Archive

Researchers Find Cyberattack Discrepancies Based on Race, Gender

The research by Malwarebytes, Digitunity and the Cybercrime Support Network based on a survey of 5,000 people in the United States, United Kingdom and Germany found that Black people, Indigenous people, and People of Color (BIPOC) are more likely to have their identities stolen than White people, 21...

Marketers Need New Strategies To Parry Cookieless Advertising

The impending loss of third-party digital cookies will soon force the e-commerce advertising industry to shift its strategies fast. These developments are issuing a real blow to advertisers seeking to leverage third-party data. At issue now is how brands will regroup from these substantial changes t...

The Perils of IT Security Hubris

Corporate cybersecurity has been increasingly compromised since organizations began implementing work-from-home policies in March as the pandemic continued its spread. In addition to the risks created by increased stress on personnel and depleted staff, IT leaders might be overconfident about the cy...

John McAfee Emerges With Private Cell Phone Data Service

The Ghost Cell Phone Data Service is part of a larger ecosystem which includes McAfee's Ghost cryptocurrency and GhostX Exchange for private cryptocurrency exchange. "The Ghost brand will encompass a range of practical, real world tools for people to protect our rights and take back our privacy," M...

Apple Feature Forces Change in Online Ad Industry

Apple's Intelligent Tracking Prevention feature has made it difficult for online advertisers to use cookies to target Safari users based on their browsing habits. Third-party cookies "serve as the foundation for almost all advertising use cases," noted Jordan Mitchell, head of consumer privacy, iden...

Congress Eyes Google’s Chrome Encryption Plans

Google's plans to test an encrypted Internet DNS protocol reportedly have spurred some members of Congress to consider opening an antitrust investigation. They are concerned that the new technology could give Google an edge over competitors by making it harder for them to access consumer data. Googl...

Instagram May Roll Out App for ‘Real Friends’ Sharing

A new application may be in the works that allows Instagram users to share real-time information with their closest friends. Called "Threads," the app allows users to set up automatic sharing with their closest Instagram buddies of such information as location, movement and battery life, as well as ...

Apple Spotlights Privacy, Big Iron at WWDC

Privacy, a new muscular Mac Pro workstation, and the debut of iPadOS were topline items at Apple's WWDC keynote. During its more than two-hour presentation, Apple emphasized new features in its products aimed at protecting users' data and privacy. "At Apple, we believe privacy is a fundamental human...

EXPERT ADVICE

A Practical Guide to Protecting Your Privacy Online

Do you take your online privacy seriously? Most people don't. They have an ideal scenario of just how private their online activities should be, but they rarely do anything to actually achieve it. The problem is that bad actors know and rely on this fact, and that's why there's been a steady rise in...

LINUX PICKS AND PANS

Kodachi Builds Privacy Tunnel for Linux

Online and Internet security are not topics that typical computer users easily comprehend. All too often, Linux users put their blind trust in a particular distribution and assume that all Linux OSes are equally secure. However, not all Linux distros are created with the same degree of attention to ...

How to Protect Your Company’s Online Reputation

When it comes to business, you're only as good as your reputation. Indeed, your reputation is your brand. It is the substance your logo represents; it is the glue in customer brand loyalty. In a word, reputation is everything. Yet it's not entirely under your control. That doesn't mean you are helpl...

EXPERT ADVICE

How to Protect Your Online Privacy: A Practical Guide

Do you take your online privacy seriously? Most people don't. They have an ideal scenario of just how private their online activities should be, but they rarely do anything to actually achieve it. The problem is that bad actors know and rely on this fact, and that's why there's been a steady rise in...

BEST OF ECT NEWS

How to Prevent the Internet From Ruining Your Company’s Reputation

When it comes to business, you're only as good as your reputation. Indeed, your reputation is your brand. It is the substance your logo represents; it is the glue in customer brand loyalty. In a word, reputation is everything. Yet it's not entirely under your control. That doesn't mean you are helpl...

Google Digs In Heels Over Global Expansion of EU’s ‘Right to Be Forgotten’

Google took on French lawyers at the European Union Court of Justice this week, in an effort to fend off expansion of the EU's "right to be forgotten" judgment. The EU's attempts to broaden the scope of that judgment would be "completely unenvisagable," and it could result in impositions on the valu...

Elon Musk's Dec. 2 action to release The Twitter Files: Approve or Disapprove?
Loading ... Loading ...

LinuxInsider Channels