High-Tech Bridge decided to conduct a simple technical experiment to verify how the 50 largest social networks, web services and free emails systems respect – or indeed abuse - the privacy of their users.
Yves Le Roux is the Technology Strategist at CA Technologies and Chair of ISACA’s Data Privacy Task Force.
Inspired by a piece of fictional software described in Cory Doctorow's book Little Brother, developer Ben West created a browser plugin that should, in theory, make it difficult for advertisers and government agencies to create an accurate profile of an Internet user based on the websites he visits.
Cybercriminals have been spotted using a novel method of controlling Android mobile malware: a legitimate service called Google Cloud Messaging.
It has recently been proved that setting up bug bounties is a cheaper option than hiring full-time bug hunters, and Google's two bug bounty programs - Google Web and Chromium - have proved to be a great choice for the company, According to the researchers, one of the factors in the success of the Chromium bug bounty initiative is that the majority of the rewards are for only $500 or $1,000 and larger rewards are infrequent.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.