Tag: Policy

Is the data privacy movement waiting for its Cuyahoga River fire or Love Canal? The muted response to the most recent data dumps say "yes." (Image courtesy of Library of Congress.)

Amid More Dumping, Data Privacy Movement Awaits a Spark | Digital Guardian

In-brief: Like Love Canal or the ‘flaming river’ in Cleveland that eventually prompted anti-pollution laws, the casual leak of data on 33 million U.S. professionals is a sign that our online environment is badly compromised. But can we fix it? (Editor’s note: this blog post originally appeared on Digital Guardian’s blog.)

Companies should make life harder for cyber criminals by ceasing the use of valuable, "static" data to authenticate consumers. (Image courtesy of the Library of Congress.)

Opinion: Disrupt Fraud by Devaluing Data

In-brief: companies that want to make life difficult for cyber criminals can start by moving valuable data off the front lines and finding ways to use less valuable information to verify the identity of their customers, writes Keir Breitenfeld, who works for Experian’s Fraud & Identity Solutions group.

Hacking tools belonging to the CIA were leaked via the site Wikileaks. What have we learned from the release?

Podcast: CIA Hacking Tools, Our Orwellian Internet of Things & G-Men can subpoena Memories?

In-brief: In this week’s podcast, Paul talks with Sven Dietrich of The John Jay College of Criminal Justice at the City University of New York about the release of CIA hacking tools, FBI Director Comey’s talk on encryption and more. 

Proposed legislation to prevent manufacturers from using the Digital Millennium Copyright Act to prohibit independent repair and maintenance of products that run software is being sidelined by opposition from private firms like equipment maker John Deere, Motherboard reports. (Image courtesy of the Library of Congress.)

Right to Repair on the Ropes in Minnesota | Motherboard

In-brief: Proposed legislation to prevent manufacturers from denying owners and independent repair people to fix and maintain software-based products is being sidelined by opposition from private firms like equipment maker John Deere, Motherboard reports.

Many of the CIA hacking tools disclosed by Wikileaks target known or patched security holes, security experts say.

MEH CIA: Agency’s Hacking Tools Targeted Known, Patched Holes

In-brief: Two days after the site Wikileaks dumped thousands of pages of information about covert CIA hacking tool, the security and technology communities have weighed in. Their verdict? Meh.