Drivers To Be Given Real-Time “Risk Scores” Using Embedded Telematic Surveillance Sensors
The real reason behind machine-to-machine (M2M) communication, or telematics in new cars is to more precisely assess risk.
The real reason behind machine-to-machine (M2M) communication, or telematics in new cars is to more precisely assess risk.
A threat actor has published the phone numbers and account details for an estimated 533 million Facebook users —about a fifth of the entire social network’s user pool— on a publicly accessible cybercrime forum.
End-to-end encryption could be challenged with security agencies enabled to monitor user messages.
A planned Biden administration executive order will require many software vendors to notify their federal government customers when the companies have a cybersecurity breach.
Research claims there is little difference between Apple and Google when it comes to collecting certain data.
Bavarian DPA declared the use of Mailchimp in Bavaria impermissible due to non-compliance with Schrems II mitigation steps in relation to the transfer of e-mail addresses to Mailchimp in the U.S.
Cars are increasingly equipped with cameras to monitor driver behavior, but Tesla’s use of the technology raises safety and privacy questions.
The computer code underlying TikTok doesn’t pose a national security threat to the U.S., according to a new study by university cybersecurity researchers.
Credit card hacking forum Carding Mafia is the latest victim of the age-old hackers on hackers crime.
Tesla would never provide the U.S. government with data collected by its vehicles in China or other countries, said CEO Elon Musk.
If you intend to quit WhatsApp for another social media application, here is a list of applications that are secure, and you should totally try out…
Computer giant Acer has been hit by a REvil ransomware attack where the threat actors are demanding the largest known ransom to date, $50,000,000.