Yellow Printer Dots Reveal Identity of NSA Leaker
Ars Technica reported (thanks Dave Ries) last week on how NSA leaker Leigh Winner was identified. When reporters at The […]
Ars Technica reported (thanks Dave Ries) last week on how NSA leaker Leigh Winner was identified. When reporters at The […]
…it’s not only the price you pay that will be affected. Source: Social media intelligence and profiling in the insurance […]
While most desktop ransomware targets Windows, simply because it is the most widely used operating system, some ransomware has also […]
A machine-learning algorithm could spot liars in 95% of cases. Source: Identity theft can be thwarted by artificial intelligence analysis […]
Political operatives used fake news, Big Data and Facebook to suppress the vote and rile up racists in 2016. It’s […]
Johan Smessaert, head of IT platform services at ING Belgium, tells CIO Journal that the technology would give the bank […]
Police body cameras give possibility to better investigate police incidents. However, they pose also privacy issues. Source: Body cameras are […]
Encryption has become a cornerstone of the technologies that support communication, commerce, banking, and myriad other essential activities in today’s […]
On June 06, 2017, European law firm Fieldfisher launched mobile app: “A Complete Guide to the GDPR”. The app provides complete guide […]
Mobile health apps targeting dementia patients lack appropriate privacy policies, according to researchers, raising concerns about the possibility of privacy […]
WebKit has long included features to reduce tracking. From the very beginning, we’ve defaulted to blocking third-party cookies. Now, we’re […]
In addition to improvements in productivity and eliminating things like traffic, driverless cars will be good for security, he said. […]