Sensitive data for around 14 million Verizon customers was exposed online because a third-party contractor forgot to limit external access to an Amazon S3 server.
The Federal Trade Commission has shut down the operator of a large network of online loan sites that allegedly promised to find people the loans with the lowest rates, but actually sold users' data to third-parties, most of which weren't even lenders.
An impAn improperly secured Amazon S3 "bucket" (server) belonging to World Wrestling Entertainment (WWE) had exposed the personal details of over three million fans.roperly secured Amazon S3 "bucket" (server) belonging to World Wrestling Entertainment (WWE) had exposed the personal details of over three million fans.
Low-income families from Rhode Island are giving up their privacy for the sake of receiving a school-issued laptop to aid children in their studies, according to a report released by the American Civil Liberties Union (ACLU) last week.
Gabor Szathmari, a security researcher for CryptoAUSTRALIA, is working on a method of improving the security of leaked documents by removing hidden dots left behind by laser printers, which are usually used to watermark documents and track down leakers.
Some people have no shame, and one of those is Theresa May, the Prime Minister of the United Kingdom, who used the terror attacks that took place in London, on Saturday, June 3, to push her party's agenda for laws that would push for encryption backdoors.
Ran Bar-Zik, a web developer at AOL, has discovered and reported a bug in Google Chrome that allows websites to record audio and video without showing a visual indicator.
At the annual Google Marketing Next conference, the Mountain View search and advertising giant announced a new service that will let advertisers track and tie offline credit card payments with ongoing marketing campaigns.
A report released on Monday by The Centre for Internet and Society reveals that over 135 million records from India's Aadhaar national ID systems have already leaked online.
Dr. Neal Krawetz, a computer forensics expert, revealed on Monday several problems with the amount of details the Tor Browser discloses about users, which may allow a determined actor to identify users employing the Tor Browser to surf the Internet.
Sensors used to detect the level of ambient light can be used to steal browser data, according to privacy expert Lukasz Olejnik.
The website of a company handling the shipment of Samsung products is currently leaking data about Samsung customers in an appalling manner.
For many years, MAC Address Randomization was slated as the next big thing for protecting user privacy on the modern Internet.
The way in which Firefox caches intermediate CA certificates allows a third-party to deduce various details about website visitors and also link advertising profiles to private browsing sessions.
Germany's telecommunications regulator has issued a ban against a line of smart toys called "My Friend Cayla," calling the toy an espionage device, and recommending that parents destroy all toy instances at once.
Downloading and trying to open Windows DRM-protected files can deanonymize Tor Browser users and reveal their real IP addresses, security researchers from Hacker House have warned.
Scientists from universities in China and the UK have published research that details a novel method that breaks Android's pattern lock system based on videos of people entering their patterns from distances of up to nine meters away.
New research released this week reveals that a large chunk of today Android VPN clients are a serious security and privacy risk, with some clients failing to encrypt traffic, and some even injecting ads in a customer's browsing experience.
A new ransomware called DetoxCrypto has been discovered that includes variant that take pictures of your active screen or try to take part in the PokemonGo craze.