Articles about Privacy

Identifying users with behavioral biometrics

Password

As we're regularly being told, passwords on their own are no longer sufficient to ensure our security. Businesses are therefore on the lookout for new ways to identify users without making the sign in process overly complicated.

Adaptive authentication specialist SecureAuth is launching the latest version of its product that includes behavioral biometrics, a new risk analysis technology that performs keystroke analysis and mouse movement analysis to determine a user's legitimacy and build a completely unique behavior-based profile on each user device.

Continue reading

85 percent of enterprises keep sensitive data in the cloud

cloud padlock

According to a new report by enterprise security specialist Vormetric, 85 percent of senior IT security executives worldwide say they are using sensitive data in the cloud, up from 54 percent last year.

But even as they move to adopt cloud services, and in some cases believe that cloud environments are more secure than their local IT infrastructure, enterprises remain concerned about the security of their information.

Continue reading

Big Brother ist vatching you: Germany poised to use Trojans to spy on internet users

german_trojan

German intelligence agencies are set to gain greater NSA-style surveillance powers after the German Interior Ministry announced plans to use Trojans to spy on the internet activities of suspects. Known as Bundestrojaner, the Trojan would give the government the ability to not only track which sites a target visits, but also record conversations, make use of webcams, access data and log keystrokes.

The Trojan has been in testing since late last year, and having received governmental approval could now be widely dispatched. Widely described as malware and spyware, the tool cannot be used without a court order, but this will do little to assuage the fears of privacy groups.

Continue reading

How to stop Microsoft using your Windows 10 lock screen to show ads

keyhole

Sometimes it can feel as though I'm just looking for things to dislike about Windows 10, but just as I'm warming to the operating system a little more (in the last week I went as far as starting to write an article about how my opinion of Windows 10 had changed for the better. It remains unfinished), something else comes along to irritate me. I know I'm not alone, and the most recent annoyance is the appearance of ads on the lock screen.

You're probably more used to the idea of the lock screen being home to either a photo of your choice, or a randomly selected image from Microsoft that changes from time to time. Recently however, some users have noticed that these images have been replaced with ads for the game Rise of the Tomb Raider. If you want to ditch the lock screen ads, here's how to do it.

Continue reading

Bill Gates is wrong

sad-bill-gates

I see something disingenuous about Microsoft cofounder Bill Gates supporting the government's demands that Apple selectively unlock an iPhone used by one of the San Bernardino, Calif. shooters. The former CEO turned philanthropist spoke to the Financial times in an interview posted today. The implications for Microsoft cannot be overstated, and the company's current chief executive should state corporate policy.

Gates' position aligns with the government's: That this case is specific, and isolated, and that the demand would merely provide "access to information". Here's the thing: The interviewer asks Gates if he supports tech companies providing backdoors to their smartphones. The technologist deflects: "Nobody's talking about a backdoor". Media consultants teach publicly-facing officials to offer non-answers exactly like this one. The answer defines the narrative, not the interviewer's question.

Continue reading

95 percent of US consumers share their passwords

weak password

It seems that convenience trumps security when it comes to passwords. Although 73 percent of US consumers believe sharing login details is risky, 95 percent do share between one and six of their passwords with other people.

A new survey by LastPass also reveals that only 19 percent of respondents say they don't share passwords that would jeopardize their identity or financial information, leaving a scary 81 percent of people who would share them.

Continue reading

Are you Digitally Enlightened or an Online Nudist?

personal-keyboard

According to the results of a new survey, while two thirds of US respondents say they would like extra layers of online privacy and security, their actions prove otherwise as few even use currently available tools.

The study by VPN provider Hide My Ass! has been used to categorize people into five different approaches to online life:

Continue reading

The role of collaboration in GDPR compliance

Cloud handshake collaboration

As the European Union reaches an agreement on the General Data Protection Regulation (GDPR), which will require companies to comply with state-of-the-art cybersecurity requirements, security firm Palo Alto Networks has surveyed businesses to see how much they know about cyber-security and where the responsibility lies.

The survey suggests much work still needs to be done, particularly in areas of collaboration and responsibility sharing.

Continue reading

Tim Cook is absolutely right

Apple CEO Tim Cook

Some documents are historically significant. They mark moments, comment on them, in manner demanding future citation and even use in courts or classrooms. That's how I read Apple CEO Tim Cook's "Open Letter to Our Customers", about breaking iPhone encryption. His exposition spotlights seminal moment in the United States of America: Government's further expansion of powers encroaching indiviuals' rights to privacy and one company standing up and saying "No".

Some people will scoff at my comparison, but it truly is what I see. Cook is like Rosa Parks, refusing to take a seat at the back of the bus—or in this instance behind one court judge and the FBI. Cook and Apple stand up for us all. I applaud law enforcement's efforts to protect us from terrorism but tyranny shouldn't be the means; taking away Constitutionally-given freedoms to protect them. Tim Cook is right.

Continue reading

Your VoIP phone could be used to spy on you

phone_exchange

You should be careful when running voice-over-IP (VoIP) phones, as weak passwords could turn your device into a covert spying tool.

Security consultant Paul Moore says he has discovered how default and weak passwords on enterprise-grade Snom VoIP phones could allow attackers to make their own calls using your service, or listen to your conversations.

Continue reading

ID as a Service solution helps to secure digital access

ID verification

Identity and access management (IAM) is a growing field, expected to be worth around $18 billion by 2019 according to a recent report.

This is partly down to cloud growth creating the need for a secure solution that can scale quickly, in on-premise environments and across cloud applications, without additional costs for installation and extra hardware.

Continue reading

Windows 10 to be installed on 4 million US Department of Defense computers

Windows 10

Microsoft keeps shouting about the millions of users that have switched to Windows 10, and soon the company will have another 4 million to bray about. The US Department of Defense is the latest big name to give Windows 10 the seal of approval apparently unconcerned with the privacy and telemetry issues that have put off others.

4 million enterprise upgrades for Windows 10 is a real feather in the cap for Microsoft, and the aim is to get each system running the latest version of the operating system inside a year. The DoD has also announced that it is granting certification to Surface 3, Surface Pro 3, Surface Pro 4, and Surface Book devices, meaning that they now appear on its Approved Products List.

Continue reading

Why Apple is right to reject the order to unlock a killer's phone

iPhone unlock

Apple has been ordered by the US courts to help the FBI gain access to data on an iPhone belonging to San Bernardino gunman Syed Rizwan Farook. Farook and his wife killed 14 people in the California city late last year before being shot dead by police.

The FBI says the phone contains information crucial to the investigation, and needs Apple’s help to unlock it. Data on Apple devices is encrypted by default -- and has been since September 2014 -- which means no one, other than the device owner, can access it. And that includes Apple itself.

Continue reading

Mozilla wants to educate us all on encryption

Data encryption

Terrorists use encryption. They also breathe air, drive cars, and drink water. What do I mean by saying this? Well, just because a bad person uses something, doesn't make the thing they use evil. In fact, encryption is not evil at all -- it is a tool to protect the privacy and communications of all people.

Sadly, not everybody understands encryption. There is nothing wrong with being ignorant on a subject -- not everyone can be knowledgeable about everything. With that said, some politicians and other decision-makers could enact policy about encryption due to knee-jerk reactions to things they don't understand. Luckily, Mozilla has a new initiative aimed at educating people as to what encryption actually is.

Continue reading

Store your personal data in a HAT to keep it safe

Education internet

As we use the internet we give away information to lots of sites from shopping portals to search engines. The growth of the Internet of Things is likely to see a further boost in the amount of data held and shared about us.

The Warwick Manufacturing Group (WMG) at the University of Warwick in the UK is working on £1.2 million HAT (Hub-of-all-things) research project to develop a platform technology where individuals can keep all their personal data in one place.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.