privacy
-
NSA Admits Secretly Buying Your Internet Browsing Data without Warrants
The U.S. National Security Agency (NSA) has admitted to buying internet browsing records from data brokers to identify the websites…
Read More » -
LODEINFO Fileless Malware Evolves with Anti-Analysis and Remote Code Tricks
Cybersecurity researchers have uncovered an updated version of a backdoor called LODEINFO that’s distributed via spear-phishing attacks. The findings come…
Read More » -
Remcos RAT Spreading Through Adult Games in New Attack Wave
The remote access trojan (RAT) known as Remcos RAT has been found being propagated via webhards by disguising it as…
Read More » -
Case Study: The Cookie Privacy Monster in Big Global Retail
Explore how an advanced exposure management solution saved a major retail industry client from ending up on the naughty step…
Read More » -
FTC Bans Outlogic (X-Mode) From Selling Sensitive Location Data
The U.S. Federal Trade Commission (FTC) on Tuesday prohibited data broker Outlogic, which was previously known as X-Mode Social, from…
Read More » -
NIST Warns of Security and Privacy Risks from Rapid AI System Deployment
The U.S. National Institute of Standards and Technology (NIST) is calling attention to the privacy and security challenges that arise…
Read More » -
5 Ways to Reduce SaaS Security Risks
As technology adoption has shifted to be employee-led, just in time, and from any location or device, IT and security…
Read More » -
The Definitive Enterprise Browser Buyer’s Guide
Security stakeholders have come to realize that the prominent role the browser has in the modern corporate environment requires a…
Read More » -
Google Settles $5 Billion Privacy Lawsuit Over Tracking Users in ‘Incognito Mode’
Google has agreed to settle a lawsuit filed in June 2020 that alleged that the company misled users by tracking…
Read More » -
Product Explained: Memcyco’s Real-Time Defense Against Website Spoofing
Hands-On Review: Memcyco’s Threat Intelligence Solution Website impersonation, also known as brandjacking or website spoofing, has emerged as a significant…
Read More »