Major tech companies and some lawmakers are pushing for rules on using facial recognition systems, but federal regulation isn't on the horizon.
Microsoft will do more than pay researchers bounties for finding and reporting vulnerabilities in Microsoft Account and Microsoft Entra ID in its Microsoft Identity Bounty Program. The company also wants vulnerabilities in select OpenID standards.
Two months into his job, FTC Chairman Joseph Simons says the commission needs more authority to enforce data security privacy violations.
Two powerful senators have asked executives at Google and Amazon to rethink their decisions to end the use of domain fronting on their cloud networks to help protect at-risk users.
Microsoft President Brad Smith is asking Congress to step in and regulate the use of facial recognition technology to help prevent abuse.
The FBI estimates that BEC scams have cost victims nearly $13 billion in the last year and a half, a major increase that shows no signs of being an anomaly.
Why are attackers interested in compromising the Internet of Things? In this Decipher video, security experts discuss what attackers are looking for when they go after Internet-connected doorbells and other smart devices.
Bundles of personal data records are referred to as fullz on the underground marketplaces by criminals. The data can include names, addresses, phone numbers, social security numbers (SSNs) and date of birth, all of which can be used for medical fraud, impersonation or even extortion. Stolen healthcare information is valued the highest.
"If it bleeds, it leads..." We have a perverse fascination with autonomous vehicles, especially when they fail, and even more so when there is a fatality.
Chrome now includes a new feature called Site Isolation that can help defend against speculative execution attacks in the browser.
In its latest release of iOS, Apple has included a new feature called Restricted Mode that can prevent USB-based attacks.
A case before the Illinois Supreme Court is looking like a key test of how companies are allowed to collect and use consumers' biometric information.
For organizations worried about phishing attacks and the prospect of losing control over their files the checklist from the Democratic National Committee is a good starting point to improve baseline security practices.
Facebook said in a long response to lawmakers that it had so-called integration partnerships with 52 companies, but it has ended most of them already.
The CA Security Council's London Protocol attempts to address the problem of phishing sites with legitimate SSL/TLS certificates, but the initiative perpetuates the myth that the pricier EV certificates are more secure than DV certificates.