In this farewell letter, CyberPrivacy founder Marília Wyatt discusses why the publication matters to her, the joy of how readers connect with the work, and what is next.
Read More Marília Wyatt: A Farewell Letter to Readers
Thousands of Android apps targeted explicitly at kids under 13 may be violating U.S. privacy law; 40% of apps analyzed do not use TLS in at least one transmission containing identifiers or other sensitive information.
Read More Thousands of Apps for Kids Insecurely Transmit Data, Report Says
This research explores the history of DDos attacks, which were previously designed to inflict punitive damage on the victim but have since grown into sophisticated censorship tools.
Read More The Evolution of Politically Motivated Distributed Denial of Service Attacks
The contributing authors examine various aspects of the right to privacy and its role in moral philosophy, legal theory, and public policy. They also address justifications and foundational arguments for privacy rights.
Read More “Privacy”, The Stanford Encyclopedia of Philosophy
The CyberPrivacy Brief: The security incident disclosed Wednesday by social media network Reddit verifies how attackers can intercept text messages or SMS-based two-factor authentication that delivers unique code to compromise accounts. Impacted user data includes email addresses and a 2007 database backup that had old salted and hashed passwords. Attackers also had read access to storage systems, including Reddit source […]
Read More Reddit Urges Users To Switch To Token-Based Authentication
AI tool aims to help users understand complex privacy policies on the internet, and help organizations improve their privacy policies.
Read More AI Tool Makes It Easier for Users to Grasp Privacy Policies
A study from scientists at the University of Haifa, Israel found an increase in participants’ levels of cortisol, the stress hormone when they saw simulated cyberattacks on computers and mobile phones.
Read More Political Scientists Examine Cyberattacks Implications On Human Psyche
By Daniel Solove George Washington University Law School This book chapter, originally written in 2006 and updated in 2016, provides a brief history of information privacy law, with a primary focus on United States privacy law. It discusses the development of the common law torts, Fourth Amendment law, the constitutional right to information privacy, numerous […]
Read More A Brief History of Information Privacy Law
The top five impediments to cybersecurity framework implementation were reported as follows: 1) Lack of trained staff; 2) Lack of necessary tools to automate controls; 3) Lack of budget; 4) Lack of appropriate tools to audit continuous effectiveness of controls; and 5)
Read More New Research Reveals Top Five Impediments to Cybersecurity Framework Implementation
Lack of integration among tools