Skip to content

CyberPrivacy

Where Cybersecurity and Privacy Meet Society

  • About us
  • Copyright Policy
  • Privacy Notice

We respect your privacy. We will never share your information.

Follow CyberPrivacy on WordPress.com

Knowledge base

  • Marília Wyatt: A Farewell Letter to Readers November 24, 2019
  • Reddit Urges Users To Switch To Token-Based Authentication August 1, 2018
  • AI Tool Makes It Easier for Users to Grasp Privacy Policies July 9, 2018
  • Thousands of Apps for Kids Insecurely Transmit Data, Report Says June 4, 2018
  • Political Scientists Examine Cyberattacks Implications On Human Psyche September 20, 2017
  • A Brief History of Information Privacy Law February 10, 2017
  • New Research Reveals Top Five Impediments to Cybersecurity Framework Implementation January 5, 2017
  • The Evolution of Politically Motivated Distributed Denial of Service Attacks January 5, 2016
  • “Privacy”, The Stanford Encyclopedia of Philosophy August 9, 2013

Blogroll

  • A Cypherpunk's Manifesto
  • Addressing The Deficit in Cybersecurity Workforce & National Policy
  • Advice from a Hacker on Picking a Good Password
  • Biased Algorithms Are Everywhere, and No One Seems to Care
  • China’s Ministry of State Security Likely Influences National Network Vulnerability Publications
  • Choosing The Perfect Computer
  • CIO Quick Takes: What You Need to Know about Women in Tech
  • Cisco Turns To The Education Sector For Cybersecurity Experts
  • Cobalt VP Caroline Wong To Women Considering Cybersecurity: 'Do It'
  • Computers at Risk: Safe Computing in the Information Age
  • Cyber Attack Survival Guide
  • Cyber-Attacks Take Aim at Universities Across US
  • Cybercrime/Hacker Terminology
  • Cybersecurity Dictionary
  • Cybersecurity for Critical Energy Infrastructure
  • CyberWar Threat
  • Cyphernomicon
  • Educational Software Rings in Big Bucks at Expense of Students
  • Following Student Suicides, Administrators Balance Privacy and Transparency
  • Girl Scouts Can Now Seek Cybersecurity Badges
  • Hackers, By Steven Levy, Examines History & Culture of Early Computing
  • Have You Looked at Your Cybersecurity Strategy Lately?
  • How Does a Data Breach Happen?
  • How to Become a Full-Blown Privacy Fanatic With Purism's Librem Laptop
  • How to Set Up and Use a VPN
  • How to Turn Every Employee into a Cybersecurity Expert
  • Improving Cybersecurity Governance In The Boardroom
  • It’s Creepy, But Not Illegal, For This Website To Provide All Your Public Info To Anyone
  • List of Data Brokers and Opt Out Info
  • Malware Hunter: New Service From Search Engine Shodan Finds Malware Servers
  • Pearson: No Profits Left Behind Even When Results Don’t Measure Up
  • Petya 2017 Was A Wiper Not A Ransomware
  • Phishing with Unicode Domains
  • Politics Intrude as Cybersecurity Firms Hunt Foreign Spies
  • Privacy in the Information Age Is Not a Lost Cause
  • Request for Confidentiality of Your Rutgers' Student Directory Information
  • Risk-Based Approaches to Cybersecurity
  • Senators Offer Bill To Boost Security Of Internet-Connected Devices
  • Smart Farming May Increase Cyber Targeting Against US Food and Agriculture Sector
  • Smart TVs Are Spying On You Through Your Phone
  • Supreme Court: Hacking Conviction Stands for Man Who Didn’t Hack Computer
  • Tactical Cybersecurity Checklist
  • The Bootlegger, the Wiretap, and the Beginning of Privacy
  • The Brutal Fight to Mine Your Data and Sell It to Your Boss
  • The Digital Vigilantes Who Hack Back
  • The Drone as Privacy Catalyst
  • The Man Who Wrote Those Password Rules Has a New Tip: N3v$r M1^d!
  • Think Like a Hacker, Defend Like a Ninja
  • Trump Budget Includes Big Money For Cybersecurity
  • UN Finds Cybersecurity Is A Struggle Worldwide
  • Understanding The Dark Web & How it Factors Into Cybersecurity
  • Universities like Rutgers are Frequent Targets for Cyber-Attacks
  • Untangling the Tangled Web of Cybersecurity Disclosure Requirements: A Practical Guide
  • Use This Tool to Check if You have Been Pwned
  • What Is A Fileless Attack? How Attackers Invade Systems Without Installing Software
  • Why Algorithmic Transparency is Important
  • Why Privacy Matters Even if You Have 'Nothing to Hide'
  • Why VPN adoption Will How & How It’ll Keep Pace with Demand

Archives

Category: apps

AI Tool Makes It Easier for Users to Grasp Privacy Policies

AI tool aims to help users understand complex privacy policies on the internet, and help organizations improve their privacy policies.

Read More AI Tool Makes It Easier for Users to Grasp Privacy Policies
Featured

Thousands of Apps for Kids Insecurely Transmit Data, Report Says

Thousands of Android apps targeted explicitly at kids under 13 may be violating U.S. privacy law; 40% of apps analyzed  do not use TLS in at least one transmission containing identifiers or other sensitive information.

Read More Thousands of Apps for Kids Insecurely Transmit Data, Report Says
Create a website or blog at WordPress.com
  • Follow Following
    • CyberPrivacy
    • Already have a WordPress.com account? Log in now.
    • CyberPrivacy
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar