Checkout
Cart: $0.00 - (0 items )

This is how police request customer data from Amazon

This is how police request customer data from Amazon Anyone can access portions of a web portal, used by law enforcement to request customer data from Amazon, even though the portal is supposed to require a verified email address and password. Amazon’s law enforcement request portal allows police and federal agents to […]

Read More

Senate’s encryption backdoor bill is ‘dangerous for Americans,’ says Rep. Lofgren

Senate’s encryption backdoor bill is ‘dangerous for Americans,’ says Rep. Lofgren A Senate bill that would compel tech companies to build backdoors to allow law enforcement access to encrypted devices and data would be “very dangerous” for Americans, said a leading House Democrat. Law enforcement frequently spars with tech companies over their […]

Read More

Apple opens up — slightly — on Hong Kong’s national security law

Apple opens up — slightly — on Hong Kong’s national security law After Beijing unilaterally imposed a new national security law on Hong Kong on July 1, many saw the move as an effort by Beijing to crack down on dissent and protests in the semi-autonomous region. Soon after, a number of […]

Read More

Decrypted: Uber’s former security chief charged, FBI’s ‘vishing’ warning

Decrypted: Uber’s former security chief charged, FBI’s ‘vishing’ warning A lot happened in cybersecurity over the past week. The University of Utah paid almost half a million dollars to stop hackers from leaking sensitive student data after a ransomware attack. Two major ATM makers patched flaws that could’ve allowed for fraudulent cash […]

Read More

Leaked S-1 says Palantir would fight an order demanding its encryption keys

Leaked S-1 says Palantir would fight an order demanding its encryption keys Palantir, the secretive data analytics startup founded by billionaire investor Peter Thiel, would challenge a government order seeking the company’s encryption keys, according to a leaked document. TechCrunch has obtained a leaked copy of Palantir’s S-1, filed with U.S. regulators […]

Read More

A new technique can detect newer 4G ‘stingray’ cell phone snooping

A new technique can detect newer 4G ‘stingray’ cell phone snooping Security researchers say they have developed a new technique to detect modern cell-site simulators. Cell site simulators, known as “stingrays,” impersonate cell towers and can capture information about any phone in its range — including in some cases calls, messages and […]

Read More

Gedmatch investigating after user DNA data made available to police

Gedmatch investigating after user DNA data made available to police Gedmatch, the DNA analysis site that police used to catch the so-called Golden Gate Killer, was pulled briefly offline on Sunday while its parent company investigated how its users’ DNA profile data apparently became available to law enforcement searches. The site, which […]

Read More

Decrypted: As tech giants rally against Hong Kong security law, Apple holds out

Decrypted: As tech giants rally against Hong Kong security law, Apple holds out It’s not often Silicon Valley gets behind a single cause. Supporting net neutrality was one, reforming government surveillance another. Last week, Big Tech took up its latest: halting any cooperation with Hong Kong police. Facebook, Google, Microsoft, Twitter, and […]

Read More

CBP says it’s ‘unrealistic’ for Americans to avoid its license plate surveillance

CBP says it’s ‘unrealistic’ for Americans to avoid its license plate surveillance U.S. Customs and Border Protection has admitted that there is no practical way for Americans to avoid having their movements tracked by its license plate readers, according to its latest privacy assessment. CBP published its new assessment — three years […]

Read More

Societal upheaval during the COVID-19 pandemic underscores need for new AI data regulations

Societal upheaval during the COVID-19 pandemic underscores need for new AI data regulations Bradford K. Newman Contributor Bradford K. Newman is the chair of Paul Hastings’ Employee Mobility and Trade Secret Practice and the author of Protecting Intellectual Property In The Age Of Employee Mobility: Forms and Analysis. More posts by this […]

Read More

Back to top