TikTok

TikTok and National Security: The Need for a Comprehensive U.S. Privacy Law

| | data, Privacy, social media
Last week, President Donald Trump threatened to ban the popular social media platform TikTok, whose corporate owner is a Chinese company with alleged ties to the Chinese Communist Party. Trump’s stated grounds ...
Security Boulevard

How Big Tech Collects Your Private Data and How to Delete It

In episode 132 for August 3rd 2020: How the big tech companies like Google, Apple, Facebook, and Twitter collect your private data and how you can delete it with Kira Rakova from ...
Sextortionists Using Social Engineering Tactics to Collect Victims’ Data

Sextortionists Using Social Engineering Tactics to Collect Victims’ Data

Security researchers observed sextortionists leveraging social engineering techniques to steal their victims’ personal information. SANS’ Internet Storm Center (ISC) discovered that sextortionists had begun creating profiles for young women on dating websites ...
U.S. Marshals Announced Data Breach of Prisoners’ Information

U.S. Marshals Announced Data Breach of Prisoners’ Information

The United States Marshals Service announced a data breach involving the personal information of its former and current prisoners. In a data breach notification letter obtained by ZDNet, the U.S. Marshals Service ...
5 Ways to Strengthen your Password

5 Ways to Strengthen your Password

We use passwords to secure a variety of personal and professional accounts. These accounts protect important data such as ourbanking information, medical portals, or company emails. As we create more profiles for ...
5 Ways to Strengthen your Password

5 Ways to Strengthen your Password

We use passwords to secure a variety of personal and professional accounts. These accounts protect important data such as ourbanking information, medical portals, or company emails. As we create more profiles for ...
data lifecycle

Storage Is Your Data Lifecycle Weak Spot

Privacy regulations have put more emphasis on data security. When we talk about data security and privacy, it’s often discussed as though the protection covers everything equally. But all data isn’t equal; ...
Security Boulevard
DoppelPaymer Ransomware Launches Site for Publishing Victims’ Data

DoppelPaymer Ransomware Launches Site for Publishing Victims’ Data

The operators of DoppelPaymer ransomware launched a site for publishing the data of their victims who don’t pay the ransom. On February 25, DoppelPaymer’s handlers published a site called “Dopple leaks.” A ...
Ashley Halsey

The Three Best Practices for Securing the Hybrid Cloud

The post The Three Best Practices for Securing the Hybrid Cloud appeared first on CCSI ...
Keep Business Communications Confidential

Technology: Good Thing or Bad Thing?

These days it’s trendy to talk about technology as if it were purely a bad thing. After all, we’ve got companies violating our privacy and harvesting our data without being transparent about ...