We examine the automotive data ecosystem and take a closer look at privacy and security concerns arising from how data is generated, consumed, and transmitted by connected vehicles.
The photos, videos, and audio posts we put online expose sensitive biometric patterns that can be abused by cybercriminals. These patterns are virtually unchangeable and can be used now or in future attacks.
Our research takes an in-depth look at the security flaws that we found in the logistics API implementation of e-commerce platforms that can potentially leak the private information of consumers.
An unsecured Amazon S3 bucket was found leaking the data of more than 30,000 individuals. It was discovered to have exposed 85,000 files that included records with sensitive personally identifiable information (PII).
Researchers recently demonstrated how security issues in Amazon Alexa Google Home devices can be abused to phish and eavesdrop on their owners. Here's what you need to know.
The nonprofit group Open Privacy Research Society recently publicized that the confidential medical and personally identifiable information (PII) of patients across Vancouver, Canada, is being leaked through the paging systems of hospitals in the area. What do
Identifying mission-critical information assets is essential in designing an effective security architecture. What assets demand the best defenses and protection?