Source Surveillance in The Circle October 22, 2017March 12, 2018Privacy Tech Team What if you lived in a world of total surveillance, constantly observed by millions of watchers? Such is the premise of the best-selling
2FA – What is it? October 18, 2017March 12, 2018Privacy Tech Team With the endless cycle of news about breaches and hacked accounts, many people start to wonder how they can better protect their digital
Source: Gage Skidmore The FCC and Privacy – Two Viewpoints October 18, 2017March 12, 2018Privacy Tech Team The Federal Communications Commission (FCC) has been in the news in recent days, as a proposed measure to increase consumer privacy hit resistance
Source: Blue Coat Photos Insider Threats: a Growing Menace October 14, 2017March 12, 2018Privacy Tech Team We’ve seen data breaches due to misconfigured databases, technical malfunctions, and a myriad of other causes including accidental disclosure or theft. Data breaches
Backdoors to Encryption October 10, 2017March 12, 2018Privacy Tech Team As encryption has become a common facet of modern technology, the laws governing privacy and law enforcement’s access to information has struggled to
Your Health Privacy at Risk October 6, 2017March 12, 2018Privacy Tech Team So far this year, data breaches have continued to occur at a feverish pace. One favorite target? Health records. According to the Privacy
Tax Time Comes for Bitcoin Users October 2, 2017March 12, 2018Privacy Tech Team Think you can use Bitcoin to avoid paying taxes? Think again. As cryptocurrencies have risen in popularity, tax regulators are taking notice. The
The Future of Cyber War September 30, 2017March 12, 2018Privacy Tech Team In 2010, the world was introduced to what was possibly the first incident involving cyberwarfare. The Stuxnet malware had infected Iranian nuclear
TorFlow The Dark Net September 26, 2017March 12, 2018Privacy Tech Team When you think of the internet, what do think of? For many people, the internet conjures thoughts of familiar sites such as Google,
A. Dulaunoy Bug Bounty Programs Pay Hackers to Hack September 23, 2017March 12, 2018Privacy Tech Team Uber was recently in the headlines when a hacker was able to exploit a vulnerability in Uber’s code and get rides for free.