#rdap

[ follow ]
#privacy
fromYahoo
2 months ago
Privacy technologies

Your privacy choices

Yahoo and partners use cookies and technical identifiers to deliver services, measure usage, secure accounts, and provide personalized advertising unless users reject consent.
fromSecuritymagazine
2 months ago
Information security

Strong Privacy Requires Strong Security - and GenAI Raises the Stakes

Privacy and security must be integrated, with technical, procedural, and cultural controls enforcing privacy commitments through strong security fundamentals.
Privacy professionals
fromSecuritymagazine
1 day ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
Privacy technologies
fromComputerWeekly.com
5 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
#ai
Information security
fromHarvard Gazette
14 hours ago

Got personal financial, medical data you'd like to keep private? Good luck.Got personal financial, medical data you'd like to keep private? Good luck. - Harvard Gazette

New AI models may increase the risk of cybercriminals breaching secure systems, exposing personal data.
Privacy technologies
fromComputerWeekly.com
2 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromHarvard Gazette
14 hours ago

Got personal financial, medical data you'd like to keep private? Good luck.Got personal financial, medical data you'd like to keep private? Good luck. - Harvard Gazette

New AI models may increase the risk of cybercriminals breaching secure systems, exposing personal data.
Privacy technologies
fromComputerWeekly.com
2 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
#data-privacy
EU data protection
fromThedrum
2 days ago

The future of data, privacy and ethics

Misleading practices in e-commerce, such as false stock availability, are regulated by the European Commission to protect consumers.
Privacy professionals
fromZDNET
2 days ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
fromZDNET
1 week ago
Privacy professionals

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
fromAdExchanger
2 weeks ago
EU data protection

Data Privacy At The Kitchen Table | AdExchanger

Data privacy has become a significant concern for lawmakers and constituents, evolving into a key topic of discussion.
EU data protection
fromThedrum
2 days ago

The future of data, privacy and ethics

Misleading practices in e-commerce, such as false stock availability, are regulated by the European Commission to protect consumers.
Privacy professionals
fromZDNET
2 days ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
Privacy professionals
fromZDNET
1 week ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
fromNature
1 week ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
Europe politics
fromTheregister
1 week ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
#ddos
EU data protection
fromSecurityWeek
5 days ago

53 DDoS Domains Taken Down by Law Enforcement

Law enforcement in 21 countries coordinated to disrupt DDoS-for-hire services, resulting in arrests and the takedown of numerous domains.
Information security
fromThe Hacker News
5 days ago

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

Operation PowerOFF disrupted DDoS-for-hire services, taking down 53 domains and arresting four individuals linked to over 75,000 cybercriminals.
EU data protection
fromSecurityWeek
5 days ago

53 DDoS Domains Taken Down by Law Enforcement

Law enforcement in 21 countries coordinated to disrupt DDoS-for-hire services, resulting in arrests and the takedown of numerous domains.
Information security
fromThe Hacker News
5 days ago

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

Operation PowerOFF disrupted DDoS-for-hire services, taking down 53 domains and arresting four individuals linked to over 75,000 cybercriminals.
#age-verification
Privacy technologies
fromThe Verge
6 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
Privacy technologies
fromThe Verge
6 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
Information security
fromThe Hacker News
2 weeks ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
2 weeks ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Privacy professionals
fromZDNET
2 weeks ago

I turned to PrivacyBee to clean up my data - here's how it made me disappear

PrivacyBee is preferred for its comprehensive data removal services and user-friendly management tools.
fromTheregister
1 month ago

AFRINIC says litigant is trying to 'paralyse' it

We are currently facing a web of litigation and procedural roadblocks driven by CIL, Larus Ltd, and associated advocacy campaigns. The post mentions litigation to prevent the registry from issuing IPv4 addresses, and objections to the creation of a new committee to consider bylaw changes.
Intellectual property law
Information security
fromTechRepublic
4 weeks ago

Inside RSA 2026: Security Leaders Grapple With AI's Growing Role and Risks

The RSA Conference 2026 emphasizes the rise of AI in cybersecurity and the critical need for governance and trust in AI systems.
Privacy technologies
fromNextgov.com
1 month ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Privacy professionals
fromMedCity News
1 month ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
EU data protection
fromPrivacy International
1 month ago

Our key achievements from 2025

Organizations successfully challenged governments and corporations on data exploitation and technology misuse, achieving regulatory compliance rulings and policy reforms that protect hundreds of millions of people globally.
Privacy technologies
fromZDNET
1 month ago

This free privacy tool makes it super easy to see which sites are selling your data

Global Privacy Control is a 2020 movement offering browser extensions and tools to help users opt out of data selling by automatically signaling their privacy preferences to websites.
Privacy professionals
fromTheregister
1 month ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
Tech industry
fromTheregister
2 months ago

Internet governance can be messy. APNIC is good with that

APNIC faces member scrutiny over governance, diversity, finances, IPv6 adoption, and responsiveness while its director general urges greater member engagement and civic education.
fromEntrepreneur
1 month ago

Why Nations Are Now Battling Over Your Digital DNA

Across the world, governments are redefining data. It is no longer a commercial byproduct, but a strategic resource. One that carries economic weight, political influence, and long-term national consequences. At the center of this shift is what most people never consciously see but continuously produce: their digital DNA.
World politics
fromNextgov.com
2 months ago

Trust, trade and the new data diplomacy

Data has become the defining currency of global power. The nations and organizations that can manage, protect, and share it responsibly will shape the future of economic resilience and international cooperation. In an era where artificial intelligence and digital interdependence connect every market and mission, the ability to build and maintain trust in data is now a central pillar of both commerce and diplomacy.
World news
fromReason.com
2 months ago

How to build your own internet in 2026

The internet you experience daily-endless scrolling, algorithmic feeds serving content you didn't ask for, AI-generated slop clogging search results-isn't the only internet available. It's just the one that's easiest to stumble into. You're not stuck with the internet that has evolved alongside the rise of hegemonic platforms. We're 20-plus years into the social internet, and the winners of the last round of audience capture have made clear they're shifting to optimize for social broadcasting instead of networking, to maximize market share and market cap.
Digital life
Marketing tech
fromMarTech
1 month ago

The 5 trends reshaping identity resolution in 2026 | MarTech

Identity resolution platforms have become foundational marketing infrastructure as 54% of mobile and 36% of desktop impressions lack identifiers, making data clean rooms essential for secure cross-channel customer data collaboration.
Privacy technologies
fromArs Technica
1 month ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Marketing
fromCMSWire.com
2 months ago

The Cookie Banner Checklist That Actually Matters

A centralized resource delivers actionable research, editorial insight and practical data to guide CMOs and customer experience leaders through complex customer and organizational landscapes.
#domain-registration
Marketing tech
fromMarTech
2 months ago

Navigating identity in a cookieless, compliant world | MarTech

Transition from third-party cookies to first-party data and consent-driven identity strategies enables compliant, scalable personalization while maintaining trust.
Privacy professionals
fromWIRED
1 month ago

Do You Need an Identity Protection Service for Safe Browsing?

Identity theft protection services function as insurance products offering reactive compensation for damages rather than active prevention, with coverage details and sub-benefit caps critically affecting actual protection value.
fromEntrepreneur
2 months ago

AI Can Delete Your Data. Here's Your Prevention Plan.

Never feel that you are totally safe. In July 2025, one company learned the hard way after an AI coding assistant it dearly trusted from Replit ended up breaching a "code freeze" and implemented a command that ended up deleting its entire product database. This was a huge blow to the staff. It effectively meant that months of extremely hard work, comprising 1,200 executive records and 1,196 company records, ended up going away.
Artificial intelligence
Privacy technologies
fromTech Times
1 month ago

Top Strategies to Protect Your Online Privacy from AI Tracking and Data Collection

Implement VPNs, two-factor authentication, app permission audits, and tracker blockers to protect personal data from AI-driven monitoring and unauthorized collection.
Privacy professionals
fromSecurityWeek
1 month ago

Internet Infrastructure TLD .arpa Abused in Phishing Attacks

Threat actors abuse the .arpa TLD infrastructure to host phishing content by exploiting DNS provider controls to add IP address records where only reverse DNS records should exist.
EU data protection
fromTechzine Global
2 months ago

Metadata, cloud sovereignty's weak spot

US authorities can access some metadata of cloud users in European sovereign clouds, potentially revealing operational and behavioral information despite data residency protections.
Privacy professionals
fromPrivacy International
1 month ago

Privacy International & Women on Web - Securing Reproductive Justice: A Guide to Digital Privacy for Sexual and Reproductive Justice Activists

Sexual and reproductive justice activists face escalating surveillance, digital censorship, and criminalization risks, requiring them to fundamentally adapt their operational security and advocacy strategies.
fromThe Hacker News
2 months ago

Password Reuse in Disguise: An Often-Missed Risky Workaround

Near-identical password reuse occurs when users make small, predictable changes to an existing password rather than creating a completely new one. While these changes satisfy formal password rules, they do little to reduce real-world exposure. Here are some classic examples: Adding or changing a number Summer2023! → Summer2024! Appending a character Swapping symbols or capitalization Welcome! → Welcome? AdminPass → adminpass Another common scenario occurs when organizations issue a standard starter password to new employees, and instead of replacing it entirely, users make incremental changes over time to remain compliant.
Information security
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Information security
fromDataBreaches.Net
2 months ago

Threats: Results of a pilot survey on threats, and a new category on DataBreaches.net - DataBreaches.Net

A pilot survey of 112 respondents documented legal, criminal, and other threats faced by security researchers and journalists, calling for further research and action.
Information security
fromEmptywheel
2 months ago

"Tor Stinks" ... because It Requires Manual (Digital) Tails

Tor resists systematic de-anonymization; NSA can de-anonymize only a very small fraction manually and cannot reliably combine Tor attacks with passive SIGINT.
#residential-proxies
fromSilicon Canals
1 month ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
fromCoindesk
2 months ago

Privacy

This Privacy Notice applies to all personal information processed by CoinDesk, including its affiliates and subsidiaries (" CoinDesk," " we," " us," or " our "). It covers the information CoinDesk collects through the websites, mobile applications, electronic devices, all other products and services we provide, any other services that display this Privacy Notice, all of the associated content, functionalities, and advertising, and when you communicate with us by phone, email, or otherwise (collectively, the " Services ").
Privacy professionals
#data-breach
Information security
fromThe Hacker News
2 months ago

Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026

Identity security posture—password hygiene, privileged access, and MFA coverage—now strongly determines cyber underwriting and insurance costs.
fromThe Cyber Express
2 months ago

Data Privacy Week 2026 Interview: Why Verification Matters

Ad fraud isn't just a marketing problem anymore - it's a full-scale threat to the trust that powers the digital economy. In 2024 alone, fraud in mobile advertising jumped 21%, while programmatic ad fraud drained nearly $50 billion from the industry. During data privacy week 2026, these numbers serve as a reminder that ad fraud is not only about wasted budgets - it's also about how consumer data moves, gets tracked, and sometimes misused across complex ecosystems.
Privacy professionals
Privacy professionals
fromSlate Magazine
2 months ago

What's Happening to Discord Is Going to Happen to All Your Favorite Websites

Discord will default users to 'teen' protections and require facial-recognition scans or government IDs for age verification, prompting widespread privacy and security concerns.
fromArs Technica
2 months ago

Upgraded Google safety tools can now find and remove more of your personal info

There are people on the Internet who want to know all about you! Unfortunately, they don't have the best of intentions, but Google has some handy tools to address that, and they've gotten an upgrade today. The "Results About You" tool can now detect and remove more of your personal information. Plus, the tool for removing non-consensual explicit imagery (NCEI) is faster to use. All you have to do is tell Google your personal details first-that seems safe, right?
Privacy technologies
Privacy professionals
fromZDNET
1 month ago

How to clean up your digital footprint - and why it matters more than you think

Abandoned social media accounts and old posts create digital vulnerabilities requiring regular maintenance to protect reputation and prevent identity theft or fraud.
fromoregonlive
2 months ago

Your personal data is being sold right now. Here's what you can do

Oregon allows consumers to opt out when companies collect and sell personal details gained in online transactions or simply when people log on to a website or use an app. Under the Oregon Consumer Privacy Act, residents can see what data companies keep about them, request corrections or deletion and opt out of data sales, targeted advertising and certain types of profiling. Businesses must also disclose their data practices and obtain consent before collecting sensitive information such as precise location, biometric or some health data.
Privacy professionals
Privacy professionals
fromwww.mercurynews.com
1 month ago

To attend prom or a football game, California students first had to surrender their data

California fined PlayOn $1.1 million for violating state privacy law by collecting student data through ticketing platforms without providing opt-out options and selling that data to advertisers.
[ Load more ]