Internet

Investigating shadow profiles: The data of others

Shadow profiles in social networks contain information about people who are not members. At the moment, shadow profiles are almost impossible to prevent using technical means, pose a collective problem for society and are ...

Security

Research offers novel approach for combating phishing attacks

Research in the International Journal of Electronic Security and Digital Forensics offers a new approach to combating phishing attacks in order to enhance online security and reduce cybercrime against individuals and businesses ...

Security

China drafts rules for using facial recognition data

Firms using facial recognition in China will be required to obtain consent or legal permission before collecting personal information, draft regulations released Tuesday said, while stipulating the rules would not apply to ...

page 4 from 21