Satoshi Nakamoto Blog

Category : computer security

Anonymity computer security Data Protection data security Differential Privacy Encryption Europe european union gdpr general data protection regulation Imperial College London London Privacy Security Yves-Alexandre de Montjoye

Privacy researchers devise a noise-exploitation attack that defeats dynamic anonymity

Privacy researchers in Europe believe they have the first proof that a long-theorised vulnerability in systems designed to protect privacy by aggregating and adding noise...
Articles ceo Column computer security cybercrime Cyberwarfare department of defense Donald Trump Electricity Facebook Federal Trade Commission Finance leader medicare national security President united states Washington

Democratic Presidential nominees are ignoring the issue of our cybersecurity infrastructure

Robert Ackerman Jr. Contributor Robert Ackerman Jr. is the founder and a managing director of AllegisCyber, an early-stage cybersecurity venture firm, and a founder of...
Apple Inc Banking and Financial Institutions Capital One Financial Corporation Company Reports computer security Computers and the Internet Cyberattacks and Hackers Facebook Inc Frauds and Swindling Impostors (Criminal) Social Media

The Week in Tech: Facebook Romance Scams and Banking Hacks

Each week, we review the week’s news, offering analysis about the most important developments in the tech industry. Want this newsletter in your inbox? Sign...
chief information security officer Cisco Systems computer security Cyberwarfare Emily Heath Enterprise Events Federal Bureau of Investigation London manchester martin casado San Francisco TC TC Sessions: Enterprise 2019 Telecommunications U.S. Securities and Exchange Commission United Kingdom Wendy Nather

United Airlines CISO Emily Heath joins TC Sessions: Enterprise this September

In an era of massive data breaches, most recently the Capital One fiasco, the risk of a cyberattack and the costly consequences are the top...