GET UP TO SPEED ON ALL THINGS CYBER

We facilitate the exchange of crowdsourced cyber insights, experiences and differing opinions that challenge the status quo.

Our mission is to elevate cybersecurity awareness and defense through the content we generate. All of our original content is steered by our Content Advisory Committee, comprised of cyber leaders that you recognize and trust.

Our audience is diverse, ranging from CXO and board members, to members of the public with an interest in IT security such as students and business owners. Discussions address topics in business and personal security. Content published on Cyber Business Review is always ungated and freely available.

LATEST CYBER NEWS

02/02/2024 U.S. government sanctions Iranian officials over Pennsylvania water facility hack

The Iranian attack targeted a device manufactured by an Israeli company. (read more)

- - - - - - - - - - - - - - - - - - - - - -

01/29/2024 Wow! Mother of all breaches reveals 26 billion records: what we know so far

The supermassive leak contains data from numerous previous breaches, comprising an astounding 12 terabytes of information, spanning over a mind-boggling 26 billion records.  (read more)

- - - - - - - - - - - - - - - - - - - - - -

01/22/2024 Smartphone ambient light sensors allow spying

Android and iPhone ambient light sensors can be turned into cameras, allowing malicious actors to secretly film unsuspecting victims and their surroundings. (read more)

Privacy in the Age of Facial Recognition

Privacy in the Age of Facial Recognition

8-July | Written by Alexander Rau
If you have a social media account, someone already has a digital file of your face on their database. This is a privacy concern. Unfortunately for most users, the extent of this concern remains unknown, largely due to lengthy fine prints or tedious communication processes. This article by Alexander Rau journals his personal experience of approaching one facial recognition software company to find out exactly what biometric information they owned on him. It includes the necessary links in case you’re interested to run the same experiment. – Steve Tso

Read More

SUBSCRIBE TO OUR NEWSLETTER
to receive news and updates

By signing up, you agree to our Privacy Policy.