#digital-certificates

[ follow ]
Europe news
fromwww.theguardian.com
1 hour ago

Biometric checks stalled again for cross-Channel travellers

Passengers crossing from the UK to France will not face new biometric checks despite the EU's entry-exit system deadline approaching.
#ai
Privacy technologies
fromComputerWeekly.com
1 day ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Artificial intelligence
fromFortune
1 day ago

In the age of vibe coding, trust is the real bottleneck | Fortune

AI tools can generate code rapidly, but they also introduce vulnerabilities and require rigorous verification to ensure security and compliance.
fromHarvard Business Review
4 days ago
Artificial intelligence

AI Agents Act a Lot Like Malware. Here's How to Contain the Risks.

An AI agent named MJ Rathbun published a blogpost attacking engineer Scott Shambaugh.
from24/7 Wall St.
2 months ago
Information security

Cybersecurity Can Be The Next Mega Trend Thanks To AI

AI expansion increases cyberattack surfaces, making cybersecurity services more essential and driving long-term revenue and valuation growth for cybersecurity companies.
Privacy technologies
fromComputerWeekly.com
1 day ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
E-Commerce
fromForbes
2 days ago

AI Shopping: Why The Universal Commerce Protocol Changes Everything

UCP enables AI agents to manage transactions directly with retailers, eliminating friction in the shopping journey.
Artificial intelligence
fromFortune
1 day ago

In the age of vibe coding, trust is the real bottleneck | Fortune

AI tools can generate code rapidly, but they also introduce vulnerabilities and require rigorous verification to ensure security and compliance.
#data-breach
Privacy professionals
fromSilicon Canals
22 hours ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromSilicon Canals
1 day ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
EU data protection
fromTheregister
4 days ago

European Commission admits breach of public web systems

The European Commission confirmed a data breach affecting its public web infrastructure, with details on the extent and nature of the data taken remaining unclear.
Privacy professionals
fromSilicon Canals
22 hours ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromSilicon Canals
1 day ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
EU data protection
fromTheregister
4 days ago

European Commission admits breach of public web systems

The European Commission confirmed a data breach affecting its public web infrastructure, with details on the extent and nature of the data taken remaining unclear.
#cybersecurity
fromTechCrunch
17 hours ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

Information security
fromSecuritymagazine
1 day ago

Stakeholder Confidence in the Age of Digital Threats: PR as a Security Asset

Cybersecurity involves both technical measures and effective communication to maintain stakeholder trust during incidents.
EU data protection
fromTechCrunch
17 hours ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
#ai-governance
Cryptocurrency
fromnews.bitcoin.com
1 day ago

REAL and Redstone Collaborate to Enhance Data Integrity for Tokenized Assets

REAL partners with Redstone to enhance data transparency and risk intelligence in its ecosystem for tokenized assets.
Poker
fromBusiness Matters
3 days ago

Digital Wallets and the Future of Casino Payments in the UK

Digital wallets are preferred for online payments due to their speed, ease of use, and enhanced privacy, especially in casino transactions.
E-Commerce
fromFast Company
1 day ago

Visa says AI could start making purchases for you. Not everyone wants that, but here's how close we are

AI is influencing consumer purchases and acting on behalf of shoppers in commerce.
#generative-ai
Privacy technologies
fromNextgov.com
2 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Digital life
fromBig Think
3 days ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
2 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Privacy professionals
fromSilicon Canals
1 day ago

A money-transfer app stored customer passports on an unencrypted, publicly accessible server for nearly five years - Silicon Canals

Fintech companies face regulatory pressure to collect identity documents but lack enforceable obligations to protect them, leading to data breaches.
Photography
fromWIRED
5 days ago

Your Photos Are Probably Giving Away Your Location. Here's How to Stop That

Photos contain metadata like EXIF data, including location, which can be useful but may compromise privacy when shared.
#privacy
fromBitcoin Magazine
1 day ago
Privacy technologies

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

LNVPN has evolved into a comprehensive privacy infrastructure service offering anonymous eSIM data plans, disposable phone numbers, and AI chat tools.
Privacy professionals
fromBanray
3 days ago

BanRay.eu - Your face is not inventory

Meta's camera-equipped glasses compromise privacy by recording individuals without consent, turning them into data for AI training.
Privacy technologies
fromBitcoin Magazine
1 day ago

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

LNVPN has evolved into a comprehensive privacy infrastructure service offering anonymous eSIM data plans, disposable phone numbers, and AI chat tools.
Privacy professionals
fromBanray
3 days ago

BanRay.eu - Your face is not inventory

Meta's camera-equipped glasses compromise privacy by recording individuals without consent, turning them into data for AI training.
fromTearsheet
2 days ago

How Paze is betting bank trust can crack the digital wallet market - Tearsheet

I'm the general manager of Paze, one of the business units of Early Warning Services. The mandate is really to take Paze and bring this new payment checkout system to the masses - both on the consumer side and on the merchant side - really making sure that our goal of becoming one of the top three wallets for checkout in the next five years becomes reality.
Cryptocurrency
#digital-identity
UK politics
fromTheregister
2 weeks ago

What was missing from the UK digital ID consultation?

The UK government's digital identity consultation lacks key details on pricing and audit trail duration, raising concerns about privacy and enforcement.
London startup
fromComputerWeekly.com
2 weeks ago

Digital IDs edge closer to practical reality for UK businesses | Computer Weekly

The CFIT's Digital Company ID Coalition has delivered priority use cases, governance frameworks, commercial models, and a working prototype, advancing digital identity infrastructure for UK businesses from concept to practical implementation.
EU data protection
fromwww.thelocal.se
3 weeks ago

Sweden developing state-issued alternative to BankID

Sweden is launching Sverige-id, a government digital identification service available to citizens and registered foreign residents, addressing barriers foreigners face accessing BankID and essential services.
Information security
fromSecurityWeek
3 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
fromnews.bitcoin.com
4 days ago

Circle Deploys USDC and CCTP on Pharos Network to Advance RealFi Goals

The integration of USDC at the protocol level introduces a transparent, fully reserved, dollar-denominated stablecoin into the Pharos ecosystem, enhancing its financial capabilities.
Cryptocurrency
Privacy professionals
fromZDNET
1 day ago

I turned to PrivacyBee to clean up my data - here's how it made me disappear

PrivacyBee is preferred for its comprehensive data removal services and user-friendly management tools.
fromwww.bbc.com
2 weeks ago

Race on to establish globally recognised 'AI-free' logo

AI is creating significant disruption and competing definitions of what is 'human made' are confusing consumers. A universal definition is essential to build trust, clarification and confidence. Without standardization, consumers face confusion distinguishing between genuinely human-made products and those using AI, undermining the credibility of the entire certification movement.
Graphic design
Information security
fromnews.bitcoin.com
3 days ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
EU data protection
fromComputerWeekly.com
3 days ago

High Court dismisses judicial review against eVisa system | Computer Weekly

The High Court upheld the Home Office's eVisa system, ruling it lawful despite ongoing data issues and lack of alternative proof for immigration status.
Healthcare
fromNextgov.com
3 weeks ago

CMS touts early uses of new biometric verification tools for Medicare.gov

CMS launched modern identity verification options (Login.gov, ID.me, CLEAR) on Medicare.gov, with 25% of users adopting them within five to six days and 60% of new accounts using these credentials.
EU data protection
fromSecurityWeek
4 days ago

European Commission Reports Cyber Intrusion and Data Theft

The European Commission confirmed a cyberattack that compromised its cloud infrastructure, resulting in the theft of hundreds of gigabytes of data.
#digital-id
UK politics
fromwww.bbc.com
3 weeks ago

Government pushes ahead with revamped Digital ID

The UK government is advancing digital ID plans to streamline public services access via smartphones, shifting focus from mandatory employment verification to consumer convenience benefits.
UK politics
fromwww.theguardian.com
3 weeks ago

UK digital ID scheme to have limited use before next general election, minister says

Britain's £1.8bn digital ID scheme will initially offer limited functionality including vehicle tax payments and right-to-work checks by the next election, with broader services like benefits and pensions planned for the following parliament.
UK politics
fromwww.bbc.com
3 weeks ago

Government pushes ahead with revamped Digital ID

The UK government is advancing digital ID plans to streamline public services access via smartphones, shifting focus from mandatory employment verification to consumer convenience benefits.
UK politics
fromwww.theguardian.com
3 weeks ago

UK digital ID scheme to have limited use before next general election, minister says

Britain's £1.8bn digital ID scheme will initially offer limited functionality including vehicle tax payments and right-to-work checks by the next election, with broader services like benefits and pensions planned for the following parliament.
Privacy professionals
fromHer Campus
3 days ago

Who's Watching The Watchers? AI, Age Verification, And Online Privacy

Parents are increasingly concerned about children's exposure to harmful online content despite regulations like CIPA and platforms like YouTube Kids.
EU data protection
fromwww.dw.com
6 days ago

German public sector tries to reduce reliance on US tech

German authorities' data is at risk due to US access through the CLOUD Act, prompting calls for digital sovereignty alternatives.
#digital-sovereignty
Information security
fromInfoQ
1 week ago

Architecting Portable Systems on Open Standards for Digital Sovereignty

Digital sovereignty involves having a valid 'Plan B' for critical systems to avoid reliance on single vendors.
Information security
fromInfoQ
1 week ago

Architecting Portable Systems on Open Standards for Digital Sovereignty

Digital sovereignty involves having a valid 'Plan B' for critical systems to avoid reliance on single vendors.
Privacy technologies
fromArs Technica
2 weeks ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Artificial intelligence
fromTheregister
2 weeks ago

World pitch: scan eyeballs to tie identity to AI agents

World is launching AgentKit, a technology linking AI agents to verified human identities through iris-scanning orbs to prevent AI abuse and establish trust in agentic systems.
Privacy professionals
fromSecurityWeek
1 week ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
fromEntrepreneur
1 month ago

Why Nations Are Now Battling Over Your Digital DNA

Across the world, governments are redefining data. It is no longer a commercial byproduct, but a strategic resource. One that carries economic weight, political influence, and long-term national consequences. At the center of this shift is what most people never consciously see but continuously produce: their digital DNA.
World politics
Privacy technologies
fromArs Technica
2 weeks ago

After Discord fiasco, age-check tech promises privacy by running locally. Does it work?

Age-verification systems using on-device face scans and cross-platform age keys reduce privacy risks, but widespread distrust of vendors and past data breaches undermine user confidence in these technologies.
Information security
fromZDNET
2 weeks ago

As AI agents spread, 1Password's new tool tackles a rising security threat

AI agents require credentials to access systems, creating enterprise security risks similar to managing human employee access, necessitating unified credential management solutions.
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Privacy professionals
fromTheregister
2 weeks ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
Privacy technologies
fromTheregister
3 weeks ago

Microsoft tightens Authenticator checks on Android and iOS

Microsoft automatically removes Entra credentials from jailbroken and rooted iOS and Android devices, with enforcement beginning on Android now and iOS in April 2026, completing by July 2026.
Privacy professionals
fromWIRED
2 weeks ago

Do You Need an Identity Protection Service for Safe Browsing?

Identity theft protection services function as insurance products offering reactive compensation for damages rather than active prevention, with coverage details and sub-benefit caps critically affecting actual protection value.
Information security
fromThe Hacker News
4 weeks ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Identity spoofing against older adults alone grew by 8x between 2020 and 2024, driven in part by convincing AI impersonations of friends and loved ones. It's a problem costing people in the U.S. nearly half a billion dollars a year with no end in sight.
Privacy technologies
#dual-citizenship
fromSilicon Canals
1 month ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
US politics
fromThe Verge
2 months ago

Will you have to show your ID at the app store?

Online age verification faces legal, technical, and privacy obstacles, though recent Supreme Court developments may allow some limited forms of verification.
E-Commerce
fromTearsheet
2 months ago

Trust Bridges Matter: When agentic systems meet payment reality - Tearsheet

AI agents face a consumer trust gap for handling payment credentials, limiting their autonomy to execute transactions despite strong decision-making capabilities.
Information security
fromTheregister
1 month ago

Every day in every way, passwords are getting worse

Passwords remain ubiquitous, aging and increasingly vulnerable due to implementation flaws, password manager weaknesses, and AI-related risks.
fromWIRED
1 month ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
EU data protection
fromTechzine Global
1 month ago

Metadata, cloud sovereignty's weak spot

US authorities can access some metadata of cloud users in European sovereign clouds, potentially revealing operational and behavioral information despite data residency protections.
fromEntrepreneur
1 month ago

AI Can Delete Your Data. Here's Your Prevention Plan.

Never feel that you are totally safe. In July 2025, one company learned the hard way after an AI coding assistant it dearly trusted from Replit ended up breaching a "code freeze" and implemented a command that ended up deleting its entire product database. This was a huge blow to the staff. It effectively meant that months of extremely hard work, comprising 1,200 executive records and 1,196 company records, ended up going away.
Artificial intelligence
#discord
Information security
fromSecurityWeek
1 month ago

Webinar Today: Identity Under Attack - Strengthen Your Identity Defenses

Adopt an identity-first security strategy to protect sensitive data, meet compliance requirements, and balance security, user experience, and operational efficiency against identity threats.
Privacy technologies
fromFox News
2 months ago

5 tech terms that shape your online privacy

Limit app permissions, especially location, microphone, and photo access, and regularly adjust device privacy settings to prevent background data collection.
Information security
fromChannelPro
2 months ago

Ping Identity snaps up Keyless to tackle AI-powered security threats

Ping Identity acquired Keyless to add zero-knowledge, device-independent biometric authentication and fast cryptographic re-verification to its identity security platform.
Information security
fromFortune
2 months ago

You probably use the same password for 30 different websites. It's time for a passkey. | Fortune

Passkeys offer secure, user-friendly authentication but adoption lags due to low awareness, misconceptions, AI concerns, and implementation challenges; treat passkeys as UX initiatives.
Information security
fromComputerworld
2 months ago

Enterprises still aren't getting IAM right

Employees frequently bypass identity and access controls while agentic AI worsens privilege risk, leaving most organizations with inadequate just-in-time privileged access models.
fromInfoWorld
2 months ago

Descope introduces Agentic Identity Hub 2.0 for managing AI agents

Descope has announced Agentic Identity Hub 2.0, an update to its no-code identity platform for AI agents and Model Context Protocol (MCP) servers. The new release gives developers and security teams a dedicated UI and control plane to manage authorization, access control, credentials, and policies for AI agents and MCP servers, Descope said. Unveiled January 26, Agentic Identity Hub 2.0 lets MCP developers and AI agent builders use the platform to manage AI agents as first-class identities alongside human users,
Information security
[ Load more ]