We had the pleasure of interviewing Dr. Gilad L. Rosner, privacy and information policy researcher and the founder of Internet of[…]
Read moreTag: Privacy

Patching up security holes in Tor network
A lot has been said about Tor – software project that enables its users to browse the web in anonymity[…]
Read moreLegal harmonization, FBI, and Jürgen Habermas
As mentioned in our text on FBI vs. iPhone controversy, today we bring you the interview with Víctor Rodriguez Doncel. He[…]
Read moreSECURECOMM 2015 Security and Privacy in Communication Networks
Two months left till the 11th EAI International Conference on Security and Privacy in Communication Networks to take place on[…]
Read moreProf. Wang, MOBIMEDIA: 'Visual computing for the future of the IoT, cloud and Big Data'
With research interests that include networking, wireless sensor networks, multimedia communication, network and information security, software engineering and programming, embedded[…]
Read moreDr. Sigg, MobiCASE 2015: ‘Join us in Berlin, collaborate and have fun!’
An expert on the design, analysis and optimisation of algorithms for distributed and ubiquitous systems, Dr. Stephan Sigg, currently working[…]
Read moreHow the content of your tweets can give your location away
Twitter is a source of a vast amount of unstructured textual data that can be used for location-based advertisement and[…]
Read moreCan cloud-stored data be safe?
IBM creates 2.5 quintillion bytes of data every day. In 2012, the US president’s administration announced the Big Data Research[…]
Read moreIOT360 Belisario: 'Many issues concerning privacy and the IoT are arising'
Ernesto Belisario combines his two passions – computer science and law – by being an administrative and ICT lawyer. His[…]
Read moreMaking informed and conscious decisions: highlighted permissions to help users
In the globalized world of big data, people often do not pay much attention to personal data privacy. Do you[…]
Read more