- Botnet snatches 2 million logins for Facebook, ADP payroll processor and other sites
- Hacker-built drone can hunt, hijack other drones
- Malware still running rings around security tools, eThreatz testing finds
- 2 million stolen login credentials discovered for Facebook, Google, LinkedIn, Twitter, other sites
- Conventional insurance may not cover cyber security breaches: Centre for Internet Safety
government in pictures
The National Security Agency on Friday cited a 1981 executive order signed by then-President Ronald Reagan as the authority under which it is collecting location data daily from tens of millions of cell phones around the world.
The U.S. National Security Agency has been spying on Italian communications from installations on the roof of the U.S. Embassy in Rome and the country's consulate in Milan and even mounted an operation to capture information from inside the Italian embassy in Washington, D.C., the Italian weekly magazine L'Espresso claimed Friday.
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
In the midst of the NSA snooping scandal, Microsoft is talking up a three-pronged approach to keep customer data safe from the prying eyes of governments.
The developer of a popular flashlight app for Android devices has agreed to settle U.S. Federal Trade Commission charges that it shared users' geolocation information with advertising networks and other organizations without permission.
Amazon's nascent plan to use unmanned drones to deliver packages to customers has already raised strong privacy concerns that could ultimately nip it in the bud.
Any effort to rein in the National Security Agency after its widespread spy activities were revealed in leaked documents must focus on more than simply limiting what personal data can be collected.
Edward Snowden's revelations about the U.S. government's data collection program could cause U.S. providers of cloud-based services to lose 10% to 20% of the foreign market to overseas rivals.
Members of Judiciary Committee express concern over broad-ranging, secretive authorities under Foreign Intelligence Surveillance Act, push for bill to strengthen oversight, transparency.
Legislation, stealth technologies, and emerging data privacy markets are proving that the battle for our Internet privacy has only just begun
Whitepapers about government
From almost every angle, the message for Australian government bodies is as clear as it is for their private sector counterparts: do more with less. Effective data management policies are often the best ‘unrealised’ opportunities to directly address these high-level challenges, especially when it comes to government data custodianship.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.