Mozilla wants to make private browsing truly private.
Mozilla wants to make private browsing truly private.
Yahoo said Monday it had removed malware from its advertising network, after malicious code there had gone undetected for at least six days.
A New York judge ruled Tuesday that Facebook has no legal standing to challenge the constitutionality of search warrants served on its users, highlighting the limits to online companies' abilities to protect user privacy.
Microsoft is said to be paying $320 million to acquire Adallom, a Cloud security provider whose services might help Microsoft in its new push toward becoming a "Cloud-first" company.
Newly leaked figures reveal that the vast majority of people who exercised their right to be "forgotten" by Google's services in Europe are everyday members of the public, with just 5 percent of requests coming from criminals, politicians and high-profile public figures.
In our last episode of Private I, I explained the basics of public-key (PK) cryptography, a way to scramble messages in a way that only someone possessing a particular key can decrypt, without that key ever having to be publicly disclosed or shared. It's an effective system that has no known theoretical exploits, and currently deployed implementations are considered robust.
Your email address is like your home address: Never give it out unless absolutely necessary.
We lead rich virtual lives on social networking sites like Google+, Facebook, and Twitter. So what happens when real life catches up, and our flesh-and-blood bodies succumb to mortality? For our virtual selves, at least, some concrete answers are available--ways to settle our digital affairs after death, while minimizing hassle and heartache for loved ones.
Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.
Patrick Heim is the (relatively) new head of Trust & Security at Dropbox. Formerly Chief Trust Officer at Salesforce, he has served as CISO at Kaiser Permanente and McKesson Corporation. Heim has worked more than 20 years in the information security field. Heim discusses security and privacy in the arena of consumerized cloud-based tools like those that employees select for business use.
It's so far been another sorry, sorry year in the technology industry, with big name companies, hot startups and individuals making public mea culpas for their assorted dumb, embarrassing and other regrettable actions.
As the voting period draws an end on PopVote -- the website hosting Hong Kong's unofficial online referendum on political reform--Computerworld Hong Kong talked with its cloud provider CloudFlare and other security vendors to find out the lesson learned from dealing with massive DDoS attacks.
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
New social media privacy laws that have been enacted in several states around the country, or are in the works, present something of a mixed bag for businesses.
Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint
Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.
Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation
CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)
Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana