- Google Glass privacy concerns raised by international data protection authorities
- Does encryption really shield you from government's prying eyes?
- NSA spying could mean U.S. tech companies lose international business
- Proposed e-license plates can be altered remotely and may be used to track you
privacy in pictures
Matter has anti-matter, Superman has Green Kryptonite, and now Google Glass has anti-Glass?
Privacy officials from six countries and the European Commission are pushing Google to answer questions about privacy issues surrounding its digital eyewear called Glass.
It is not just personal information that is being swept into the National Security Agency's (NSA) massive databases. It is corporate data as well. And that could cause some serious international blowback for the U.S., both politically and economically.
A telephone records surveillance program run by the U.S. Federal Bureau of Investigation and National Security Agency raises serious privacy concerns and should be reined in, some U.S. senators said Wednesday.
Google has asked the court overseeing terrorism-related surveillance programs at the U.S. National Security Agency to allow the company to publish information on the number of surveillance requests it receives.
It was a shock when David Petraeus--a respected and highly-decorated Army general--abruptly stepped down from his post as the director of the CIA earlier this week. It was even more of a jolt to learn that his resignation was due to an extramarital affair. But, the real story might be the fact that the affair came to light more or less accidentally as a result of poor email and privacy practices.
Vague policies, rogue apps, zombie phones can doom even the best Bring Your Own Device intentions. But the good news is it's not too late to make game-changing adjustments.
A defiant Edward Snowden resurfaced in Hong Kong today vowing to fight any U.S. efforts to extradite him on charges that he leaked classified documents describing two secret government data collection programs.
A day after The Washington Post and Guardianpublished bombshell revelations that America's biggest tech companies are allowing the U.S. government to constantly monitor highly personal data contained in their servers, the facts remain fuzzy and somewhat fluid--and the statements of the parties involved don't add up.
New social media privacy laws that have been enacted in several states around the country, or are in the works, present something of a mixed bag for businesses.
Your online life may not seem worth tracking as you browse websites, store content in the cloud, and post updates to social networking sites. But the data you generate is a rich trove of information that says more about you than you realize - and it's a tempting treasure for marketers and law enforcement officials alike.
Whitepapers about privacy
The results of PwC’s annual Global Information Security Survey indicate that companies are confident in their efforts to secure systems, information, and privacy. Strategies and personnel are in place, they say, and processes and technology are humming along. The number of incidents reported seems manageable. Read more.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.