- Today's Approach to Security is Broken
- Google introduces Chrome 'factory reset' pop-ups to tackle extensions hijacks
- Fake-police ransomware reaches Australia
- Microsoft confirms HTTP Strict Transport Security for IE 12
- Review: Linux Security Distributions
privacy in pictures
The Tor Project has flagged 380 Tor relays vulnerable to the critical Heartbleed flaw to be rejected from the Tor anonymity network, reducing the network's entry and exit capacity.
Canadian police have arrested a 19-year-old man for allegedly using the Heartbleed bug to steal data about taxpayers.
A new webmail service called Lavaboom promises to provide easy-to-use email encryption without ever learning its users' private encryption keys or message contents.
Privacy is at a premium. Whether it's the NSA, a hacker cabal, or corporate marketers, someone is looking over your shoulder every time you use your PC.
Telecom operator Telefónica has launched the first mobile ad-exchange platform to use the operator's customer demographics and real-time location data to serve targeted mobile ads, the company said on Wednesday.
Your Gmail account probably contains some sensitive information--emails from your friends and family members, information about accounts for other services, candid pictures, you name it. What if someone else has been poking around in there? Fortunately, Google gives you the tools necessary to find out.
Anyone who's paid attention to computer security over the past few years will probably tell you that your password isn't enough. Passwords are often awkward and hard to remember--leading people to use the same password for multiple sites--and if someone gets a hold of your login credentials, they can wreak havoc with your personal information. Not good.
Your email address is like your home address: Never give it out unless absolutely necessary.
It was a shock when David Petraeus--a respected and highly-decorated Army general--abruptly stepped down from his post as the director of the CIA earlier this week. It was even more of a jolt to learn that his resignation was due to an extramarital affair. But, the real story might be the fact that the affair came to light more or less accidentally as a result of poor email and privacy practices.
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
Online tracking is on the rise, but efforts to create a practical Do Not Track policy have slowed to a crawl. Meanwhile, users and browser companies are taking matters into their own hands.
Stories like Jordan Belfort exist beyond the 80s. With the increasingly stringent regulatory requirements to tame the latest wolves of Wall Street, more financial institutes are turning towards proactive monitoring tools to avoid fraud. As big data is becoming a helpful tool to detect and alert potential fraud, the technology is also raising concern over its impact on personal data privacy.
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
Whitepapers about privacy
Cloud computing has fundamentally changed the way businesses and consumers use computers and technology and the way Information Technology (IT) professionals manage those resources. While the cloud has delivered a multitude of benefits to technical and non-technical people alike, there have also been significant downsides to reliance on cloud technology, including unplanned outages and even outright cyberattacks and data theft.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.