privacy - News, Features, and Slideshows

Most popular

privacy in pictures

  • In Pictures: 9 iPhone and iPad apps that invade your privacy, and 1 that doesn't

    Most iPhone and iPad apps appear harmless and fun, but don't fall for them. Some apps are virtual Trojan horses that swipe personal data when you're not looking. Appthority has put together a list of some of the worst offenders and you may be shocked to learn that a couple of the most popular apps made the list, such as Facebook and Angry Birds Star Wars. Be sure to check out the app at the end of the list for the one most honest.

    30 Jan | View galleries

  • 10 scariest hacks from Black Hat and Defcon

    Hack week in Vegas During the Black Hat and Defcon conferences in Las Vegas last week, researchers wheeled out their best new attacks on everything from browsers to automobiles, demonstrating ingenuity and diligence in circumventing security efforts or in some cases in exploiting systems that were built without security in mind. Here's a handful of the ones that deserve the most concern.

    18 Aug | View galleries

News about privacy
Tutorials about privacy
Features about privacy
  • How Apple's privacy stance could give Google an AI edge

    "We at Apple reject the idea that our customers should have to make tradeoffs between privacy and security," said Apple CEO Tim Cook earlier this month during an Electronic Privacy Information Center (EPIC) event where he was honored for corporate leadership. "We can and we must provide both in equal measure."

    Matt Kapko | 24 Jun | Read more

  • U.S. surveillance programs are killing the tech industry

    The Information Technology & Innovation Foundation, ranked as the most authoritative science and technology think tank in the U.S. (second in the world behind Max Planck Institutes of Germany), has just released its latest report on the impact of the existence and disclosure of the broad NSA national and international spying programs.

    Rob Enderle | 13 Jun | Read more

  • Whose privacy matters most?

    No one wants their private information falling into the wrong hands, but this is especially true of the younger generation, as they lack the resources to address such a compromise directly, and parents often don't think to monitor their child's personal records or usage.

    Kacy Zurkus | 02 Jun | Read more

Whitepapers about privacy

  • Cloud-Based Security Threats Present Challenges and Opportunities for MSPs

    Cloud computing has fundamentally changed the way businesses and consumers use computers and technology and the way Information Technology (IT) professionals manage those resources. While the cloud has delivered a multitude of benefits to technical and non-technical people alike, there have also been significant downsides to reliance on cloud technology, including unplanned outages and even outright cyberattacks and data theft.

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Media Release

More media release