- Seven technology predictions for 2014
- French Treasury accidentally signs SSL certificate for Google.com domains
- Hacker-built drone can hunt, hijack other drones
- Blue Cross: 840,000 healthcare records at risk after laptop theft
- The week in security: Microsoft fights NSA as shadow IT bites business
privacy in pictures
Twitter has reversed a controversial policy change announced Thursday that would let a user block others on Twitter, but the blocked people could still continue to follow and see the user's tweets and interact with them.
The French Senate has passed a law giving government officials warrantless access to live login and user location data from ISPs and websites, angering Internet companies and human rights groups.
Europe’s top legal advisor ruled on Thursday that the blanket retention of data, even to combat crime, is incompatible with fundamental rights.
Critics of the U.S. National Security Agency's bulk collection of U.S. residents' telephone records should offer a better way to track terrorists and protect the country against attacks, the agency's director said Wednesday.
An Arizona lawmaker is eyeing an unusual way of reigning in the National Security Agency, which has been under fire for questionable surveillance practices: Block it from operating in her state.
Anyone who's paid attention to computer security over the past few years will probably tell you that your password isn't enough. Passwords are often awkward and hard to remember--leading people to use the same password for multiple sites--and if someone gets a hold of your login credentials, they can wreak havoc with your personal information. Not good.
Your email address is like your home address: Never give it out unless absolutely necessary.
It was a shock when David Petraeus--a respected and highly-decorated Army general--abruptly stepped down from his post as the director of the CIA earlier this week. It was even more of a jolt to learn that his resignation was due to an extramarital affair. But, the real story might be the fact that the affair came to light more or less accidentally as a result of poor email and privacy practices.
Computerworld Hong Kong took an in-depth look at the top ten events that shook the local and global IT world in 2013.
Apple's App Store, Google's Play store and other app stores are packed with apps that can compromise your security and privacy without you ever knowing anything bad happened. What's a mobile app user to do?
Amazon's nascent plan to use unmanned drones to deliver packages to customers has already raised strong privacy concerns that could ultimately nip it in the bud.
Any effort to rein in the National Security Agency after its widespread spy activities were revealed in leaked documents must focus on more than simply limiting what personal data can be collected.
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.