- Web proxy app becomes Bitcoin mining trojan
- Week in review: Great Bitcoin Robbery highlights shopping-season security risks
- Bitcointalk.org warns passwords in danger after DNS attack
- Fake-police ransomware reaches Australia
- Retailers tracking customers via Wi-Fi suggests that privacy really is dead
Europe’s Home Affairs Commissioner said on Wednesday that she would be keeping a close eye on data sharing deals with the U.S.
The European Union will not set up a Terrorist Finance Tracking System (TFTS) due to concerns about data security.
The European Commission said Wednesday it will not suspend the safe harbor agreement with the U.S. despite calls from the European Parliament.
A U.S. judge has shut down an online business listing operation that allegedly bilked more than US$14 million from U.S. small businesses and churches.
Privacy rights advocates and legal experts this week said they were disappointed but not surprised with the U.S. Supreme Court's denial of a petition challenging the legality of the National Security Agency's phone metadata collection program.
Any effort to rein in the National Security Agency after its widespread spy activities were revealed in leaked documents must focus on more than simply limiting what personal data can be collected.
IT can never take all the risk out of a supply chain, but it can help organizations minimize their vulnerability in a world of new threats.
The US presidential election result leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for compromises on a handful of issues.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.