The view from the top of IT with TechWorld Editor Rohan Pearce
Japanese authorities are trying to unravel what happened at Mt. Gox, the popular Bitcoin exchange that collapsed last week, and recent revelations are only serving to thicken the plot, not clarify it.
By Tim Hornyak and Jeremy Kirk | 07 March, 2014 15:08
The U.S. National Security Agency (NSA) has turned the European Union into a tapping "bazaar" in order to spy on as many EU citizens as possible, NSA leaker Edward Snowden said.
By Loek Essers | 07 March, 2014 13:07
Metadata has had a bad rap lately, with disclosures tying its collection to government spying programs. But those bits of information lurking behind our phone calls, photos and online chats can be useful in other ways if they're harnessed properly.
By Zach Miners | 06 March, 2014 02:01
Deutsche Telekom has joined forces with CipherCloud to help enterprises protect hosted applications using encryption and other technologies such as data loss prevention.
By Mikael Ricknäs | 04 March, 2014 15:29
A new variant of the Gameover malware that steals online banking credentials comes with a kernel-level rootkit that makes it significantly harder to remove, according to security researchers from Sophos.
By Lucian Constantin | 28 February, 2014 17:33
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
By Tony Bradley | 11 November, 2010 07:42
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up properly. But most expensive? Surviving the backlash and legal consequences of losing customer data, financial records and private company information.
By James E. Gaskin | 14 May, 2009 04:34
Apple has improved its security in recent years, but is it enough?
By Bob Violino | 10 March, 2014 11:04
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
An encryption initiative runs into the law of unintended consequences, since the legal department can't search encrypted emails for e-discovery purposes.
By Mathias Thurman | 14 January, 2013 11:04
The largest single type of security breach is the stolen or lost laptop, according to the Open Security Foundation, yet these computers are among the least protected of all IT assets. The costs of a data breach can be huge, including the loss of trade secrets, marketing plans, and other competitive information that could have long-term business damage, plus the immediate costs of having to notify people if their personal information was possibly at risk from the breach. Particularly in a recession, enterprise management can't afford to take these risks lightly.
By Mel Beckman | 20 January, 2009 08:55
As of September 2013, a new and vicious form of malware has been wreaking havoc. CryptoLocker belongs to a family of malware called “ransomware”, which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it’s too late and the damage to their files is irreparable.