The view from the top of IT with TechWorld Editor Rohan Pearce
Google's move to start displaying email images by default in Gmail is going to help marketers, in part, to more accurately track how many people open their emails.
By Loek Essers | 13 December, 2013 17:03
The Android 4.4.2 update that began to roll out Monday to Google's Nexus devices removed a feature that gave users fine-grained control over app permissions, prompting criticism from the Electronic Frontier Foundation.
By Lucian Constantin | 13 December, 2013 17:00
Twitter has reversed a controversial policy change announced Thursday that would let a user block others on Twitter, but the blocked people could still continue to follow and see the user's tweets and interact with them.
By John Ribeiro | 13 December, 2013 04:23
The French Senate has passed a law giving government officials warrantless access to live login and user location data from ISPs and websites, angering Internet companies and human rights groups.
By Peter Sayer | 12 December, 2013 13:35
Europe’s top legal advisor ruled on Thursday that the blanket retention of data, even to combat crime, is incompatible with fundamental rights.
By Jennifer Baker | 12 December, 2013 12:57
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
In 2003, author and security pioneer Simson Garfinkel conducted a study of data he found on second-hand hard drives. On eBay, Garfinkel bought the hard drive from an old ATM machine; it held 827 bank account PINs. Another drive he purchased on eBay had previously been owned by a medical center and contained information on 31,000 credit card numbers.
By Tony Bradley | 05 May, 2010 23:35
Amazon's nascent plan to use unmanned drones to deliver packages to customers has already raised strong privacy concerns that could ultimately nip it in the bud.
By Jaikumar Vijayan | 06 December, 2013 11:42
Any effort to rein in the National Security Agency after its widespread spy activities were revealed in leaked documents must focus on more than simply limiting what personal data can be collected.
By Jaikumar Vijayan | 19 November, 2013 17:51
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
There's no such thing as a free email service, at least not when it comes to Google, according to industry analysts.
By Sharon Gaudin | 15 August, 2013 20:52
The rapidly expanding field of Information Governance, encompassing all aspects policies, processes and controls of the effective management of information within an organisation, has at its heart a requirement to understand the information that is travelling within it in order to adequately protect it. In this whitepaper, we look at the next generation of Data Loss Prevention solutions, and how they operate within a set governance framework.