privacy - News, Features, and Slideshows
privacy in pictures
A fresh analysis of documents disclosed by former U.S. intelligence contractor Edward Snowden shows that AT&T has been a much closer and eager partner for the National Security Agency's Internet spying activities than was previously known.
By Marc Ferranti | 16 August, 2015 07:52
It's possible for companies to design their encryption systems to allow law enforcement agencies to access customer data with court-ordered warrants while still offering solid security, U.S. Department of Justice officials said.
By Grant Gross | 13 August, 2015 06:41
If you're worried about Big Brother monitoring you from security cameras, Japan has developed eyewear that can keep you anonymous.
By Tim Hornyak | 12 August, 2015 00:35
A talk about a radio-based privacy device dubbed ProxyHam that promised to allow hackers to connect to Wi-Fi networks from as far as 2.5 miles away was abruptly pulled from the DEF CON schedule by its creator a few weeks ago.
By Lucian Constantin | 09 August, 2015 02:53
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
In 2003, author and security pioneer Simson Garfinkel conducted a study of data he found on second-hand hard drives. On eBay, Garfinkel bought the hard drive from an old ATM machine; it held 827 bank account PINs. Another drive he purchased on eBay had previously been owned by a medical center and contained information on 31,000 credit card numbers.
By Tony Bradley | 05 May, 2010 23:35
A funny thing is happening in the wake of the <a href="http://www.computerworld.com/article/2490179/security0/security0-the-snowden-leaks-a-timeline.html">Edward Snowden NSA revelations</a>, the infamous <a href="http://www.computerworld.com/article/2601905/apple-icloud-take-reputation-hits-after-photo-scandal.html">iCloud hack of celebrity nude photos</a>, and the hit parade of customer data breaches at <a href="http://www.computerworld.com/article/2490637/security0/target-finally-gets-its-first-ciso.html">Target</a>, <a href="http://www.computerworld.com/article/2844491/home-depot-attackers-broke-in-using-a-vendors-stolen-credentials.html">Home Depot</a> and the <a href="http://www.computerworld.com/article/2845621/government/us-postal-service-suffers-breach-of-employee-customer-data.html">U.S. Postal Service</a>. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.
By Matt Weinberger | 15 November, 2014 02:37
Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.
By Jaikumar Vijayan | 27 June, 2014 04:58
With Europe's top court ordering Google to allow people to basically edit their online personal histories, some wonder what this will mean for finding the truth online.
By Sharon Gaudin | 15 May, 2014 06:23
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
By Jaikumar Vijayan | 18 April, 2014 21:36
Whitepapers about privacy
One-to-one computing programs are a great way to make sure all students are able to enjoy benefits of digital learning content. This whitepaper talks about the critical technology issues associated with these programs and how they can be resolved.
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- FT.NET Tech LeadVIC
- CCSSIS/ SSRS ExpertVIC
- CCSAP ABAP ProgrammersACT
- CCContract Analyst Programmer (Crystal Reports) 160129/AP/vhs-aAsia
- CCSolution Architect - .NET TechnologiesNSW
- CCMicrosoft Dynamics CRM DeveloperSA
- FTIT Support AnalystNSW
- CCMultiple Java rolesACT
- FTHelpdesk support - Level 1VIC
- CCService ModellerNSW
- CCCisco Network EngineerNSW
- CCSenior Android DeveloperNSW
- CC.NET DeveloperACT
- CCInformation Security ManagerNSW
- FTSystems Administrator/Engineer | Projects & BAU | Coastal Newcastle NSWWA
- FTTechnical WriterNSW
- CCAndroid and iOS DevelopersVIC
- FTSenior Consultant | Project work | National Systems IntegratorNSW
- CCWeb DeveloperNSW
- CCAutomation QAVIC
- CCHybris Developer - Global ConsultancyNSW
- CCCitrix Systems EngineerNSW
- FTSenior Project Manager - SecurityNSW
- FTSoftware Developer - Ruby on RailsNSW
- FTNetwork EngineerNSW
One of the biggest use cases for the cloud – in fact, the biggest, in the case of hosted private cloud – is for backup and disaster recovery. This white paper explores why the Cloud is well suited for Disaster Recovery and what organisations need to consider to ensure that Cloud DR is right for them.
- SD-WAN: What it is and why you’ll use it one day
- Android root malware widespread in third-party app stores
- UCLA just open-sourced a powerful new image-detection algorithm
- SCO vs. IBM legal battle over Linux may – finally – be finished
- Microsoft adds conservative release 'ring' to Windows 10 beta program
- 6 things you should know about Twitter's timeline change
- Microsoft lets cautious users try more of Windows 10’s leading edge
- Bill filed in Congress would ban encryption backdoors
- Networking company name change madness is upon us
- Browser maker Opera's board urges sale to Chinese collective for $1.2B
- A new IoT gateway design could be Bluetooth's ticket to the cloud
- LG's G5 smartphone to have 'always on' ability
- Data science achieves the ultimate ROI: A craft beer
- SAP slaps patch on leaky factory software
- Paul McCartney gives Skype some silly love songs