privacy - News, Features, and Slideshows
privacy in pictures
A fresh analysis of documents disclosed by former U.S. intelligence contractor Edward Snowden shows that AT&T has been a much closer and eager partner for the National Security Agency's Internet spying activities than was previously known.
By Marc Ferranti | 16 August, 2015 07:52
It's possible for companies to design their encryption systems to allow law enforcement agencies to access customer data with court-ordered warrants while still offering solid security, U.S. Department of Justice officials said.
By Grant Gross | 13 August, 2015 06:41
If you're worried about Big Brother monitoring you from security cameras, Japan has developed eyewear that can keep you anonymous.
By Tim Hornyak | 12 August, 2015 00:35
A talk about a radio-based privacy device dubbed ProxyHam that promised to allow hackers to connect to Wi-Fi networks from as far as 2.5 miles away was abruptly pulled from the DEF CON schedule by its creator a few weeks ago.
By Lucian Constantin | 09 August, 2015 02:53
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
In 2003, author and security pioneer Simson Garfinkel conducted a study of data he found on second-hand hard drives. On eBay, Garfinkel bought the hard drive from an old ATM machine; it held 827 bank account PINs. Another drive he purchased on eBay had previously been owned by a medical center and contained information on 31,000 credit card numbers.
By Tony Bradley | 05 May, 2010 23:35
A funny thing is happening in the wake of the <a href="http://www.computerworld.com/article/2490179/security0/security0-the-snowden-leaks-a-timeline.html">Edward Snowden NSA revelations</a>, the infamous <a href="http://www.computerworld.com/article/2601905/apple-icloud-take-reputation-hits-after-photo-scandal.html">iCloud hack of celebrity nude photos</a>, and the hit parade of customer data breaches at <a href="http://www.computerworld.com/article/2490637/security0/target-finally-gets-its-first-ciso.html">Target</a>, <a href="http://www.computerworld.com/article/2844491/home-depot-attackers-broke-in-using-a-vendors-stolen-credentials.html">Home Depot</a> and the <a href="http://www.computerworld.com/article/2845621/government/us-postal-service-suffers-breach-of-employee-customer-data.html">U.S. Postal Service</a>. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.
By Matt Weinberger | 15 November, 2014 02:37
Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.
By Jaikumar Vijayan | 27 June, 2014 04:58
With Europe's top court ordering Google to allow people to basically edit their online personal histories, some wonder what this will mean for finding the truth online.
By Sharon Gaudin | 15 May, 2014 06:23
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
By Jaikumar Vijayan | 18 April, 2014 21:36
Whitepapers about privacy
As your organization implements BYOD, it’s important to maintain compliance with data security and privacy regulations. This paper provides some key best practices to avoid problems and stay vigilant. • Poor compliance can result in financial penalties, litigation and damage to your company’s reputation • Make sure you have the IT solutions you need to avoid data leaks, avert data loss and prevent unauthorized access to information • Employ solutions designed to streamline BYOD management and simplify the process of proving compliance
Research shows that 94% of CIOs believe that enterprise mobility has become an important part of their enterprise IT strategy. While there are many benefits for business, there are still risks when it comes to security. This whitepaper looks at the steps all organisations to take when it comes to supporting a mobile workforce.
- FTLevel 2 IT Support TechnicianVIC
- CCMilitary simulation programmer with C# and Unity - 3 monthsNSW
- FTSystems Administrator | National commercial law firm | MS, AWS & eDiscoveryNSW
- FTMid level IT consultant | Systems Integration & Managed ServicesNSW
- CCE-Commerce - Senior Web Application DeveloperNSW
- FTSenior Consultant | Project work | National Systems IntegratorVIC
- FT1st & 2nd level IT support all-rounder in beautiful rural BathurstNSW
- FTLinux Administrator with AWS & DevopsNSW
- FTAndroid DeveloperNSW
- FTField EngineerNSW
- FTManual Test Engineer | Financial Institution | Web testingNSW
- FTSystems Administrator - Managed ServicesNSW
Snapshot-based data protection solutions were supposed to solve our backup challenges, weren't they? Then why are your backups still broken? If your snapshots are manually-managed or of the build-it-yourself variety, there may be several reasons that they aren't working very well. Learn more about the top reasons your snapshots are failing.
- 7 warnings to heed before a cloud migration
- Facebook splits React library across Web and mobile
- US will not seek legislation against encryption
- Apple removes apps from store that could spy on your data traffic
- Alibaba sets up second data center in the US in $1B cloud expansion
- New California law requires warrants for access to private communications
- Many vulnerabilities in older Huawei 3G routers won't get patched
- New AWS tools give developers high-powered instances, better container support and more
- Qualcomm enters server CPU market with 24-core ARM chip
- Quick iPhone 6S case review: Ballistic Tungsten Tough
- AWS re:Invent 2015: Amazon aims to make AWS a better home for IoT devices
- Dell's next 'AFTE' software robot will offer cognitive intelligence
- Adidas to 3D print custom insoles in sneakers
- AT&T kicks off Wi-Fi calling years after T-Mobile
- AWS re:Invent 2015: AWS Mobile Hub streamlines app dev