privacy - News, Features, and Slideshows
privacy in pictures
A hacker group known as Team GhostShell is publishing snippets of sensitive data allegedly stolen from the databases of hundreds of compromised websites.
By Lucian Constantin | 02 July, 2015 02:19
By Peter Sayer and Loek Essers | 01 July, 2015 23:52
A U.S. surveillance court has extended a controversial telephone records dragnet while the National Security Agency works to wind down the program on orders from Congress.
By Grant Gross | 01 July, 2015 05:25
Despite a big push over the past few years to use encryption to combat security breaches, lack of expertise among developers and overly complex libraries have led to widespread implementation failures in business applications.
By Lucian Constantin | 27 June, 2015 02:25
Australian Privacy Commissioner Timothy Pilgrim has opened an investigation into an alleged data breach involving iiNet subsidiary Westnet.
By Hamish Barwick | 26 June, 2015 14:54
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
In 2003, author and security pioneer Simson Garfinkel conducted a study of data he found on second-hand hard drives. On eBay, Garfinkel bought the hard drive from an old ATM machine; it held 827 bank account PINs. Another drive he purchased on eBay had previously been owned by a medical center and contained information on 31,000 credit card numbers.
By Tony Bradley | 05 May, 2010 23:35
A funny thing is happening in the wake of the Edward Snowden NSA revelations, the infamous iCloud hack of celebrity nude photos, and the hit parade of customer data breaches at Target, Home Depot and the U.S. Postal Service. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.
By Matt Weinberger | 15 November, 2014 02:37
Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.
By Jaikumar Vijayan | 27 June, 2014 04:58
With Europe's top court ordering Google to allow people to basically edit their online personal histories, some wonder what this will mean for finding the truth online.
By Sharon Gaudin | 15 May, 2014 06:23
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
By Jaikumar Vijayan | 18 April, 2014 21:36
Whitepapers about privacy
As your organization implements BYOD, it’s important to maintain compliance with data security and privacy regulations. This paper provides some key best practices to avoid problems and stay vigilant. • Poor compliance can result in financial penalties, litigation and damage to your company’s reputation • Make sure you have the IT solutions you need to avoid data leaks, avert data loss and prevent unauthorized access to information • Employ solutions designed to streamline BYOD management and simplify the process of proving compliance
This report showcases the results from a Computerworld survey across IT managers and CIOs on their organisation’s use and intentions around data backup and recovery processes. Find out: how IT leaders are changing the way they protect their organisation’s valuable information, the most popular uses and intentions around data backup practices and how organisations are dealing with exponential data growth.
While selecting the right data centre in terms of the facility, location, and reliability is critically important, SMBs need to understand they can realise significant value when they insist on maximising the operation. Find out why you should not assume equipment is well-tended just because the colocation is operating smoothly, why SMBs should take the initiative when it comes to organising, protecting, and managing their own equipment, and how you can achieve these goals effectively for the best result.
- OpenSSL tells users to prepare for a high severity flaw
- Nvidia attempts to ease the path to deep learning
- FBI chief warns that terrorists hide behind encrypted communications
- Privacy group files FTC complaint to push Google to extend right to be forgotten to US
- US judge dimisses second conviction of ex-Goldman Sachs coder
- Samsung profit squeezed by Galaxy S6 shortage
- Reddit CEO Ellen Pao tries to calm furor with huge 'mea culpa'
- Drawing and writing (poorly) with HP Pro Slate 8
- In Pictures: Best office apps for Android, round 3
- In Pictures: How 7 companies bring power to Hadoop Big Data applications
- Instagram bumps up photo resolution to 1080 pixels
- Samsung releases world's first 2TB consumer SSDs
- Microsoft's new Tossup app tries to simplify getting friends together
- Cisco leading another IoT standards group
- Humans again to blame for latest accidents involving Google autonomous cars