privacy - News, Features, and Slideshows
- Apple's Yosemite OS shares Spotlight search terms by default
- Candidates for EU's data protection job heard by the European Parliament
- Industry can head off IoT privacy rules, former US official says
privacy in pictures
Apple has warned users about attacks on its iCloud website, after monitoring groups alleged that China had tried to intercept customer information from the service.
By Michael Kan | 22 October, 2014 14:46
The Internet of Things is raising a host of concerns over the control of data that could lead to government regulation, but tech companies can rein in those worries on their own if they act fast, according to a former White House technology official.
By Stephen Lawson | 22 October, 2014 11:39
The U.S. Federal Trade Commission's new chief technologist is high-profile digital privacy consultant Ashkan Soltani, a move that signals the agency's growing interest in policing online tracking and other Internet privacy issues.
By Grant Gross | 22 October, 2014 04:58
The European Union is finally moving to replace its data protection supervisor, after Members of the European Parliament interviewed the five candidates shortlisted for the roles of EU data protection supervisor and assistant supervisor on Monday.
By Loek Essers | 21 October, 2014 22:45
Apple is being called out for how it shares desktop and Web searches in its latest desktop operating system, Yosemite.
By Jeremy Kirk | 21 October, 2014 11:19
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
In 2003, author and security pioneer Simson Garfinkel conducted a study of data he found on second-hand hard drives. On eBay, Garfinkel bought the hard drive from an old ATM machine; it held 827 bank account PINs. Another drive he purchased on eBay had previously been owned by a medical center and contained information on 31,000 credit card numbers.
By Tony Bradley | 05 May, 2010 23:35
Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.
By Jaikumar Vijayan | 27 June, 2014 04:58
With Europe's top court ordering Google to allow people to basically edit their online personal histories, some wonder what this will mean for finding the truth online.
By Sharon Gaudin | 15 May, 2014 06:23
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
By Jaikumar Vijayan | 18 April, 2014 21:36
Whitepapers about privacy
As your organization implements BYOD, it’s important to maintain compliance with data security and privacy regulations. This paper provides some key best practices to avoid problems and stay vigilant. • Poor compliance can result in financial penalties, litigation and damage to your company’s reputation • Make sure you have the IT solutions you need to avoid data leaks, avert data loss and prevent unauthorized access to information • Employ solutions designed to streamline BYOD management and simplify the process of proving compliance
Benefits based on Forrester Consulting Study “The Total Economic Impact of Converging SAP Landscapes on Vblock™ Systems”
- FTClient Service Director - Search: SEO & PPCNSW
- FTData Product SpecialistNSW
- FTDigital Performance Manager - MediaNSW
- FTAccount Manager - DataNSW
- FTSEM Specialist - SEM AnalystNSW
- FTStrategic Account Manager - Google AnalyticsNSW
- FTCampaign Managers | Programmatic / RTB | Display + Video | Trading desk |SydneyNSW
- FTDigital Marketing CoordinatorNSW
Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
- What Facebook's Mark Zuckerberg said in Mandarin that so impressed the Chinese
- Microsoft to discontinue free Xbox Music streaming
- Investor visa overhaul to boost venture capital for startups
- Vietnam police hunt hackers behind mass outage
- Apple to stop SSL 3.0 support for push notifications soon
- Xiaomi moving data outside China following privacy concerns
- At Austin airport, Wi-Fi predicts how long the security line will be
- Twitter weaves Fabric, but will developers be drawn in?
- AT&T signed up 500,000 cars for its 4G network last quarter
- Debian community splits over systemd, but fork still unlikely
- TIO task force to field NBN grievances
- Government regulation on cloud security may spur SaaS use in health care
- Progress builds up developer chops with Telerik buy
- Monumental day for Wikipedia in Poland
- Microsoft misses Windows bug, hackers slip past patch