privacy - News, Features, and Slideshows
privacy in pictures
Silicon Valley-based ride-sharing company Uber is looking eastward to inject some wisdom into how it handles user data.
By Zach Miners | 21 November, 2014 08:03
Thanks to revelations about government spying, a revamped version of a 15-year-old agreement governing the exchange of personal data between EU and the U.S. still seems a long way off, threatening the ability of American companies to do business in Europe.
By Loek Essers | 21 November, 2014 05:03
The U.S. National Security Agency is planning no major changes in its domestic telephone records collection program after a bill to rein in those efforts failed in the Senate this week, the agency's director said.
By Grant Gross | 21 November, 2014 04:40
A free tool released Thursday allows users to scan their computers for surveillance malware that has been used in attacks against journalists, human rights defenders and political activists around the world.
By Lucian Constantin | 20 November, 2014 22:54
Google is employing a big team of lawyers, engineers and paralegals who have so far evaluated over half a million URLs that were requested to be delisted from search results by European citizens, the company said.
By Loek Essers | 20 November, 2014 07:27
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
In 2003, author and security pioneer Simson Garfinkel conducted a study of data he found on second-hand hard drives. On eBay, Garfinkel bought the hard drive from an old ATM machine; it held 827 bank account PINs. Another drive he purchased on eBay had previously been owned by a medical center and contained information on 31,000 credit card numbers.
By Tony Bradley | 05 May, 2010 23:35
A funny thing is happening in the wake of the Edward Snowden NSA revelations, the infamous iCloud hack of celebrity nude photos, and the hit parade of customer data breaches at Target, Home Depot and the U.S. Postal Service. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.
By Matt Weinberger | 15 November, 2014 02:37
Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.
By Jaikumar Vijayan | 27 June, 2014 04:58
With Europe's top court ordering Google to allow people to basically edit their online personal histories, some wonder what this will mean for finding the truth online.
By Sharon Gaudin | 15 May, 2014 06:23
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
By Jaikumar Vijayan | 18 April, 2014 21:36
Whitepapers about privacy
As your organization implements BYOD, it’s important to maintain compliance with data security and privacy regulations. This paper provides some key best practices to avoid problems and stay vigilant. • Poor compliance can result in financial penalties, litigation and damage to your company’s reputation • Make sure you have the IT solutions you need to avoid data leaks, avert data loss and prevent unauthorized access to information • Employ solutions designed to streamline BYOD management and simplify the process of proving compliance
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTProgram Manager - Integration & SolutionsNSW
- FTAcquisition Marketing ExceutiveNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTSenior SEO ManagerNSW
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTStudio Design ManagerVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTStudio Design ManagerVIC
- FTChief Information Officer - CSIROACT
Top 5 reasons why EMC for archiving This whitepaper provides the top five reasons why organisations looking for the best-of-breed archive software and protection storage for a true end-to-end archive solution. · Archiving inactive data from tier-1 storage is a key way to save big · Eliminate siloes for administration savings, while maximising overall storage efficiency, typically reducing archive and backup capacity required by 10-30x. · Archiving solution that allows you to add virtual and physical servers to meet new demands
- Webcam snooper now looking for a job
- Telstra targets government with secure cloud offer
- Australia, Canada, UK and China weigh in on Insecam privacy issue
- Traces of Regin malware may date back to 2006
- Analyst, Vodafone cast doubt on likelihood of telco's sale
- Symantec identifies sophisticated, stealthy 'Regin' malware
- Spliddit: Algorithms to divide the rent, stuff, or credit fairly between people
- Why is Microsoft updating Windows PCs for a security bug on the server?
- Prices for 4K monitors sink below $500
- Apple's $450 million e-books settlement gets final approval
- Black Friday: Newegg axes prices on laptops, desktops, tablets and more
- Reports: EU taking first step towards breaking up Google
- Double-edged feedback sword nicks Microsoft over OneDrive
- The ups and downs of Microsoft Band
- US man sentenced for hacking POS systems at Subway