- Akamai admits its OpenSSL patch was faulty, reissues keys
- Google updates terms of service to reflect its scanning of users' emails
- Glass all gone after one-day sale, Google says
- How to fix the two-factor authentication log-in error in Gmail on Android
privacy in pictures
Telecom operator Telefónica has launched the first mobile ad-exchange platform to use the operator's customer demographics and real-time location data to serve targeted mobile ads, the company said on Wednesday.
By Loek Essers | 16 April, 2014 21:54
More U.S. Internet users report they have been victims of data breach, while 80 percent want additional restrictions against sharing of online data, according to two surveys released Monday.
By Grant Gross | 15 April, 2014 04:54
Website and server administrators will have to spend considerable time, effort and money to mitigate all the security risks associated with Heartbleed, one of the most severe vulnerabilities to endanger encrypted SSL communications in recent years.
By Lucian Constantin | 11 April, 2014 06:55
The U.S. Federal Trade Commission on Thursday cleared a path for Facebook's acquisition of WhatsApp to proceed, though it called on both companies to be mindful of their data collection policies.
By Zach Miners | 11 April, 2014 06:19
A Swedish ISP has deleted all retained customer data after European Union laws that require communications providers to retain metadata were invalidated by the EU's supreme court earlier this week. The ISP on Thursday called on other providers to do the same.
By Loek Essers | 10 April, 2014 21:08
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
In 2003, author and security pioneer Simson Garfinkel conducted a study of data he found on second-hand hard drives. On eBay, Garfinkel bought the hard drive from an old ATM machine; it held 827 bank account PINs. Another drive he purchased on eBay had previously been owned by a medical center and contained information on 31,000 credit card numbers.
By Tony Bradley | 05 May, 2010 23:35
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
By Marc Ferranti | 06 March, 2014 22:06
A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
By Jaikumar Vijayan | 23 January, 2014 19:45
Retailers and banks must move quickly to figure out who should be responsible for better securing the payments system network or risk having Congress decide for them.
By Jaikumar Vijayan | 23 January, 2014 16:05
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
By Grant Gross | 20 December, 2013 16:11
Whitepapers about privacy
Cloud computing has fundamentally changed the way businesses and consumers use computers and technology and the way Information Technology (IT) professionals manage those resources. While the cloud has delivered a multitude of benefits to technical and non-technical people alike, there have also been significant downsides to reliance on cloud technology, including unplanned outages and even outright cyberattacks and data theft.
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTExecutive Producer/Head of Production: Advertising AgencyNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTIT Support EngineerNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTOBIEE BI/DW ConsultantNSW
- FTDeliverability SpecialistNSW
You need to secure your BYOD devices—but MDM alone isn't enough to prevent data loss. Read this whitepaper—Data Loss Prevention: When MDM Is Not Enough—to learn how to combat MDM shortcomings. See how to add cross-platform security, implement protection policies, and address risks in consumer apps.
- German researchers hack Galaxy S5 fingerprint login
- Telefónica starts exchange for targeted mobile ads
- Glass all gone after one-day sale, Google says
- Mt. Gox has filed for liquidation in Japan, says report
- Microsoft's Chinese partner confident Xbox can compete against Android consoles
- Australia needs effective government cyber policy leadership: report
- Court slaps TPG with $400k fine over 000 failure
- Lycamobile issued warning for over-charging customers
- TPG should pay rural levy for each FTTB service: NBN Co
- Ukraine tensions could hurt international security efforts, Kaspersky says
- See ya, Microsoft: Intel looks to Android for growth in tablets
- Rushed Heartbleed fixes may expose users to new attacks
- NBN Co hits 105Mbps in limited FTTN trial
- Typo halts sales of iPhone keyboard as injunction takes effect
- In Pictures: Windows 8.1 tablets with 8-inch screens: Which one is right for you?