privacy - News, Features, and Slideshows
A funny thing is happening in the wake of the <a href="http://www.computerworld.com/article/2490179/security0/security0-the-snowden-leaks-a-timeline.html">Edward Snowden NSA revelations</a>, the infamous <a href="http://www.computerworld.com/article/2601905/apple-icloud-take-reputation-hits-after-photo-scandal.html">iCloud hack of celebrity nude photos</a>, and the hit parade of customer data breaches at <a href="http://www.computerworld.com/article/2490637/security0/target-finally-gets-its-first-ciso.html">Target</a>, <a href="http://www.computerworld.com/article/2844491/home-depot-attackers-broke-in-using-a-vendors-stolen-credentials.html">Home Depot</a> and the <a href="http://www.computerworld.com/article/2845621/government/us-postal-service-suffers-breach-of-employee-customer-data.html">U.S. Postal Service</a>. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.
By Matt Weinberger | 15 November, 2014 02:37
Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.
By Jaikumar Vijayan | 27 June, 2014 04:58
With Europe's top court ordering Google to allow people to basically edit their online personal histories, some wonder what this will mean for finding the truth online.
By Sharon Gaudin | 15 May, 2014 06:23
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
By Jaikumar Vijayan | 18 April, 2014 21:36
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
By Marc Ferranti | 06 March, 2014 22:06
A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
By Jaikumar Vijayan | 23 January, 2014 19:45
Retailers and banks must move quickly to figure out who should be responsible for better securing the payments system network or risk having Congress decide for them.
By Jaikumar Vijayan | 23 January, 2014 16:05
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
By Grant Gross | 20 December, 2013 16:11
Amazon's nascent plan to use unmanned drones to deliver packages to customers has already raised strong privacy concerns that could ultimately nip it in the bud.
By Jaikumar Vijayan | 06 December, 2013 11:42
Any effort to rein in the National Security Agency after its widespread spy activities were revealed in leaked documents must focus on more than simply limiting what personal data can be collected.
By Jaikumar Vijayan | 19 November, 2013 17:51
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
There's no such thing as a free email service, at least not when it comes to Google, according to industry analysts.
By Sharon Gaudin | 15 August, 2013 20:52
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCIT Performance Test AnalystACT
- FTAndroid DeveloperNSW
- FTNetwork Systems LeadVIC
- CCSSIS/ SSRS ExpertVIC
- CCPython Web Developer - DevOPS EnvironmentVIC
- CCSenior Systems Analyst (Biomedical)SA
- CCPega BPM Developer / Configurer - 12 months contractACT
- CCObjective ECMS Technical ConsultantSA
- CCWeb DeveloperNSW
- FTVB6 DeveloperNSW
- FTSenior Linux Sys AdminNSW
- CCSAP CRM Specialist- ABAPACT
- CCJava Development Contract - MelbourneVIC
- FTUI DeveloperNSW
- CCiOS DeveloperNSW
- CCContract System Analyst (SQL/.net) 160205/SA/561Asia
- CCSenior Wintel EngineerNSW
- CCSAP ABAP ProgrammersACT
- FTSystems Engineer / Administrator - Managed ServicesNSW
- CCInformation ArchitectQLD
- CCHybris Developer - Global ConsultancyNSW
- CCWeb Content WriterSA
- FTFront End Developer Required Working World Leading Digital TeamNSW
- FTNetwork Engineer | NV2 clearance | Defence projects | Immediate interviewACT
- FTAxway API DeveloperNSW
This e-book gives insight into what it means to use a hybrid approach to cloud computing and the flexibility and choice that it provides. You will discover the type of technologies and approaches that are imperative for your organisation to create the business value and flexibility the constituents you serve demand.
- Microsoft's Azure Stack beta gets new services and DevOps tools
- 9 technologies that could cut demand for lawyers, lower legal fees
- Prysm combines displays with SaaS to extend the reach of enterprise collaboration
- Kingston buys encrypted flash drive maker IronKey
- Users await possible Twitter feed change
- Microsoft previews enterprise-grade setting sync in Windows 10
- Forget Trump and Clinton: IBM's Watson is running for president
- 5G might be your next home broadband service
- Cybercriminals adopt spies' techniques to pull off online bank heists
- Watch hundreds of robots and drones in an amazing choreographed dance
- Java installer flaw shows why you should clear your Downloads folder
- Report: Hackers steal, post details on 9,000 DHS employees
- Facebook's Free Basics prohibited in India
- Mozilla moves Firefox to more flexible release schedule
- Apple's GPU supplier ditches CEO, seeks new strategy