privacy - News, Features, and Slideshows
A funny thing is happening in the wake of the <a href="http://www.computerworld.com/article/2490179/security0/security0-the-snowden-leaks-a-timeline.html">Edward Snowden NSA revelations</a>, the infamous <a href="http://www.computerworld.com/article/2601905/apple-icloud-take-reputation-hits-after-photo-scandal.html">iCloud hack of celebrity nude photos</a>, and the hit parade of customer data breaches at <a href="http://www.computerworld.com/article/2490637/security0/target-finally-gets-its-first-ciso.html">Target</a>, <a href="http://www.computerworld.com/article/2844491/home-depot-attackers-broke-in-using-a-vendors-stolen-credentials.html">Home Depot</a> and the <a href="http://www.computerworld.com/article/2845621/government/us-postal-service-suffers-breach-of-employee-customer-data.html">U.S. Postal Service</a>. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.
By Matt Weinberger | 15 November, 2014 02:37
Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.
By Jaikumar Vijayan | 27 June, 2014 04:58
With Europe's top court ordering Google to allow people to basically edit their online personal histories, some wonder what this will mean for finding the truth online.
By Sharon Gaudin | 15 May, 2014 06:23
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
By Jaikumar Vijayan | 18 April, 2014 21:36
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
By Marc Ferranti | 06 March, 2014 22:06
A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
By Jaikumar Vijayan | 23 January, 2014 19:45
Retailers and banks must move quickly to figure out who should be responsible for better securing the payments system network or risk having Congress decide for them.
By Jaikumar Vijayan | 23 January, 2014 16:05
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
By Grant Gross | 20 December, 2013 16:11
Amazon's nascent plan to use unmanned drones to deliver packages to customers has already raised strong privacy concerns that could ultimately nip it in the bud.
By Jaikumar Vijayan | 06 December, 2013 11:42
Any effort to rein in the National Security Agency after its widespread spy activities were revealed in leaked documents must focus on more than simply limiting what personal data can be collected.
By Jaikumar Vijayan | 19 November, 2013 17:51
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
There's no such thing as a free email service, at least not when it comes to Google, according to industry analysts.
By Sharon Gaudin | 15 August, 2013 20:52
Research shows that 94% of CIOs believe that enterprise mobility has become an important part of their enterprise IT strategy. While there are many benefits for business, there are still risks when it comes to security. This whitepaper looks at the steps all organisations to take when it comes to supporting a mobile workforce.
- FTMid level IT consultant | Systems Integration & Managed ServicesNSW
- FTLinux Administrator with AWS & DevopsNSW
- FTSenior Consultant | Project work | National Systems IntegratorVIC
- FT1st & 2nd level IT support all-rounder in beautiful rural BathurstNSW
- FTSystems Administrator - Managed ServicesNSW
- FTManual Test Engineer | Financial Institution | Web testingNSW
- FTAndroid DeveloperNSW
- FTLevel 2 IT Support TechnicianVIC
- CCMilitary simulation programmer with C# and Unity - 3 monthsNSW
- FTSystems Administrator | National commercial law firm | MS, AWS & eDiscoveryNSW
- CCE-Commerce - Senior Web Application DeveloperNSW
- FTField EngineerNSW
This infographic provides tips on how you can use business T&E data more efficiently through understanding the job responsibilities of stakeholders who receive data, raising awareness of how the information should be presented and consolidation of all T&E intelligence into one source, aiming to improve and promote business spend clarity.
- US will not seek legislation against encryption
- Apple removes apps from store that could spy on your data traffic
- Alibaba sets up second data center in the US in $1B cloud expansion
- New California law requires warrants for access to private communications
- Many vulnerabilities in older Huawei 3G routers won't get patched
- New AWS tools give developers high-powered instances, better container support and more
- Qualcomm enters server CPU market with 24-core ARM chip
- Quick iPhone 6S case review: Ballistic Tungsten Tough
- AWS re:Invent 2015: Amazon aims to make AWS a better home for IoT devices
- Dell's next 'AFTE' software robot will offer cognitive intelligence
- Adidas to 3D print custom insoles in sneakers
- AT&T kicks off Wi-Fi calling years after T-Mobile
- AWS re:Invent 2015: AWS Mobile Hub streamlines app dev
- Microsoft's Surface Book to reignite OEM hostility
- Microsoft links Power BI to Alteryx for deeper analytics