privacy - News, Features, and Slideshows
Former U.S. Secretary of State Hillary Clinton called for a "global compact" on surveillance and the use of collected data, saying the U.S. isn't the only country that does it and American technology companies are unfairly targeted for the government's actions.
By Stephen Lawson | 29 August, 2014 09:04
Email addresses and encrypted passwords of around 97,000 users who tested early builds of the Bugzilla bug tracking software were left exposed for three months following a server migration.
By Lucian Constantin | 28 August, 2014 22:38
The Senate has voted to extend the reporting deadline of the inquiry into reform of the Telecommunications (Interception and Access) Act 1979. The inquiry, chaired by Greens Senator Scott Ludlam, had been due to table its final report last night.
By Rohan Pearce | 28 August, 2014 08:40
Attorney-General George Brandis has reiterated the government's intention to introduce a mandatory data retention regime but failed to answer a query by Greens Senator Scott Ludlam on what the cost of such a scheme is likely to be.
By Rohan Pearce | 27 August, 2014 15:26
Future versions of the Firefox OS mobile platform will allow users to control application-specific permissions, a feature with both privacy and security benefits that's missing on Android.
By Lucian Constantin | 27 August, 2014 00:01
The U.S. National Security Agency built a "Google-like" search engine to give domestic and international government agencies access to details of billions of calls, texts and instant messages sent by millions of people, according to The Intercept.
By Martyn Williams | 26 August, 2014 07:02
Information security spending in Australia will exceed $2 billion next year, according to a Gartner forecast released today.
By Adam Bender | 22 August, 2014 11:12
The data breach at Community Health Systems that exposed the personal information on more than 4.5 million people is a symptom of the chronic lack of attention to patient data security and privacy within the healthcare industry.
By Jaikumar Vijayan | 20 August, 2014 06:25
A senior U.S. senator is asking airlines about their data privacy practices, saying he's concerned about what information the companies are collecting and sharing with third parties.
By Grant Gross | 19 August, 2014 05:35
Civil liberties organisation Electronic Frontiers Australia has warned that new ASIO powers proposed by the federal government could compromise the security of third party computer systems.
By Rohan Pearce | 18 August, 2014 13:48
Because targets of ASIO surveillance are becoming increasingly security conscious, the intelligence agency requires more flexibility in how it hacks into computer systems, the Attorney-General's Department today told a parliamentary inquiry into national security law reform.
By Rohan Pearce | 15 August, 2014 15:51
Thirty U.S. data brokers and data management firms, including Adobe Systems, AOL and Salesforce.com, are violating privacy promises they've made regarding their handling of the personal information of EU residents, a privacy group said in a complaint to be filed Thursday.
By Grant Gross | 14 August, 2014 14:02
The U.S. National Security Agency has a cyberwarfare program that hunts for foreign cyberattacks and is able to strike back without human intervention, according to NSA leaker Edward Snowden.
By Grant Gross | 14 August, 2014 02:50
Targeted "preservation notices" issued under the Telecommunications (Interception and Access) Act together with stored communications warrants offer an alternative to the mass surveillance dragnet implied by a mandatory data retention scheme, according to Internet service provider iiNet.
By Rohan Pearce | 13 August, 2014 12:38
UXC Connect’s Jesmond Psaila says that DevOps can do for IT operations what Agile did for software development. This paper demonstrates how, by combining both approaches, you can significantly improve operational efficiency and time-to-market. • Marketing and development teams want to constantly change or increase functionality, while IT operations teams want to keep the environment as stable as possible • Agile software development and virtualisation have not solved the time-to-value problem faced by marketing and IT operations teams • Recent movements in DevOps aim to address and redefine a more agile service management platform, while new tools have vastly improved functionality to configure and automate common processes
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- FTSenior Media TraderNSW
- FTDigital Media PlannerNSW
- FTCampaign Managers| RTB / Programmatic | Expression of InterestNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTChief Information OfficerNSW
Frost & Sullivan Research: A Structured Approach to Deploying Communications Endpoints in the Enterprise
Communications endpoints are a key part of the enterprise workers' tool kit. But businesses must address security and operating costs arising from BYOD arrangements. This guide covers the four phases of a communications endpoints deployment to maximize the return on IT and communications investment.
- Backoff malware infections are more widespread than thought
- IBM Watson cooks up some new dishes
- Apple will keep pushing for a sales ban on Samsung products
- Facebook testing mobile searches for old posts
- Appeals court denies Oracle request to restore $1.3 billion judgment against SAP
- Scientists create one robot brain to rule them all
- Intel amps up desktop performance with its first 8-core PC chip
- IDC: Tablets sales growth to slow this year
- Can SDN usher in better IT security?
- Chrome for Mac to desert early Intel Mac owners by October
- Mozilla presses forward with new revenue plan, debuts ads in Firefox preview
- Drivers want their cars to get to know them better
- Nokia's navigation service Here comes to Samsung smartwatch and Galaxy
- As smartphone screen sizes max out, stylish designs expected at IFA
- CryptoWall held over half-a-million computers hostage, encrypted 5 billion files