Security Privacy

Security Privacy news, analysis, research, how-to, opinion, and video.

security fingerprints
google myaccount settings

internal security risks

How your employees put your organization at risk

Security threats don't come only from the outside. The biggest threats are often sitting right in the office. Whether it's adult websites or social media, employees are accessing content that puts your business at risk.

14445634744 3d2d72c990 o

Re-thinking doctor-patient communications in the digital age

In recent weeks, the appropriateness of email communication has come under heavy scrutiny as the media revealed that Hillary Clinton exclusively used a personal email account during her tenure as secretary of state. Professor Eric...

Phishing for passwords.

New Chrome extension aims to protect Google passwords, foil phishers

Hackers often gain access to accounts by stealing password through nefarious means. The new Password Alert Chrome browser extension helps deter bad guys by discouraging people from reusing their Google passwords on other sites and...

Report: IT managers not best leaders in breach crisis

Technology managers are typically expected to take the point when a company is hit by a major cyber security crisis, but a more business-oriented leader might be more effective, says a new report from Booz Allen Hamilton.

hacked hacker breach security

Health insurance companies prime targets for hackers

Anthem’s recent data breach underscores the need for stronger security and highlights the potential harm that hackers can cause.

09 chief privacy officer

The IoT will force us to delegate our privacy

A look at the impact of IoT on how users will deal with their privacy and why the delegated privacy will empower users.

security phishing hook

Domain Keywords Used to Spot Phishing Sites

Criminals setting up fake domains for phishing are prone to use the same words over and over and spotting those words can help identify malicious sites, according to a new threat detection model from OpenDNS.

lenovo superfish how to remove

Lenovo Consumer Laptops Bring a Super Fishy Surprise

Lenovo has stopped pre-loading Superfish adware onto it new machines, but the practice has raised security and privacy concerns. Here's how to remove it.

wireless vehicle privacy security

Security, Privacy Gaps Put U.S. Drivers at Risk of Hacking

New standards are needed to plug security and privacy gaps in cars and trucks, according to a report released by U.S. Sen. Edward Markey.

spies

How Corporate Spies Access Your Company's Secrets

Lower-level employees can infiltrate corporate assets and remain undetected for months, or even years. How can you safeguard your sensitive data from prying eyes?

securitytopstories

10 Top Security Stories of 2014

From data breaches and cyberthreats to uncertainty around mobile, cloud and the Internet of Things, these are the security stories that dominated 2014.

Private property

Doxxing defense: Remove your personal info from data brokers

Don't want your home address or other personal info published to the world? This weekend, take an hour or two to make yourself a less visible target.

Facebook nudges users to take control with privacy makeover

Facebook wants its users to take control of their own privacy, and it's giving them new information to help them do just that.

Confidential Business Data at Risk at the Border

U.S. agents can search and seize the laptops of international travelers at the border, so take precautions to protect confidential business information.

internet privacy
Q&A

You Are Responsible for Your Own Internet Privacy

Stan Stahl knows about the shady world of high-tech security and false privacy. Stahl helped secure teleconferencing at the White house and the communications network controlling the country's nuclear weapons arsenal. CIO.com talks to...

privacy

Snapchat, Whisper Promise Privacy but Fail (Miserably) to Deliver

Privacy and anonymity in the era of social media are promises left unfulfilled. The events of recent months make this abundantly clear, yet Snapchat and Whisper, two companies at the center of controversy, place the blame on users.

Hacker manipulating code

Today's Security Hacks Are After More Than Bank Info

Customers cringe every time they hear about a bank, retail or healthcare hack that puts personal or financial data at risk. Today's hackers are after much more that credit card numbers, though -- and most firms are powerless to stop...

wearable privacy

How to Read (and Actually Understand) a Wearable Tech Privacy Policy

Three privacy experts share tips on how to read a wearable-tech privacy policy, and they highlight a set of red flags consumers should look out for.

Load More