Best practices, tips, techniques, and business strategies to find a balance between privacy and securit.
Thu, March 06, 2014 - Despite all of the attention it has received in the media, government hacking ranks low as a concern for security professionals.
Thu, March 06, 2014 - Privacy issues may cause a stumbling block for companies capitalizing on a growing stream of user data
Thu, March 06, 2014 - The proposed deal raises concerns about WhatsApp users' privacy, two groups say
Thu, March 06, 2014 - As if crowded train cars aren't creepy enough, a Massachusetts high court has ruled that so-called "upskirt" photos of a woman on a Boston trolley are legal, according to a strict reading of state law.
Thu, March 06, 2014 - The tool can be used to add malicious functionality to legitimate applications, researchers from Symantec said
Wed, March 05, 2014 - Human rights groups are using metadata to verify the authenticity of eyewitness footage
Tue, March 04, 2014 - Attackers have used a variety of techniques to exploit known vulnerabilities in router models from different manufacturers
Tue, March 04, 2014 - Even if a company were willing to expunge personal data that it had been authorized to collect, the realities of IT systems mean it probably could never completely do that.
Tue, March 04, 2014 - Sprint is accused of overcharging law enforcement agencies more than US$21 million
Mon, March 03, 2014 - The senior White House counselor is leading a study group whose findings could influence policy changes
Mon, March 03, 2014 - Who says privacy is dead? While it's true that marketers, the government, data aggregators and others are gathering and analyzing more data than ever about every individual, you can still exert some control over what's out there, who's tracking you and what they do with that information.
Fri, February 28, 2014 - Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at this week's RSA Conference, you can't provide physical or electronic security simply by trying to prevent authorized access -- you have to rethink all types to security to protect data and lives.
Fri, February 28, 2014 - The app exposes information about attendees in a SQLite database file, according to IOActive
Thu, February 27, 2014 - Another day, another revelation about intelligence agencies' ability to peer into your private life: The Guardian reported that GCHQ, Britain's surveillance agency, captured stills from Yahoo webcam chats between 2008 and 2010.