Identity & Access

Identity & Access news, information, and how-to advice

Synology
Cost of healthcare    167248933

whatsapp ios

FTC warning unlikely to stop Facebook from changing WhatsApp privacy policies

Despite pressure from the Federal Trade Commission, Facebook is unlikely to leave WhatsApp's stricter privacy policies intact, once government regulators approve the $19 billion acquisition, privacy experts say.

Schneier: Internet has delivered a ‘golden age of surveillance’

Security guru Bruce Schneier talks about power and privacy when there is no limit on the amount of data that can be collected, stored and analyzed

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

Slideshow

The worst data breaches of 2014…so far (Q1)

The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them through March of the this year for a loss of 4,238,983 records related to sensitive personal information exposed through hacker...

Businesses face rising political pressure from data breaches

FTC encourages Congress to pass national breach notification legislation, among other efforts.

Yahoo Logo

Yahoo! Encrypts! All! The! Things!

Yahoo has offered a public status update for their various encryption projects, including an announcement that a new, encrypted, version of Yahoo Messenger will be released in the coming months.

U.S. government seeking easier hacking sparks privacy debate

Government has made a request to change federal court rules to ease the ability to hack into computers during criminal investigations

Logicalis eBook: SAP HANA: The Need for Speed

Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes

Gameover malware targets accounts on employment websites

In addition to CareerBuilder, new variants of the Trojan program target Monster.com, researchers from F-Secure said

Blue bank vault

Banks' suit in Target breach a 'wake up call' for companies hiring PCI auditors

Two banks have filed a lawsuit against Target and Trustwave Holdings, the retailer's security assessor

Report: Obama to unveil legislation to end NSA bulk phone data collection

Phone data will now be stored with telecommunications carriers rather than with the U.S. National Security Agency

Turkey, Twitter & Censorship: VPN, Tor and more

Well, it seems that even a blind squirrel can find a nut every now and again. It appears from reports that the Turkish government finally figured out how to remedy their laughable attempt to block Twitter by using DNS. The citizens...

2013 Cyber Risk Report

The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat landscape.

California DMV customers may be affected by a credit card breach

The state's Department of Motor Vehicles is warning customers of a potential security breach affecting its payment processor.

NSA hacked into servers at Huawei headquarters, reports say

The US government agency also gained information to place backdoors on networking equipment, according to leaked documents

Microsoft tweaks privacy policies after email spying backlash

To track down a Windows 8 leaker Microsoft peeked inside a blogger's email account

googleglass

Why Google Glass security remains a work in progress

University researchers develop spyware for Glass that snaps pictures and sends them to a remote server

Internet Security Threat Report 2014

The Internet Security Threat Report (ISTR) provides an analysis of the year's global threat activity, based on data from the Symantec™ Global Intelligence Network.

Fake Tor app has been sitting in Apple's App Store for months, Tor Project says

Apple has not removed the fake app so far despite being notified in December, Tor developers say

5 ways to prevent data loss in mobile environments

Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data...

Impact of EA Games hack on Apple shows ripple effect of attacks

EA Games server hacked to redirect users to phishing page requesting Apple ID and password

Healthcare.gov: Proceed at your own risk

The government insists the Obamacare site is secure. But most experts disagree

Load More