Privacy

Privacy news, information, and how-to advice

whatsapp ios

Schneier: Internet has delivered a ‘golden age of surveillance’

Security guru Bruce Schneier talks about power and privacy when there is no limit on the amount of data that can be collected, stored and analyzed


Slideshow

The worst data breaches of 2014…so far (Q1)

The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them through March of the this year for a loss of 4,238,983 records related to sensitive personal information exposed through hacker...

Yahoo Logo

Yahoo! Encrypts! All! The! Things!

Yahoo has offered a public status update for their various encryption projects, including an announcement that a new, encrypted, version of Yahoo Messenger will be released in the coming months.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

U.S. government seeking easier hacking sparks privacy debate

Government has made a request to change federal court rules to ease the ability to hack into computers during criminal investigations

Blue bank vault

Banks' suit in Target breach a 'wake up call' for companies hiring PCI auditors

Two banks have filed a lawsuit against Target and Trustwave Holdings, the retailer's security assessor

Gameover malware targets accounts on employment websites

In addition to CareerBuilder, new variants of the Trojan program target Monster.com, researchers from F-Secure said

Report: Obama to unveil legislation to end NSA bulk phone data collection

Phone data will now be stored with telecommunications carriers rather than with the U.S. National Security Agency

Logicalis eBook: SAP HANA: The Need for Speed

Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes

Turkey, Twitter & Censorship: VPN, Tor and more

Well, it seems that even a blind squirrel can find a nut every now and again. It appears from reports that the Turkish government finally figured out how to remedy their laughable attempt to block Twitter by using DNS. The citizens...

California DMV customers may be affected by a credit card breach

The state's Department of Motor Vehicles is warning customers of a potential security breach affecting its payment processor.

NSA hacked into servers at Huawei headquarters, reports say

The US government agency also gained information to place backdoors on networking equipment, according to leaked documents

googleglass

Why Google Glass security remains a work in progress

University researchers develop spyware for Glass that snaps pictures and sends them to a remote server

2013 Cyber Risk Report

The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat landscape.

Microsoft tweaks privacy policies after email spying backlash

To track down a Windows 8 leaker Microsoft peeked inside a blogger's email account

5 ways to prevent data loss in mobile environments

Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data...

Impact of EA Games hack on Apple shows ripple effect of attacks

EA Games server hacked to redirect users to phishing page requesting Apple ID and password

Fake Tor app has been sitting in Apple's App Store for months, Tor Project says

Apple has not removed the fake app so far despite being notified in December, Tor developers say

Internet Security Threat Report 2014

The Internet Security Threat Report (ISTR) provides an analysis of the year's global threat activity, based on data from the Symantec™ Global Intelligence Network.

Healthcare.gov: Proceed at your own risk

The government insists the Obamacare site is secure. But most experts disagree

Hacker Diabl0 arrested in Thailand at the request of Swiss authorities

He is wanted in connection with computer fraud and credit card information theft in Switzerland

Slideshow

20 infamous hacker security vendor break-ins

Here are 20 of the most notorious known break-ins over the past decade.

Who put the cockroach in my supply chain?

Businesses have always had concerns about supply chain risks but, for most businesses, those risks involve shipping delays, parts shortages and labor issues. But that’s starting to change as evidenced by CSOonline’s recent coverage on

Load More