ORLANDO, Fla. -- When the massive distributed denial-of-service (DDoS) attack in March brought down the voice-over-IP (VoIP) call processing supplied by TelePacific Communications to thousands of its customers, it marked a turning point for the local-exchange services provider in its thinking about security.
Ellen Messmer |
05 Oct |
Read more
Facebook's tracking technology has landed the social network in hot water, with two lawmakers calling for a Federal Trade Commission (FTC) investigation.
Sharon Gaudin |
30 Sep |
Read more
Interesting revelations invariably emerge when a high-profile entity is scrutinised, intensely and unforgivingly, by those who are convinced it's too good to be true. Case in point: Julia Gillard. The NBN. Miley Cyrus. And Facebook, of course, which this week was pulled into yet another privacy scandal that should surprise absolutely nobody – and offer yet another reason why CSOs should be very, very careful when it comes to use of social media within their company's four walls.
David Braue |
30 Sep |
Read more
Amazon's new Silk browser has raised some eyebrows among privacy and security experts.
Gregg Keizer |
30 Sep |
Read more
TAMPA -- Using a portable kit to be able to quickly analyze human DNA collected in the field for investigative and forensics purposes has been a long-time dream for the Federal Bureau of Investigation (FBI), law enforcement and the Department of Defense (DoD).
Ellen Messmer |
30 Sep |
Read more
The complexity of encryption schemes has been increased dramatically in an attempt to outpace the development of computational tools designed to crack them. Now it's important to devise algorithms that can't be brute forced for trillions of years in the hopes that they will remain secure long enough to be useful before they, too, are broken. Here's a quiz about encryption to see how well you are versed in one of security's most important components. Keep track of your score and check at the end to see how well you stack up.
Tim Greene and Jim Duffy |
29 Sep |
Read more
Development of enterprise mobile apps has been moving more slowly than development of consumer-facing apps, according to Gartner. One main reason is IT leaders' concerns about the security of mobile devices, which are often employees' personal devices, and are vulnerable to being lost, hacked or stolen. While there are plenty of established tools and practices for keeping Web visitors from straying (or hacking) into sensitive corporate data, managing security across a diverse set of mobile devices remains a challenge, IT experts say.
Elisabeth Horwitt |
29 Sep |
Read more
BoxTone has released a new version of its mobile device management software, which now works with existing enterprise policy-setting and security tools. This integration lets enterprise IT staff apply those tools to mobile users.
John Cox |
28 Sep |
Read more
With the proliferation of data breaches, The Harford insurance company is selling a new data loss insurance aimed at small businesses that might be put at financial risk if they lose valuable and sensitive data.
Tim Greene |
22 Sep |
Read more
The Information Commissioner's Office (ICO) has found the University Hospital of South Manchester NHS Foundation Trust in breach of the Data Protection Act (DPA) after losing an unencrypted USB key containing patients' personal data.
Anh Nguyen |
08 Sep |
Read more
For years, Facebook users have been clamoring for better privacy controls and clarity, while Facebook engineers oscillate between improvements and major privacy snafus. Every now and then a new wave of exasperated users cry out "That's it, I'm leaving". Up to now, users really didn't have anywhere to go after quitting, so they effectively quit the social media scene, self-ostracized (MySpace is equivalent to being exiled, perhaps worse). Now that they have somewhere else to go (Google+), Facebook is ramping up its privacy controls and seems to be taking privacy more seriously. Let the privacy competition begin!
Andreas M. Antonopoulos |
08 Sep |
Read more
Microsoft said Sunday that a digital certificate stolen from a Dutch company could not be used to force-feed customers malware through its Windows Update service.
Gregg Keizer |
06 Sep |
Read more
On 28 August Iranian citizens were subjected to a far reaching cyber snooping operation made possible by an attack on Dutch certificate authority DigiNotar.
Liam Tung |
06 Sep |
Read more
Technology is a wonderful thing but while the majority of people will use it for proper and honest purposes, there will always be a small percentage who will use it for unethical reasons. And this is an important point to make – people use the technology for illegal or immoral purposes; the technology itself is not the issue.
Neil Gaughan |
05 Sep |
Read more
I thought we could examine a recent theme in a little more detail this month: the challenges of dealing with the <a href="http://www.csoonline.com/article/681822/just-say-yes-why-banning-consumer-devices-makes-your-organization-less-secure">consumerization of IT devices</a> in the workplace. We recently completed a study, in partnership with Symantec, that looked at the security and compliance risks of a mobile workforce. It affirmed what I've believed for a long time, namely, that there is a consensus that mobile workers pose a great risk and that, for the most part, businesses are not prepared to mitigate that risk.
Bob Bragdon |
31 Aug |
Read more
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
André Bakken, director of product management at Ipswitch File Transfer |
30 Aug |
Read more
Facebook recently rolled out a number of changes to the social networking site. One of the changes eliminates the <a href="http://www.pcworld.com/article/238708/facebook_revamps_locationsharing_feature_in_places.html">concept of Facebook Places</a>, but instead incorporates location-aware updates at virtually every level of Facebook. You might want to think twice, though, before <a href="http://www.pcworld.com/businesscenter/article/209709/facebook_deals_bring_customers_to_your_facebook_place.html">broadcasting your location</a> to the anonymous masses online.
Tony Bradley |
30 Aug |
Read more
Recently, I contended that "Freedom and privacy, in any meaningful sense, are dead" and discussed the two types of privacy, "factual" privacy, which concerns "static" data such as your age and cholesterol level, and "lifestream" privacy which is the realtime data about things such as where you go and who you talk to.
Mark Gibbs |
24 Aug |
Read more
Facebook is making a series of design changes to the site to make it clearer to users who can see the content that they post, an issue Google has been criticizing Facebook about since it launched its own social network, Google+, in June.
Juan Carlos Perez |
24 Aug |
Read more
Imagine what would happen if all the Google engineers turned rogue and held the world’s Gmail accounts to ransom. Or if aliens attacked earth and wiped California off the map.
Georgina Swan |
22 Aug |
Read more