Criminal attacks on healthcare increase 100 percent
As millions of new patients enter the U.S. healthcare system under the Affordable Care Act, patient records have become a smorgasbord for criminals. A new study on patient …
Head of Senate Intelligence Committee accuses CIA of spying on Senate
The long awaited reprimand of the US intelligence community by Senator Dianne Feinstein, the head of the Senate Intelligence Committee, happened yesterday, but not for the …
Facebook security and privacy pitfalls
In this interview, Andrei Serbanoiu, Online Threats Researcher at Bitdefender, discusses Facebook security and privacy pitfalls, the dangers of sharing on the social network, …
How do the top 100 UK ecommerce sites deal with personal data?
Dashlane assessed the password security procedures on the Top 100 e-commerce sites by examining 26 different password security criteria and awarding/docking points depending …
Do organizations care about data protection?
Most consumers just don’t believe that the personal and financial data they submit to corporations is safe. That’s the unmistakable takeaway from a new snap poll …
Pinterest publishes its first transparency report
Pinterest has joined the ranks of Internet companies who publish a bi-annual transparency report by issuing one covering the six months from July to December 2013. …
Video: Edward Snowden on privacy and technology
Edward Snowden speaks about privacy and technology with the ACLU’s Ben Wizner and Christopher Soghoian at SXSW Interactive.
50,000 Statista users affected by data breach
Customers of the biggest online statistics portal Statista are being notified that the company’s systems have been breached and the hackers likely made away with its …
Is your browser a user agent, or a double agent?
In this podcast recorded at RSA Conference 2014, Mike Shema, Director of Engineering at Qualys, discusses how privacy shouldn’t be an afterthought in the browser. Data …
Big Data security and privacy challenges
In this interview, Leighton Johnson, CTO, Senior Security Engineer for Information Security and Forensics Management Team (ISFMT), talks about how Big Data is transforming the …
Personal info of 12 million KT customers stolen and misused
Two men have been arrested in connection with the massive KT Corp. data breach that resulted in the theft of personal and financial information of some 12 million customers of …
HTTPS can’t be trusted to obscure private online activity
HTTPS was initially used to prove to Internet users that the website and web server with which they are communicating are indeed the ones they want to communicate with, but …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege