Please turn on your JavaScript for this page to function normally.
The privacy officer’s agenda according to Gartner

Data breaches, cloud computing, location-based services and regulatory changes will force virtually all organizations to review, and at least half of all organizations to also …

Drive-by attacks targeting smartphones are in our future

A new study that has analyzed the behavior of 10,000 applications downloaded from the Android Market, shows that many mobile applications leak personal information and that …

Granular access to encrypted data in the cloud

Newline Software announced the release of OPTIC, Online Privacy Technology In the Cloud. The solution allows developers to securely query, write, and read encrypted data to …

AVG releases Premium Security

AVG announced Premium Security, the Internet security solution that surveys the Web for incidents of stolen identity. It includes AVG Identity Alert, AVG Internet Security and …

Phishers becoming sophisticated marketers of fraud

Phishers are becoming more sophisticated criminal marketers, according to a report by IID which documents a quarter that was a watershed for data breaches, from large-scale …

Google still grabbing more than just Wi-Fi devices’ MAC address?

Google is in for another privacy dispute, as it seems that its Street View cars have not been collecting only hardware IDs of detected Wi-Fi devices, but also the MAC …

22% in US admit to potential abuse of private data

22% of US, 29% of Australian and 48% of British employees who have access to their employer’s or client’s private data, would feel comfortable doing something with …

Power to the people: Securing consumerized devices

The consumerization genie is out of the bottle. Employees are increasingly using consumer-focused websites and apps such as Twitter, Facebook and LinkedIn for work-related …

An anonymous social network in the making?

Spurred by blocked accounts of Anonymous members and activists on various popular social networks such as Facebook, Twitter, and (recently) Google+, a group apparently loosely …

Verizon takes on issue of stolen credentials

Unauthorized access to corporate networks through stolen user names and passwords topped 45 percent in 2010, making credentials the second most compromised data type, …

Law enforcement supports new U.S. data retention bill

A new proposal for a U.S. federal law that would compel ISPs to retain logs regarding their customers for 18 months is currently being discussed in the House of …

Credit card numbers stolen in Kiplinger breach

Kiplinger Washington Editors – the publisher of well-known business and economic publications such as the The Kiplinger Letter and the Kiplinger’s Personal Finance …

Don't miss

Cybersecurity news