Prism whistle-blower Edward Snowden persuaded other National Security Agency (NSA) colleagues to give him their login details and passwords, which he later used to gain access to classified information that he later leaked to the media. ...
Tags: Computer Products, software
Secure email providers Lavabit and Silent Circle have formed a partnership they call the Dark Mail Alliance, with the intention of creating a secure email service that can thwart government surveillance. According to security news site ...
Tags: Computer Products, software
Seclore, a leader in providing security, privacy and compliance solutions, announces the successful deployment of its flagship Information Rights Management (IRM) technology - Seclore FileSecure - for HDFC Life, one of India's leading ...
Tags: Seclore, compliance solutions
Mobilising apps for employees to use on their iPhones and Android devices sure sounds like a fun idea. Employees would actually be thankful for having such a cool IT department, a forward-thinking team on the cutting-edge of consumer tech ...
Tags: Computer Product, software
Researchers showed a Black Hat audience how femotcell technology, used by phone companies to boost cell phone coverage, can be hacked to intercept cell phone calls, text messages and other data. Tom Ritter and Doug DePerry , researchers ...
Tags: Phone Calls, Exploit Cellular Tech
A federal court judge in New Jersey on Wednesday agreed to allow the U.S. Chamber of Commerce and several other organizations to seek the dismissal of a closely watched data breach lawsuit filed by the Federal Trade Commission against ...
Tags: Wyndham Lawsuit, Computer
South Lanarkshire Council is on the lookout for security software providers in a tender worth nearly £1m. The Scottish council is looking for a partner to deliver a range of IT security-related services and software over a four-year ...
Tags: Computer Products, software
Some websites and mobile app developers are confused about how to comply with revised rules governing the online collection of personal information from children that took effect in the U.S. Monday, critics said. The U.S. Federal Trade ...
Cisco today announced that 50 schools involved in Azerbaijan's?e-School project have deployed a unified distance learning system based on?Cisco Enterprise Networks. The solution provides the schools with secure and reliable access to data ...
Tags: Cisco, Computer Products
Mobile Helix, the enterprise application and data security platform provider, has launched Link, which it describes as the industry’s first pure HTML5 platform. Link unlocks enterprise productivity by combining unparalleled security ...
Tags: Mobile Helix, Link, HTML5 Platform
The Open Data Center Alliance, a customer group that shares tips about cloud deployments and tries to nudge vendors into supplying the products they want, has added big data to the list of IT topics it covers. The alliance was set up in ...
Tags: Open Data Center Alliance, Big Data, Cloud
According to Protiviti’s 2013 Security and Privacy Survey, a large number of companies are not adequately prepared to respond to a data breach of IT security crisis, despite a broader recognition that cyber threats are more prevalent. ...
Tags: Data Breaches, Security
Even before bombshell disclosures of the U.S. government's massive collection of Internet and cellphone data, many U.S. residents were concerned about privacy violations. In a survey conducted just days before reports surfaced about ...
Tags: NSA Scandal, Privacy Breaches
Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data ...
Tags: Data encryption, Spy-Proof, Surveillance
Businesses that receive a court order for data similar to the one reportedly?handed to Verizon?by an intelligence agency have no choice but to comply and to take comfort in their immunity from lawsuits, an expert says.? In April, the ...
Tags: Computer Products, software