Computerworld - Employers in Illinois and California cannot ask for usernames and passwords to the personal social media accounts of employees and job seekers under laws that took effect on Jan. 1. Illinois Gov. Patrick Quinn in August ...
Tags: social media, Facebook, Employers, social media site
CBR rounds up expert comments on Gartner's new prediction that Worldwide IT spending will reach EURO2.28tn this year. Evanna Kearins, director of Jaspersoft, told CBR "Even though we still find ourselves in a hugely volatile economy ...
The National Telecommunications and Information Administration (NTIA) is set to host the first of several meetings seeking input for its effort to develop new codes of conduct for handling private consumer date on the Internet and mobile ...
Tags: NTIA, private consumer, privacy practices, Bill of Rights, FTC
Cloud computing services from outside the U.S. are trying to exploit perceived weaknesses in privacy laws to drive business away from U.S. providers, according to some representatives of the tech industry. Deutsche Telekom and other ...
Tags: Foreign cloud, marketing, privacy, Computer Products
Computerworld - Research in Motion Wednesday released a BlackBerry PlayBook OS update that adds full device encryption to secure personal data stored on the device to go along with the already-available encryption for corporate data. The ...
Tags: BlackBerry PlayBook OS, personal data, corporate data, company news
Computerworld - Individuals have no reasonable expectation of privacy in historical cell phone location data collected and maintained by phone companies, a federal prosecutor said in oral arguments Monday before a three-judge panel from the ...
Tags: Cell Phone, cell phone location, cell phone location data
Demand for real-time data, including personal health information, will drive the market for wearable wireless devices to grow from 14 million items this year to as many as 171 million in 2016. In four years, the market for these devices ...
Metropolitan Police Service (MPS) officials are planning to build a computer system to analyse photo and video evidence gathered by members of the public using mobile phones. The project was inspired by systems used by broadcasters to ...
Tags: Metropolitan Police Service, computer system, mobile phone
Attackers can read emails, contacts and other private data from the accounts of Yahoo users who visit a malicious page by abusing a feature present on Yahoo's Developer Network website, says an independent security researcher. A limited ...
Tags: Attackers, emails, private data, Yahoo users
ISACA has released insights from its 2012 IT Risk/Reward Barometer. The results from this study confirm an understanding of the risk posed by employee activities with both work and personal devices. For example, a consistently high ...
Tags: BYOD, risk barometer, reward barometer, organisation security
Three widely deployed payment terminals have vulnerabilities that could allow attackers to steal credit card data and PIN numbers, according to a pair of security researchers from penetration testing firm MWR InfoSecurity in the U.K. The ...
Tags: payment terminals, MWR InfoSecurity, credit card data, PIN numbers
Over half of CIOs fail to test cloud vendors' security systems and procedures before selecting the provider, according to a survey of 250 senior IT decision-makers. The research, conducted by IT recruitment consultancy Robert Half ...
Tags: CIO, cloud vendors, security, UK
They say no one can hear you scream in space, but if you so much as whisper on the Web, you can be tracked by a dozen different organizations and recorded for posterity. Simply visiting a website can allow its operators to figure out your ...
Tags: device information, advertising cookies, web
Increased regulation, reduced profits and changing customer demands are driving banks to replace home-grown software with commercially available alternatives. Simon Paris, head of global banking at SAP, said the strategic change has been ...
Tags: Simon Paris, Commercial Systems, home-grown software, SAP system
Hadoop and MapReduce have long been mainstays of the big data movement, but some companies now need new and faster ways to extract business value from massive -- and constantly growing -- datasets. While many large organizations are still ...