Computerworld-In the biggest data compromise of the year,Social Security Numbers(SSN)belonging to about 3.6 million residents in South Carolina have been exposed in an intrusion into a computer at the state's Department of Revenue. ...
Tags: credit card, debit card, SSNs
Companies need to store emails and documents for at least six years in a central repository, before they consider deleting or destroying the information, according to Pinsent Masons lawyers. "In terms of retaining documents and having a ...
Tags: Pinsent Masons, e-discovery, Mimecast, IT project
A hacking group that calls itself Team GhostShell this week claimed credit for breaking into servers at 100 major universities from around the world,including Harvard,Stanford,the University of Pennsylvania and the University of Michigan. ...
Mobile phone group O2 is gearing up to introduce a bring-your-own-device (BYOD) scheme to its operations in Europe and South America, following a successful roll-out in the UK. O2, part of Spain's Telefonica, said the policy has helped ...
Police across Europe could soon find themselves monitoring Facebook,Google and Twitter for content related to terrorism. A leaked report about a"Clean IT"initiative by the European Union(EU)revealed the plan for police officers ...
Tags: EU, monitor web, police, Wikipedia
Facebook will suspend its facial recognition photo tagging service in Europe by 15 October,following a privacy audit by the Irish Data Protection Commission(DPC). The technology,which suggests when registered users could be tagged in ...
Tags: Facebook, photo tagging tool, registered users, privacy issues
The US is collecting huge amounts of data on its citizens, according to former National Security Agency (NSA) official Bill Binney. While at the NSA, Binney led the development of secret software he now believes is being used to carry out ...
Tags: NSA, Bill Binney, secret software, illegal data
There is a long history of users wanting, or needing, different tools to use in the workspace. Until recently, such desires have usually been expressed in terms of informal complaints and/or formal requests to IT to provide new equipment or ...
Tags: IT equipment, IT services, bring-your-own-device policy, personal devices
Wikipedia founder Jimmy Wales has slammed as"technologically incompetent"the Draft Data Communications Bill,which will make it easier for security and police services to spy on e-mails,phone calls and internet activity of UK citizens. ...
Tags: Wikipedia, Jimmy Wales, slams draft communications data bill, ISPs
IBM has announced a smaller, faster, more secure mainframe computer to compete with increasingly popular, lower cost, PC-based enterprise servers. The move is aimed at countering a long-term decline in the sales of mainframes and securing ...
Tags: IBM, secure mainframe computer, enterprise servers, long-term decline
Many businesses are still reluctant to move sensitive data into an outsourced datacentre,according to analyst Gartner. The findings,based on Gartner's latest annual survey of the state of risk management programmes globally,show that many ...
Tags: Gartner, keep data in-house, risk management programmes, cloud computing
The Information Commissioner's Office (ICO) has fined Torbay Care Trust (TCT) £175,000 for a data breach it said was "entirely avoidable". The Trust, based in Devon, had published "sensitive details" of over 1,000 employees on its ...
IDG News Service - Microsoft has released Attack Surface Analyzer 1.0, a free tool that can help system administrators, IT security professionals or software developers understand how newly installed applications can affect the security of ...
Complaints over the past several weeks from Dropbox users whose email addresses have been targeted with spam have finally been answered by the company,which has admitted the possibility that an employee's company email was hacked,and a list ...
Tags: Dropbox, web service, LinkedIn, SafeNet
European Union cybersecurity agency Enisa has called on service providers and end-users to work together to protect online identities. Passwords protect sensitive information, yet in the first half of 2012 alone, data breaches have ...
Tags: online identities, sensitive information, personal data, passwords safe