May 01, 2011 Added by:Keith Mendoza
The NSTIC is still in its infancy. However, the White House is aggressively pushing for its implementation, and we will be seeing the Identity Ecosystem pretty soon. I just hope that these very basic questions are answered in a convincing way when that time comes...
April 24, 2011 Added by:Theresa Payton
If restrictions to cookies become common place on the internet, the Internet Advertising Bureau will be forced to make major changes to the way they obtain information about internet users. This could alter the entire structure of internet advertising as we know it today...
April 18, 2011 Added by:Headlines
This is NOT a government-mandated, national ID program; in fact, it's not an identity 'program' at all. This is a call by the administration to the private sector to step up, take leadership of this effort and provide the innovation to implement a privacy-enhancing, trusted system...
April 18, 2011 Added by:Headlines
The legislation will define limits and the fair use of information collected by online marketers and retailers, and set forth provisions for better notifying consumers of their right to opt out of data collection...
April 15, 2011 Added by:Robert Siciliano
Twitter’s numbers are astounding. In the physical world, when communities become larger and more densely populated, crime rises. The same applies to online communities. Spammers, scammers, and thieves are paying attention...
April 11, 2011 Added by:Headlines
In the majority of the instances where Chapman found sensitive documents that were indexed and searchable, the owners of the information did not realize that by placing the information on family and/or business websites, they were making the information publicly accessible...
April 08, 2011 Added by:Headlines
Computer scientist and researcher Yong Wang and his colleagues have developed a methodology to determine the physical location of Internet users. The researchers demonstrated they are able to pinpoint the location of an IP address on average to within about 690 meters...
March 31, 2011 Added by:Robert Siciliano
Situationist is an iPhone app that alerts members to each other’s proximity and gets them to interact in random situations. Members simply upload their photo and pick the situations they want to happen to them in the knowledge that they might then occur anywhere, and at any time...
March 31, 2011 Added by:Headlines
Referrer headers sent to the third parties contain a unique identifier that is associated with a cookie issued by LinkedIn. The suit maintains that this practice reveals sensitive information regarding the referring member's browsing habits and history...
March 31, 2011 Added by:David Navetta
The Act seeks to establish standards to govern the use and disclosure of utility data (including personal information) by electric utilities, and requires electric utility companies to maintain the confidentiality of customer data and allow customers to access the data...
March 27, 2011 Added by:Robert Siciliano
It has become apparent that the conveniences of technology have outpaced consumers’ security intelligence. It is possible to secure systems in a way that will defeat most criminal activity, but that level of security comes with inconveniences that the consumer may not be equipped to handle...
March 26, 2011 Added by:Theresa Payton
On Guard Online states that 22% of 16-24 year olds using social networking do not know who they are sharing their information with. It is that exact age range that is most at risk for invasion of privacy. This age group needs more education about the dangers of sharing too much information...
March 25, 2011 Added by:David Navetta
Consider the relatively hostile regulatory and legal environment that Internet tracking companies currently face. The WSJ's year-long What They Know investigation into online tracking exposed a fast-growing network of hundreds of companies that collect highly personal details about Internet users...
March 25, 2011 Added by:Headlines
"Typically AT&T customers’ data would have routed over the AT&T network directly to Facebook’s network provider but due to a routing mistake their private data went first to Chinanet then via Chinanet to SK Broadband in South Korea, then to Facebook..."
March 20, 2011 Added by:David Navetta
Companies are well advised to take proactive approach to compliance with privacy and information security laws, regulations, guidelines and best practices. The FTC expects businesses to collect, use, disclose and process personal information in a fair and transparent way...
March 18, 2011 Added by:Headlines
"If the company cannot address and resolve these issues for those who are seeking secure communications, then vulnerable users will continue to be exposed to avoidable risks. Skype's misleading security assurances continue to expose users around the world to unnecessary and dangerous risk..."
SecurityWeek NCAA Bracket Challenge: Registe... aman mathur on 03-25-2015
Update 3: Hackers May Leak Norton Antivirus ... jhunax Astillero on 03-25-2015
Bridging the Cybersecurity Divide, Why Secur... suresh dwivedi on 03-25-2015