= Member Content

ALL security Stories

Britain Orders Google To Delete Street View Data

June 21, 2013
Google has 35 days to purge all user personal data its Street View vehicles inadvertently collected in 2010 or face legal sanction.

| Read Article »



Want NSA Attention? Use Encrypted Communications

June 21, 2013
Bad news has emerged for fans of PGP and other encryption services. The NSA is taking a gloves-off approach when you go this route.

| Read Article »



WikiLeaks Offers Snowden Flight To Iceland

June 21, 2013
WikiLeaks donations fund charter plane to bring NSA whistleblower Snowden to Iceland in asylum attempt.

| Read Article »



FAA Reconsiders Gadget Rules On Airplanes

June 21, 2013
FAA prepares to relax the rules about electronic device use on planes. But don't expect to be able to make phone calls.

| Read Article »



Google Given Three Months To Meet Privacy Law

June 20, 2013
French data protection agency threatens fines if privacy fixes aren't implemented soon.

| Read Article »



Android App Offers Caller ID, Call Blocking

June 20, 2013
PrivacyStar bills itself as first app with ability to block calls and texts, add Caller ID and report abusive callers directly to FTC.

| Read Article »



Firefox Advances Do Not Track Technology

June 20, 2013
Mozilla says Firefox, over objections from the advertising industry, soon will begin blocking many types of cookies used to track users.

| Read Article »



Microsoft Dangles $100,000 Bug Bounty

June 19, 2013
One hitch: The bugs might be worth more on the open market.

| Read Article »



NSA Tests IT Access Control Restrictions

June 19, 2013
Could two-person access requirements and better automation prevent future leaks?

| Read Article »



What Prism Knows: 8 Metadata Facts

June 19, 2013
Data traffic analysis could provide "megadata" intelligence agencies can use to cross-reference information using big data techniques.

| Read Article »



Security ROI: 5 Practices Analyzed

June 19, 2013
Which security practices bring the best return on investment? Not all of the most popular practices are good for your company.

| Read Article »



Google Challenges Surveillance Gag Order

June 19, 2013
Google argues it has a First Amendment Right to report the number of demands for information it receives under national security laws.

| Read Article »



Google Defends Efforts Against Rogue Pharmacies

June 18, 2013
Under fire from law enforcement officials, Google insists it has been making progress in its effort to deny advertising to rogue pharmacies.

| Read Article »



FBI Driver's License Photo Searches Raise Privacy Questions

June 18, 2013
Facial-recognition software advances allow law enforcement and government agencies to match images of unknown suspects with government-issued ID...

| Read Article »



Privacy Concerns: Big Data's Biggest Barrier?

June 18, 2013
Businesses must be up front with consumers about what data they're using and why. Opting out should be easier, too.

| Read Article »



CrowdStrike Falcon Traces Attacks Back To Hackers

June 18, 2013
Startup that encourages playing offense on security launches cloud-based service to help businesses identify adversaries, mitigate attacks and...

| Read Article »



Google Launches Attack On Online Child Pornography

June 17, 2013
Google pledges millions to charities and software developers to help it eliminate online material that endangers children.

| Read Article »



Apple, Facebook, Microsoft Detail Surveillance Requests

June 17, 2013
Newly published information details the total number of government surveillance requests received; Google abstains, citing "a step back for users."

| Read Article »



NSA Prism: Readers Speak

June 17, 2013
NSA's Prism program has sparked debate about protections versus privacy. Network Computing readers weigh in.



Thumb Drive Security: Snowden 1, NSA 0

June 14, 2013
Thumb drives helped NSA whistle-blower Edward Snowden transport top-secret data from the agency. If the NSA can't keep a lid on thumb drives, can you?

| Read Article »



Inside A Cyber Espionage Campaign

June 14, 2013
A group of Taiwanese researchers peer into the operations center of a group behind one large espionage campaign.



Vulnerability Reports: What They Don't Tell You

June 14, 2013
With flaw tallies varying by up to 75%, vulnerability data needs to be taken with a grain of salt, Black Hat presenters say.



Bug Data Buys Businesses Intel From U.S. Government

June 14, 2013
Thousands of businesses are reportedly exchanging information with the government on zero-day vulnerabilities and online threats in return for...

| Read Article »



Smartphone Makers Asked To Fight 'Apple-Picking'

June 13, 2013
Mobile device theft is being called an epidemic. Apple tweaks iOS 7; device makers and law enforcement also team on anti-theft technology.

| Read Article »



LulzSec Hacker Ryan Cleary To Be Released

June 13, 2013
Release comes despite being convicted of possessing child porn images and serving only a portion of his sentence, leading hackers to suggest he's...

| Read Article »





Resource Links