Related Content
Facebook Security Bug Shares Six Million Users’ Contact Info Pamela Rentz details the security flaw that may have allowed approximately six million Facebook users’ contact information (email addresses or phone numbers) to be accessed by people who either had some contact information about that user or a connection to them. |
||
FDA Urges Medical Device Makers and Hospitals to Increase Security Cybersecurity incidents reported involving some medical devices have prompted the U.S. Food and Drug Administration to issue stern warnings to medical device manufacturers and health care facilities to ramp up safeguards. Pamela Rentz highlights the latest FDA recommendations. |
||
This Little City Is One of the Most High-Tech in the World At first glance, you wouldn’t think of Tallinn, Estonia's capital, as modern. But this city is a hotbed of technological innovation, giving birth to Skype, housing the headquarters of the NATO Cooperative Cyber Defense Centre of Excellence, and providing automated convenience to its citizens. |
||
When It Comes to Privacy, Focus on Transparency Following the NSA leak, people are more concerned than ever about their privacy and company transparency. While privacy standards continue to change, companies can avoid potential PR disasters by emphasizing transparency. |
||
The Software behind the PRISM Intelligence-Gathering Program News of the National Security Agency’s PRISM intelligence-gathering program has reverberated throughout the media. This sophisticated computer system has the capability to sift through enormous amounts of data and extrapolate meaning, giving the NSA a way to track people and their behaviors. |
||
Google Says No to Facial Recognition on Google Glass Google will not be allowing facial recognition on Google Glass any time soon, but that doesn't mean the company is forever ruling out the possibility. Will this be enough to alleviate the privacy concerns of people worried that Google Glass will lead to an Orwellian future? |
||
Anywhere, Anytime Data Protection in the Cloud Until recently, who was responsible for data protection was rarely an issue—it was clearly the company’s sole responsibility. Now that companies are relying on outside parties and SaaS services for delivery of basic IT services and allowing staff to use their own equipment, the answer is unclear. |
||
When Good Bots Go Bad: How Ticketmaster Combats Hackers Live Nation and Ticketmaster are facing daily attacks from hackers worldwide who are looking to make billions of dollars off securing sought-after concert and sporting event tickets. The companies are sparing no expense in trying to avoid a lifetime of cat and mouse when dealing with bots. |