Related Content
Need for Cyber Security Exposed by Zombie Apocalypse Pamela Rentz details the Executive Order by President Obama that strengthens the government’s partnership with the private sector to address cyber security threats through new information sharing programs, providing both classified and unclassified threat and attack information to US companies. |
||
Evernote's Security Breach Leads to Leaked Passwords Another day, another security breach. Following in the footsteps of popular hacked services Dropbox and LinkedIn, software and service vendor Evernote announced this March that it had suffered a data breach and suspected that usernames, email addresses, and encrypted passwords had been stolen. |
||
FTC Stresses “Privacy by Design” for Mobile App Developers For those who develop mobile apps, the federal government wants to make sure everyone is aware that privacy by design—privacy and data protection for consumers—should be built into every stage of the development cycle. Pamela Rentz details the latest privacy efforts by the Federal Trade Commission. |
||
Biometrics Recognition Technology Goes to School The South Dakota School of Mines & Technology is participating in a pilot biometrics program that makes the school the first ever biometrics campus. Pamela Rentz highlights the pilot program, which allows faculty and students to pay for goods by scanning their finger. |
||
First National Day of Civic Hacking Announced Merging the notion of community volunteer initiatives with a hackathon, the White House Office of Science Technology and Policy recently announced the first National Day of Civic Hacking. Mark your calendar and be prepared to get civic-hacking on June 1–2, 2013. |
||
Whose Mobile Apps Are the Most Secure? It's the age old question—which mobile phone or tablet should you buy? One major deciding factor has become which device carries the best and safest mobile apps. Unfortunately, in the battle between Android and iOS, neither is taking mobile app data security as seriously as it could—and should. |
||
Hunt for the New "Red October" Pamela Rentz looks at a report, published by the Russian Internet security firm Kaspersky Lab, which details a cyber espionage network that has been infiltrating computer networks at various international diplomatic, governmental, and scientific research organizations since 2007. |
||
February Coding News Roundup In this roundup of coding news, we learn that the US arm of mobile device maker HTC got in hot water with the Federal Trade Commission, a new study says that software vulnerabilities were up in 2012 after a five-year lull, and a scientist built a programming language based on Arabic scripts. |