Bill to rein in NSA phone data collection reintroduced
A bipartisan group of U.S. lawmakers has reintroduced legislation aimed at ending the National Security Agency’s bulk collection of telephone records across the country. …
WordPress e-commerce plug-in puts over 5,000 websites at risk
heCartPress, an e-commerce plug-in used on thousands of WordPress-based websites, has several high-risk vulnerabilities. There are currently no fixes available for the flaws and, …
SAP patches login flaw in ASE database
SAP patched a flaw on Thursday that could allow an attacker to take complete control over a database, according to security vendor Trustwave. The …
Berlin Strikes Compromise on Privacy, Security With New Data Guidelines
The German government on Wednesday proposed new guidelines on data retention aimed at balancing privacy protection with the needs of law enforcement in setting …
Twitter moves non-US accounts to Ireland away from the NSA
Twitter has updated its privacy policy, creating a two-lane service that treats US and non-US users differently. If you live in the US, your …
IBM and Apple want to share how you are with others
IBM has launched a health unit to make sense of the wealth of data created by the boom in fitness trackers and apps. Watson …
China to strengthen surveillance, security in anti-terror push
China will establish a national population database linked to ID information and credit records, state media reported late on Monday, as part of a …
AT&T pays record $25m fine over customer data thefts
AT&T has been fined $25m (£17m) over data breaches at call centres in Mexico, Colombia and the Philippines. Names, social security numbers and customer …
Fewer than 1% of Android devices affected by potentially harmful apps
Based on data collected by Google, less than one percent of Android devices had a potentially harmful application installed last year. This includes devices …
Cloud security challenges go all the way to the board
In the rush to take advantage of cloud’s benefits, businesses must properly manage the risks of handing over data, systems, and infrastructure to a …
Recent Comments