AT&T Acknowledges Another Insider Breach
AT&T recently began notifying an undisclosed number of customers that one of its employees “violated our strict privacy and security guidelines” by accessing their …
Enforcing Password Complexity without Alienating Users
Cybercriminals have seemingly mastered the tools used to intercept, retrieve and expose passwords. Even so, passwords remain the preferred method used for protecting systems. …
Tech Execs Express Extreme Concern That NSA Surveillance Could Lead To ‘Breaking’ The Internet
As mentioned, on Wednesday I attended a tech exec panel held at Palo Alto High School (in the high school gym, which was a …
US threat to British online privacy
Private information stored online by British computer users could be scrutinised by American law enforcement agencies under a wide-ranging new right-to-snoop being pursued by …
Chinese hackers breach 50 U.S. gov’t contractors’ systems in one year
Over the course of almost a year, Chinese hackers were able to target, attack and successfully penetrate government contractors’ systems to steal sensitive information …
Researchers find data leaks in Instagram, Grindr, OoVoo and more
By sniffing out the details of network communications, University of New Haven researchers have uncovered a host of data-leakage problems in Instagram, Vine, Nimbuzz, …
IBM Brings Bare Metal Intel TXT Security to Cloud
IBM today announced that it is bringing Intel’s Trusted Execution Technology (TXT) to its Softlayer cloud service. Intel’s TXT is a trust mechanism that …
Recent Comments