Privacy Archives - Page 14

How the cloud can improve security: Courtot

SAN FRANCISCO - After the warnings about the cloud and its potential threats to security, it seems counter-intuitive to say the cloud can actually help businesses shore up the security of their data.

Published on: February 27th, 2014 Candice So

10 security concerns for the public cloud: Russinovich

SAN FRANCISCO - It’s not news that businesses are moving more and more of their data to the cloud. But even as cloud storage and computing have hit the mainstream, there are a

Published on: February 27th, 2014 Candice So

One shared database in security’s future: Trilling

SAN FRANCISCO – With all the weekly headlines about new malware, dangerous threats, and unforeseen attack vectors, it might be easy to believe that hackers will soon be the victors of the cybersecurity

Published on: February 27th, 2014 Candice So

Pony malware targeting passwords and Bitcoins uncovered

Correction: The original version of this story said there were attacks on 73,000 different websites. The correct number is 93,000. We regret the error. Security researchers have uncovered a new type of malware

Published on: February 26th, 2014 Candice So

RSA keynotes tackle NSA allegations out of the gate

Updated on Feb. 26, 2014 at 7:45am ET with analyst comments from Anton Chuvakin of Gartner Inc. There’s been a lot of talk about RSA Security Inc.’s involvement with the U.S. National Security

Published on: February 25th, 2014 Candice So

A look ahead at next week’s RSA conference

With the RSA conference kicking off Feb. 24 in San Francisco, there’s a lot of buzz around what may – or may not – be revealed during one of the cyber security industry’s

Published on: February 21st, 2014 Candice So

#FollowFriday – startups, digital marketing, and Internet privacy

For today's edition of our #FollowFriday post, we've rounded up a list of three people whose tweets are retweet-worthy. Whether they tweet on startups, digital marketing techniques, or advocate for a free Internet,

Published on: February 20th, 2014 Candice So

Windows error reporting helps researchers uncover attacks

Windows Error Reporting, the program that sends details to Microsoft Corp. each time an application crashes or fails to update, helped researchers find evidence of attacks leveled against an unnamed government agency and

Published on: February 19th, 2014 Candice So

Canadian privacy advocates joining Day We Fight Back campaign

Two years after the death of the Stop Online Piracy Act bill in the U.S., privacy advocates around the world are staging another online protest. This time around, it’s not to stop one

Published on: February 11th, 2014 Candice So

#FollowFriday – 3 people to follow in marketing, 3D tech, and privacy

For today's edition of our #FollowFriday post, we've rounded up a list of three people whose tweets are retweet-worthy. Whether they tweet on marketing and leadership, 3D technology, or privacy and security, these

Published on: February 6th, 2014 Candice So

Canadians would sell all their data to a brand for $2,000: Microsoft

Canadians and other global consumers are getting more savvy about the idea that marketers want a piece of their personal data, and expect to see value in return for giving it up, according

Published on: January 30th, 2014 Brian Jackson

Bell defends ‘Relevant Ads’ program as necessary to compete with Facebook, Google

Bell Canada isn't backing down from its practice of collecting user data for the purposes of targeted advertising in the face of an application made to the Canadian Radio-television and Telecommunication Commission (CRTC)

Published on: January 27th, 2014 Brian Jackson

Hackers can now log your keystrokes from your touchscreens

Hackers now have yet another way to trace your keystrokes – but it’s not the physical keyboard with its sturdy, plastic keys that they’re now after. A researcher at Trustwave Holdings Inc. has

Published on: January 20th, 2014 Candice So

Trend Micro’s 5 predictions for cybersecurity in 2014

Mobile banking heists, exploited vulnerabilities, and data breaches – these could be the cybersecurity hallmarks of 2014, according to a new report from security software provider Trend Micro Inc. In a report released

Published on: January 2nd, 2014 Candice So

Ron Deibert: Internet freedom comes down to a ‘clash of two world views’

For anyone following cybersecurity and digital privacy, 2013 has been a whirlwind. When former National Security Agency (NSA) contractor Edward Snowden took the lid off of U.S.’ cybersurveillance activities this past June, unleashing

Published on: December 17th, 2013 Candice So