- Welcome Guest
- Sign In
IBM on Tuesday introduced the z13s, a mainframe computer system optimized for hybrid cloud deployment. The z13s is designed to provide advanced cryptography for mid-sized firms that need a high level of data protection. The advanced cryptography includes built-in hardware security features that effe...
Hollywood Presbyterian Medical Center last week revealed its computer systems were offline after a ransomware attack scrambled the data on its systems. Ransomware is a form of malware that encrypts data and system files on a computer and demands payment of a ransom to unscramble the files. Since the...
Any effort to ban encryption or provide government agencies with backdoor access would be unenforceable and prone to failure, according to a Harvard University report released last week. Bruce Schneier, a fellow at Harvard's Berkman Center for Internet and Security, collaborator Kathleen Seidel, and...
Google is expanding the right of Europeans to be forgotten on the Internet to domains outside their countries, according to news reports Thursday. Searches made from European IP addresses for people whom Google has granted a right to be forgotten will turn up zero links, regardless of which version ...
The U.S. government is under pressure to improve cybersecurity and is meeting that challenge with a commitment to substantially enhance spending for protecting IT systems. The Obama administration projected that the federal budget for cybersecurity spending in fiscal 2016 would be about $14 billion ...
The Internal Revenue Service on Tuesday said it recently discovered and halted an automated bot attack on its electronic filing PIN application website. Identity thieves used malware in an attempt to generate E-file PINs for 464,000 Social Security numbers stolen from another source, the IRS said. T...
The U.S. government was shaken last year when the Office of Personnel Management disclosed that employment records affecting 21.5 million people had been breached. The Obama administration initiated several comprehensive actions designed to shore up federal data protection -- including an immediate ...
California State Assemblyman Jim Cooper last week introduced a bill seeking to ban the sale of smartphones that include unbreakable encryption. The bill would require smartphones made on or after Jan. 1, 2017, and sold in California to be capable of being decrypted and unlocked by their manufacturer...
A coalition of 59 organizations on Wednesday sent a letter to U.S. Federal Communications Commission Chairman Tom Wheeler calling on him to get cracking on privacy protection rules for consumers. The groups include consumer advocates such as Consumer Watchdog and the Chicago Consumer Coalition as we...
Bot fraud will cost digital advertisers $7.2 billion worldwide this year, according to a report released Tuesday by the Association of National Advertisers. For the "2015 Bot Baseline" report, 49 ANA members deployed detection tags from White Ops on their digital ads to measure bot fraud over 61 day...
The Federal Trade Commission is extending its regulatory reach to the e-commerce impact of big data. For years, the FTC has asserted vigorously its authority to apply consumer protection laws to emerging developments in the IT realm. Now it is signaling that it will apply that same vigor to big data...
Privacy advocates from around the globe have taken heart from reports that Apple CEO Tim Cook pushed hard against the Obama administration's efforts to reach a compromise on encryption during a recent Silicon Valley meeting. Cook earlier this month joined a delegation of social media and technology ...
Cisco on Wednesday unveiled Cloud Consumption as a Service, an offering designed to help enterprises discover and continually monitor public cloud use -- aka "shadow IT" -- across their systems. Shadow IT systems in an enterprise or organization expose it to security risks and hidden costs, and may ...
Periscope on Tuesday announced integration with Twitter, allowing users to view its live-stream broadcasts directly in the Twitter iOS app. Previously, Periscope broadcasters could share only links to their videocasts in tweets. Now they can embed video directly into tweets, and the content can be s...
Social Media
See all Social Media