Technical advances -- and questionable use -- are fast accelerating the need for policies regarding the unmanned future of our skies
privacy in pictures
It's OK to be paranoid about every last detail when it comes to security.
It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace.
Technology is not evil, only its use or misuse.
The Australian Competition and Consumer Commission (ACCC) has launched Federal Court proceedings targeting Google and its local subsidiary over the collection and use of location data by the Android mobile platform.
Apple has described as “dangerously ambiguous with respect to encryption and security” the federal government’s surveillance bill.
A coalition of digital rights groups has called for the government’s draft surveillance bill to be scrapped wholesale, saying that it “effectively enacts insecurity by design” and will create “extremely broad powers with almost no oversight without a...
The government this morning unveiled an exposure draft of its much-anticipated legislative response to the increased use of encrypted communications services.
Google is under investigation in Australia following claims by Oracle that it collects data from millions of Android smartphones users.
Reader Steve wrote in with this question:
Unless you encrypt your files, outsiders can easily gain access to them—even without knowing your Windows password — by booting into their own operating system from a disc or a bootable USB drive that they have inserted into your machine.
The impact of the United Kingdom voting to withdraw from the European Union could have far-reaching implications for international companies who experts say may need to rethink their data management policies as the move could create a network of disp...
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
They say no one can hear you scream in space, but if you so much as whisper on the Web, you can be tracked by a dozen different organizations and recorded for posterity. Simply visiting a website can allow its operators to figure out your general phy...
Facebook will enhance its social-networking site's privacy features over the next 12 months as a result of a set of recommendations from the Canadian government.
Whitepapers about privacy
As your organization implements BYOD, it’s important to maintain compliance with data security and privacy regulations. This paper provides some key best practices to avoid problems and stay vigilant. • Poor compliance can result in financial penalties, litigation and damage to your company’s reputation • Make sure you have the IT solutions you need to avoid data leaks, avert data loss and prevent unauthorized access to information • Employ solutions designed to streamline BYOD management and simplify the process of proving compliance
Latest News Articles
- Thunderbolt adapter guide: How to connect an iPhone, display, hard drive, and more to a MacBook or iMac
- Apple Music+, 3rd-gen AirPods may launch next week
- Samsung Galaxy Book Pro 360 review: A beautiful thin-and-light PC
- Colored MacBook Air with white bezels: Macworld readers arenâ€™t having it
- 3 must-know insights from our early Intel 11th-gen 'Tiger Lake H' testing
Most Popular Articles
- 1 Don't get fooled by this malware-ridden MSI Afterburner fake
- 2 Small phone lovers rejoice: The Asus Zenfone 8 is a fantastic option
- 3 Apple hires, then fires controversial ex-Facebook employee
- 4 This $10 Switch calculator will look very familiar to iPhone fans
- 5 The next MacBook Air: A rainbow of colors and even more speed
Join the newsletter!
- Bowers and Wilkins launch the PI7 and PI5 wireless earphones
- What laptop should I get? Top 12 things to consider
- Sonos Arc review: The Main Event
- Intel Core i3 vs i5 vs i7: find out which cpu is better
- Laser vs. inkjet printers: which is better?