Technical advances -- and questionable use -- are fast accelerating the need for policies regarding the unmanned future of our skies
privacy in pictures
It's OK to be paranoid about every last detail when it comes to security.
It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace.
Technology is not evil, only its use or misuse.
The Australian Competition and Consumer Commission (ACCC) has launched Federal Court proceedings targeting Google and its local subsidiary over the collection and use of location data by the Android mobile platform.
Apple has described as “dangerously ambiguous with respect to encryption and security” the federal government’s surveillance bill.
A coalition of digital rights groups has called for the government’s draft surveillance bill to be scrapped wholesale, saying that it “effectively enacts insecurity by design” and will create “extremely broad powers with almost no oversight without a...
The government this morning unveiled an exposure draft of its much-anticipated legislative response to the increased use of encrypted communications services.
Google is under investigation in Australia following claims by Oracle that it collects data from millions of Android smartphones users.
Reader Steve wrote in with this question:
Unless you encrypt your files, outsiders can easily gain access to them—even without knowing your Windows password — by booting into their own operating system from a disc or a bootable USB drive that they have inserted into your machine.
The impact of the United Kingdom voting to withdraw from the European Union could have far-reaching implications for international companies who experts say may need to rethink their data management policies as the move could create a network of disp...
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
They say no one can hear you scream in space, but if you so much as whisper on the Web, you can be tracked by a dozen different organizations and recorded for posterity. Simply visiting a website can allow its operators to figure out your general phy...
Facebook will enhance its social-networking site's privacy features over the next 12 months as a result of a set of recommendations from the Canadian government.
Whitepapers about privacy
As your organization implements BYOD, it’s important to maintain compliance with data security and privacy regulations. This paper provides some key best practices to avoid problems and stay vigilant. • Poor compliance can result in financial penalties, litigation and damage to your company’s reputation • Make sure you have the IT solutions you need to avoid data leaks, avert data loss and prevent unauthorized access to information • Employ solutions designed to streamline BYOD management and simplify the process of proving compliance
Latest News Articles
- Jaybird Vista review: See how they fly
- HP Spectre x360 13: Full, in-depth review
- Sonos says goodbye to several legacy products
- PC sales expected to fall after Windows 10 sales bump ends
- Sapphire Pulse Radeon RX 5600 XT review: Punching above its class
Most Popular Articles
- 1 Put your hands up if you want a Ryzen-based take on Intel's NUC hardware
- 2 PC sales expected to fall after Windows 10 sales bump ends
- 3 Sapphire Pulse Radeon RX 5600 XT review: Punching above its class
- 4 7 standout pieces of CES tech
- 5 How foldables fit into the next phase of Intel’s Project Athena
Join the newsletter!
- Google Pixel 4 XL review (2019): Full Resolution
- iPhone 11 Pro review: Identical looks, superlative cameras
- Samsung Galaxy Fold review: Show Off
- Intel Core i3 vs i5 vs i7: find out which cpu is better
- Laser vs. inkjet printers: which is better?