| Similar Articles |
 |
InternetNews May 20, 2010 |
South America Emerges As Cybercrime Hotspot China gets all the bad press but it turns out that Luxembourg, the Cayman Islands and a bunch of South American countries are actually the least discriminating when it comes to filtering malware.  |
InternetNews September 7, 2010 |
Cybersecurity Czar: Privacy Won't Be a Casualty NSA Director Gen. Keith Alexander reaffirmed his view that protecting U.S. government, military and civilian data networks doesn't mean sacrificing citizens' right to privacy.  |
InternetNews March 25, 2010 |
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries.  |
InternetNews January 15, 2010 Larry Barrett |
Russia Blamed for 13% of Global Cyber Attacks New report from Akamai awards Russia the dubious distinction of world's leading source of cyber threats.  |
InternetNews February 24, 2010 |
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators.  |
InternetNews April 23, 2009 Kenneth Corbin |
House Panel Begins Work on Online Privacy Law In NebuAd's shadow, lawmakers probe data-collection practices of ISPs as they debate just how far online privacy legislation should reach.  |
InternetNews December 28, 2010 |
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010.  |
InternetNews August 3, 2010 |
Most Don't Object to Cyber Spying: Report A survey by a prominent security software firm reveals that most people don't mind if the government uses cyber spying techniques to keep tabs on our enemies.  |
InternetNews February 25, 2010 |
CTIA Calls for Location-Based Privacy Rules As the privacy debate turns to location-based services, wireless association seeks clarification from Congress on the rules for sharing data with law enforcement authorities.  |
InternetNews February 17, 2010 |
When the Cyber Attack Comes, Will We Be Ready? War-game simulation of a massive cyber attack on U.S. infrastructure highlights emergency provisions administration officials might be forced to take.  |
PC World September 11, 2002 Andrew Brandt |
A Year Later, Online Privacy and Security Still Weak Guarding both virtual and physical shores remains a challenge of checks and balances.  |
InternetNews December 30, 2010 |
Looking Back on Web Privacy: 2010 Internet privacy was a favorite topic among regulators, lawmakers and advocacy groups, but for all the debate, how far did the government get toward reining in online data collection?  |
InternetNews February 9, 2010 |
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter.  |
InternetNews January 22, 2008 Kenneth Corbin |
Google, Consumer Groups Fire Opening Salvos in EU Talks As the European Commission reviews the blockbuster Google/DoubleClick merger, rivals debate the impact on privacy.  |
InternetNews November 20, 2009 |
Microsoft: No 'Back Door' in Windows 7 But cozy ties between spy agency and tech industry have some privacy advocates worried.  |
InternetNews February 20, 2009 Kenneth Corbin |
Privacy Groups Blast ISP Data-Retention Bill Privacy advocates are lashing out at a renewed effort by lawmakers to impose requirements on ISPs and wireless network operators to keep records about the identities of Internet users.  |
Search Engine Watch June 19, 2010 Johnny Widerlund |
Social Media: The Privacy and Security Repercussions How risky is our online behavior? A closer look at social media's privacy and security vulnerabilities.  |
Bank Systems & Technology September 15, 2007 Sharon Gaudin |
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts.  |
Reason April 2002 Jeremy Lott |
Fake IDs Facial recognition technology is often billed as a tradeoff between privacy and security. A recent American Civil Liberties Union report suggests that it's closer to a no-win deal, resulting in less privacy and precious little added security...  |
PC World November 2004 Andrew Brandt |
Listening In to Net Phone Conversations The ability to make phone calls over the Internet creates new communication options for all of us--including, unfortunately, criminals. Federal law enforcement officials want to make sure that when bad guys use Net phones, the cops can listen in.  |
InternetNews September 7, 2010 |
Google Faces Heat Over Privacy Tweaks A move to reduce legalese has one privacy advocacy group up in arms.  |
InternetNews February 25, 2010 |
Malware Thrives Despite Improved Security: IBM Security researchers at IBM's X-Force find 6,601 new software vulnerabilities in 2009, down 11 percent from last, but that hasn't stopped hackers and phishers from finding new ways to rip off consumers.  |
Information Today November 12, 2015 |
FCC Allows Internet Companies to Keep Tracking User Activities According to The Washington Post, the Federal Communications Commission will not impose a requirement on Google, Facebook, and other internet companies that could make it more difficult to track user activities.  |
InternetNews March 4, 2010 |
DHS Chief: Security Requires Faster Response Department of Homeland Security Secretary Janet Napolitano told security experts and media that while many great ideas have been suggested, less talk and more action is needed to safeguard government and corporate networks.  |
InternetNews March 19, 2004 Ryan Naraine |
It is Time for Some 'Friendly' Worms Let's face it folks, the virus writers have the upper hand these days. Is it time for the industry to be bold and imaginative about fighting back?  |
InternetNews January 28, 2010 |
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years.  |
CIO January 1, 2002 Stephanie Viscasillas |
Privacy Versus the FBI The antiterrorism law President Bush signed in late October makes it easier for officials investigating potential terrorist activity to get court orders to search companies' business records. It is important to take that into account in your privacy policy.  |
InternetNews February 20, 2009 Richard Adhikari |
Attack Preys on New Adobe Acrobat Vulnerability Experts warn businesses and government agencies on the latest flaw uncovered in one of Adobe's popular applications.  |
InternetNews April 20, 2010 |
Hackers Breached Google's Password Hub: Report New report cites source close to investigation claiming that hackers in China were able to compromise the password service that acts as gateway to Google's Web products and services.  |
InternetNews May 13, 2010 |
One Gang Responsible For Most Phishing Attacks More than two-thirds of all phishing attacks in the second half of 2009 were the work of one gang, according to an anti-phishing group.  |
Information Today May 3, 2012 Paula J. Hane |
Online Consumer Privacy in the Spotlight Choose Privacy Week is being held May 1-7, 2012. The theme is "Freedom from Surveillance." The American Library Association's Office for Intellectual Freedom established Choose Privacy Week to deepen public awareness about this issue. The event is timely with many privacy issues like CISPA in the news.  |
InternetNews February 24, 2010 |
Lawmakers Dig In On Cybersecurity Bill Supporters of the Cybersecurity Act of 2009 remain steadfast in their support of a bill that would expand President Obama's authority to intervene in the event of a major cyber attack.  |
InternetNews December 3, 2009 Kenneth Corbin |
Privacy Advocates Press for Net Legislation A new effort by the Center for Democracy and Technology coincides with signs of movement in Congress on Internet privacy.  |
InternetNews June 3, 2009 Kenneth Corbin |
Microsoft, Google Cautiously Endorse Privacy Bill Privacy attorneys for leading Web firms offer support for a limited, general privacy bill as debate in Congress looms.  |
Search Engine Watch June 5, 2010 Johnny Widerlund |
Avoiding Online Risks Kicking Off with the 2010 FIFA World Cup Cyber criminals will continue hijacking current news and events to serve malware. A rundown of the most prevalent online security risks, and how to avoid them.  |
InternetNews December 30, 2009 |
Malware Targeting Adobe, Social Sites in 2010 Security player McAfee runs down its picks for malware creators' highest-priority targets in the coming year.  |
PC World September 12, 2001 Tom Spring & Frank Thorsberg |
Will Attack Hurt Net Privacy? Privacy advocates urge government to balance security needs and civil liberties...  |
InternetNews May 13, 2010 |
APWG Fingers 'Avalanche' Phishing Syndicate The Anti-Phishing Working Group says one highly sophisticated and well-organized group of cyber thieves was responsible for a huge spike in phishing attacks late last year.  |
PC World October 7, 2002 Michelle Madigan |
Privacy Concerns Pushed to Front Lines Feds must explore, explain any effect on privacy by new policies or practices, under pending legislation.  |
InternetNews February 17, 2011 |
RSA: Security Experts Debate Cyberwar Threat From corporate espionage to WikiLeaks, experts at the RSA conference debate the challenge of maintaining computer security.  |
InternetNews August 23, 2010 |
Facebook Touts Places Privacy Controls Responding to early criticism about the privacy settings of its new location-based service Places, Facebook takes pains to point out the various ways that people can control their information.  |
InternetNews April 8, 2010 |
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official.  |
Salon.com September 14, 2001 Katharine Mieszkowski |
Send in the online spooks? In the aftermath of terrorism, civil libertarians are running for cover. But are they protesting too much?  |
InternetNews November 11, 2005 Roy Mark |
FBI Hunkered in The Bunker Cyber G-men are responsible for investigating cyber attacks by foreign adversaries and terrorists, and for preventing online criminals from using the Internet to steal, defraud and otherwise victimize U.S. citizens, businesses and communities.  |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China.  |
InternetNews June 4, 2010 |
Hackers Zero In On Execs With World Cup Scam A flurry of malware scams are using e-mails related to the upcoming World Cup to target executives at companies and organizations around the world.  |
Commercial Investment Real Estate Sep/Oct 2015 Alan Lyons |
Cyber Scares Protect your real estate business from online security breaches.  |
BusinessWeek May 12, 2011 Sara Forden |
Online Privacy: Can the U.S. Get Its Act Together? A spate of high-profile data security breaches may finally compel Washington to draft a comprehensive privacy policy.  |
PC World April 16, 2001 David Clarke |
Internet Privacy: A Matter of Competition? Privacy policy debate considers legislation, self-regulation, and letting the market decide...  |
InternetNews October 26, 2010 |
Obama Administration Forms Online Privacy Panel New Subcommittee on Privacy and Internet Policy includes representatives from a broad range of executive agencies, aims to help formulate administration policy on a hot-button Internet issue.  |