A few years back Google got into fearful trouble by recording the location of WiFi transceivers without asking for their owners’ permission.
Browsing: Identity and Access Management (IAM)
The Nexus of Forces is transforming the approach towards information security as new requirements are brought about by social, mobile, cloud and information.
Buffer, a social media app, allows its users to schedule and automatically post updates to social media sites such as Facebook and Twitter.
Professional networking giant LinkedIn is the subject of much criticism for its new LinkedIn Intro offering for lapses in privacy and security, and is being described as the equivalent to a Man-in-the-Middle (MitM) attack.
In recent months, I’ve started to take my own digital security much more seriously. I encrypt my e-mail when possible, I’ve moved away from Gmail, and I’ve become much more vigilant about using a VPN nearly all the time.
Digital forensics refers to the processes involved in examining data from harddrives, volatility memory (RAM), network captures, and a wide range of digital devices for artifacts that remain after specific actions occurred on a system.
In a move to fight back against governments that try to block their citizens’ Internet access, Google released tools to keep people around the world online.
The joint ICICI Bank and Facebook app is known as Pockets and its focal feature is known as “Split n Share”. As the name suggest, a customer can split and track group expenses, along with sharing them friends, reports bankingtech.com.
The European Parliament voted today to suspend a major data sharing agreement with the US following the ongoing scandal over alleged surveillance from the US National Security Agency.
GlobalSign recently hosted a webinar discussing how to make access to sensitive data more secure. They surveyed attendees on the topic of multi-factor authentication…