Prime Minister David Cameron has cited televised crime dramas to justify his push to expand Britain's surveillance laws and collect bulk Internet and mobile usage data. But does cop show fiction square with surveillance fact?
President Obama says his proposed cybersecurity budget is designed to help prevent foreign nations or hackers from shutting down American networks, stealing trade secrets or invading the privacy of American families.
Is Amazon India on the verge of extending its online payments gateway to offline sellers and kiranas? And if so, what are the potential business implications and security risks for Indian organizations?
Online shoe and clothing retailer Zappos has reached a settlement with nine state attorneys general over a 2012 data breach that exposed the personal details of more than 24 million customers.
As mobile threats have evolved, so has mobile security. What used to be the benchmark - mobile device management - today is merely the baseline. While organizations today develop mobile security maturity, they enhance not just device security, but also content, application and transaction security. Where does your...
European privacy watchdogs say Google and other search engines must comply with "right to be forgotten" link-removal requests not just on their European sites, but across all of their sites, raising fears of EU censorship run amok.
A year after Facebook received a bug report regarding a loophole in its app architecture, the vulnerability remains exploitable, says the researcher who discovered this potential threat to user privacy.
A new U.K. government report accuses social networks of serving as a "safe haven for terrorists," inflaming what some see as tense relations in the post-Snowden era between the British government and Silicon Valley.
Until we get to a stage where we can guarantee the confidentiality of traditional identity reference data such as names, addresses, emails and favorite cat colors, we must move away from relying on this static data for authentication. Truly massive amounts of this information are stolen on a regular basis, proving we...
Apple CEO Tim Cook traveled to China in the wake of allegations that hackers are targeting Chinese iCloud users. The Chinese government has denied any involvement in the attacks, which can bypass the latest iPhone's stronger encryption.
FBI Director James Comey says he wants Congress to update a 20-year-old law to give law enforcement authorities access to the encrypted data of suspected criminals.
Apps for wearable devices that are designed to track a user's pulse rate, blood-oxygen level or location may be leaking that data during transmission, Symantec security researcher Candid Wüeest warns in a Black Hat Europe briefing.
The development of authentication technologies that could replace the password is "nearing a tipping point," but there's still several years of work to do, says Jeremy Grant, who oversees the National Strategy for Trusted Identities in Cyberspace.
Apple announces security and privacy changes tied to the release of iOS8, including better data encryption, more secure iCloud backups, and a corporate promise to be more transparent. But it delays release of its HealthKit.
Federal government auditors have identified weaknesses in the technical controls protecting the security of the federally run Obamacare HealthCare.gov website and systems, which they say create increased and unnecessary risks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.