The Canada Revenue Agency, Ottawa's equivalent of the IRS, refuses to conduct an audit of how many privacy breaches it has sustained over the last decade.
The top six information security threats in 2014 are BYOD, data privacy in the cloud, brand reputational damage, privacy and regulation, cybercrime and the Internet of Things, according to the non-profit Information Security Forum.
Around 5,077 applications, or 1.2 percent, of 420,646 Google Play apps analyzed by security firm Bitdefender are stolen from other developers and re-engineered to steal data and perform other malicious activities, related Loredana Botezatu, e-threat analyst for Bitdefender, in a blog.
In an exclusive interview with FierceMobileIT, Joshua Konvisser, partner with the law firm of Pillsbury Winthrop Shaw Pittman, explains how BYOD is a balancing act between employee privacy, corporate interests and interests of the data owners.
Microsoft does not encrypt its server-to-server data communications, a senior Microsoft official told a European parliament committee this week, Ars Technica reports.
A disturbing 57 percent of security analysts said that data breaches they investigated or addressed were never disclosed by their companies, according to a blind survey of 200 security professionals by Opinion Matters on behalf of ThreatTrack Security.
Nonprofit IT security certification group (ISC)2 unveiled this week a new certification program for assessing information security expertise specifically within the healthcare industry.
Almost all of U.S. IT professionals surveyed by ISACA believe that the Internet of Things--the term for the growing interconnections among devices, machines, sensors and other objects--poses major IT governance issues for the enterprise.
The National Security Agency is able to eavesdrop on communication links to Google, Yahoo data centers, according to the latest revelation by former NSA contractor Edward Snowden reported by the Washington Post.
Silent Circle and Lavabit have teamed on the Dark Mail Alliance, which aims to develop an open protocol and architecture for secure mail, Ars Technica reports