Latest Headlines

Latest Headlines

News Scan: UN approves appointment of digital privacy rapporteur; Goldman named first-ever White House CDO; More

The top news stories for March 27, 2015.

Initiative to improve security backfires on Hilton

In a twist of irony, an initiative by Hilton Hotels & Resorts to prompt members to change the passwords of their account culminated in the discovery of a bug that could allow hackers to take over any number of accounts, if they knew the 9-digit number of a valid account.

Should you worry about government spying? IT security pros differ

It turns out, leaders of companies that offer IT security products and services have different opinions about whether you should care about government hacking. 

News Scan: Many CIOs making fine CDOs; White House proposes privacy bill of rights; More

The top news stories for March 2, 2015.

Code used in 'Superfish' found in more apps

Looking at what Superfish is, and why the reuse of a self-generated SSL certificate creates a security nightmare for affected computers.

News Scan: Apple's Cook warns of privacy loss 'dire consequences'; Microsoft adopts new standard for cloud privacy; More

The top news stories for Feb. 17, 2015.

Big data poses privacy, security risks, MIT study finds

Big data in the form of a massive stash of "anonymized" credit card data poses security and privacy risks, concluded a recent study by the Massachusetts Institute of Technology.

5 tips for reducing BYOD's legal risks

BYOD confronts enterprises with many risks, not the least of which are legal. In an informative article in the Seattle Business magazine, D. Michael Reilly, an attorney with the law firm of Lane Powell, offers enterprises 5 tips on how to manage the legal risks of BYOD.

News Scan: IT advocacy groups band together to increase clout; Women in IT need to raise their profile; More

The top news stories for Jan. 29, 2015.

FTC report on IoT: Many findings, little teeth

While the FTC's security and privacy recommendations for IoT devices and data are useful, they are voluntary and therefore lack teeth. Companies have little incentive to spend the extra time and money needed to implement them.