In Pictures: 7 commonly overlooked ways to tighten cybersecurity
It's OK to be paranoid about every last detail when it comes to security.
19 Nov | View galleries
YouTube banned from using behavioral advertising on kids content, but it’s not watertight.
Facebook settles FTC privacy charges but two commissioners think the terms won't change the company's behavior.
The laissez-faire attitude of many companies towards consumer privacy protections is catching up with them after a series of massive fines sent shockwaves through a business community already reeling from an escalating cybersecurity threat climate.
David Braue | 17 Jul | Read more
UK privacy watchdog challenges Facebook to drop appeal after Mark Zuckerberg's weekend call for more regulation of Internet companies.
Swedish consumer group accuses Google of offering consumers too vague explanations.
Scott Trezza is frustrated with Spotlight in Yosemite:
Glenn Fleishman | 04 Aug | Read more
Google recently added another option to its Takeout service that lets you export data from your Google account, and the latest addition is one of the most important: Your Google search history.
On Tuesday, BitTorrent (the company) launched Sync 1.4, a brand new version of its peer-to-peer file syncing app that makes sharing folders with others a breeze. We have an in-depth hands-on with Sync 1.4 that will teach you how to use the app if you're not familiar with it.
When was the last time you read a privacy policy? Any kind of privacy policy? Be honest.
A reader recently asked me how they could use aliases in Outlook.com to create an anonymous email account. My answer was simple: you really can't.
"We at Apple reject the idea that our customers should have to make tradeoffs between privacy and security," said Apple CEO Tim Cook earlier this month during an Electronic Privacy Information Center (EPIC) event where he was honored for corporate leadership. "We can and we must provide both in equal measure."
Matt Kapko | 24 Jun | Read more
The Information Technology & Innovation Foundation, ranked as the most authoritative science and technology think tank in the U.S. (second in the world behind Max Planck Institutes of Germany), has just released its latest report on the impact of the existence and disclosure of the broad NSA national and international spying programs.
Rob Enderle | 13 Jun | Read more
No one wants their private information falling into the wrong hands, but this is especially true of the younger generation, as they lack the resources to address such a compromise directly, and parents often don't think to monitor their child's personal records or usage.
Kacy Zurkus | 02 Jun | Read more
Imagine if, with no effort on your part, every web connection you made was secured, even the most ordinary, such as visiting our fair site while not logged in. You might think, why bother when I'm just visiting sites I read or use for reference--sites where there's no personal or financial information to steal?
Glenn Fleishman | 18 Apr | Read more
On Tuesday, my personal account at GoDaddy was compromised. I knew it was coming, but considering the layered account protections used by the world's largest domain registrar, I didn't think my attacker would be successful.
Steve Ragan | 20 Mar | Read more
Cloud computing has fundamentally changed the way businesses and consumers use computers and technology and the way Information Technology (IT) professionals manage those resources. While the cloud has delivered a multitude of benefits to technical and non-technical people alike, there have also been significant downsides to reliance on cloud technology, including unplanned outages and even outright cyberattacks and data theft.