sensitive data

sensitive data

US Government Agencies Will Soon Be Able To Access Foreign Medical Dossiers Due To Patriot Act

www.techdirt.com
The US Patriot Act has suddenly scared an entire nation, and it's not the US itself this time. The Netherlands is currently going nuts about the US government being able to request medical details of all its citizens when the Dutch Electronic Patient Database (EPD) is implemented next month. This...
US Government Agencies Will Soon Be Able To Access Foreign Medical Dossiers Due To Patriot Act

IBM bans Siri on its networks over worries that Apple may store sensitive data

thenextweb.com
Worried that Apple may be able to store sensitive queries and potential company secrets, IBM has put the kibosh on the use of Siri on its networks, Wired reports. IBM CIO Jeanette Horan confirmed that Big Blue had imposed the restriction, telling the publication that the company “worries that the spoken...
IBM bans Siri on its networks over worries that Apple may store sensitive data
U.S. warns gas pipeline companies of cyberattacks

Dashlane Emerges From Private Beta, Wants To Be Your Personal Data Assistant

www.betabeat.com
Ms. Perdomo (via meetup.com) Password management app Dashlane is now ready for prime time, emerging from an invite-only beta phase preceded by super-secret stealth mode. And they’d like to pitch you on a solution for your no-good, very bad password practices. When Betabeat last spoke to Dashlane back in September,...
Dashlane Emerges From Private Beta, Wants To Be Your Personal Data Assistant

Privacy concerns over popular ShowIP Firefox add-on

nakedsecurity.sophos.com
A popular Firefox add-on appears to have started leaking private information about every website that users visit, including sensitive data which could identify individuals or reduce their security to a third-party server....
Privacy concerns over popular ShowIP Firefox add-on

The Consumerization Of IT: 7 Ways To Seize The Business Opportunity

readwrite.com
Guest author Christian Buckley is product evangelism director at Axceler, a designer of collaboration solutions. Users have wrested more control from the information technology department than ever before. Now that they have become tech-savvy in their off-hours, they're demanding work products with the same degree of usability as their...
The Consumerization Of IT: 7 Ways To Seize The Business Opportunity
Mobile app security: Always keep the back door locked

This Computer Never Crashes

www.businessinsider.com
Good news for folks who regularly find themselves mashing control+alt+delete until their fingernails hurt: Researchers at the University College London have invented a new "systemic" computer that automatically repairs corrupted data whenever it appears. In non-geek speak, all that means is that this gilded, Platonic ideal of desktop PCs never,...
This Computer Never Crashes

Evernote attacked by hackers, user data accessed

www.electronista.com
Note-taking app Evernote has been attacked by hackers, in the latest in a long line of digital break-ins. The company has been forced to reset all passwords for its near-50 million users after sensitive data was pulled from servers by parties unknown, including usernames, account e-mail addresses, and encrypted passwords.......
Evernote attacked by hackers, user data accessed
White House admits systems in Military Office were hacked

Luluvise shows where your data can end up

www.guardian.co.uk
Women-only social network Luluvise lets its members rate the men they've dated – but should they be posting personal sensitive data without the men's permission?Luluvise describes itself as "a social network for women". It's loved by the technology media, racking up plenty of friendly articles since its launch late last...
Luluvise shows where your data can end up
Patent Patrol: Is Microsoft Planning A Robust Mobile Device Future?

Red-Hot Startup Huddle Is About To Make Your Work A Hundred Times Less Annoying

www.businessinsider.com
Huddle is offering new "Sync" software that's going to save you from a ton of headaches at work when you are trying to share files and work on projects remotely. Huddle is a service for sharing files across a company — so you can work on a document or...
Red-Hot Startup Huddle Is About To Make Your Work A Hundred Times Less Annoying
Funding daily: mobile payments, charitable giving, and flower delivery

Facebook And Dropbox's Apps Are Seriously Vulnerable To Hackers Right Now (FB)

www.businessinsider.com
A security researcher named Gareth Wright has uncovered an unpleasant security hole in the Android and iOS Facebook apps, reports The Next Web. A motivated hacker could copy a plain text file off of your mobile device that would grant him access to your entire account. The problem exists...
Facebook And Dropbox's Apps Are Seriously Vulnerable To Hackers Right Now (FB)

Privacy group wants FTC to examine Facebook-Datalogix partnership

www.pcworld.com
The U.S. Federal Trade Commission should analyze Facebook's relationship with a data marketer to ensure it doesn't violate the social networking site's recently approved settlement, the Electronic Privacy Information Center said Monday. Facebook is working with Datalogix, a company based in Colorado that specializes in collecting data from retailers...
Privacy group wants FTC to examine Facebook-Datalogix partnership
90% of popular SSL sites vulnerable to exploits, researchers find

Trojan Targets Industry, Government with Fake Conference Invitations

www.eweek.com
Attackers targeted executives in the defense industry and government officials with fake invitations to conferences to install the MSUpdater Trojan to steal sensitive data. - Researchers discovered malware that has been used in targeted attacks against defense contractors, government agencies and other organizations since early 2009, according to IT security...
Trojan Targets Industry, Government with Fake Conference Invitations

Stalking Shadow IT: Amazon Assembles An Enterprise Cloud Army

readwrite.com
If you're like most enterprise IT professionals, you have serious concerns about cloud computing. According to a new Lieberman Software 2012 Cloud Security Survey, sponsored by the Cloud Security Alliance, 88% of the 300 IT professionals surveyed believe that some of their data hosted in the cloud could be lost, corrupted...
Stalking Shadow IT: Amazon Assembles An Enterprise Cloud Army

Where Kim Dotcom and Mega have the edge on Dropbox and Box.net

gigaom.com
As a world (in)famous technologist with the literal last name “Dotcom,” Kim Dotcom is a man whose swag is matched only by the damages sought against him by the U.S. government. His filesharing site Megaupload was long the ire of record companies and movie studios, who say it was a...
Where Kim Dotcom and Mega have the edge on Dropbox and Box.net

XSS Vulnerabilities, Raw SQL Top List of Common Programming Errors

www.webmonkey.com
No programmer is perfect, but some mistakes are more dangerous than others. While some mistakes might just slow down your site, others can open up vulnerabilities that expose your code, your database and even your users to all manner of attack. To help you identify the more serious errors common...
XSS Vulnerabilities, Raw SQL Top List of Common Programming Errors

How To Set Up An iPhone Passcode And Protect Your Data (AAPL)

www.businessinsider.com
Your iPhone is home to the sensitive data on your calendar and the contact info for your friends and family. If you use banking apps, then there's even more at risk. Why not set up a passcode to keep it all under wraps? Here's how to do it.  ...
How To Set Up An iPhone Passcode And Protect Your Data (AAPL)

PayPal the biggest target for site spoofing scams this holiday season, followed by financial firms

thenextweb.com
What was the most phished website during the 2012 holidays? If you thought it was a bank, you’d be pretty close; it was actually PayPal, which saw nine times more phishing sites than the next closest victim. Seriously: it was the only company that saw spoofed sites in the five...
PayPal the biggest target for site spoofing scams this holiday season, followed by financial firms

Outrage as credit agency plans to mine Facebook data

gigaom.com
Everyone knows Facebook is full of interesting data that’s being exploited in all sorts of ways –- whether by startups building businesses on the social graph, or employers who are vetting job candidates using the site. But here’s a way in which you might not want your data mined: to...
Outrage as credit agency plans to mine Facebook data

To Lock Down Mobile Apps, Cenzic Launches New App Testing Tools

techcrunch.com
Software and SaaS security company Cenzic is today launching a new security product for mobile application developers which will allow for the testing of mobile apps on any platform – iOS, Android, J2ME, and more. The product will be the first that can test products without requiring developers to submit...
To Lock Down Mobile Apps, Cenzic Launches New App Testing Tools

Networks under attack

www.guardian.co.uk
Your company's confidential information is under threat from botnets, spreading infection across the networkA botnet is a collection of connected PCs that are under the control of a remote hacker, typically through an infected PC that is then run by an external command and control system.The infected software can be...
Networks under attack
Red October relied on Java exploit to infect PCs
Facebook adds iOS and Mac development studio Acrylic to design team
OneID develops ring of strategic partnerships to keep identities top secret
CloudLock aims to bring PCI compliance to Google Drive
× Just a test of the new info bar. What do you think?