Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
A US Senate committee is currently debating the ability of individual companies to self-regulate Internet privacy. The question is whether more legislation will better control what companies collect and disseminate of an online user's private...
This spring, privacy activists revealed that Microsoft's free email service, Hotmail, sends its subscribers' email address, city, and state information to InfoSpace, an Internet white pages service. InfoSpace then combines this information with...
Scientists at the University of California, Berkeley, released a report detailing several security problems in the Wireless Equivalent Privacy (WEP) technology that wireless LAN traffic uses. WEP is part of the IEEE 802.11 standard and uses the...
Users have complained loudly about the various tactics used by many companies to track their Web surfing habits. For example, companies such as DoubleClick routinely track user demographics through the use of cookies. Many users that configure...
The Privacy Foundation released a detailed report on Wednesday outlining a method where Microsoft Word, Excel, and PowerPoint documents can be made to contain Web bugs--1 pixel by 1-pixel images that blend into the background of a document...
By now you've probably heard the rumors about the National Security Agency's (NSA) alleged communications spy network called Echelon. In case you aren't aware, Echelon allegedly can monitor almost every type of communication, including telephone...
Our privacy is continuously under attack. But if you believe Sun Microsystems' CEO and President, Scott McNealy, our privacy has been long gone anyway. McNealy made that comment last year, and although in some ways that statement is true, to hold...