Please turn on your JavaScript for this page to function normally.
Design guidelines for mobile app privacy

The GSM Association (GSMA), with the support of mobile operators in Europe and following consultation across the wider mobile ecosystem, has published a set of global Privacy …

White House announces Consumer Privacy Bill of Rights

As the privacy of Internet user seems to be eroding with every passing day and online companies can’t seem to guarantee them that their personal information will not be …

Tips to minimize the risk of identity fraud

Javelin Strategy & Research recommends that consumers follow a three-step approach to minimize their risk and impact of identity fraud. Prevention 1. Keep personal data …

Password amnesia and online identity

The use of multiple passwords is posing a security risk to individuals and businesses alike, according to Ping Identity. A new study, which surveyed 2,000 consumers, …

Identity fraud hits 11.6 million in the US

In 2011 identity fraud increased by 13 percent. More than 11.6 million adults became a victim of identity fraud in the United States, while the dollar amount stolen held …

New capabilities for the IBM security intelligence platform

IBM unveiled new capabilities planned for its security intelligence platform designed to combine deep analytics with real-time data feeds from hundreds of different sources to …

Indian govt to ask Yahoo, Google to route emails through servers in India

Web mail service providers such as Google, Yahoo, and others will be asked to route all emails accessed in India through servers located in the country – even if the …

Microsoft says Google also bypassed IE’s privacy settings

Following the discovery that Google and other online advertising companies are bypassing Safari’s default “no tracking” settings with specific code inserted …

“Ex-girlfriend sex video” Facebook scam

Survey scammers love targeting Facebook users, because the social nature of the network makes sure that the scam will be propagated far and wide. The latest of these scams has …

Hackers can find you by tracking your cellphone

Finding out people’s approximate whereabouts by tracing their cellphone signal is something that service providers can easily do, as cellular networks track its …

Secret ad code allows Google to bypass Safari’s “no tracking” settings

Once again, Google has been caught doing something that it shouldn’t be doing: using code in their ads to intentionally bypass the privacy settings of Safari users in …

Imation secures mobile data, identity and workspaces

Imation announced its unified Secure Data, Identity and Mobile Workspace product set, which brings together a combination of encrypted USB storage devices and media, …

Don't miss

Cybersecurity news