Tag: Data Protection

1 2 3 10 / 29 POSTS
Security Mistakes and Exploitation of Mobile Apps

Security Mistakes and Exploitation of Mobile Apps

Security mistakes in mobile app development are quite common and can lead to the user’s mobile device being compromised and his or her data being mani ...
Protecting sensitive data through encryption and other means

Protecting sensitive data through encryption and other means

One of the most common ways of sensitive data when transferring digitally is to make use of encryption. Commonly used encryption methods include symme ...
Age of big data, student privacy at risk – is no child left un-mined?

Age of big data, student privacy at risk – is no child left un-mined?

It is the era where people are sharing photos of their kids, containing children in even small mortarboards on Facebook and other social media sites. ...
LG and Samsung smartwatches leave private data unencrypted

LG and Samsung smartwatches leave private data unencrypted

Hackers can hack the private information from Samsung and LG smart watches with ease, investigators have come to an end that none among both of the br ...
NSA mass surveillance reformed, now Govt. won’t collect the data instead mobile firms will

NSA mass surveillance reformed, now Govt. won’t collect the data instead mobile firms will

Advocates of reforming NSA (National Security Agency) practices are currently focusing on other controversial plans that American Freedom Act didn’t m ...
Facebook’s European Union woes remain, FB’s privacy settings under scrutiny of watchdogs

Facebook’s European Union woes remain, FB’s privacy settings under scrutiny of watchdogs

The social media giant Facebook has turn out to be an old-timer of the fights battled over data security, net neutrality and internet privacy, and it ...
RadioShack Vended Users’ Private Data to Settle its Debts, FTC not Pleased

RadioShack Vended Users’ Private Data to Settle its Debts, FTC not Pleased

RadioShack's monetary death may leave techies with minimum room to purchase gizmos and their data on the sale square: Customer information that the ve ...
Cyber Security, impact to the user and cost?

Cyber Security, impact to the user and cost?

How often do you read emails or articles depicting the threats directed at users of emails or the Internet?  Figuratively speaking the statistics are ...
Federal Court: NSA mass phone surveillance ruled illegal

Federal Court: NSA mass phone surveillance ruled illegal

A government petitions court has ordered the NSA’s mass collection of huge number of United States’ telephone records is illegitimate. The system was ...
Google is Planning to Boost up Android Privacy Controls

Google is Planning to Boost up Android Privacy Controls

An awesome news for Android users who have been bugging Google to accomplish more to help ensure their security. Google is ready to provider more priv ...
1 2 3 10 / 29 POSTS