Items Tagged with "internet"


69dafe8b58066478aea48f3d0f384820

FCC Prompts ISPs to Adopt Code of Conduct Standards

February 24, 2012 Added by:Headlines

"If we fail to tackle these challenges, we will pay the price in the form of diminished safety, lost privacy, lost jobs, and financial vulnerability – billions of dollars potentially lost to digital criminals," FCC Chairman Julius Genachowski said...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Obama Unveils Blueprint for Online Privacy Bill of Rights

February 23, 2012 Added by:Headlines

The Obama Administration today unveiled a “Consumer Privacy Bill of Rights” as part of a comprehensive blueprint to improve consumers’ privacy protections and ensure that the Internet remains an engine for innovation and economic growth...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

IPv6 Protocol Implementation is Not a Security Panacea

February 22, 2012 Added by:Headlines

"The same thing that made the IPv6-enabled Internet valuable has also made it an increasingly valuable venue for attacks. While the frequency of attacks is relatively modest on IPv6 today, we expect that accelerated adoption will be followed in-kind by an accelerated pace of attacks..."

Comments  (0)

65be44ae7088566069cc3bef454174a7

Is Information Online Legally Fair Game to Use for Marketing?

February 21, 2012 Added by:Rebecca Herold

Social media sites are booming. The amount of personal information posted to them, such as photos, videos, original stories, thoughts, gossip, is exploding. Marketers are drooling at the prospect of using all that “free” information. Well, it’s really not free, folks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Planned Anonymous Attack on the Internet Likely to Fail

February 20, 2012 Added by:Headlines

"The attack is no longer practical. It's such a common idea that Wikipedia has a page devoted to it. For something so obvious, defenders have spent considerable time devising solutions. There are many reasons why such an attack won't cause a global blackout..."

Comments  (1)

F29746c6cb299c1755e4087e6126a816

Google Wants to Get to Know You Better... Uh-Oh

February 19, 2012 Added by:Kelly Colgan

The company that started out as a little search engine has grown into a behemoth that dabbles in everything from social networking to picture sharing to 3D modeling. And it plans to integrate information pulled from all of those Google services you use to learn more about you...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Malnets to Become Source for Majority of Attacks

February 13, 2012 Added by:Infosec Island Admin

"Malnet infrastructures enable cybercriminals to launch dynamic attacks that are often not detected by traditional anti-virus vendors for days or months. In one case in early February 2011, a malware payload changed locations more than 1,500 times in a single day..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

We Have Every Right to be Furious about ACTA

February 13, 2012 Added by:Electronic Frontier Foundation

While ACTA was only negotiated between a few countries, it has global consequences. First because it will create new rules for the Internet, and second because its standards will be applied to other countries through the U.S.’s annual Special 301 process...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Seeks Proposals to Improve Trust in Cyberspace

February 10, 2012 Added by:Headlines

The National Institute of Standards and Technology (NIST) launched a competition for pilot projects to accelerate progress toward improved systems for interoperable, trusted online credentials that go beyond simple user IDs and passwords...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

GFI WebMonitor Internet and Web Security Review

February 09, 2012 Added by:Dan Dieterle

Looking for a program that monitors internet use, allows granular control over sites and services they can access, coupled with comprehensive web security and threat detection that includes scanning with three Anti-Virus engines? Look no further...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Defending the Enterprise - Five Corporate Security Challenges

February 08, 2012 Added by:Rafal Los

You have to keep close tabs on your employees, your friends, your enemies and those you would never suspect, because threats are ever-present and overwhelming. Keep a level-head, because the evolution of threat doesn't mean it's any more scary today than yesterday...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

NIST Recommendations for Trusted Identities in Cyberspace

February 08, 2012

The report lays out a path for implementing the National Strategy for Trusted Identities in Cyberspace, a White House initiative to bring together the private sector, advocacy groups, public-sector agencies to improve the privacy, security and convenience of online transactions...

Comments  (0)

Ebbcdce0dfc85abf519d8b44a017f687

Data Privacy: Oxymoron, Wishful Thinking, or Strategic Goal?

February 03, 2012 Added by:Brian Dean

Consumers are desensitized to breaches, as evidenced by the meager rate of consumers applying for free credit monitoring services after a company breach. If you analyze the data that was breached, sometimes you have to ask, “Why are they even collecting all of that data?”

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

How Will Facebook’s IPO Impact Online Privacy?

February 02, 2012 Added by:Allan Pratt, MBA

The dramatic shift away from protecting confidential data is due to “the Facebook era.” While we’ve all met new friends and reconnected with family members, the reality is that thieves are out there devising innovative ways to steal our identities and confidential data...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Web Authentication: A Broken Trust with No Easy Fix

January 30, 2012 Added by:Infosec Island Admin

Systemic weaknesses and a general lack of oversight governing the process used to issue digital certificates, key to the standards used to validate legitimate websites, prompted some security experts to wonder if the system may be hopelessly ineffective...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ENISA Report on Network Information Security in Education

January 30, 2012

ENISA's Report on Network Information Security in Education comes at a time when education and ITC are interconnected more than ever. The challenge of the digitally active citizen is to remain informed on the news coming from the dynamic field of Information Security...

Comments  (2)

Page « < 5 - 6 - 7 - 8 - 9 > »