Menu Close

Articles on Data security

Displaying 61 - 78 of 78 articles

If you’ve been hacked or had your identity stolen, time is of the essence when it comes to minimising the damage. Image sourced from Shutterstock.com

The first 72 hours are critical for hacking victims

Preventing and responding to the hacking epidemic is not a problem for one group or organisation to solve. And what happens in the first 72 hours can make all the difference.
The consent policies of popular websites would take a month to read. Perhaps including a sign like this would be a simpler solution. Shutterstock

Personal privacy is eroding as consent policies of Google and Facebook evoke ‘fantasy world’

We live in a world increasingly dominated by our personal data. Some of those data we choose to reveal, for example, through social media, email and the billions – yes, billions – of messages, photos and…
Is it a crime scene or just a store checkout? Could be both. Marlith

After a data breach, it’s consumers left holding the bag

Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
Listening in to a conversation can be easy if you have the right code in place. A. Strakey/Flickr

Sound advice – a new way to eavesdrop on Nexus phones

You don’t have to look far to see how many ways criminals can exploit mobile devices for nefarious purposes. From simple phishing scams to creating fake Wi-Fi networks, the methods in which data can be…
With a few lines of code, cyber criminals and governments have able to infiltrate the security of banks and retailers and steal hundreds of millions in customer records. Shutterstock

JPMorgan hack signals banks and retailers can do more to keep our data safe

JPMorgan Chase early last month disclosed that cyber thieves pilfered account data on 76 million households and seven million small businesses over the summer, one of the biggest breaches ever and only…
Emailing from the car: fast, convenient and not in the least bit secure. rheauchyr

Cybersecurity czar dodges questions over IT security

Cyber security has been a hot item on the UK government agenda in the last few years. Francis Maude of the Cabinet Office is the minister in charge. So if anyone was looking for answers in this area, his…
Data breaches often go undiscovered for years. www.shutterstock.com

When data privacy goes missing, will the regulators hear it cry?

What does privacy mean in an age of ongoing privacy breaches? With new privacy law coming online in Australia on March 12, our Privacy in Practice series explores the practical challenges facing Australian…
Can you ever be anonymous in your doctor’s surgery if your doctor isn’t? MTSOfan

Your NHS data is completely anonymous – until it isn’t

The debate about uploading nearly all data from UK medical practices to a national database continues to cause concern. Responding to fears that the information held in the care.data database will put…
Press two to cancel your mobile phone contract and revert to your landline. _Wiedz

Don’t like being monitored? Get rid of your mobile phone

Concern over privacy has peaked in recent months, especially in telecommunications, where technological advances appear to bring total surveillance ever closer to reality. In one high-profile case of recent…
Can you spot your Facebook data? National Security Agency

Obama’s reformed NSA may look much the same as before

President Obama faced a difficult task in his speech on reform of the NSA’s surveillance activities. As an accomplished orator, crafting a well-received speech was obviously within his capabilities, but…
Online retail continues to grow, despite the shadow of cybercrime. Dolinski/Flickr

Easy Target? The shadow hanging over online retail

The recent hack and subsequent data loss by US retailer Target involved the personal information of at least 70 million customers, including names, phone numbers, email and mailing addresses. It follows…

Top contributors

More