The Xbox One Kinect microphone – one of the hi-tech new features of Microsoft’s new Xbox One console – has raised security concerns since it “listens” to users even when the console is turned off.
Britain’s hi-tech government intelligence agency GCHQ should know better than to send passwords in plain text via email – but has been doing so due to “legacy systems”, it admitted in a statement this week.
A prototype multi-cursor system designed to improve the security of on screen password entry has been posted onto DigInfo, the Tokyo based news site that promotes cutting edge technology from Japan.
Results from an eight country Accenture survey shows that US doctors surveyed have mixed feelings about electronic patient records (EPR). While some 82 percent want patients to update their own records, only a third (31 percent) believe they should have full access.
According to the PwC Top Health industry issues of 2013 report, healthcare managers and consumers are increasingly concerned about the rise of healthcare workers using their own devices within hospitals and other healthcare centers.
A French-Moroccan national was jailed by a Dublin court after being found guilty of hacking into the business accounts of an online betting company, according to the Irish Independent.
We tend to replace our computers more often these days but how do you ensure that you don’t give away your data when you pass on that old desktop or laptop? Here are our top tips for safer computer disposal. Back up your data Before you do anything with your existing PC or laptop, ensure
Are younger people less aware of online security risks, or do they simply prefer to take more risks with their personal information? That’s one of the questions raised by the findings of our recent poll of 2,129 U.S. adults (aged 18 and over) by Harris Interactive.
In our last post (part 1 of 2), we dove into Facebook timeline privacy and security, prompted by the universal imposition of the timeline view that is currently under way on the world’s largest social network. In this second part, we continue reviewing our Facebook timeline from other people’s perspective, using a tool called View
With the recent announcements of password breaches at LinkedIn, and warnings from Google about state-sponsored attacks on Gmail accounts, it seems like a good idea now to review some password security basics. In this blog post, we’re going to take a look at a rather low-tech solution to a decidedly high-tech problem: How to guard