Samsung is the most popular brand of smartphone among a large portion of the adult population – adulterers, with the Korean handsets chosen by more than half of those conducting secret affairs.
Two-thirds of the respondents to the survey admitted to using various methods to check on children “without their knowledge” – and one-fifth had found “incriminating” posts which they confronted children about.
A new Harris poll shows that revelations about the National Security Agency’s digital surveillance activities are changing online behavior for many Americans and some say they are doing less online banking and less online shopping because of what they have learned about the NSA.
Hackers could take control of Philips ‘smart TVs’ and broadcast their own ‘shows’ to watching famlies, thanks to a ‘fixed’ password which allows nearby attackers easy access to the set’s Wi-Fi adapter.
A young MIT student has invented a new system for storing data which could offer protection against unscrupulous colleagues – and even against the hi-tech tentacles of government organizations with “back doors” into corporate servers.
Starting today, Gmail will use an encrypted HTTPS connection to check or send email, regardless of what platform users employ to access the service – and will use security measures when moving mails internally, citing fears over government snooping.
Facebook’s ‘Deepface’ photo-matching software can now ‘recognize’ human faces with an accuracy just a fraction of a percentage point behind human beings – a huge leap forward in the technology, with some potentially alarming implications for privacy.
Smartphone apps and home equipment for scanning brainwaves could lead to a future in which governments or companies misuse such data as a way of decoding people’s personality traits, researchers from MIT and the Technical University of Denmark have warned.
Twitter has removed a bug that allowed site users to spy on protected accounts, reading supposedly protected Tweets via SMS or push notifications, regardless of whether users had approved them as followers.
University of Berkeley researchers have revealed a technique for identifying individual web pages visited ‘securely’ by users, with up to 89% accuracy, revealing data such as health conditions, financial details and sexual orientation.
Did you know that medical data on 20,000 people may be exposed to abuse today? As a healthcare practitioner, you may not be aware of the value of the data in your care, but criminals certainly are.
A secret technology which relied on radio transmissions has allowed the National Security Agency to spy on computers disconnected from the internet – a security measure known as an ‘air gap’, and commonly used to protect machines containing highly sensitive data.
The Target security breach and the Snowden revelations about NSA surveillance have raised awareness of data privacy to new levels, making Data Privacy Day more relevant than ever in 2014. And yes, Data Privacy Day is a real thing, observed on January 28.
Tips for shoppers worried that their credit or debit cards may have been compromised by the massive security breach at Target stores.
The 2014 threat trends report from ESET’s global network of cybersecurity experts centers on three key trends, the first and foremost being digital privacy, the others being threats to mobile devices, and new, hi-tech malware targeting PCs and other devices in the home.
This is a quick reminder that the September 23 deadline for compliance with the new HIPAA regulations is rapidly approaching. Organizations that handle protected health information (PHI) need to be sure they are up to speed on the changes and ready to withstand scrutiny. In general, you will need new NPPs and BAAs (Notices of
Internet users are becoming more savvy about keeping their private data safe – but many have already fallen victim to crime and scams, a study by the Pew Research Institute’s Internet Project has found. One in five (21%) of internet users have had an email or social networking account compromised or taken over without their permission.
An infographic of recent healthcare IT security statistics paints a striking picture of much security work yet to be done, even as new medical privacy regulations go into effect.