FBI says social media monitoring won't infringe privacy rights

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

FBI says social media monitoring won't infringe privacy rights


FBI says social media monitoring won't infringe privacy rights

Posted: 14 Feb 2012 08:57 AM PST


The FBI said its proposed plans to monitor social media sites to improve real-time situation awareness will be fully vetted by the agency's Privacy and Civil Liberties Unit.

Royal Philips Electronics reports Web security breach

Posted: 14 Feb 2012 08:24 AM PST


Health-care technology and lighting vendor Royal Philips Electronics has reported a possible security breach affecting a portion of its website, the company announced Tuesday.

Mozilla will ask all certificate authorities to revoke SSL-spying certificates

Posted: 14 Feb 2012 08:23 AM PST


Mozilla plans to ask all certificate authorities to review their subordinate CA certificates and revoke those that could be used by companies to inspect SSL-encrypted traffic for domain names they don't control.

Four keys to successful BYOD

Posted: 14 Feb 2012 06:22 AM PST


The bring your own device (BYOD) movement formally advocates use of personal equipment for work and obligates IT to ensure jobs can be performed with an acceptable level of security, but how can risks be addressed given the range of devices used and the fact that you lack control of the end point?

Whistleblowing site Cryptome.org infected with drive-by exploits

Posted: 14 Feb 2012 03:38 AM PST


Cryptome.org, a website dedicated to disclosing confidential information, was compromised last week and was used to infect PCs running Internet Explorer through drive-by exploits.

Intel’s 10G 'Romley' server to spur Ethernet switch growth

Posted: 13 Feb 2012 12:45 AM PST


When Intel ships its long-awaited 10G-enabled server platform later this quarter, it's expected to have a significant impact on the Ethernet switching market.

IBM's top network exec talks strategy

Posted: 12 Feb 2012 10:58 PM PST


IBM reversed course on networking in 2010 when it acquired Blade Network Technologies, one of its key network suppliers. Network World Editor in Chief John Dix and Managing Editor Jim Duffy recently caught up with Vikram Mehta, founder of BNT and now vice president of IBM System Networking, for an update on IBM's network visions going forward.

FBI seeks social media monitoring tool

Posted: 14 Feb 2012 02:12 AM PST


In a move that's unlikely to sit well with privacy advocates, the FBI has begun scouting for a tool that will allow it to gather and mine data from social networks like Facebook, Twitter and blogs.

Startup with heavy Russian connections offers crypto authentication service

Posted: 14 Feb 2012 02:00 AM PST


Can a security startup based in Bedford, N.H., which relies on Russian cryptography expertise from Moscow, bring about a revolution in the way that users authenticate to gain access to websites today and secure data?

Spear-phishing stats reveal unexplained holiday spikes

Posted: 14 Feb 2012 08:01 AM PST


While phishing attempts against workplace email accounts drop precipitously on Christmas and New Year's Day, as might be expected, such attacks spike dramatically on other holidays, says a report from a security firm. Why is not clear.

Startup sets up website malware detection service

Posted: 13 Feb 2012 12:55 AM PST


Startup StopTheHacker makes its debut today with a set of services for detecting malicious code implanted in websites by hackers who compromise sites to try to launch attacks on visitors to infected Web pages.

Obama's 2013 IT budget: Less for DOD, less overall

Posted: 13 Feb 2012 12:38 AM PST


U.S. President Barack Obama will request a 2013 federal IT budget of US$78.9 billion, a decrease of 0.7 percent from the government's 2012 budget.

Is your definition of security holding you back?

Posted: 12 Feb 2012 11:00 PM PST


Hunched forward in an effort to find comfort in old, wooden chairs gathered around a whiteboard in an oversized conference room, the ten people sitting before me each clutched a single sheet of white paper in one hand, a pen in the other.

Security Manager's Journal: Hackers phone home -- on our dime

Posted: 12 Feb 2012 10:56 PM PST


Trouble Ticket

Police warn of money-stealing computer virus

Posted: 12 Feb 2012 10:07 PM PST


The Metropolitan Police is warning the public to be aware of a computer virus that impersonates its e-crime unit in an effort to steal money from unsuspecting users.

Continuous Transaction Monitoring (CTM) protects financial integrity, even when network security inevitably fails

Posted: 12 Feb 2012 09:23 PM PST


Everyone's seen the headlines. TJX. RSA. Playstation Network. Symantec. Major corporations with massive investments in network security reduced to public ridicule and expensive liability by hackers. Even governments aren't immune, as proven by online vigilantes like Wikileaks and Anonymous.

How does mobile device management (MDM) work?

Posted: 13 Feb 2012 08:40 AM PST


Enterprise IT and security teams are stretched thin by the growing number of mobile device types invading the enterprise -- many owned by employees -- the variety of OSs and the sheer volume of mobile apps users are requesting. Questions abound.

0 comments:

Post a Comment