Google's tracking of Safari users could lead to FTC investigation

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Google's tracking of Safari users could lead to FTC investigation


Google's tracking of Safari users could lead to FTC investigation

Posted: 17 Feb 2012 08:45 AM PST


Google's alleged circumvention of do-not-track controls on Apple's Safari browser could lead to big fines from the U.S. Federal Trade Commission if the agency determines Google has violated a privacy settlement the company agreed to in March, some privacy advocates said Friday.

The decision to strip online certificate revocation checks from Chrome is misguided, Symantec says

Posted: 17 Feb 2012 07:55 AM PST


Stripping OCSP (Online Certificate Status Protocol) and CRL (certificate revocation list) checks from Google Chrome could have dangerous implications because it will turn Google into a single point of failure, according to security vendor Symantec.

Attackers have all they need from leaky cellphone networks to track you down

Posted: 17 Feb 2012 07:37 AM PST


GSM cellular networks leak enough location data to give third-parties secret access to cellphone users' whereabouts, according to new University of Minnesota research.

WSJ: Google disregarded iPhone privacy settings

Posted: 17 Feb 2012 06:57 AM PST


The Wall Street Journal has charged that Google, along with a number of other advertising agencies, have planted code on millions of iPhones that allows the companies to track user behavior.

Twitter enables HTTPS by default

Posted: 17 Feb 2012 05:31 AM PST


Twitter has enabled secure hypertext transfer protocol (HTTPS) for all its users by default, meaning that traffic on the micro-blogging site is now encrypted, providing better protection against man-in-the-middle attacks.

Lieberman: Cybersecurity Act of 2012 will help us protect critical infrastructure

Posted: 17 Feb 2012 05:31 AM PST


At a hearing on the bill, witnesses and senators said fast action is necessary to protect critical infrastructure against certain attack. The bill's sponsor promised there's no hidden SOPA-PIPA language in the legislation.

Apple's new OS X tightens screws on some malware

Posted: 17 Feb 2012 03:04 AM PST


Mac OS X Mountain Lion will offer users a new security model that by default lets users install only programs downloaded from the Mac App Store or those digitally signed by a registered developer.

Goldman Sachs IT analyst 'caught up in major investigation'

Posted: 16 Feb 2012 11:09 PM PST


Henry King, a high profile IT analyst at Goldman Sachs, is reportedly under investigation for leaking insider trading information.

McCain, GOP Vow Alternative Cybersecurity Bill

Posted: 16 Feb 2012 04:03 AM PST


Arizona Republican blasts bipartisan cybersecurity bill for DHS authority, new regulations on private sector operators.

Cybersecurity bill would create costly regulations, say critics

Posted: 16 Feb 2012 02:23 AM PST


Leaders in the U.S. Senate are trying to fast-track new cybersecurity legislation that will create costly new regulations for some businesses, some critics said Thursday.

The 15 worst data security breaches of the 21st Century

Posted: 16 Feb 2012 01:58 AM PST


Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one? For some perspective, we take a look at 15 of the biggest incidents in recent memory. Helping us out are security practitioners from a variety of industries, including more than a dozen members of LinkedIn's Information Security Community, who provided nominations for the list.

Shylock financial malware back 'with a vengeance'

Posted: 16 Feb 2012 01:49 AM PST


There are hints in Shylock terminology to suggest it is coming from Russia or the Ukraine. But who is involved and exactly where it is coming from remains a mystery.

Privacy tussle brews over social media monitoring

Posted: 16 Feb 2012 12:16 AM PST


A major tussle is emerging in the debate over how government agencies can gather and use information posted publicly on social networks like Facebook and Twitter.

FTC warns enforcement action may be next for mobile apps for kids

Posted: 15 Feb 2012 11:48 PM PST


The U.S. Federal Trade Commission, which in a new survey found that the vast majority of mobile apps for kids don't clearly disclose data sharing practices, said its next step will be the potential enforcement of privacy regulations.

8 Tips to Defend Against Online Financial Fraud Threats

Posted: 15 Feb 2012 11:48 PM PST


Criminals in 2012 are increasingly targeting the accounts of business owners and executives as a way to facilitate financial fraud and CIOs can help protect their organizations against these attacks.

DDoS attackers start targeting IPv6 networks

Posted: 15 Feb 2012 10:40 PM PST


Cybercriminals have started launching distributed denial-of-service (DDoS) attacks against networks that transmit data over IPv6 (Internet Protocol version 6), according to a report published recently by DDoS mitigation vendor Arbor Networks.

Government Moves Toward Cloud Computing 'Perfect Storm'

Posted: 15 Feb 2012 10:06 PM PST


As FedRAMP initiative ramps up, cloud service providers can look forward to clearer guidance from federal clients and a robust market as administration tech chiefs press on toward a 'Perfect Storm' in cloud computing.

Exactly what is Homeland Security watching for on Facebook, Twitter, YouTube?

Posted: 16 Feb 2012 08:59 AM PST


The idea that any number of federal institutions are watching your every move on social networks like Facebook, Twitter is unnerving at best. The Department of Homeland Security is one of those agencies and today it testified before a House subcommittee to define and defend its role in social media monitoring.

0 comments:

Post a Comment