NASSCOM and DSCI have launched a cybersecurity task force to help develop India as a global R&D hub. Experts question whether the sponsoring organizations have set the right agenda for this new entity.
In a landmark judgment, the Supreme Court of India struck down the controversial Section 66A of India's Information Technology Act, saying it violated the right to free speech as guaranteed by India's constitution.
As cybercrime grows, Section 66A of India's IT Act is under scrutiny of the court, government and security leaders. Some experts say it requires amendments to ensure correct interpretation and implementation.
British Prime Minister David Cameron reportedly plans to lobby U.S. President Barack Obama to criticize technology companies that offer encrypted communications that cannot be cracked by law enforcement or intelligence agencies.
Apple's advice to always use strong passwords and two-factor authentication ignores that image hackers are bypassing those controls - and celebrities aren't the only victims. Here's what needs to change.
Cybersecurity researchers at the Georgia Tech Research Institute are developing a tool known as BlackForest that amasses information from the Internet to give organizations an early warning of a pending cyber-attack.
Security experts say a newly reported flaw in open-source authorization services, which has been named Covert Redirect, doesn't appear to pose as big a risk as the Heartbleed bug.
Microsoft has confirmed unauthorized access to certain employees' e-mail accounts following targeted phishing attacks. Find out what kind of documents the hackers accessed.
Technology is the biggest challenge to ethics and compliance in organizations today, says Deloitte's Keith Darcy. "We have the capacity to do things before we ever consider the ethical consequences ..."
Hackers have pilfered some 2 million user passwords and credentials for Facebook and other social media and Internet sites, according to IT security provider Trustwave. The hackers attacked computers in about 100 nations.
Twitter's announcement that it's adding "forward secrecy" encryption to its sites should serve as a reminder that organizations need to continually assess the risks to their organization, experts say.
Twitter's IPO filing sheds light on the social media company's perceived security risks. For example, it acknowledges the challenge of preparing for evolving cyberthreats.
As organizations use social media to grow their online presence, questions of ownership become an increasing concern, says Alan Brill of Kroll, who advises organizations on how to mitigate risks.
As social media use grows, so do the risks of organizations getting caught up in costly legal disputes over ownership and assets. Alan Brill of Kroll advises on how to mitigate such risks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.