ITworld Security http://www.itworld.com/taxonomy/term/49/all en Apple Watch under scrutiny for privacy by Connecticut attorney general http://www.itworld.com/436371/apple-watch-under-scrutiny-privacy-connecticut-attorney-general The attorney general of the U.S. state of Connecticut is concerned about the privacy implications of Apple Watch&#039;s handling of consumers&#039; health information.<p><a href="http://www.itworld.com/436371/apple-watch-under-scrutiny-privacy-connecticut-attorney-general" target="_blank">read more</a></p> http://www.itworld.com/436371/apple-watch-under-scrutiny-privacy-connecticut-attorney-general#comments Security News Tue, 16 Sep 2014 05:16:20 +0000 IDGNS staff 436371 at http://www.itworld.com 'Tiny banker' malware targets US financial institutions http://www.itworld.com/security/436366/tiny-banker-malware-targets-us-financial-institutions A banking trojan, known for its small size but powerful capabilities, has expanded the number of financial institutions it can collect data from, according to security vendor Avast.<p><a href="http://www.itworld.com/security/436366/tiny-banker-malware-targets-us-financial-institutions" target="_blank">read more</a></p> http://www.itworld.com/security/436366/tiny-banker-malware-targets-us-financial-institutions#comments Data Protection Security News Tue, 16 Sep 2014 03:28:53 +0000 IDGNS staff 436366 at http://www.itworld.com Data loss detection tool mines the ephemeral world of 'pastes' http://www.itworld.com/security/436360/data-loss-detection-tool-mines-ephemeral-world-pastes It&#039;s not easy to figure out if your data has been collected by hackers, but an online tool has been expanded to hunt through one of the most prolific sources of leaked data, known as &quot;pastes.&quot;<p><a href="http://www.itworld.com/security/436360/data-loss-detection-tool-mines-ephemeral-world-pastes" target="_blank">read more</a></p> http://www.itworld.com/security/436360/data-loss-detection-tool-mines-ephemeral-world-pastes#comments Security News Tue, 16 Sep 2014 02:05:18 +0000 IDGNS staff 436360 at http://www.itworld.com What are some legal, legitimate reasons to use TOR? http://www.itworld.com/answers/topic/security/question/what-are-some-legal-legitimate-reasons-use-tor <p>A lot of people seem to think TOR is all about shady or illegal activity, which it is not although they aren’t entirely wrong either. What are some legitimate uses that you have found for TOR?</p> Security privacy Tor TOR network Tue, 16 Sep 2014 01:33:37 +0000 TheCount 436348 at http://www.itworld.com Google reports a 19% jump in US government data requests http://www.itworld.com/internet/436332/google-reports-19-jump-us-government-data-requests Google fielded 19 percent more requests from the U.S. government for data on its users in the first half of this year compared to the second half of last year, the company said Monday.<p><a href="http://www.itworld.com/internet/436332/google-reports-19-jump-us-government-data-requests" target="_blank">read more</a></p> http://www.itworld.com/internet/436332/google-reports-19-jump-us-government-data-requests#comments Data Protection Government Internet IT Management On-demand Software Security News Mon, 15 Sep 2014 23:07:00 +0000 IDGNS staff 436332 at http://www.itworld.com Yahoo slams new 'digital will' law, says users have privacy when they die http://www.itworld.com/security/436311/yahoo-slams-new-digital-will-law-says-users-have-privacy-when-they-die What should happen to your personal digital communications -- emails, chats, photos and the like -- after you die? Should they be treated like physical letters for the purposes of a will?<p><a href="http://www.itworld.com/security/436311/yahoo-slams-new-digital-will-law-says-users-have-privacy-when-they-die" target="_blank">read more</a></p> http://www.itworld.com/security/436311/yahoo-slams-new-digital-will-law-says-users-have-privacy-when-they-die#comments Data Protection Internet Networking On-demand Software Security Unified Communications News Mon, 15 Sep 2014 20:22:50 +0000 IDGNS staff 436311 at http://www.itworld.com Everything you need to know about keeping your Google account safe http://www.itworld.com/security/436297/everything-you-need-know-about-keeping-your-google-account-safe Last week there were inaccurate reports that millions of Google passwords were hacked. It wasn&#039;t really the case, but you still should keep your Google account as safe as possible. Here&#039;s how to go a long way towards making sure it doesn&#039;t get hacked.<p><a href="http://www.itworld.com/security/436297/everything-you-need-know-about-keeping-your-google-account-safe" target="_blank">read more</a></p> http://www.itworld.com/security/436297/everything-you-need-know-about-keeping-your-google-account-safe#comments Cloud Computing Security How-to gmail Google google hack hack passwords security Mon, 15 Sep 2014 18:57:30 +0000 Preston Gralla 436297 at http://www.itworld.com Open-source project promises easy-to-use encryption for email, instant messaging and more http://www.itworld.com/security/436289/open-source-project-promises-easy-use-encryption-email-instant-messaging-and-more A software development project launched Monday aims to create free tools that simplify the encryption of online forms of communication like email, instant messaging, SMS and more by solving the complexity associated with the exchange and management of encryption keys.<p><a href="http://www.itworld.com/security/436289/open-source-project-promises-easy-use-encryption-email-instant-messaging-and-more" target="_blank">read more</a></p> http://www.itworld.com/security/436289/open-source-project-promises-easy-use-encryption-email-instant-messaging-and-more#comments Security News Mon, 15 Sep 2014 17:40:19 +0000 IDGNS staff 436289 at http://www.itworld.com How network virtualization is used as a security tool http://www.itworld.com/virtualization/436256/how-network-virtualization-used-security-tool As VMware sells its network virtualization software, it&#039;s finding that security is a big driver for adoption.<p><a href="http://www.itworld.com/virtualization/436256/how-network-virtualization-used-security-tool" target="_blank">read more</a></p> http://www.itworld.com/virtualization/436256/how-network-virtualization-used-security-tool#comments Security Virtualization News network virtualization Tue, 16 Sep 2014 01:12:35 +0000 IDGNS staff 436256 at http://www.itworld.com Caught in the breach: How a good CSO confronts inevitable bad news http://www.itworld.com/data-protection/436246/caught-breach-how-good-cso-confronts-inevitable-bad-news What goes through the mind of a CSO/CISO upon being told by his or her team that their organization has been breached?<p><a href="http://www.itworld.com/data-protection/436246/caught-breach-how-good-cso-confronts-inevitable-bad-news" target="_blank">read more</a></p> http://www.itworld.com/data-protection/436246/caught-breach-how-good-cso-confronts-inevitable-bad-news#comments Data Protection Security News insider Tue, 16 Sep 2014 01:39:28 +0000 IDGNS staff 436246 at http://www.itworld.com Sprint, Windstream traffic routing errors hijacked other ISPs http://www.itworld.com/security/436174/sprint-windstream-traffic-routing-errors-hijacked-other-isps Internet traffic routing errors made by U.S. operators Sprint and Windstream on the same day last week underscore a long-known Internet weakness, posing both security and reliability issues.<p><a href="http://www.itworld.com/security/436174/sprint-windstream-traffic-routing-errors-hijacked-other-isps" target="_blank">read more</a></p> http://www.itworld.com/security/436174/sprint-windstream-traffic-routing-errors-hijacked-other-isps#comments Security News Mon, 15 Sep 2014 02:25:24 +0000 IDGNS staff 436174 at http://www.itworld.com The 2014 Next Generation Firewall Challenge http://www.itworld.com/disaster-recovery/436028/2014-next-generation-firewall-challenge <!--paging_filter--><p> The Target security breach and discovery of the "Heartbleed" vulnerability in web encryption software taught us some important lessons about enterprise security.</p> <p><a href="http://www.itworld.com/disaster-recovery/436028/2014-next-generation-firewall-challenge" target="_blank">read more</a></p> Business Intelligence Disaster Recovery Security Fri, 12 Sep 2014 23:32:36 +0000 436028 at http://www.itworld.com The 2014 Next Generation Firewall Challenge http://www.itworld.com/disaster-recovery/436028/2014-next-generation-firewall-challenge <p><a href="http://www.itworld.com/disaster-recovery/436028/2014-next-generation-firewall-challenge" target="_blank">read more</a></p> Business Intelligence Disaster Recovery Security Fri, 12 Sep 2014 23:32:36 +0000 436028 at http://www.itworld.com The 2014 Next Generation Firewall Challenge http://www.itworld.com/disaster-recovery/436028/2014-next-generation-firewall-challenge <p><a href="http://www.itworld.com/disaster-recovery/436028/2014-next-generation-firewall-challenge" target="_blank">read more</a></p> Business Intelligence Disaster Recovery Security Fri, 12 Sep 2014 23:32:36 +0000 436028 at http://www.itworld.com The 2014 Next Generation Firewall Challenge http://www.itworld.com/disaster-recovery/436028/2014-next-generation-firewall-challenge <p><a href="http://www.itworld.com/disaster-recovery/436028/2014-next-generation-firewall-challenge" target="_blank">read more</a></p> Business Intelligence Disaster Recovery Security Fri, 12 Sep 2014 23:32:36 +0000 436028 at http://www.itworld.com