Articles about Privacy
In Germany, data watchdogs will meet this week to debate the future of the Safe Harbor agreement in the post-Snowden world.
The whistleblower organisation is demanding answers from Google over why it took so long to disclose that it had handed over details of three WikiLeaks' staffers' emails to the US government.
Facebook is heading to court this April to argue why it shouldn't be sued for allegedly violating European privacy laws.
It wouldn't be another news week if our governments didn't disappoint us in some way or another. The UK seems to be tiring of civil liberties, Russia is tiring of civility, and North Korea is way overdue for its little nap. Plus (no surprise), the Department of Homeland Security is insecure.
The case for mandatory data retention is that the data is crucial for averting terrorism or big crimes -- but sometimes its use is a little more questionable.
The peak national body representing companies including Apple, Google, Telstra, and Optus has said that the Australian government's draft data-retention legislation is too ambiguous.
Australian Customs and Border Protection Service has said that it would increase its surveillance of Australians' telecommunications should the mandatory data-retention legislation pass.
Microsoft handed over data linked to the Charlie Hebdo terrorist attack to the FBI in double-quick time, noting that extra snooping should only happen under certain circumstances.
The lobby group representing technology giants including Google, Twitter, Microsoft, and Facebook has said that the mandatory data-retention legislation before the Australian parliament could see its own services caught up by the scheme.
The leaks from Edward Snowden on the US government's surveillance operations have hastened the need for mandatory data retention, according to the Australian Attorney-General's Department.
If history and initial reaction are any gauge, privacy advancements will have to come from somewhere besides the Oval Office or Congress
Google resists calls from European data protection authorities to apply privacy-related URL removals to non-EU domains.
An unknown number of government websites have been compromised by a hacker who reportedly exfiltrated more than 770,000 records from the computer system and database of Australian travel insurer Aussie Travel Cover.
The United States government is gearing up for digital war, with classified documents leaked by former National Security Agency contractor Edward Snowden published by Germany's Der Spiegel outlining the agency's moves to appropriate foreign attacks for its own use.
Lack skills yourself? A new website allows you to find a hacker in minutes for revenge against an ex or to take down local competition.
A number of free and open-source projects exist solely to protect your identity and online activity. Here are just a few to make you more secure in the new year.
A look back at the hot topics, major deals, and the technological breakthroughs of 2014 -- from security to product launches, and the year's successes and catastrophes.
Apps running in mobile operating systems must get permission from the user for all sorts of things. This can be confusing. Do some do it better than others?
How do you vanish online? Follow these 10 steps to get started.
The new Apple software and new hardware for it have many features that could present problems for enterprises if IT doesn't prepare.
Your home router is vulnerable to attacks as soon as you take it out of the box. Here are six things you can do to secure your network.
My Amazon home page shows me how much the company knows about me and my online activities. Here we show you which privacy and security settings can help you reduce the information Amazon holds about you.
Have you ever wondered how social networking sites seem to know so much about you and your preferences? We take the lid off how these sites gather data about your activities.
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
Maintaining privacy online seems almost impossible, but there are a tools that can minimise the chances of your personal, financial or business data falling into the wrong hands.
How much do you love your country? Enough to shop until you drop, choosing just the right gifts? If you're stumped on exactly what to give your favorite nation, we have the answers. Come on in!
Welcome to the official 2013 edition of our ZDNet DIY-IT Gift Guide. This year, in honor of 2013, we present to you 14 interesting and useful products that the DIY-ITer in your life will find particularly useful, fun, or cool.
A look back at the hot topics, major discoveries, and technological breakthroughs of 2012: from privacy to surveillance, major product launches, successes and catastrophes.
ZDNet looks back at the year, on a month-by-month basis, at some of the most publicized hacks, leaks and data breaches of 2012.
Thanksgiving is over, and we're heading into December. It's time for a look back at all the blunders, catastrophes, epic fails and major screw-ups of 2012.
At the Where 2.0 conference in San Jose, Calif., Deborah Estrin, a professor of computer science at UCLA, says the capability of GPS mobile phones to record location over time creates a new wealth of analytics. For example, new opportunities will exist where information is gathered from multiple users that better enables the accuracy of local traffic conditions.
There are no privacy issues with Google Street View, a Maps-based project that offers 360-degree panoramic views of various streets in cities around the US, according to Google Australia's head of engineering. At the Google developer day in Sydney last week, Lars Rasmussen denied that privacy was an issue when it came to Google Street View because, he said, the images are all taken in "public areas".
The success of the proposed Access Card rests on how the private sector puts it to use, according to Australian Federal Police (AFP) Commissioner Mick Keelty.Keelty believes the private sector may use the Access Card as a general ID card when its real purpose was to ensure that the "right people" receive access to needed government services such as Medicare.
Chertoff, secretary of the U.S. Department of Homeland Security, appears at the opening of the Joint Regional Intelligence Center in Norwalk, Calif., on Friday, Aug. 18, saying that his department is indeed concerned with privacy. The intelligence center joins federal, state and local law enforcement in one facility as part of a post-9/11 effort to improve law enforcement collaboration.
Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.
As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.
ZoneAlarm Security Suite puts Norton Internet Security and McAfee Internet Security to shame with its easy-to-use features.ZoneAlarm's Security Suite is one of the best security suites we've seen.
A well-designed program, Spy Sweeper is both classy and effective.Webroot Spy Sweeper 2.