Articles about Privacy
Australia is developing its mandatory data-retention legislation with a flawed process that will inevitably produce bad laws. Start again.
Health devices that track a person's every movement will likely be left out of the Australian government's proposed mandatory data-retention regime.
Hangouts announces a new feature. Is your privacy protected?
Although the man involved in a fatal siege in Sydney on Monday was well known to police and out on bail, Prime Minister Tony Abbott has said that retaining every Australians' telecommunications data for two years may have helped police in the incident.
The chair of the joint committee on intelligence and security, Dan Tehan, has said that Monday's gunman incident in Sydney has reinforced the need for increased police powers and intelligence surveillance.
Number of attacks peaks driven by attempts to steal money online during the World Cup.
Trying to buy confidential office hardware, or a surprise gift? Advances in ad retargeting will broadcast your intentions across the internet and all your devices unless you cover your tracks.
Australia's leading national security and intelligence agencies will not reveal the communications data they want retained by telecommunications companies until discussions with those companies have concluded.
Dashlane and Lastpass now let users change passwords automatically. This closes up one of the gaps in password management.
Microsoft has fired the latest salvo in a case to keep US agents from having access to customer data stored overseas.
Cyber-warfare has been batted around everywhere from IT circles to popular culture, almost reaching a fever pitch recently surrounding suspicion and reports regarding the breach at Sony Pictures.
Australian Attorney-General George Brandis has refused to release the PricewaterhouseCoopers report prepared for the government on the cost of the industry for the Australian government's mandatory data-retention legislation.
A look back at the hot topics, major deals, and the technological breakthroughs of 2014 -- from security to product launches, and the year's successes and catastrophes.
Apps running in mobile operating systems must get permission from the user for all sorts of things. This can be confusing. Do some do it better than others?
How do you vanish online? Follow these 10 steps to get started.
The new Apple software and new hardware for it have many features that could present problems for enterprises if IT doesn't prepare.
Your home router is vulnerable to attacks as soon as you take it out of the box. Here are six things you can do to secure your network.
My Amazon home page shows me how much the company knows about me and my online activities. Here we show you which privacy and security settings can help you reduce the information Amazon holds about you.
Have you ever wondered how social networking sites seem to know so much about you and your preferences? We take the lid off how these sites gather data about your activities.
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
Maintaining privacy online seems almost impossible, but there are a tools that can minimise the chances of your personal, financial or business data falling into the wrong hands.
How much do you love your country? Enough to shop until you drop, choosing just the right gifts? If you're stumped on exactly what to give your favorite nation, we have the answers. Come on in!
Welcome to the official 2013 edition of our ZDNet DIY-IT Gift Guide. This year, in honor of 2013, we present to you 14 interesting and useful products that the DIY-ITer in your life will find particularly useful, fun, or cool.
A look back at the hot topics, major discoveries, and technological breakthroughs of 2012: from privacy to surveillance, major product launches, successes and catastrophes.
ZDNet looks back at the year, on a month-by-month basis, at some of the most publicized hacks, leaks and data breaches of 2012.
Thanksgiving is over, and we're heading into December. It's time for a look back at all the blunders, catastrophes, epic fails and major screw-ups of 2012.
During the year, we have seen the destruction of SOPA and PIPA but the emergence of CISPA and similar laws around the world, a growing trend in hacks and scams, an explosion in malware, and states committing cyberwarfare on their friends and foes. Here's a run-down of what happened in 2012.
At the Where 2.0 conference in San Jose, Calif., Deborah Estrin, a professor of computer science at UCLA, says the capability of GPS mobile phones to record location over time creates a new wealth of analytics. For example, new opportunities will exist where information is gathered from multiple users that better enables the accuracy of local traffic conditions.
There are no privacy issues with Google Street View, a Maps-based project that offers 360-degree panoramic views of various streets in cities around the US, according to Google Australia's head of engineering. At the Google developer day in Sydney last week, Lars Rasmussen denied that privacy was an issue when it came to Google Street View because, he said, the images are all taken in "public areas".
The success of the proposed Access Card rests on how the private sector puts it to use, according to Australian Federal Police (AFP) Commissioner Mick Keelty.Keelty believes the private sector may use the Access Card as a general ID card when its real purpose was to ensure that the "right people" receive access to needed government services such as Medicare.
Chertoff, secretary of the U.S. Department of Homeland Security, appears at the opening of the Joint Regional Intelligence Center in Norwalk, Calif., on Friday, Aug. 18, saying that his department is indeed concerned with privacy. The intelligence center joins federal, state and local law enforcement in one facility as part of a post-9/11 effort to improve law enforcement collaboration.
Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.
As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.
ZoneAlarm Security Suite puts Norton Internet Security and McAfee Internet Security to shame with its easy-to-use features.ZoneAlarm's Security Suite is one of the best security suites we've seen.
A well-designed program, Spy Sweeper is both classy and effective.Webroot Spy Sweeper 2.
The best of ZDNet, delivered
- 1 How to watch the NFL on the internet
- 2 Four privacy settings you should enable in iOS 7 immediately
- 3 Amnesty's Detekt tool wants to help you thwart government spying
- 4 Want to make money mining bitcoins? Criminals have you beat
- 5 Why the iOS 'Limit Ad Tracking' setting is more important than ever