Monday, April 3, 2017

In mining user data, ISPs have to weigh cash vs. privacy

Broadband privacy: What happened, what it means and what you can do

Email not displaying correctly? View it in your browser.

Computerworld Security

Apr 03, 2017
Featured Image

In mining user data, ISPs have to weigh cash vs. privacy

U.S. internet service providers are about to face temptation. Now that the broadband privacy rule repeal is almost certain, will they sell their customers' data to marketers, or will they keep it private? Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Broadband privacy: What happened, what it means and what you can do
Google's Android hacking contest fails to attract exploits
Top 5 VPN services for personal privacy and security
Review: Consider VPN services for hotspot protection
What to look for in a VPN to protect your privacy
Triple your privacy with a Chromebook and two VPNs
Latest WikiLeaks dump exposes CIA methods to mask malware

Video/Webcast: AppNeta

Measuring Web App Performance Into and Across Cloud Providers

In this webinar, Alexander Verharen of ERP cloud software company QAD joins AppNeta to explain how QAD has improved its web user experience and the performance of its virtual hosts and platform servers. Hear firsthand about Alexander's real-world success! Read More

Thumbnail Image

Broadband privacy: What happened, what it means and what you can do

When Congress revoked FCC's broadband privacy rules, ISPs relaxed and privacy advocates cried foul. This collection of Computerworld articles explains the issues. Read More

Thumbnail Image

Google's Android hacking contest fails to attract exploits

Google offered to pay $200,000 to any researcher who could remotely hack into an Android device by knowing only the victim's phone number and email address. No one stepped up to the challenge for six months. Read More

Thumbnail Image

Top 5 VPN services for personal privacy and security

If you regularly travel or work remotely, you need to use a VPN or you're putting yourself — and your data — at risk. Here's a look at the options and price plans for some of the top VPNs. Read More

Thumbnail Image

Review: Consider VPN services for hotspot protection

We review 7 low-cost VPN services for when you're out of the office or out of the country. Read More

Thumbnail Image

What to look for in a VPN to protect your privacy

How much a VPN can protect your privacy or anonymity really depends upon which VPN you choose. Here are some things to look for in a VPN to best protect your privacy. Read More

Thumbnail Image

Triple your privacy with a Chromebook and two VPNs

In response to privacy invasions by Internet Service Providers, a Chromebook and two VPNs should offer great security, privacy and anonymity. Read More

Thumbnail Image

Latest WikiLeaks dump exposes CIA methods to mask malware

WikiLeaks may have dealt another blow to the CIA's hacking operations by releasing files that allegedly show how the agency was masking its malware attacks. Read More

White Paper: Lookout Mobile Security

Are You Prepared? The Future of Enterprise Mobile Security

As threats to enterprise mobility continue to intensify, the mobile security industry is evolving quickly. In this report, Lookout co-founders John Hering and Kevin Mahaffey share their predictions for what important new changes are coming and how you can best prepare your organization for success. Read More

Computerworld's 2017 Data+ Editors' Choice Awards: A Call for Case Studies

Computerworld is seeking case studies that illustrate intriguing ways data analytics is being used everywhere from research to commerce. Do you have an interesting case study on mining data for analysis, prediction and/or boosting the bottom line? A select group of the most innovative and fascinating case studies will be showcased in September. Case studies are due May 4. Submit a case study here

IT Salary Survey 2017: Tech pay holds tight (for now)

The 2017 IT Salary Survey results are in! Our annual survey shows steady pay increases -- but with predictions for IT spending and hiring all over the map, salaries could be in for a wild ride. You'll find our special report in the April issue of Computerworld's Digital Magazine, which also includes News Analysis, Opinion, Shark Tank, Security Manager's Journal, the Grill and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive