Is Amazon India on the verge of extending its online payments gateway to offline sellers and kiranas? And if so, what are the potential business implications and security risks for Indian organizations?
The subject of privacy has been debated ever since the release of the AP Shah Committee report on the subject. Kamlesh Bajaj, CEO of the Data Security Council of India, shares insights on how the nation's Data Privacy Act may finally be taking shape.
After the complete collapse of network security at Sony Pictures - in the wake of its data breach - it's important that we highlight some of the organization's fundamental security mistakes. Here's a macro view of the lessons we must all learn.
Who hacked Sony? Not us, say the North Koreans, ending days of silence. As Deloitte becomes the latest victim of the G.O.P. gang that's claimed credit, one thing is certain: Sony won't have to buy the movie rights to this hacking story.
The CEO of a Pakistani firm that developed a mobile spyware application called StealthGenie has pleaded guilty to U.S. charges of selling an illegal "interception device." Find out why one observer says the case could be precedent-setting.
European privacy watchdogs say Google and other search engines must comply with "right to be forgotten" link-removal requests not just on their European sites, but across all of their sites, raising fears of EU censorship run amok.
A year after Facebook received a bug report regarding a loophole in its app architecture, the vulnerability remains exploitable, says the researcher who discovered this potential threat to user privacy.
A new U.K. government report accuses social networks of serving as a "safe haven for terrorists," inflaming what some see as tense relations in the post-Snowden era between the British government and Silicon Valley.
Most citizens rightly don't trust the Internet as a voting booth. But the Atlantic Council's Jason Healey says that could change, not because of better security, but because the digital generation might demand it as they age.
Apple CEO Tim Cook traveled to China in the wake of allegations that hackers are targeting Chinese iCloud users. The Chinese government has denied any involvement in the attacks, which can bypass the latest iPhone's stronger encryption.
Apps for wearable devices that are designed to track a user's pulse rate, blood-oxygen level or location may be leaking that data during transmission, Symantec security researcher Candid WÃ¼eest warns in a Black Hat Europe briefing.
Amsterdam is again playing host to the annual Black Hat Europe information security gathering, and presenters have promised to cover everything from privacy flaws in wearable computers to two-factor authentication system failures.