Mattel will sell a cloud-connected $75 "Hello Barbie" doll that can "listen" to what kids are saying and talk back. But security experts warn that anything that connects to the Internet can - and will - be hacked.
"Align technology with businesses" is an old phrase. But information security is now part of this change, making strides to align with growth as a business enabler. Enter: the converged technology operations center.
As cybercrime grows, Section 66A of India's IT Act is under scrutiny of the court, government and security leaders. Some experts say it requires amendments to ensure correct interpretation and implementation.
Reflecting on the ramifications of the "Digital India" and "Make in India" initiatives, R Chandrasekhar, president of NASSCOM, says it is time for Indian lawmakers to adopt comprehensive privacy legislation.
President Obama says his proposed cybersecurity budget is designed to help prevent foreign nations or hackers from shutting down American networks, stealing trade secrets or invading the privacy of American families.
The subject of privacy has been debated ever since the release of the AP Shah Committee report on the subject. Kamlesh Bajaj, CEO of the Data Security Council of India, shares insights on how the nation's Data Privacy Act may finally be taking shape.
After the complete collapse of network security at Sony Pictures - in the wake of its data breach - it's important that we highlight some of the organization's fundamental security mistakes. Here's a macro view of the lessons we must all learn.
Who hacked Sony? Not us, say the North Koreans, ending days of silence. As Deloitte becomes the latest victim of the G.O.P. gang that's claimed credit, one thing is certain: Sony won't have to buy the movie rights to this hacking story.
A new U.K. government report accuses social networks of serving as a "safe haven for terrorists," inflaming what some see as tense relations in the post-Snowden era between the British government and Silicon Valley.
How relevant is ROI when demonstrating security to senior management? How seriously do Indian organizations take the practice of privacy? Sagar Karan, CISO at Fullerton India, shares his insights on these topics.
Apple CEO Tim Cook traveled to China in the wake of allegations that hackers are targeting Chinese iCloud users. The Chinese government has denied any involvement in the attacks, which can bypass the latest iPhone's stronger encryption.
Apps for wearable devices that are designed to track a user's pulse rate, blood-oxygen level or location may be leaking that data during transmission, Symantec security researcher Candid WÃ¼eest warns in a Black Hat Europe briefing.
Amsterdam is again playing host to the annual Black Hat Europe information security gathering, and presenters have promised to cover everything from privacy flaws in wearable computers to two-factor authentication system failures.