Information Security Laws, Investigations and Ethics

Information Security Laws, Investigations and Ethics News

  • March 06, 2015 06 Mar'15

    Adobe's new twist on bug bounty programs: No cash for bug hunters

    News roundup: Bug bounty programs can offer big rewards to researchers, unless Adobe is handing out the prizes. Plus: Signal 2.0 encryption app; app cloning risk increasing; Angler adopts 'domain shadowing' capability.

  • February 06, 2015 06 Feb'15

    Budget, breach law highlight growing federal cybersecurity awareness

    News roundup: With the proposed 2016 federal budget and push for a national data breach law, Washington may finally care about cybersecurity. Plus: Coviello to retire; Flash patched again; Sony Pictures breached by Russians and loses its co-chair.

  • December 12, 2014 12 Dec'14

    Sony Pictures hacking back: The ethics of obfuscation

    News roundup: Amid a devastating breach incident Sony Pictures is fighting back, raising legal and ethical questions. Plus: A big week in security acquisitions; Comcast sued over open Wi-Fi; and Yahoo announces vulnerability disclosure policy.

  • October 31, 2014 31 Oct'14

    Verizon's mobile persistent cookie is more trick than treat

    News roundup: Verizon gave its mobile users an early Halloween trick: a cookie that cannot be erased, despite a number of privacy concerns. Also: compromising an air-gapped computer over the air; an alleged government-funded hack against a CBS ...

View All News

Information Security Laws, Investigations and Ethics Get Started

Bring yourself up to speed with our introductory content

  • wiretapping

    Wiretapping is the surreptitious electronic monitoring of telephone, telegraph, cellular, fax or Internet-based communications. Wiretapping is achieved either through the placement of a monitoring device informally known as a bug on the wire in ... Continue Reading

  • privacy policy

    A privacy policy is a document that explains how an organization handles any customer, client or employee information gathered in its operations. Most websites make their privacy policies available to site visitors.  A privacy page should specify ... Continue Reading

  • I-SPY Act -- Internet Spyware Prevention Act of 2005 (H.R. 744)

    The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.R. 744), is a bill in the U.S. Congress that would criminalize the unauthorized use of spyware, phishing, and other methods of using the Internet to obtain sensitive ... Continue Reading

View All Get Started

Evaluate Information Security Laws, Investigations and Ethics Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Product Reviews

Powered by IT Central Station View All Evaluate

Manage Information Security Laws, Investigations and Ethics

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Information Security Laws, Investigations and Ethics Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close