Remove tag data-controller
article thumbnail

President’s Council of Advisors on Science and Technology Release Health IT Report

Hunton Privacy

has been focused on the two reports issued in December 2010 by the Federal Trade Commission and the Department of Commerce , a third government report has received far less press attention, but may have a greater impact on U.S. While much of the attention of the privacy policy community in Washington, D.C. business and consumers.

IT 40
article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

Welcome to The Hacker Mind, an original podcast from for all secure. Herfurt: My name is Martin Herfurt and I'm a security researcher. And the coffee spur was an attempt to show manufacturers of hands free sets that pre-programmed pin that cannot be changed by the user would not be the ideal way to handle security in this respect.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

billion locals' data. It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. It's also an era where this sort of information is constantly leaked to unauthorised parties; last year Equifax lost control of 145.5

Security 111
article thumbnail

Free Taxonomy & Folksonomy Book | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. The truth is, today’s workers - especially younger employees who have been virtually nursed on cell phones, iPods, IM and more - expect speed, simplicity and control. And they expect it now. All rights reserved.

Paper 40
article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. I asked a question from the floor about the benefits of standardization of mobile phone UI; Steve responded with the realities of service providers controlling much of mobile functionality. for Google?

article thumbnail

Microsoft Office Sharepoint Server: a next generation of deeper, wider content silos? | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Taxonomies and tagging, threaded discussion, wikis and other ‘Enterprise 2.0 ‘ tools are an alternative solution to the problem of generating mountains of hard to find silo’d information and associated email.

article thumbnail

The Future of the Web | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. By structuring the world’s data in this manner, the Freebase community is creating a global resource that will one day allow people and machines everywhere to access information far more easily and quickly than they can today.

Paper 45