Topic: legal

Avaya, Afiniti partner to bring unique AI-based contact center

Integrated offering from the two companies will drive significant performance, profit and productivity improvements for enterprise contact centers globally

Microsoft cites 24% jump in tech support scams

According to the FBI, cybercrooks have changed tactics and sometimes pose as government agents or tech support reps for GPS, printer or cable companies, or virtual currency exchangers.

N.Y. AG's scrutiny of cryptocurrencies unlikely to stymie a thriving industry

The New York Attorney General's office is looking into the practices and policies of cryptocurrency exchanges; experts say any ensuing regulation will likely protect investors while allowing the marketplace to continue growing.

sivarama-pwc_0_0.jpg
Top 10 priorities that will help Indian companies to embrace GDPR

On 25 May 2018, the EU General Data Protection Regulation (GDPR) comes into effect, giving regulators unprecedented power to impose fines, and requiring large-scale privacy changes across organizations if they conduct business in Europe.

Asia and Middle East a hotbed of new threat actors in Q1, 2018

Kaspersky Lab’s latest quarterly threat intelligence summary reveals a wave of new APT activity based mainly in Asia and the Middle East, with a number of new techniques used by actors.

bhabani-panda-CISO-Kwench.jpg
Involving ground-level employees in implementing GDPR is a challenge: Bhabani Panda, Kwench Global

The countdown to EU-GDPR implementation has begun; but has India Inc. overcome the challenges to adhere to the deadline? Bhabani Panda, CISO of Kwench Global reveals measures and how to handle the implementation process.

Raspberry-canakitbasic-100745038-orig.jpg
Best Raspberry Pi kits: 10 options for beginners and experienced makers

Our top picks range from basic Raspberry Pi starter kits to hardware bundles for specialized projects.

wireless-charging.jpg
Wireless charging over distance just got a boost

Companies developing wireless charging that can be projected up to several meters away have partnered with electronics industry stalwarts, paving the way for actual product shipments this year.

GrayKey-cellphone-security-100755339-large.jpg
GrayKey: What you need to know about this iPhone hacker and how to protect yourself

Updated information about a turnkey, automated cracking system marketed to law enforcement makes it clear users should pick longer passcodes.

A searchable glossary of wireless terms

From amplifier to wireless network topology, find concise definitions of wireless terminology

3.24 million records stolen or compromised in 2017: Gemalto Study

Gemalto Breach Level Index highlights improperly secured databases in the cloud and internal threats were the fastest growing security risks for companies.

Reputational risk and social media: When you're blocked or banned without notice

Businesses depend on sites like Facebook, Twitter, Dropbox, and Apple to interact with customers, promote their messages and store content. One complaint against you can shut you off from those services and damage your brand.