Business Today: Latest Business News, India economy News, Stock Markets, Sensex, Mutual Funds and Indian Tax
Search

Total 1509 results found. Search for [ privacy ]

Results 1 to 21 of 1509
PTI
May 22, 2019



BusinessToday.In
May 22, 2019
The data of the Truecaller users including names, phone numbers and email addresses have been leaked and is up for sale on the interwebs


PTI
May 20, 2019



BusinessToday.In
May 20, 2019
Google scans the emails for clues of the transaction and then gathers them all and puts them up on a separate page


PTI
May 19, 2019



PTI
May 17, 2019



Deepa Deshpande
May 17, 2019
An ethics-driven approach to Data Governance encourages sound knowledge of data, protection laws, and the appropriate use of the technology that generates, analyses and propagates data.


PTI
May 16, 2019



PTI
May 15, 2019



Reuters
May 14, 2019
The agreement would resolve a probe of whether the company violated a similar consent pact reached in 2011


Reuters
May 13, 2019
P Chidambaram said a Congress government would tackle the deficiencies in data collection.


PTI
May 13, 2019



Nidhi Singal
New Delhi, May 13, 2019
Restricting apps' access to your smartphone's built-in features such as camera and microphone will plug data breaches and bolster security.


PTI
May 12, 2019



Nidhi Singal
May 9, 2019
While the final release of Android Q is still a few months away, the Beta can be installed on some of the top devices by Asus, Huawei, LG, Nokia, OnePlus, Oppo, Realme, Sony, Vivo, Xiaomi, and the existing Pixel smartphones


Reuters
May 9, 2019
\"We are a nation with a tradition of reining in monopolies, no matter how well intentioned the leaders of these companies may be. Mark's power is unprecedented and un-American,\" Hughes wrote in a opinion piece.


PTI
May 9, 2019



PTI
May 8, 2019



Nidhi Singal
May 8, 2019
Unlike closed source that is accessible only by its creator, open source usually refers to the platform that is publicly accessible for inspecting, development, and modification as well as sharing


Manu Kaushik
New Delhi, May 8, 2019
'One of the other findings is that malware was not the first entry point into an organisation. It was hacking. Malware comes at the second or third stage of the compromise,' said Anshuman Sharma


PAGES 1 OF 76  12345