Stock market network reveals investor clustering

(PhysOrg.com) -- The stock price of a company continuously changes, going up or down depending on the collective activity of a large number of investors. Although this process seems fairly straightforward, no one fully understands ...

Quantum eavesdropper steals quantum keys

(PhysOrg.com) -- In quantum cryptography, scientists use quantum mechanical effects to encrypt and then communicate confidential information. Although quantum cryptography codes are unbreakable in principle, even the best ...

Security holes discovered in iPhones, iPads

A new security hole has opened up in Apple Inc.'s iPhone, iPad and iPod Touch devices, raising alarms about the susceptibility of some of the world's hottest tech gadgets to hacker attacks.

EMC's anti-hacking division hacked

The world's biggest maker of data storage computers on Thursday said that its security division has been hacked, and that the intruders compromised a widely used technology for preventing computer break-ins.

Interpol swoop nets 25 suspected 'Anonymous' hackers

Interpol has arrested 25 suspected members of the 'Anonymous' hackers group in a swoop covering more than a dozen cities in Europe and Latin America, the global police body said Tuesday.

Flaw found in securing online transactions

Researchers on Wednesday revealed a flaw in the way data is scrambled to protect the privacy of online banking, shopping and other kinds of sensitive exchanges.

page 1 from 10

Confidentiality

Confidentiality is an ethical principle associated with several professions (e.g., medicine, law). In ethics, and (in some places) in law and alternative forms of legal resolution such as mediation, some types of communication between a person and one of these professionals are "privileged" and may not be discussed or divulged to third parties.

Confidentiality of information, enforced in an adaptation of the military's classic "need to know" principle, forms the cornerstone of information security in today's corporations. The so called 'confidentiality bubble' restricts information flows, with both positive and negative consequences.

This text uses material from Wikipedia, licensed under CC BY-SA