Privacy

888605c6c25c19e41bbbb986ea6d43c1

Reducing Your Digital Footprint

August 25, 2011 Added by:Jim Palazzolo

As individual's use certain resources such as cell phones or GPS devices, they leave behind information which is considered to be a part of their digital footprint. In this essay the writer conveys countermeasures that can be used to evade or reduce an individual's digital footprint...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Ceases Using Supercookies to Track Users

August 22, 2011 Added by:Headlines

“We don't really know what they were doing with this information, but it's not obvious what this explanation would be. The burden is on Microsoft to explain how it came to be there and how they used it and what they're going to do to make sure it doesn't happen again..."

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Mobile Application Settles With FTC on COPPA Violations

August 21, 2011 Added by:David Navetta

The FTC alleged that the company’s apps were directed to children and that the applications therefore violated COPPA and the FTC’s COPPA Rule by collecting and disclosing personal information from children without their parents’ prior consent...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Releases User Security Guide

August 19, 2011 Added by:Headlines

The guide offers some fairly good advice and illustrative graphics on how to spot common scams and other mischief. It is written in simple enough terms that you, your kids, and your grandparents can all increase your Facebook security outlook a great deal in a matter of only a few minutes...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Teen Tips for a Safe Cyber Summer

August 13, 2011 Added by:Kelly Colgan

Parents can’t supervise their teens around the clock. So how can you protect your fiercely independent, world-weary, tech-savvy teen—the one with the bad case of selective hearing—from trouble online? Let us do the talking with these tips...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

LinkedIn Ceases Using Member Profiles for Advertising

August 12, 2011 Added by:Headlines

LinkedIn has pulled a one-eighty after receiving overwhelming criticism for using member profiles, images and activity in an advertising campaign. The brunt of the criticism was the decision to "opt-in" members for participation automatically without first getting their expressed permission...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Are Hijacked Facebook Accounts Identity Theft?

August 08, 2011 Added by:Kelly Colgan

An interesting Appellate Court opinion was recently issued that requires us to acknowledge the expanding realm of our own identity footprints and the need for evolving views of how we define identity theft. The case stemmed from a Juvenile Court case in Kings county California...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Microsoft Database Tracks Laptops and Smart Phones

August 01, 2011 Added by:Headlines

The data collected includes device MAC addresses and corresponding street addresses, which could be used to identify individual users in what amounts to clandestine tracking of customer movements. In fact, staff at Cnet were able to retrieve very specific device tracking information...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anti-Stalking Law Threatens Protected Speech Online

August 01, 2011 Added by:Headlines

"The idea that the government should police every inflammatory word spoken online chills freedom of speech and goes against decades of First Amendment case law. The court must recognize social network users' right to speak freely online, even if that speech is unpopular or offensive to some..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Announces Partnership To Protect Kids Online

July 29, 2011 Added by:Headlines

"Now, more than ever, it is important that all Americans — adults and children alike — learn to protect themselves online and do their part to ensure that cyberspace is a safe and secure environment for all Internet users..."

Comments  (0)

F29746c6cb299c1755e4087e6126a816

FTC Panel: How to Protect Your Kids

July 26, 2011 Added by:Kelly Colgan

At the national level, representatives from government, business, nonprofits, legal services and victim advocacy organizations explored the nature, prevention and resolution of identity fraud that target children, particularly foster youths...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sneaky LinkedIn is Using Member Profiles for Advertising

July 25, 2011 Added by:Headlines

"When LinkedIn members recommend people and services, follow companies, or take other actions, their name/photo may show up in related ads shown to you. Conversely, when you take these actions on LinkedIn, your name/photo may show up in related ads shown to LinkedIn members..."

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Capitalizing on Privacy Practices

July 22, 2011 Added by:David Navetta

Businesses that put privacy into the design of their products and services are less likely to face consumer and regulatory backlash. Businesses may benefit in another way from protective privacy practices - this recent study indicates that it may be leveraged as a selling point...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What To Do If Your Gmail Account Has Been Hacked

July 21, 2011 Added by:Robert Siciliano

Once Kate went through this process, she regained control of her account within minutes. But the criminal had deleted every single email, leaving her with nothing. He’s probably going through those messages now, searching for any useful personal information...

Comments  (6)

3e35900ae6facc6c146a85c435c71d82

Surveillance or Security? New Wiretapping Technologies

July 20, 2011 Added by:Ben Rothke

Far too many books on privacy and surveillance are filled with hysteria and hyperbole and the threat of an Orwellian society. This book sticks to the raw facts and details the current state, that of insecure and porous networks around a surveillance society...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Researchers Develop No-Proxy Anonymity System

July 18, 2011 Added by:Headlines

"The client secretly marks the connection as a Telex request by inserting a cryptographic tag into the headers. We construct this tag using a mechanism called public-key steganography... only the Telex service (using a private key) can recognize that a connection has been tagged..."

Comments  (2)

Page « < 13 - 14 - 15 - 16 - 17 > »