February 23, 2011 Added by:Rafal Los
It’s a matter of balance. And right now the marketers and business leaders who see value in using personal information are much louder and more actively pursuing their exploitation of personal information than those who are trying to ensure privacy is addressed...
February 21, 2011 Added by:Headlines
The advent of new media like social networks, new communications channels like IM, IRC, VoIP, and new devices like smartphones, have rendered current laws governing wire tapping outdated, and officials want lawmakers to narrow the gap by addressing the issue with new legislation...
February 10, 2011 Added by:Headlines
"Starting Thursday all Google users can choose to turn on a so-called 'two-factor authentication' feature, which will require them to type in a special, short-lived second password in addition to their normal password to get into their account..."
February 09, 2011 Added by:Headlines
The MPAA has apparently issued more than 100 warnings to Google regarding copyright infringement over the last few months. The MPAA warnings are usually directed at P2P file sharing users who trade movies online, but sending them to Google is enforcement on a whole new level...
February 09, 2011 Added by:Rafal Los
Recently, I had the opportunity to exchange thoughts with Rebecca Herold, and talk about the erosion of privacy on the Internet, and specifically in social media. The topic is fascinating, as there appears to be an artificial adversarial relationship between anonymity and privacy...
February 08, 2011 Added by:Headlines
The researchers produced a tool that uses statistical analysis to calculate the relative uniqueness of any given username. The team can now distinguish a single user about half of the time by analyzing multiple usernames without using other key data such as location or date of birth...
February 05, 2011 Added by:Theresa Payton
Judge rules photos posted online are not privacy protected. If this ruling becomes precedent, you may have problems with bringing forward complaints or lawsuits on ANY future photos of you or loved ones, that are posted without your permission...
February 04, 2011 Added by:Headlines
Facebook has reconciled a major privacy vulnerability that left members susceptible to social engineering exploits and data theft. The flaw may have allowed users to unwittingly spread malware to their contacts and provided malicious websites access to private account information...
February 03, 2011 Added by:Headlines
Facebook has made steady progress in their efforts to offer better security, but it remains the responsibility of account holders to make sure they are utilizing all of the security features. One allows members to monitor their profile for any unauthorized access to their Facebook account...
February 01, 2011 Added by:David Navetta
Companies that handle personal information, especially those that provide online behavioral advertising services, and those that purchase or participate in such services, should consider a risk assessment of their policies, processes and activities in order to reduce legal risks...
January 29, 2011 Added by:Theresa Payton
If you went to the airport, bank, or a store today, you probably expected to be watched. But those are the old school ways of being watched. Now, the smartphone in your pocket could watch you or your laptop webcam can watch you. Having an emotional reaction? There's a wristband monitor for that...
January 26, 2011 Added by:Headlines
"In the privacy realm, the bottom line is that law enforcement is talking about having a massive amount of information on 230 million presumably innocent Americans using the Internet, being tracked and retained," offered John Morris of the Center for Democracy and Technology in testimony...
January 22, 2011 Added by:Theresa Payton
An early draft of the plan indicates that the implementation would be handled via the U.S. Commerce Department and not Department of Homeland Security or the National Security Agency. Experts feel this may be in a nod to privacy concerns...
January 18, 2011 Added by:Headlines
The pop-up now includes a request for permission to access the user's address and cell phone number. The change is subtle enough that most Facebook users are apt to allow the application to access this data without even noticing...
January 13, 2011 Added by:Rafal Los
On one end of the argument you must concede that in order to have an acceptable user experience you must be tracked to some acceptable extent, while the other end of the argument would say that we don't want web sites, vendors and nation-states/organizations tracking us and our browsing habits...
January 08, 2011 Added by:Headlines
The DOJ requested subpoenas to access the Twitter accounts of WikiLeaks and several supporters in an ongoing criminal investigation of the whistleblower organization. The information sought includes residential, email and IP addresses, session times, billing records, and bank account details...
Why Bother with Security? [If you’re going... Westley McDuffie on 12-12-2013
Are Security Professionals Exiting the Enter... Westley McDuffie on 12-12-2013
The Security Risks of Remote Support Tools ... Amanda Martin on 12-11-2013