May 23, 2011 Added by:Robert Siciliano
With the openness of social media, predators know what a kid likes, doesn’t like, who their friends are, and often their phone numbers, where they live, go to school, sports teams they play on etc. The list goes on and on...
May 23, 2011 Added by:Rafal Los
Sadly, as your privacy shrinks - or as you give more and more of it away - the possibility of that crazy night in "Sin City" will follow you not just to work on Monday, but maybe to the next time a hacker is trying to penetrate your applications attack surface...
May 20, 2011 Added by:Headlines
"Even officials within the Justice Department itself are concerned that the FBI's secret legal theory jeopardizes privacy and government accountability, especially considering the FBI's demonstrated history of abusing surveillance law," said EFF Senior Staff Attorney Kevin Bankston...
May 13, 2011 Added by:Allan Pratt, MBA
When stores or restaurants offer a loyalty card, in exchange, the customer is asked to provide name, telephone number, email address, snail mail address, and possibly other defining characteristics or shopping preferences. But what happens to my confidential information?
May 12, 2011 Added by:Headlines
"These businesses would be substantially harmed if their customers knew that they were furnishing information to the FBI. The stigma of working with the FBI would cause customers to cancel the companies' services and file civil actions to prevent further disclosure of subscriber information..."
May 09, 2011 Added by:Headlines
Mozilla, the non-profit company behind the Firefox Web browser, has initially refused a Department of Homeland Security request to remove a third-party tool that allows users to circumvent government URL blocking efforts...
May 04, 2011 Added by:Headlines
"Facebook, Google, Yahoo – all these major US organizations have built-in interfaces for US intelligence. It’s not a matter of serving a subpoena. They have an interface that they have developed for US intelligence to use..."
May 03, 2011 Added by:Headlines
The documents do not specifically discuss how the Computer and Internet Protocol Address Verifier software is installed on target computers, but previous reports indicate that the tool may be distributed via browser vulnerabilities similar to those exploited by malicious malware...
May 01, 2011 Added by:Keith Mendoza
The NSTIC is still in its infancy. However, the White House is aggressively pushing for its implementation, and we will be seeing the Identity Ecosystem pretty soon. I just hope that these very basic questions are answered in a convincing way when that time comes...
April 24, 2011 Added by:Theresa Payton
If restrictions to cookies become common place on the internet, the Internet Advertising Bureau will be forced to make major changes to the way they obtain information about internet users. This could alter the entire structure of internet advertising as we know it today...
April 21, 2011 Added by:Gurudatt Shenoy
Considering the acknowledgement by the White House itself that their own technology is pretty outdated at 10 years old, what hope is there that an elephant such as the government would move fast enough to provide a universal identity for Americans, one that would be truly universal?
April 18, 2011 Added by:Headlines
This is NOT a government-mandated, national ID program; in fact, it's not an identity 'program' at all. This is a call by the administration to the private sector to step up, take leadership of this effort and provide the innovation to implement a privacy-enhancing, trusted system...
April 18, 2011 Added by:Headlines
The legislation will define limits and the fair use of information collected by online marketers and retailers, and set forth provisions for better notifying consumers of their right to opt out of data collection...
April 15, 2011 Added by:Robert Siciliano
Twitter’s numbers are astounding. In the physical world, when communities become larger and more densely populated, crime rises. The same applies to online communities. Spammers, scammers, and thieves are paying attention...
April 11, 2011 Added by:Headlines
In the majority of the instances where Chapman found sensitive documents that were indexed and searchable, the owners of the information did not realize that by placing the information on family and/or business websites, they were making the information publicly accessible...
April 08, 2011 Added by:Headlines
Computer scientist and researcher Yong Wang and his colleagues have developed a methodology to determine the physical location of Internet users. The researchers demonstrated they are able to pinpoint the location of an IP address on average to within about 690 meters...
Join the Security Intelligence Network on Li... Robin Joan on 01-25-2015
Steps Toward Weaponizing the Android Platfor... Robin Joan on 01-25-2015
Today's Mobile Device Data Protection Must G... Robin Joan on 01-25-2015