Privacy

5e402abc3fedaf8927900f014ccc031f

Loyalty Cards vs. Privacy Concerns

May 13, 2011 Added by:Allan Pratt, MBA

When stores or restaurants offer a loyalty card, in exchange, the customer is asked to provide name, telephone number, email address, snail mail address, and possibly other defining characteristics or shopping preferences. But what happens to my confidential information?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI Surveillance: If We Told You, You Might Sue

May 12, 2011 Added by:Headlines

"These businesses would be substantially harmed if their customers knew that they were furnishing information to the FBI. The stigma of working with the FBI would cause customers to cancel the companies' services and file civil actions to prevent further disclosure of subscriber information..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Mozilla Defies DHS Internet Censorship Request

May 09, 2011 Added by:Headlines

Mozilla, the non-profit company behind the Firefox Web browser, has initially refused a Department of Homeland Security request to remove a third-party tool that allows users to circumvent government URL blocking efforts...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Assange Claims Automated Intelligence Gathering on Facebook

May 04, 2011 Added by:Headlines

"Facebook, Google, Yahoo – all these major US organizations have built-in interfaces for US intelligence. It’s not a matter of serving a subpoena. They have an interface that they have developed for US intelligence to use..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Docs Provide Details on FBI's Surveillance Spyware

May 03, 2011 Added by:Headlines

The documents do not specifically discuss how the Computer and Internet Protocol Address Verifier software is installed on target computers, but previous reports indicate that the tool may be distributed via browser vulnerabilities similar to those exploited by malicious malware...

Comments  (0)

Af9c34417f8e5e0d240850bb353b5d40

NSTIC: Questions I'd be Asking

May 01, 2011 Added by:Keith Mendoza

The NSTIC is still in its infancy. However, the White House is aggressively pushing for its implementation, and we will be seeing the Identity Ecosystem pretty soon. I just hope that these very basic questions are answered in a convincing way when that time comes...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Cookies and Your Privacy: Past, Present and Future

April 24, 2011 Added by:Theresa Payton

If restrictions to cookies become common place on the internet, the Internet Advertising Bureau will be forced to make major changes to the way they obtain information about internet users. This could alter the entire structure of internet advertising as we know it today...

Comments  (0)

29fb4966bdfcfff5545ae464c771071b

Is the NSTIC Strategy for a Passwordless System Viable?

April 21, 2011 Added by:Gurudatt Shenoy

Considering the acknowledgement by the White House itself that their own technology is pretty outdated at 10 years old, what hope is there that an elephant such as the government would move fast enough to provide a universal identity for Americans, one that would be truly universal?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Obama Outlines Strategy for Trusted Identities in Cyberspace

April 18, 2011 Added by:Headlines

This is NOT a government-mandated, national ID program; in fact, it's not an identity 'program' at all. This is a call by the administration to the private sector to step up, take leadership of this effort and provide the innovation to implement a privacy-enhancing, trusted system...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Representative Introduces Consumer Privacy Protection Act

April 18, 2011 Added by:Headlines

The legislation will define limits and the fair use of information collected by online marketers and retailers, and set forth provisions for better notifying consumers of their right to opt out of data collection...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Twitter Scam Hooks Thousands

April 15, 2011 Added by:Robert Siciliano

Twitter’s numbers are astounding. In the physical world, when communities become larger and more densely populated, crime rises. The same applies to online communities. Spammers, scammers, and thieves are paying attention...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Completed Tax Forms Inadvertently Posted Online

April 11, 2011 Added by:Headlines

In the majority of the instances where Chapman found sensitive documents that were indexed and searchable, the owners of the information did not realize that by placing the information on family and/or business websites, they were making the information publicly accessible...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Map IP Address Locations Within 700 Meters

April 08, 2011 Added by:Headlines

Computer scientist and researcher Yong Wang and his colleagues have developed a methodology to determine the physical location of Internet users. The researchers demonstrated they are able to pinpoint the location of an IP address on average to within about 690 meters...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Creepy iPhone Application Invites Security Risks

March 31, 2011 Added by:Robert Siciliano

Situationist is an iPhone app that alerts members to each other’s proximity and gets them to interact in random situations. Members simply upload their photo and pick the situations they want to happen to them in the knowledge that they might then occur anywhere, and at any time...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

LinkedIn Sued for Disclosing User IDs to Advertisers

March 31, 2011 Added by:Headlines

Referrer headers sent to the third parties contain a unique identifier that is associated with a cookie issued by LinkedIn. The suit maintains that this practice reveals sensitive information regarding the referring member's browsing habits and history...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Oklahoma State House Passes Smart Grid Privacy Bill

March 31, 2011 Added by:David Navetta

The Act seeks to establish standards to govern the use and disclosure of utility data (including personal information) by electric utilities, and requires electric utility companies to maintain the confidentiality of customer data and allow customers to access the data...

Comments  (0)

Page « < 13 - 14 - 15 - 16 - 17 > »