August 25, 2011 Added by:Jim Palazzolo
As individual's use certain resources such as cell phones or GPS devices, they leave behind information which is considered to be a part of their digital footprint. In this essay the writer conveys countermeasures that can be used to evade or reduce an individual's digital footprint...
August 22, 2011 Added by:Headlines
“We don't really know what they were doing with this information, but it's not obvious what this explanation would be. The burden is on Microsoft to explain how it came to be there and how they used it and what they're going to do to make sure it doesn't happen again..."
August 21, 2011 Added by:David Navetta
The FTC alleged that the company’s apps were directed to children and that the applications therefore violated COPPA and the FTC’s COPPA Rule by collecting and disclosing personal information from children without their parents’ prior consent...
August 19, 2011 Added by:Headlines
The guide offers some fairly good advice and illustrative graphics on how to spot common scams and other mischief. It is written in simple enough terms that you, your kids, and your grandparents can all increase your Facebook security outlook a great deal in a matter of only a few minutes...
August 13, 2011 Added by:Kelly Colgan
Parents can’t supervise their teens around the clock. So how can you protect your fiercely independent, world-weary, tech-savvy teen—the one with the bad case of selective hearing—from trouble online? Let us do the talking with these tips...
August 12, 2011 Added by:Headlines
LinkedIn has pulled a one-eighty after receiving overwhelming criticism for using member profiles, images and activity in an advertising campaign. The brunt of the criticism was the decision to "opt-in" members for participation automatically without first getting their expressed permission...
August 08, 2011 Added by:Kelly Colgan
An interesting Appellate Court opinion was recently issued that requires us to acknowledge the expanding realm of our own identity footprints and the need for evolving views of how we define identity theft. The case stemmed from a Juvenile Court case in Kings county California...
August 01, 2011 Added by:Headlines
The data collected includes device MAC addresses and corresponding street addresses, which could be used to identify individual users in what amounts to clandestine tracking of customer movements. In fact, staff at Cnet were able to retrieve very specific device tracking information...
August 01, 2011 Added by:Headlines
"The idea that the government should police every inflammatory word spoken online chills freedom of speech and goes against decades of First Amendment case law. The court must recognize social network users' right to speak freely online, even if that speech is unpopular or offensive to some..."
July 29, 2011 Added by:Headlines
"Now, more than ever, it is important that all Americans — adults and children alike — learn to protect themselves online and do their part to ensure that cyberspace is a safe and secure environment for all Internet users..."
July 26, 2011 Added by:Kelly Colgan
At the national level, representatives from government, business, nonprofits, legal services and victim advocacy organizations explored the nature, prevention and resolution of identity fraud that target children, particularly foster youths...
July 25, 2011 Added by:Headlines
"When LinkedIn members recommend people and services, follow companies, or take other actions, their name/photo may show up in related ads shown to you. Conversely, when you take these actions on LinkedIn, your name/photo may show up in related ads shown to LinkedIn members..."
July 22, 2011 Added by:David Navetta
Businesses that put privacy into the design of their products and services are less likely to face consumer and regulatory backlash. Businesses may benefit in another way from protective privacy practices - this recent study indicates that it may be leveraged as a selling point...
July 21, 2011 Added by:Robert Siciliano
Once Kate went through this process, she regained control of her account within minutes. But the criminal had deleted every single email, leaving her with nothing. He’s probably going through those messages now, searching for any useful personal information...
July 20, 2011 Added by:Ben Rothke
Far too many books on privacy and surveillance are filled with hysteria and hyperbole and the threat of an Orwellian society. This book sticks to the raw facts and details the current state, that of insecure and porous networks around a surveillance society...
July 18, 2011 Added by:Headlines
"The client secretly marks the connection as a Telex request by inserting a cryptographic tag into the headers. We construct this tag using a mechanism called public-key steganography... only the Telex service (using a private key) can recognize that a connection has been tagged..."
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015