March 31, 2011 Added by:Robert Siciliano
Situationist is an iPhone app that alerts members to each other’s proximity and gets them to interact in random situations. Members simply upload their photo and pick the situations they want to happen to them in the knowledge that they might then occur anywhere, and at any time...
March 31, 2011 Added by:Headlines
Referrer headers sent to the third parties contain a unique identifier that is associated with a cookie issued by LinkedIn. The suit maintains that this practice reveals sensitive information regarding the referring member's browsing habits and history...
March 31, 2011 Added by:David Navetta
The Act seeks to establish standards to govern the use and disclosure of utility data (including personal information) by electric utilities, and requires electric utility companies to maintain the confidentiality of customer data and allow customers to access the data...
March 27, 2011 Added by:Robert Siciliano
It has become apparent that the conveniences of technology have outpaced consumers’ security intelligence. It is possible to secure systems in a way that will defeat most criminal activity, but that level of security comes with inconveniences that the consumer may not be equipped to handle...
March 26, 2011 Added by:Theresa Payton
On Guard Online states that 22% of 16-24 year olds using social networking do not know who they are sharing their information with. It is that exact age range that is most at risk for invasion of privacy. This age group needs more education about the dangers of sharing too much information...
March 25, 2011 Added by:David Navetta
Consider the relatively hostile regulatory and legal environment that Internet tracking companies currently face. The WSJ's year-long What They Know investigation into online tracking exposed a fast-growing network of hundreds of companies that collect highly personal details about Internet users...
March 25, 2011 Added by:Headlines
"Typically AT&T customers’ data would have routed over the AT&T network directly to Facebook’s network provider but due to a routing mistake their private data went first to Chinanet then via Chinanet to SK Broadband in South Korea, then to Facebook..."
March 20, 2011 Added by:David Navetta
Companies are well advised to take proactive approach to compliance with privacy and information security laws, regulations, guidelines and best practices. The FTC expects businesses to collect, use, disclose and process personal information in a fair and transparent way...
March 18, 2011 Added by:Headlines
"If the company cannot address and resolve these issues for those who are seeking secure communications, then vulnerable users will continue to be exposed to avoidable risks. Skype's misleading security assurances continue to expose users around the world to unnecessary and dangerous risk..."
March 17, 2011 Added by:Headlines
The new feature allows users the option to "Always Use HTTPS". Among other security benefits, the HTTPS feature will prevent users from having their login credentials stolen by Firesheep attackers when logging in to their accounts over unencrypted Wi-Fi connections...
March 15, 2011 Added by:Headlines
US Magistrate Judge Theresa Buchanan has granted a Department of Justice request to access information in the Twitter accounts of WikiLeak's Julian Assange and several supporters in an ongoing criminal investigation of the whistleblower organization...
March 14, 2011 Added by:David Navetta
Privacy-related lawsuits are on the rise, and this time Amazon.com is the target. On March 2, 2011, two named plaintiffs filed a class-action lawsuit alleging that Amazon circumvents browser privacy settings to collect users’ personal information without permission and shares the information with third parties...
March 14, 2011 Added by:Headlines
“Twitter has engaged in a number of practices that, taken together, failed to provide reasonable and appropriate security to: prevent unauthorized access to nonpublic user information and honor the privacy choices exercised by its users in designating certain tweets as nonpublic..."
March 09, 2011 Added by:Headlines
Users are asked to allow the service's application to interface with their LinkedIn, Facebook, and Twitter accounts. According to Cluley's research, potentially thousands of people have already done so. The problem is, no one is entirely sure what Connect.me is...
March 07, 2011 Added by:Robert Siciliano
"Step out your front door and you could be captured in a high-resolution photograph taken from the air or street by Google or Microsoft... Drive down a city thoroughfare, cross a toll bridge, or park at certain shopping malls and your license plate will be recorded and time-stamped...”
March 07, 2011 Added by:Headlines
A central issue is the inability of new communications platforms to collect and store the kind of data law enforcement needs to pursue indictments, and current laws do not require the service providers to store the information. That may all change soon...
Don’t Let Your Guard Down: Tragedies Pave ... Assignment Master on 09-17-2014
Today's Mobile Device Data Protection Must G... abdul bari Chanessra on 09-15-2014
Seven “Sins” of Cyber Security... abdul bari Chanessra on 09-15-2014