Privacy

37d5f81e2277051bc17116221040d51c

Banks Need You to Be Responsibly Secure

March 27, 2011 Added by:Robert Siciliano

It has become apparent that the conveniences of technology have outpaced consumers’ security intelligence. It is possible to secure systems in a way that will defeat most criminal activity, but that level of security comes with inconveniences that the consumer may not be equipped to handle...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Social Media Privacy Implications for Teens

March 26, 2011 Added by:Theresa Payton

On Guard Online states that 22% of 16-24 year olds using social networking do not know who they are sharing their information with. It is that exact age range that is most at risk for invasion of privacy. This age group needs more education about the dangers of sharing too much information...

Comments  (1)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Privacy a Key Concern for Venture Capital Firms

March 25, 2011 Added by:David Navetta

Consider the relatively hostile regulatory and legal environment that Internet tracking companies currently face. The WSJ's year-long What They Know investigation into online tracking exposed a fast-growing network of hundreds of companies that collect highly personal details about Internet users...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

AT&T's Facebook Traffic Mysteriously Routed Through China

March 25, 2011 Added by:Headlines

"Typically AT&T customers’ data would have routed over the AT&T network directly to Facebook’s network provider but due to a routing mistake their private data went first to Chinanet then via Chinanet to SK Broadband in South Korea, then to Facebook..."

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Privacy Enforcement: FTC Settles with Twitter and Chitika

March 20, 2011 Added by:David Navetta

Companies are well advised to take proactive approach to compliance with privacy and information security laws, regulations, guidelines and best practices. The FTC expects businesses to collect, use, disclose and process personal information in a fair and transparent way...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Privacy International Warns of Skype Security Concerns

March 18, 2011 Added by:Headlines

"If the company cannot address and resolve these issues for those who are seeking secure communications, then vulnerable users will continue to be exposed to avoidable risks. Skype's misleading security assurances continue to expose users around the world to unnecessary and dangerous risk..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Twitter Offers "Always Use HTTPS" Security Feature

March 17, 2011 Added by:Headlines

The new feature allows users the option to "Always Use HTTPS". Among other security benefits, the HTTPS feature will prevent users from having their login credentials stolen by Firesheep attackers when logging in to their accounts over unencrypted Wi-Fi connections...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Judge Allows Access to WikiLeaker's Twitter Accounts

March 15, 2011 Added by:Headlines

US Magistrate Judge Theresa Buchanan has granted a Department of Justice request to access information in the Twitter accounts of WikiLeak's Julian Assange and several supporters in an ongoing criminal investigation of the whistleblower organization...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Class-Action Lawsuit Alleges Data Privacy Violations

March 14, 2011 Added by:David Navetta

Privacy-related lawsuits are on the rise, and this time Amazon.com is the target. On March 2, 2011, two named plaintiffs filed a class-action lawsuit alleging that Amazon circumvents browser privacy settings to collect users’ personal information without permission and shares the information with third parties...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Twitter Settles with FTC Over Data Privacy and Security

March 14, 2011 Added by:Headlines

“Twitter has engaged in a number of practices that, taken together, failed to provide reasonable and appropriate security to: prevent unauthorized access to nonpublic user information and honor the privacy choices exercised by its users in designating certain tweets as nonpublic..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Social Networkers Blindly Joining "Connect.me"

March 09, 2011 Added by:Headlines

Users are asked to allow the service's application to interface with their LinkedIn, Facebook, and Twitter accounts. According to Cluley's research, potentially thousands of people have already done so. The problem is, no one is entirely sure what Connect.me is...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Dealing With Daily Digital Surveillance

March 07, 2011 Added by:Robert Siciliano

"Step out your front door and you could be captured in a high-resolution photograph taken from the air or street by Google or Microsoft... Drive down a city thoroughfare, cross a toll bridge, or park at certain shopping malls and your license plate will be recorded and time-stamped...”

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Five Communications Channels Feds May Soon Wiretap

March 07, 2011 Added by:Headlines

A central issue is the inability of new communications platforms to collect and store the kind of data law enforcement needs to pursue indictments, and current laws do not require the service providers to store the information. That may all change soon...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Privacy Enforcement Storm: HHS, FTC and FINRA Act

March 03, 2011 Added by:David Navetta

If your organization does not have a privacy program in place, now is the time to act. Legal compliance function, vendor management and appropriate security provisions in vendor and customer agreements are just a few of the hallmarks of a program that could help avoid enforcement actions...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Are Internet Cookies Good or Bad?

February 25, 2011 Added by:Robert Siciliano

Several companies use cookies as well as other technologies, such as tokens, along with sophisticated and unique pattern matching that can only be derived from extensive and unique experiences with a shared reputation database, to identify and re-identify devices...

Comments  (1)

53692ae1a8e713373b8a487ce89ee3e2

Dispelling The Myths Of Facebook Privacy And Security

February 24, 2011 Added by:Tom Eston

One common misconception is that applications “look and feel” like they are part of Facebook so the applications can be trusted. This is not true. The Facebook API (Application Programming Interface) is designed to allow seamless integration so it provides users with a more integrated Facebook experience...

Comments  (3)

Page « < 14 - 15 - 16 - 17 - 18 > »