Blog Posts Tagged with "Facebook"
January 26, 2011 Added by:Headlines
"Let the hacking begin: If facebook needs money, instead of going to the banks, why doesn’t Facebook let its users invest in Facebook in a social way? Why not transform Facebook into a ‘social business’ the way Nobel Price winner Muhammad Yunus described it? http://bit.ly/fs6rT3 What do you think?"
January 25, 2011 Added by:Theresa Payton
Make sure you have a strong password on your accounts, and Review your Facebook profile to see how much information you share about yourself that could be used to impersonate you - high school attended, pet's name, favorite color, etc...
January 20, 2011 Added by:Headlines
"IPv6 experts say some Internet users will experience slowdowns or have trouble connecting to IPv6-enabled websites because they have misconfigured or misbehaving network equipment, primarily in their home networks. Corporate users also could experience IPv6 brokenness..."
January 19, 2011 Added by:Headlines
It seems unlikely that Facebook and Microsoft would be clueless as to the unsavory nature of Make-My-Baby and MakeMeOld's business practices given the level of revenue they generated. Sometimes it just takes a few good bloggers to keep multi-billion dollar companies on the straight and narrow...
January 18, 2011 Added by:Headlines
The pop-up now includes a request for permission to access the user's address and cell phone number. The change is subtle enough that most Facebook users are apt to allow the application to access this data without even noticing...
January 16, 2011 Added by:Ben Kepes
Douglass talks about the security of the Cloud and justifiably contrasts security with privacy. Contrasting these two aspects of the Cloud however does not give one the right to jump to the conclusion that private information will somehow be available to Government and non-Government agencies...
January 13, 2011 Added by:Rafal Los
On one end of the argument you must concede that in order to have an acceptable user experience you must be tracked to some acceptable extent, while the other end of the argument would say that we don't want web sites, vendors and nation-states/organizations tracking us and our browsing habits...
January 08, 2011 Added by:Danny Lieberman
Yes – there is apparently a White House directive to keep Wikileaks documents off Federal networks – according to a directive from the White House Office of Management & Budget on the treatment of classified documents...
January 08, 2011 Added by:Headlines
The DOJ requested subpoenas to access the Twitter accounts of WikiLeaks and several supporters in an ongoing criminal investigation of the whistleblower organization. The information sought includes residential, email and IP addresses, session times, billing records, and bank account details...
January 07, 2011 Added by:Robert Siciliano
It is evident that without some type of government oversight that the “self policing” done by all those who stand to gain financially by selling our data will continue to spin out of control to the point where privacy will be something of the past...
January 06, 2011 Added by:Robert Siciliano
Most major websites now install cookies on your computer, which track what you do online. Over time, these cookies develop a profile, which becomes your digital fingerprint, to a certain extent. Microsoft, Google, Facebook, and most major newspapers, retailers, and advertisers are in on the game...
January 03, 2011 Added by:Headlines
Whittaker warns that if this is your first attempt at securing your profile, there is a chance that the damage has already been done. Nonetheless, taking a few minutes of your time to implement guide's recommendations could save you many hours of heartache down the road...
January 02, 2011 Added by:Headlines
The ensemble does not focus solely on the pop-security issues that made the biggest headlines per se, but is instead a thoughtful examination of some of the stories that will prove to have the biggest impact and long term effects on the information security field as a whole...
December 29, 2010 Added by:Headlines
Some of the threats came from the usual suspects: criminal syndicates, hackers and all-around cyber miscreants. Other threats emanated from the activities of legitimate industry giants and even government agencies, reinforcing the fact that consumer privacy is under attack on multiple fronts...
December 23, 2010 Added by:Brent Huston
It’s human nature to fear the unknown. We don’t like to deal with things we don’t understand. Once upon a time, it might have been ok to just avoid what we didn’t know. But today’s world is becoming more and more reliant on machines, computers, and the Internet...
Making Sense of Split Tunneling ... Willsium h. Braone on 09-19-2014
Wireless Home Technologies Create Security R... mark lewis on 09-18-2014
Global Response to Snowden Disclosures Revea... chi nguyen on 09-18-2014