Blog Posts Tagged with "geo-location"
You Down with UDID? Yeah, You Know Me...
September 13, 2012 Added by:Tripwire Inc
The Internet is chock full of databases that map UDIDs to usernames, activities, location data, game scores, ad clicks as well as Facebook and other social media profiles. Even if you deleted an application from your phone the data can still persist in the Cloud...
Comments (0)
California Location Privacy Bill Passes Assembly
August 26, 2012 Added by:Electronic Frontier Foundation
The bill requires law enforcement to obtain a search warrant anytime it requests location information from an electronic device. It codifies the Supreme Court's decision from earlier this year that the installation of a GPS device for purposes of an investigation requires a search warrant...
Comments (0)
Do You Use Foursquare?
August 05, 2012 Added by:Allan Pratt, MBA
If we don’t continue to raise issues about online privacy and security, websites and their companies’ leadership will continue to demand access to our confidential information under the pretense of doing business, or in scarier terms, doing business as usual. One website that causes concern is Foursquare...
Comments (1)
I Know What You Tweeted Last Summer...
July 04, 2012 Added by:Theresa Payton
We have mentioned before that Twitter will send every tweet to the National Archives and the Library of Congress, so watch what you tweet. Now new tools unleash a trove of data in moments. For the 140 million and growing user base that tweets over 400 million tweets per day, this might be a little more than alarming...
Comments (0)
Social Media Security: What Parents Should Worry About
June 21, 2012 Added by:Kelly Colgan
There’s no shortage of cautionary tales about social media risks for children. They’re all over the news. In a recent Harris Interactive poll, parents said their top concerns included sexual predators, cyberbullying and a desire to monitor their children’s activities online and on mobile phones...
Comments (0)
SKYPE Privacy Flaw: What Happened?
May 20, 2012 Added by:Theresa Payton
We recently learned Skype has known about a bug that shows your IP address, which can let someone track you and your account down to the city level. How long have they known about it? According to one group - for 18 months. Sometimes online services providers just don’t care...
Comments (0)
Have You Read the New Facebook Privacy Rules… Again??
May 18, 2012 Added by:Theresa Payton
They know your location, and they confirm what they grab whenever you connect to Facebook: “We receive data from the computer, mobile phone or other device you use to access Facebook. This may include your IP address, location, the type of browser you use, or the pages you visit”...
Comments (2)
Warrantless Cell Phone Tracking, Drones, and FBI Surveillance
April 19, 2012 Added by:Electronic Frontier Foundation
Documents prove warrantless cell phone tracking “has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show...
Comments (1)
On Location-Based Services Security
April 09, 2012 Added by:Robert Siciliano
Social networking sites are incorporating location-based services that allow users to broadcast their locations. Carnegie Mellon University has identified more than 80 services that either lack privacy policies or collect and save user data for an indefinite period...
Comments (0)
Applications Need to Respect User Rights From the Start
March 28, 2012 Added by:Electronic Frontier Foundation
By installing and authorizing an app, users don’t know how much information they are handing over. Without details about policies and practices, how confident can they be in the security of that data against the threat of subpoenas, intrusions, or rogue employees?
Comments (0)
Twelve Security Best Practices for USB Drives
March 06, 2012 Added by:Kelly Colgan
Portable and mobile storage devices are significant players in most corporate offices. Ensuring proper protection with a best practices policy and strict enforcement offers significant risk reduction—and can prevent long nights on data breach investigations...
Comments (1)
Twelve Security Best Practices for USB Drives
February 07, 2012 Added by:Kelly Colgan
Portable and mobile storage devices are significant players in most corporate offices. Ensuring proper protection with a best practices policy and strict enforcement offers significant risk reduction—and can prevent long nights on data breach investigations...
Comments (1)
Mobile Security: Android vs. iOS - An Infographic
January 12, 2012 Added by:Fergal Glynn
With the dominance of iOS and the rising popularity of Android devices in the mobile marketplace, the security of these devices is a growing concern. This infographic examines the security features of Android and iOS, and also takes a look at their strengths and weaknesses...
Comments (1)
Ten Tips to Stay Safe on Cyber Monday
November 16, 2011 Added by:Allan Pratt, MBA
Cyber Monday is the day when all employers cringe. They know that many employees will spend a portion of their work hours making online holiday purchases instead of working. Here are some tips to stay safe on the largest online activity day of the year...
Comments (0)
Location, Location, Location
October 11, 2011 Added by:Christopher Burgess
Location based services have great viability and increase the interaction between individuals and merchants, as well as serve to identify individuals with similar interests. Know that well-intentioned services have a positive side, but also may also be used to your detriment...
Comments (0)
Coalition Petitions Court on Domestic GPS Surveillance
October 06, 2011 Added by:Headlines
"The government can use location information over time to learn where you go to church, what sort of doctors you go to, what meetings and activities you participate in, and much more. Police should not have blanket permission to install GPS devices and collect detailed information..."
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider