more on Wechat in this IMS blog:
more on Wechat in this IMS blog:
Bullying is not just a relation between bully and victim. It’s really a three-way relation, between bully, victim and everyone who refuses to do anything about the aggression
By Richard Matthews Jul 31, 2017
Phishing is likely to get only more sophisticated.
Based on my experience in Tallinn, we will see companies become more transparent in how they deal with cyber attacks. After a massive cyber attack in 2007, for example, the Estonian government reacted in the right way.
free anti-phishing software
more on phishing in this IMS blog
hackers can access your credit card data wirelessly, through something called radio frequency identification, or RFID
card has a tiny RFID sensor chip. These chips are supposed to make life easier by emitting radio signals for fast identification. The technology helps keep track of livestock and inventory. It makes automatic payment on toll roads and faster scanning of passports possible, and, starting around 2004, brought us contactless payment with certain credit cards.
REI and other companies sell a range of RFID-blocking products and say the number of customers looking for travel bags and credit card sleeves has been growing. That’s despite the fact that the percentage of credit cards with RFID chips in the U.S. is extremely small.
Still, people are worried about electronic pickpocketing — worried enough to strap on RFID-blocking fanny packs, even skinny jeans. In 2014, the San Francisco-based clothing company Betabrand partnered with Norton Security to create the first pair of denim with RFID protected pockets.
Eva Velasquez, president of the Identity Theft Resource Center, says from a consumer perspective, deciding whether to invest in RFID-blocking technology is all about evaluating risk. In the next few years, there will undoubtedly be millions more of these cards on the market.
if you’re worried about e-pickpocketing but don’t want to spend much money, you can make your own blocking wallet or wrap your cards or passport in a thick piece of aluminum foil. According to Consumer Reports, that works as well as most RFID protectors on the market.
more on cybersecurity in this IMS blog
Amy Elisa Jackson, Glassdoor Mar. 15, 2017, 10:45 AM
cyber security experts say that weaving your personal and professional lives together via a work laptop is risky business — for you and the company. Software technology company Check Point conducted a survey of over 700 IT professionals which revealed that nearly two-thirds of IT pros believed that recent high-profile breaches were caused by employee carelessness.
more on privacy in this IMS blog
more on surveillance in this IMS blog:
more on surveillance and privacy in this IMS blog
By Sri Ravipati 05/12/17
A hacker going by the name “nclay” claims to have stolen more than 77 million user accounts from Edmodo
LeakBase yesterday Tweeted that the top domains for the data breach include:
more on Edmodo in this IMS blog
Eliza, 29, said she’d mostly abandoned using swipe apps for their intended purpose. “Tinder transitioned from being a thing where I actually wanted to meet people to being, ‘I’m bored, tell me I’m pretty,’” she said. “I don’t really meet people on it anymore.”
Talking to women in their 20s and 30s about the ways they avoid swipe burnout (or at least make swiping more pleasant), almost all of them said basically the same thing as Serena, 34: “I can only stand dating apps at this point because I delete them frequently. It feels less like a full-time job that way.” She was contemplating joining Match.com, one of the oldest and most traditional dating sites, in hopes that it might mean sifting through fewer profiles in search of decent, mature people looking to go on real dates.
more on Tinder in this IMS blog:
more on dating apps in this IMS blog
By Richard Chang 04/17/17
according to a new report from the nonprofit Electronic Frontier Foundation (EFF), “Spying on Students: School-Issued Devices and Student Privacy”
shows that state and federal laws, as well as industry self-regulation, have failed to keep up with a growing education technology industry.
One-third of all K–12 students in the United States use school-issued devices running software and apps that collect far more information on kids than is necessary.
Resource-poor school districts can receive these tools at deeply discounted prices or for free, as tech companies seek a slice of the $8 billion ed tech industry. But there’s a real, devastating cost — the tracking, cataloging and exploitation of data about children as young as 5 years old.
Our report shows that the surveillance culture begins in grade school, which threatens to normalize the next generation to a digital world in which users hand over data without question in return for free services
EFF surveyed more than 1,000 stakeholders across the country, including students, parents, teachers and school administrators, and reviewed 152 ed tech privacy policies.
“Spying on Students” provides comprehensive recommendations for parents, teachers, school administrators and tech companies to improve the protection of student privacy. Asking the right questions, negotiating for contracts that limit or ban data collection, offering families the right to opt out, and making digital literacy and privacy part of the school curriculum are just a few of the 70-plus recommendations for protecting student privacy contained in the report.
more on students and privacy
The organization released thousands of documents it claims show how the US spy agency can crack open devices from Apple, Samsung, Google and Microsoft.
Laura Hautala https://www.cnet.com/news/wikileaks-cia-hacking-tools-phones-apple-samsung-microsoft-google/
This debate took off when the US Department of Justice sought to require Apple to help it open an encrypted iPhone belonging to one of the San Bernardino shooters. After Apple fought back in court, the FBI said it had obtained another way to access the phone.
Apple, Google and Motorola declined to comment on WikiLeaks’ claims. Samsung didn’t respond to a request for comment.
“The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption,” said Moxie Marlinspike, the founder of Signal. “This story isn’t about Signal or WhatsApp, but to the extent that it is, we see it as confirmation that what we’re doing is working.”
Telegram said on its website that the problem lies with operating systems and not encrypted messaging apps and that naming specific encrypted services is “misleading.” WhatsApp declined to comment.
more on surveillance in this IMS blog
Previous 1 2 3 4 Next