Digital Privacy

Showing page 1 of 10 pages.

  • Heading Home for The Holidays? Watch Out for Holiday Hackers.

    Lots of people travel during the holidays. Your trip could be around the world or just across town. In either case, you don’t want the headaches of lost personal data to hound you on your journey. Rental cars, airport documents, and even browsing your phone at the departure gate can present data risks you don’t […] Read more

  • The Future of Identity Verification: How Concerned Should You Be About Biometrics?

    Apple iPhone users will soon be face-to-face with the future of identity verification. Apple’s new iPhone X will allow users to unlock their phones just by looking at the screen. The company’s new identity system, called Face ID, is an unlock protocol designed to replace Touch ID, Apple’s fingerprint-based system. If successful, iPhone X will […] Read more

  • The FBI Worries About Your Kid’s Toys. Are the Risks Overblown?

    Strange, but true. U.S. parents can now take some advice from the Federal Bureau of Investigation (FBI) along with them when they shop for new kids’ toys. The agency, which handles many cyber security issues nationwide, just issued a warning about interconnected toys that parents should read and heed. The Risks of Smart Toys “Toys […] Read more

  • Your New Car Is Spying on You. Can You Lock Down Your Privacy in the Age of Connected Vehicles?

    The future just pulled up in your driveway. Your new connected vehicle may be able to alert you to potholes in the road, point out traffic jams ahead, auto brake to avoid a crash, or even send weather data to a recording agency whenever you activate your windshield wipers. Features like remote start and the […] Read more

  • Who Is Watching You and Do You Care?

    Hungry for a slice of pizza? Think twice about frowning as you linger in line. A recent breakdown of a facial recognition system at an Oslo, Norway eatery gives a rare glimpse into ways businesses are using biometric technology to analyze customers. What they’re tracking may surprise you. Peppe’s Pizza in Oslo was using a […] Read more

  • Define Privacy to Secure It

    The concept of privacy has different meanings. For a teen, it can mean, “Get out of my room.” For an adult, it can mean, “I need to see your Facebook to know you’re safe.” For each individual, privacy can be an elusive, changeable concept but there are two things to agree on: privacy is important, […] Read more

  • The Latest Android Attacks

    Google’s Android operating system outranks Apple’s iPhone by a huge percentage, and hackers feel that targeting Android will yield the most results. Several new exploits aimed at Android systems show just how pervasive the problem has become and why every Android fan needs to be vigilant. 2 Million Download Malware! In late April, researchers at […] Read more

  • Hackers Grab W-2 Forms, Sell to Identity Thieves

    The list of companies reporting stolen W-2 forms is growing as hackers kick up their phishing schemes for the current income tax filing season. For employees, the challenge is determining if that new email in your inbox is really from the CEO. How you respond could put your entire workforce at risk for identity theft. […] Read more

  • VIZIO Pays Millions After Improper Data Collection

    VIZIO Inc, one of the world’s largest makers of smart TVs, has agreed to pay $2.2 million to settle charges it tracked and saved data on the viewing habits of 11 million customers without their consent. The Federal Trade Commission (FTC) and the State of New Jersey brought the case that charged VIZIO with unfair […] Read more

  • Celebgate Hacker Used Simple Phishing Tactics

    Celebgate was a hack heard—and seen—around the world in 2014 and this week, the man who pled guilty to leaking hundreds of nude celebrity photos, was sentenced to nine months in jail. Studying this sensational hack offers a valuable lesson—to explain how Edward Majerczyk, 29, from Chicago, gained access to the accounts of Jennifer Lawrence, […] Read more

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Follow us on Twitter

Follow us on LinkedIn