Archive for the ‘Information Privacy’ Category

Is privacy a dependency of information security

Is privacy a dependency of information security? by Jamie Titchener If you read the news on a regular basis, you will find that most of the cyber security or data protection articles play heavily on the fear of an individual’s privacy being compromised. But what many people don’t seem to realize is that privacy is in fact a dependency […]

Leave a Comment

Hack-proof your life: A guide to Internet privacy in 2014

A guide to Internet privacy to a hack-proof Life Keith Wagstaff NBC News It’s no secret that 2013 wasn’t a great year for Internet privacy. Former National Security Agency contractor Edward Snowden leaked thousands of classified documents that revealed the depths of the agency’s electronic surveillance program. Users had their information stolen en masse from […]

Leave a Comment

Unreasonable searches and drone killings

Peter Scheer @ SFChronicle.com on June 12, 2013 – Open Forum on NSA’s snooping First came news accounts of the government’s use of armed drones in the targeted killing of terrorists abroad. Then came the revelations about government surveillance programs, breathtaking in their scale, tapping into data on phone calls, e-mails, Internet searches and more. […]

Comments (1)

Why you should care about your digital privacy?

Surveillance Countermeasures When we use internet browser for a web search, social media site, communication (skype), buy something from a site, we are leaving digital tracks all over the internet. Your service provider of the above services have access to this information because they are collecting  this treasure trove to identify and figure out what […]

Leave a Comment

Top 10 ways to avoid being tracked online

By Stacey Vanek Smith 1. Read the agreements for all mobile phone apps before you download them. Some of them are scary! They will track your location using your GPS and some (like Facebook) will download ALL OF THE CONTACTS IN YOUR PHONE. Can’t remember who you’ve handed your data to? MyPermissions can help. 2. […]

Leave a Comment

The End of Online Privacy? Fight the Internet Snooping Bill!

The End of Online Privacy? Fight the Internet Snooping Bill! (Must watch/share) HR1981 would force the company you pay for Internet access to store a year’s worth of personal data and hand it over at the request of law enforcement. For sake of protecting childern from Pornographers does not mean that you start collecting everybody […]

Comments (1)

Privacy and Law

Your personal info is manageable and controlable most of the time as far as privacy is concern , until you have to use it for commercial use (to apply cxredit card, to apply for bank account or to apply for a job). then it depends on these commercial entities how they are goning to use, […]

Leave a Comment

How safe is your personal information on social network?

With corporations, criminals and governments all looking to capture your information via the internet, how safe are you once you logon? How to Be Invisible How Disappear Erase Digital Footprint

Comments (1)

U.S. Underwrites Internet Detour Around Censors

By JAMES GLANZ and JOHN MARKOFF The Obama administration is leading a global effort to deploy “shadow” Internet and mobile phone systems that dissidents can use to undermine repressive governments that seek to silence them by censoring or shutting down telecommunications networks. The effort includes secretive projects to create independent cellphone networks inside foreign countries, […]

Comments (3)

Alex Jones Exposes Google’s Plan to Dominate the Internet

Net Neutrality at Stake – Check it out how it matters to your privacy and security Expolre the titles below if Net Neutrality matters to you

Leave a Comment

GPS ON CELL PHONES CAMERAS a PRIVACY ISSUE

Big GOVERNMENT & CRIMINALS ADVANTAGE OVER US Anyone who’s posted cell photos online: The bad guys can now tell the EXACT location where photos were taken. more on how privacy is at risk and possible safeguards

Leave a Comment

Digital Photocopiers Loaded With Secrets

How a digital copier can become a treasure trove for an identity thief, because they have a hard drive which permanently store all images which have been digitally printed, scanned, faxed, emailed or copied on that printer. Storing images on the hard drive can be a huge threat to the security of an organization and […]

Leave a Comment

How a digital copier can be a treasure trove for a identity thief

How a digital copier can become a treasure trove for an identity thief, because they have a hard drive which permanently store all images which have been digitally printed, scanned, faxed, emailed or copied on that printer. Storing images on the hard drive can be a huge threat to the security of an organization and […]

Comments (3)

Senate Panel Clears Data Breach Bills

Image via WikipediaLegislation Heads for a Senate Vote November 5, 2009 – Eric Chabrow, Managing Editor The Senate Judiciary Committee Thursday approved two companion bills that would require businesses and government agencies to notify individuals of security breaches involving sensitive personally identifiable information. Both bills go to the Senate for consideration. The Personal Data Privacy […]

Leave a Comment

Growing social networks and widening threats

Image by Matt Hamm via FlickrThe worm targeted a social network Twitter with four attacks and created havoc for couple of days. This worm happens to self replicated itself when clicked on but didn’t steal 6 million users personal information. According to SF chronicle article by Michael Liedtke (Apr. 14 2009, c2) Twitter deleted 10,000 […]

Comments (2)

Social networks and revealing anonymous

Image via CrunchBase Privacy is a fundamental human right and in US a constitutional right. Advancement in technology are breaking every barrier to our privacy; at this rate individuals will be stripped of their privacy unless we enact policy protections. In this situation we need to define reasonable privacy for a society in general while […]

Comments (1)

Telcos and information privacy

Image via Wikipedia With the economy in the tank, breach of privacy is not going to be a priority in Obama’s administration to do list. It will be quite difficult to make it a priority when Obama has signed a bill indemnifying telcos from suits due to privacy breaches. During the presidential election campaign, Verizon […]

Comments (4)

Skype and Information Privacy

According to an SF chronicle article by Peter Svensson (Oct 3, 2008, pg. c4) “A Canadian researcher (Nart Villeneuve) has discovered that the Chinese version of eBay Inc.’s Skype communication software snoops on text chats that contain keywords like “democracy”. “ In other words, the Chinese version of Skype was used for surveillance of text […]

Comments (6)