privacy

SecurityTrendMicro

What HIPAA and Other Compliance Teaches Us About the Reality of GDPR

Credit to Author: Greg Young| Date: Thu, 03 May 2018 14:00:46 +0000

with contributing author, William J. Malik, CISA | VP, Infrastructure Strategies The date for General Data Protection Regulation (GDPR) compliance is three months away, yet many organizations, especially those outside Europe, remain unprepared. It turns out that the experiences from other privacy compliance regulations are less helpful than assumed, but the best lessons learned may be…

The post What HIPAA and Other Compliance Teaches Us About the Reality of GDPR appeared first on .

Read More
SecurityTrendMicro

PROTECTING YOUR PRIVACY – Part 2: How to Maximize Your Privacy on Social Media and in Your Browser

Credit to Author: Trend Micro| Date: Wed, 02 May 2018 15:44:51 +0000

As social media sites become a bigger part of users' daily lives, they must be increasingly careful about their online privacy.

In the last post we highlighted the privacy risks associated with using popular social networking sites and browsers. You might not appreciate just how much of your personal data is being accessed by advertisers and other third parties via your social media accounts and internet browsing. Similarly, your privacy settings may have changed significantly since…

The post PROTECTING YOUR PRIVACY – Part 2: How to Maximize Your Privacy on Social Media and in Your Browser appeared first on .

Read More
SecurityTrendMicro

PROTECTING YOUR PRIVACY – Part 1: The Privacy Risks of Social Networks and Online Browsing

Credit to Author: Trend Micro| Date: Tue, 01 May 2018 13:00:23 +0000

Most Americans today spend many of their waking hours online. In fact, we’re up to spending an average of five hours per day just on our mobiles. Much of this time is spent browsing the web or checking in, updating and sharing via our favorite social networks. There’s just one problem: unless you have your…

The post PROTECTING YOUR PRIVACY – Part 1: The Privacy Risks of Social Networks and Online Browsing appeared first on .

Read More
MalwareBytesSecurity

Please don’t buy this: smart toys

Credit to Author: William Tsing| Date: Fri, 27 Apr 2018 16:00:00 +0000

Smart toys attempt to offer what a lot of us imagined as kids—a toy that we can not only play with, but one that plays back. Many models offer voice recognition, facial expressions, hundreds of words and phrases, reaction to touch and impact, and even the ability to learn and retain new information. These features provide…

Categories:

Tags:

(Read more…)

The post Please don’t buy this: smart toys appeared first on Malwarebytes Labs.

Read More
ComputerWorldIndependent

The best privacy and security apps for Android

Credit to Author: JR Raphael| Date: Tue, 24 Apr 2018 03:00:00 -0700

Let’s get one thing out of the way right off the bat: If you’re looking for recommendations about Android security suites or other malware-scanning software, you’ve come to the wrong place.

Why? Because, like most people who closely study Android, I don’t recommend using those types of apps at all. Android malware isn’t the massive real-world threat it’s frequently made out to be, and Google Play Protect and other native Android features are more than enough to keep most devices safe.

To read this article in full, please click here

Read More