Data Privacy

SecurityTrendMicro

Today’s Predictions for Tomorrow’s Internet

Credit to Author: Rik Ferguson (VP, Security Research)| Date: Thu, 19 Oct 2017 13:00:36 +0000

Making predictions is a tricky business and in no area more so than in the area of rapidly developing technology. The pace of change continues to accelerate and the nature of innovation is such that entrepreneurs, as well as criminals are continually searching for “the next big thing” to either benefit or to blight our…

Read More
SecurityTrendMicro

Ransomware is Here to Stay: So How Do I Protect My Data?

Credit to Author: Michael Miley| Date: Tue, 22 Aug 2017 13:00:32 +0000

Recently, brand new open source ransomware samples were discovered that demonstrate specific characteristics showing that the enterprise community is more of a target than ever.Ransomware is the gift that keeps on giving for cybercriminals. Google research revealed recently that online extortionists have managed to grab more than $25 million from their victims over the past two years. Other estimates suggest businesses and netizens handed over as much as $1 billion in 2016 alone. Whatever the final figure, it’s clear…

Read More
SecuritySophos

Safari userà l’intelligenza artificiale per rintracciare chi ti traccia

Credit to Author: Sophos Italia| Date: Thu, 15 Jun 2017 16:35:43 +0000

Improvvisamente, i browser web sono tornati ad essere interessanti per la crescente attenzione degli utenti nei confronti della privacy. Apple ha utilizzato la sua Worldwide Developers Conference (WWDC) per annunciare un paio di nuove funzionalità per Safari su macOS High Sierra previsto entro la fine di quest&#8217;anno. La prima vedrà il browser in grado di [&#8230;]<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=39957&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/8SO_aVEkT5Y” height=”1″ width=”1″ alt=””/>

Read More
ComputerWorldIndependent

Appeals court gives Wikimedia thumbs up to sue NSA for 'Upstream' surveillance

Credit to Author: Darlene Storm| Date: Wed, 24 May 2017 08:26:00 -0700

Well, well, well, the NSA may not waltz away legally unscathed after spying on Americans’ private communications due to the dogged determination of the Wikimedia Foundation, the ACLU, the Knight First Amendment Institute at Columbia University and eight other co-plaintiffs.

The 4th US Circuit Court of Appeals ruled to give Wikimedia a chance to legally challenge the NSA’s mass surveillance as being unconstitutional. The government has previously argued that the NSA’s Upstream warrantless spying is authorized under Section 702 of the Foreign Intelligence Surveillance Act. Thanks to Upstream surveillance, the NSA sucks up and searches through American’s international internet communications.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Missing protection: Corporate B2B privacy policies

Credit to Author: Evan Schuman| Date: Tue, 16 May 2017 04:00:00 -0700

Read More
ComputerWorldIndependent

NSA ends surveillance tactic that pulled in citizens' emails, texts

Credit to Author: Michael Kan| Date: Sun, 30 Apr 2017 07:01:00 -0700

The U.S. National Security Agency will no longer sift through emails, texts and other internet communications that mention targets of surveillance.

The change, which the NSA announced on Friday, stops a controversial tactic that critics said violated U.S. citizens’ privacy rights.

The practice involved flagging communications where a foreign surveillance target was mentioned, even if that target wasn’t involved in the conversation. Friday’s announcement means the NSA will stop collecting this data.

“Instead, this surveillance will now be limited to only those communications that are directly ‘to’ or ‘from’ a foreign intelligence target,” the NSA said in a statement.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Honesty is not the best privacy policy

Credit to Author: Mike Elgan| Date: Sat, 15 Apr 2017 04:00:00 -0700

Digital privacy invasion is more than a theoretical or actual threat to our freedoms. It’s also a huge distraction.

Take MIT genius Steven Smith. He’s recently taken time away from his specialties of radar, sonar, and signal processing at MIT’s Lincoln Laboratory to automate the pollution of his family’s web traffic with thousands of arbitrary searches and sites.

His code essentially lies about internet activity to whomever is listening.

The software is an artful liar. According to a piece in The Atlantic, Smith’s algorithm uses web activity-spoofing software called PhantomJS to conduct searches in a way and on a timeline that mimics normal human online behavior.

To read this article in full or to leave a comment, please click here

Read More
SecurityTrendMicro

Why Scammers Want Your Tax Returns (and how to stop them)

Credit to Author: Jon Clay| Date: Thu, 13 Apr 2017 12:00:02 +0000

Hackers very often have to handle a lot of money, and keep it away from the authorities.It’s almost here – April 18, tax day in the U.S. As businesses and employees prepare their tax returns, cybercriminals are once again ramping up efforts to steal this information, and they are getting more intelligent every year.    How it works Business Email Compromise (BEC) scams have been on the rise since 2016, and…

Read More