privacy

ComputerWorldIndependent

Supreme Court: Your digital location is protected by the Constitution

Credit to Author: Lucas Mearian| Date: Fri, 22 Jun 2018 12:15:00 -0700

The U.S. Supreme Court today ruled that access to historical cell-site records of a person’s location based on their mobile phone will require law enforcement to obtain a warrant before searching a person’s historical location records.

This is the first time the high court has ruled on whether a phone subscriber has a legitimate expectation of privacy regarding a telephone company’s records of their cellphone location data, according to Aloke Chakravarty, a partner in the Denver-based law firm of Snell & Wilmer.

“This is a landmark case for privacy, and how the court will deal with emerging technologies going forward,” Chakravarty said via email. “It creates a new lens through which to view a government’s ability to obtain third-party records where a criminal defendant neither possesses the records, doesn’t have a property interest in them, may not even know they exist, and he cannot personally even access them.”

To read this article in full, please click here

Read More
ComputerWorldIndependent

Apple pushes privacy theme in Safari for iOS 12, 'Mojave'

Credit to Author: Gregg Keizer| Date: Fri, 22 Jun 2018 03:23:00 -0700

Apple upgrades its Safari browser on macOS and iOS just once a year, making the refresh more strategic than most of its rivals, notably Google, which last year had eight separate opportunities to add features or functionality to Chrome.

The next Safari, which will be bundled with macOS 10.14 ‘Mojave’ and iOS 12, and offered as a separate download for those who stick with macOS High Sierra (10.13) and Sierra (10.12), thus must make its enhancements count.

On the security and privacy side, Safari tries its hardest to build a case. Here are the important ways Apple’s browser – which shed user share on both the desktop and on mobile over the past year – has staked its reputation for the next 12 months.

To read this article in full, please click here

Read More
ComputerWorldIndependent

Is your company part of the GDPR 'mobile loophole'?

Credit to Author: Jack Gold| Date: Thu, 14 Jun 2018 08:13:00 -0700

Mobile tech, and especially mobile brought into companies through BYOD, has unique challenges for companies that need to comply with General Data Protection Regulations (GDPR) — and that’s virtually all companies, not just the ones in Europe. The regulations compel companies to manage personal data and protect privacy, and they provide individuals to have a say in what and how data about them is used.

GDPR has several disclosure and control requirements, such as providing notice of any personally identifiable data collection, notifying of any data breaches, obtaining consent of any person for whom data is being collected, recording what and how data is being used, and providing a right for people whose data is being collected to see, modify, and/or delete any information about them from corporate systems.

To read this article in full, please click here

Read More
MalwareBytesSecurity

Internet Safety Month: How to protect your child’s privacy online

Credit to Author: Jovi Umawing| Date: Tue, 12 Jun 2018 17:44:48 +0000

This month is Internet Safety Month, and today we’ll be talking about online privacy for children. For parents and caretakers, nothing could be more troubling than the thought of having your child’s personal information stolen and used by nefarious actors. In part one of this two-part series, we’ll discuss how parents can help kids and teens protect their online presence.

Categories:

Tags:

(Read more…)

The post Internet Safety Month: How to protect your child’s privacy online appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Tips for safe summer travels: your cybersecurity checklist

Credit to Author: Pieter Arntz| Date: Fri, 08 Jun 2018 15:00:00 +0000

A cybersecurity checklist for when you are about to travel or go on vacation, helps to prevent data-loss and other security issues.

Categories:

Tags:

(Read more…)

The post Tips for safe summer travels: your cybersecurity checklist appeared first on Malwarebytes Labs.

Read More