Category Archives: Trendspotting

This Week In Privacy: Jan 9, 2009

Wired

Weak Password Brings ‘Happiness’ To Twitter Hacker
An 18-year-old hacker with a history of celebrity pranks has admitted to Monday’s hijacking of multiple high-profile Twitter accounts, including President-Elect Barack Obama’s, and the official feed for Fox News.

TechNewsWorld

Will 2009 Be the Year of Multiple Digital Identities?
Just days after Twitter was hacked, a group of entrepreneurs and policy activists gathered to discuss “Privacy 2009: The Year Ahead.” The discussion demonstrated that the privacy debate is starting to mature.

InternetNews

New Data Breach, Privacy Bills in Congress
One year after trying unsuccessfully to introduce legislation on data breaches and protection of individual privacy, California Senator Dianne Feinstein is trying again.

This Week In Privacy: Jan 2, 2009

CNET

A Funny Thing Happened On The Way To a Birthday Greeting
An interesting take on privacy and revealing a piece of information that most people wouldn’t think twice about when signing up for a new online account.

WOAI

The 500 Most Common Passwords
1 in 9 people use at least one password from this list and one out of 50 use one of the top 20 most common passwords. Is yours on the list?

ReadWriteWeb

Top Online Security Threats For 2009
One new infected Web page is discovered every 4.5 seconds. Here’s a look at the top security threats you should be looking out for in 2009.

This Week In Privacy: Dec 26, 2008

The Olympian

Watch Out For ID Theft While Online
If you have some gift money burning a hole in your pocket and want to grab online post-Christmas bargains, beware of ID thieves hoping to make you the next victim.

ZDNet

5 Security Precautions To Take For The Holiday Break
The following last-minute precautions should probably be on your To Do list for just before leaving the office this holiday.

The Recorder & Times

Internet Security Tests Show All’s Not Right In The City
Anyone with a laptop and the right software could slip onto someon’s home wireless network to steal bandwidth to get free internet access or worse to steal sensitive information.


This Week In Privacy: Dec 19, 2008

Lifehacker

Lessons Learned From A Hacked Gmail Account
Just as the title says – a few first hand lessons on what to do if you find out your email has been broken into, how to keep your email safe and tips on net security in general.

The Register

Browsers Fail Password Protection Test
Chapin Information Services ran a series of browser security tests and the results are pretty interesting when it comes to browsers such as Google Chrome and Safari.

Identity Theft Resource Center

ITRC’s Identity Theft Predictions For 2009
Every year the Identity Theft Resource Center (ITRC) shares its thoughts for the upcoming year. The following items are ITRC’s predictions for 2009.


Obama Gives Privacy the Spotlight

The 73% of Americans who use the web may be interested in reading just what tech-savvy President-elect Obama has planned for the future of the cloud and how it pertains to an all time Passpack favorite – privacy on the web.

Safeguarding Internet user’s right to privacy in Web 2.0 is not
always top of the agenda – after all the “social web” is somewhat
public ground, isn’t it?

You know how public information on the web can be if you:

  • post pictures to Facebook
  • tweet your mood on twitter
  • post opinion comments on blogs

But did you know this information could be just as public:

  • social security numbers
  • access codes
  • PIN numbers
  • emails/personal messages
  • confidential client info
  • passwords

All of this personally identifying information lives and circulates on the same web as do your holiday photos and favorite Amazon books.

That’s right, the new Chief Technology Officer that Obama will appoint has got his work cut out for him.

Sharing Privately

It may almost seem like a contradiction of terms but you already have an idea of how it works.

Let’s say you put your photos up on Flickr but don’t want everyone seeing them. You go to your Privacy Settings and decide who can read and see your stuff. Most social networking apps have privacy restrictions.

But there are some things that you want to share with everybody and some things that you want to share with fewer people or maybe just one person and no one else. Not even a server : )

*Remember you can limit your personal info down to networks, friends, individuals and even for your eyes only BUT any info you put on the Net, lives somewhere on a server. So how private can sharing really be?

Well, what if you made it so that anything you don’t want everyone seeing leaves your computer encrypted? So your driver’s license number, your PIN number or your passwords actually leave your browser encrypted, travel encrypted and get to your recipient encrypted so that the only person who will ever be able to read it is the person you are sending it to and no one else. Not even a server : )

Oh, shared host-proof hosting – you may have found your voice in the 44th US Presidency.

This Week in Privacy: Dec 12, 2008

Ars Technica

CDT to Obama: Advent of “the Cloud” Makes Privacy Laws Dated

The Center for Democracy and Technology issued a transition outlining measures president-elect Barack Obama should take to restore privacy safeguards… and to promote open discourse and innovation online.

Computer Finance

The value of Your Stolen Identity: About $120

The going rate for a “complete” identity (including name, address, passport, credit card info, driver’s license number, and even banking passwords): 120 bucks. That’s right – even passwords!

IT Pro

Councils Divided Over Data Detection

As many as 90 per cent of the UK’s largest city councils cannot guarantee that all sensitive data held on their laptops is encrypted, according to research released today.

And one more thing…

This Week In Privacy, Dec 5, 2008

CEO World Magazine

The Complete Guide to Internet Security and Privacy Issues!
51 fundamental useful links for anyone interested in privacy online and what it means, protecting yourself from identity theft and various other informative channels to security on the web. Certainly is a complete guide.

Market Watch

7 Steps to Worry Free Online Shopping
Here are seven easy steps to help avoid getting scammed while doing your holiday online shopping. And we couldn’t agree more with number 4 and number 5!

Network World

5 Must-Do Security Steps For Obama
Here’s an article that talks about the fragility of cyber infrastructure and what plans President Elect Obama has to strengthen it. A brief summary of the Obama plan.