Quantcast
Last updated on April 18, 2014 at 9:36 EDT

Latest Internet privacy Stories

2014-01-27 23:04:01

Protect your business from online fraud and abuse using device fingerprinting linked to over two hundred tests on user profile and history. Saratoga Springs, NY (PRWEB) January 27, 2014 E-HAWK (http://www.e-hawk.net) today added advanced device fingerprinting as part of their Online Vetting Platform and API, giving clients enhanced levels of protection against fraudulent activities, registrations, and account hijacking. The fingerprint is linked to risk level analysis of user data...

2014-01-27 16:27:49

Organization Also Seeks Volunteers for Conference Track Committees SEATTLE, Jan. 27, 2014 /PRNewswire-USNewswire/ -- The Cloud Security Alliance (CSA), a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, today issued a Call for Papers and Call for Track Committee Volunteers for its annual CSA Congress 2014 scheduled to take place September 17-19, 2014, at the San Jose Convention Center in San Jose,...

Chrome Bug Lets Sites Eavesdrop
2014-01-24 09:48:04

redOrbit Staff & Wire Reports - Your Universe Online Computers running Google’s Chrome browser are vulnerable to attacks that let malicious websites activate the microphone and listen in on nearby conversations for extended periods of time, even after the user has left the website. The exploit was revealed by Israeli web developer Tal Ater, who discovered the vulnerability while working on his own speech recognition software. “Even while not using your computer -...

NSA Surveillance Illegal
2014-01-23 14:21:59

Peter Suciu for redOrbit.com – Your Universe Online On Thursday an independent federal privacy watchdog that was called upon to review the National Security Agency (NSA) surveillance program offered its opinion that the program to collect bulk phone calls should be shut down. The findings, which were presented in a 238-page report, noted that the program provided only “minimal” benefits in counterterrorism and security efforts, and that the program is also illegal. This...

2014-01-23 11:20:06

Surveillance minimization - where surveillance is the exception, not the rule - could help rebuild public trust following revelations about the collection of personal data, according to a law academic from the University of East Anglia. Dr Paul Bernal, whose research covers privacy, surveillance and human rights, says the role of government surveillance and of surveillance by commercial groups and others must be reconsidered. He suggests surveillance minimization as a way forward and...

2014-01-22 23:23:52

In a post on their website, Michael Maxstead, CEO of VPNReviewz, announced that the website would be starting an annual provider awards presentation. Oklahoma City, Oklahoma (PRWEB) January 22, 2014 In a post on their website, the Senior Editor and CEO of VPNReviewz proclaimed that the site would be starting an annual provider awards presentation to reward their providers that go a little further to satisfy their customers. In the post entitled, “Announcing The First Annual VPNReviewz...

2014-01-22 23:22:51

The Privacy Professor® shares tips to control your digital footprint. Des Moines, Iowa (PRWEB) January 22, 2014 Gov. Terry Branstad has proclaimed Tuesday, January 28, 2014, as the fifth annual Data Privacy Day in the state of Iowa to coincide with International Data Privacy Day. This day marks an important opportunity to encourage Iowans to be aware of data privacy concerns in today’s digital society and to take steps to protect personal information. Des Moines-based and...

2014-01-22 23:04:19

ThreatMetrix Shares Strategies For Implementing Effective Security Measures Without Disrupting Authentic Users And Compromising Privacy San Jose, CA (PRWEB) January 22, 2014 ThreatMetrix™, the fastest-growing provider of integrated cybercrime prevention solutions, continues its alignment with Data Privacy Day by announcing several strategies for businesses to change the economics of data breaches and identity theft through global trust intelligence. The Identity Theft Resource Center...

2014-01-22 12:22:57

BOSTON, Jan. 22, 2014 /PRNewswire/ -- Skyhook Wireless, the inventors of Wi-Fi and hybrid positioning announced a partnership with CAMS LLC - the leader in providing online operators with payment connectivity, geolocation and Know Your Customer (KYC) verification services - to provide Wi-Fi location services in the state of New Jersey. On November 21st, the state of New Jersey authorized online gaming. According to NJ.com, Governor Chris Christie anticipates online gaming will...

2014-01-22 08:33:50

SANTA MONICA, Calif., Jan. 22, 2014 /PRNewswire-USNewswire/ -- Google's social network, Google+, relies on a flagrant and fundamental privacy design flaw that is an unfair business practice, Consumer Watchdog said today in a formal complaint to the Federal Trade Commission. In addition, the nonprofit, nonpartisan public interest group said that the Internet giant's plan to link Google+ accounts to Gmail, so that a user can send an email to a Gmail account, without knowing the address...


Latest Internet privacy Reference Libraries

secure_email
2012-07-01 22:51:38

Email encryption refers to encryption and authentication of email messages, which is typically done to protect content from being read by unintended recipients. Email technology is readily available but has yet to achieve widespread usage, most likely due to social factors, such as people seeing the use of encryption as paranoid, and as marking a message urgent whether it is or not. A recent survey (from January 2012) found that only 35 percent of companies have implemented email...

More Articles (1 articles) »