Monthly Archive: December 2010


Hacking Incorporated: The Target is Your Wireless Data

In the Wireless Age, hackers are becoming big time entrepreneurs, joining forces with others in multinational white collar organizations dedicated to cybercrime. Their target is your wireless data.

Data Leaks: Apple Sued Over App Privacy

Two class-action lawsuits have been filed against Apple, alleging that the company does not do enough to enforce its privacy policy or restrict use of unique IDs, which is how advertisers track and identify individuals. This BBC News story suggests that one of the law firms may also sue Google as it feels that the Android applications leak personal data.

Attorney Crusades Against Spam Emails

An attorney who is “not your average Internet consumer” and sues companies he accuses of violating California’s anti-spam law is working to eradicate all forms of spam. Though this Associated Press article says such lawsuits are “mere rain drops in the ocean” as there are approximately 200 billion spam messages each day, accounting for 90% of all email.

Google Search: ‘This Site May Be Compromised’

This MSNBC post reports that Google has changed how some search results will appear to users. When doing a Google search, a notification may appear directly under the link that warns, “This site may be compromised.” Google says it will use “a variety of automated tools to detect common signs of a hacked site as quickly as possible.”

mobile apps

Mobile Anonymity: Get App-Smart

Do you like listening to Pandora and playing Angry Birds? Advertisers know it, too. Smartphone users are all but powerless to limit tracking among the apps they download, according to the findings of a new Wall Street Journal report that tested consumer privacy on 101 apps. Many companies allegedly sold consumer details gathered from these apps to various ad networks.

privacy policy

How Far is Too Far? (Part 1 of 2)

In Part 1 of this two-part series, Private WiFi CEO Kent Lawson discusses the extent of personal tracking that is taking place online – and what amount, if any, goes too far.

Fortifying Phones From Attackers

The Wall Street Journal reports on the evolving role of privacy and information security as more and more consumers and companies start doing business on their mobile devices. Case in point: AT&T has hired 13 PhDs in the last six months to focus on mobile security technology that detects and blocks malicious software from reaching mobile devices.

social media

Internet Security In a WikiLeaks Age

In this interview on The Huffington Post, a security adviser warns that “large-scale attacks on individual citizens, exploiting their online lives through bank accounts, social networking, and professional networks” could aim to “disrupt our connected lives.”