Have you heard of LinkedIn’s new “Intro” app? By rerouting your email through their servers, LinkedIn can scan and store all of your information in your emails, including contacts and email content. Are you sure you want a third party to be able to access all of this private information? Probably not. But that’s not all. Read on to discover why Intro sounds like a bad idea for your privacy.
Monthly Archive: October 2013
Some of us already know that wireless signals on an airplane are no different than wireless signals bouncing around Starbucks — they can leave you vulnerable to identity crooks and hackers. Yet most of us ignore that knowledge in order to take advantage of modern conveniences.
Check out what a Forbes author has to say about “all the other ways we blindly trust that our information will stay private” during flights and beyond.
Whenever you access a public WiFi network — especially a hotel’s wireless network — make sure that you are encrypting your data with a personal VPN. Because if you don’t take steps to protect your data, no one will. Click to find out why our online security at hotels is worse than ever.
Millennials are the most connected generation in history. But their ease with online technology and their propensity for sharing information on the Internet have led them to engage in risky online behavior, according to a new study by the defense contractor Raytheon. And that’s leading to an explosion of identity theft among young adults.
The Internet has nearly evolved into a basic life necessity equivalent to water, food, and shelter. But did you know that once you enter a store and use its free WiFi connection, you essentially become an open book. Stores can use data they retrieve from your phone and tailor a shopping experience.
Click to find out how and why retailers are leveraging the Internet to understand their customers’ habits — and potentially snoop on their personal information.
Dick Cheney received a pacemaker in 2007, and he was concerned enough to ensure that doctors removed its wireless capabilities in case any terrorist could gain access to it. These details are revealed in a new book called Heart, written both by Cheney and his cardiologist.
This news from Cheney reveals the hard truth about wireless devices or anything connected to a network: it’s always possible to hack into it.
Do you take steps to protect your online security when you connect to WiFi hotspots? Unfortunately, for one out of every three hotspot users, the answer to that question is “no,” according to a recent study by Kaspersky Lab and the research agency B2B International.
And that, along with other security lapses, has created a cybercrime explosion.
Yahoo is now recycling old email addresses — accounts that had not been used for 12 months or more. But something happened that the company didn’t plan for: new email owners started receiving emails intended for the original owner.
What are some of the ways you “hack” your online life? Check out some awesome Internet privacy tips and savvy security tricks featured in Intel’s #hackyourlife digital security infographic/video series. Some of these tips just might save your (financial) life — and you may even win a new Dell XPS 12 Ultrabook and will also find an exclusive deal for PRIVATE WiFi ($1 a month for three months — more than 90% off). We call that win-win!
Earlier this month Facebook announced its partnership with Cisco; the two tech companies have teamed up to provide free WiFi access at local businesses. On the surface the price-tag will be a measly Facebook check-in. In actuality, this “free” WiFi might end up costing users more than they know. Read on to learn more about how this program will work and what you can do to keep your data safe.
Smartphone advertising is the new frontier. Up until now, many advertisers had no way to access user data via a smartphone, so most advertising has been a shot in the dark. But all that has changed. Keep reading to find out how they are using your data — and how it affects your online privacy.
Did you know that the Department of Homeland Security has created a number of scholarship, fellowship, and internship programs to attract top talent? Check out what kind of college programs and other resources are being developed to train students in these very-important computer security initiatives.