CEO Kent Lawson explores “the dark side” of hackers — a scary reality that many of us choose to ignore. He says many people ask, “Why would any hacker want to steal information from me? I don’t have anything that interesting to steal. I’m sure I’m safe.” Unfortunately, usually the first indication we get that we are a victim of identity theft is when we get our bank statement. Read on for a step-by-step look at how victims — maybe YOU one day — are targeted, as well as security steps to implement NOW!
The Private WiFi Blog Blog
Nearly 100% of U.S. teens go online and the majority are using wireless devices to do it. When you add free public WiFi access points at parks, libraries, cafes and entire cities to the equation, parental controls are history.
Child identity theft occurs when a minor’s identity is used by another person for personal gain. The perpetrator may be a family member or someone known by the family. It could also be a complete stranger who purposely targets children. Because of the lengthy time between the theft of the information and the discovery of the crime, children are a primary target for identity thieves. The period between malicious use of the identity and discovery of that use can be many years, usually happening when the child reaches 18 and starts to establish their own credit file.
Did you know that Facebook claims legal ownership of whatever we upload to them? Turns out you have no right to retrieve your information or any ability to permanently delete it. As CEO Kent Lawson reports in this article, that is just one example of a “downside” to sharing data, photos, or other sensitive personal information via “the cloud,” which is simply a metaphor for the Internet. Not ready to lose control of your personal information? Then keep reading to learn more about “the cloud” — where it’s been and, more importantly, where it’s going.
Private Communications Corporation Launches Software to Protect Consumer Data Transmitted over Unencrypted Public Wifi Networks
For Immediate Release Private Communications Corporation Launches Software to protect Consumer Data Transmitted over Unencrypted Public Wifi Networks PRIVATE WiFi®...
More than 50% of Americans use Facebook, but what about the younger demographic; should they be allowed to use social media sites? In this post we discuss Everloop, the new and “safe” social network for tweens.
So you take pictures with your smartphone and post them online. What’s the worst thing that could happen? What personal information could possibly be exposed? Where’s the threat? Unfortunately, even as careful as some people may be about sharing personal information online, they may be unwittingly exposing information through a process called “geotagging.” Geotagging is the embedding of geospatial information into media files.
You may want to turn off the GPS in your camera, according to CEO Kent Lawson. His new post explores the security risks in sharing photos via email, Facebook, Flickr, or any other photo-sharing site, since the date, the time, and even the location, are easily accessible and could fall into the wrong hands.
Hacking unsecured wireless networks at hotels is easier and safer than robbing guests’ rooms or cracking their safes. For cybercriminals in search of an easy target, the payoff is much bigger.
If you think home wireless networks are safe from hackers, a new British study might change your mind. It found that half of home WiFi networks can be hacked in less than five seconds. Is U.S. wireless security any better?
CEO Kent Lawson discusses the recent political unrest in Egypt, the role of social networking in the digital revolution, and how, in this day and age, a country simply cannot function without the Internet.
Location Based Services are becoming more popular than ever. On smartphones, users are making the technology mainstream as they locate nearby services and check-in to businesses and establishments. But sharing this much information via social media can hinder your internet security and online privacy.