Be careful what you text in California. A new law says police officers do not need a search warrant to search your phone, potentially stripping privacy rights to your text messages, phone records, emails, photos, videos, and anything else you keep on your smartphone. But what about the Fourth Amendment, you ask? Exactly. If you haven’t password-protected your smartphone, now may be the time to take the extra step.
The Private WiFi Blog Blog
A man who bragged about hacking into Miley Cyrus’ email account was arrested on a separate matter and was charged with possession of unauthorized credit card account numbers. The Associated Press says FBI agents searched his computer, and the suspect allegedly had used 200 credit card account numbers and related personal information to make fraudulent online purchases.
Part 1 of this series discussed how companies can track our location, but that is just one piece of information in “the new normal” of what marketers can find out about us. Now in Part 2, check out how our travels around the Internet leave digital fingerprints all over the place.
BBC News reports on a a “precipitous decline” in spam messages, noting that one security firm detected around 200 billion spam messages being sent each day in August 2010, but just 50 billion by December. The majority of spam is sent by networks of infected computers known as botnets; the article points out that one botnet, called Rustock, was once responsible for almost 48% of spam, but by December it accounted for just 0.5% of global spam.
Online Privacy Diminishes with Facebook and Users Keep Coming Back For More: The Social Media Privacy Report
This week’s installment of the Social Media Privacy Report examines the discrepancy between growing online security concerns among experts and internet users’ apathetic attitude towards the threat to their internet safety and privacy. Meanwhile, Facebook remains at the pinnacle of the social media frenzy and despite web protection issues, it continues to thrive.
Cybercriminals hacked into an email database for 2.2 million new Honda and Acura owners that contained customers’ names and email addresses, as well as online login names and their 17-character Vehicle Identification Numbers. This MSNBC news article warns drivers to promptly change their passwords and be cautious of unsolicited emails requesting personal information because “if the hackers were able to present themselves as Honda, and reassured you that they were genuine by quoting your Vehicle Identification Number, then as a Honda customer you might be very likely to click on a link or open an attachment.”
The FCC has announced a challenge for researchers, inventors, and software developers to create apps that allow users to monitor and protect Internet openness. Some call this contest a mere side-note to the brouhaha over how net neutrality rules will either destroy capitalism as we know it or cement the power of the wireless oligarchs.
Computer privacy is changing every day, and with new computer vision technology that can observe us and understand us better, the New York Times poses the question of whether that is helpful technology or an invasion of privacy. Among many other ways it will become part of our future, this new computer vision may be part of law enforcement, national security, and military operations, as well as how doctors and nurses will rely on extra patient safety measures in the operating room.
This first guest article from the Identity Theft Resource Center® (ITRC) discusses various forms of identity theft and predicts increased incidence of identity theft in 2011. The ITRC will be writing guest posts on some Wednesdays for private-i. Check this space in the future for their latest articles.
NPR’s All Things Considered has a new podcast and article detailing cyberwar as an important foreign policy issue, especially after the director of National Intelligence “identified the danger of cyber attacks on the United States as the single, the number one greatest security threat facing the country.”
After discovering the State of New York had set up a @NYGovernor Twitter account for the governor — who was instead using @NYGovCuomo — an alleged prankster decided to pose as the governor. The New York Times reports that within days, he had several hundred followers corresponding with the fake identity, all oblivious to the ruse.
Available on both 3G and WiFi networks, new Skype 3.0 upgrades support making video calls on the iPhone 4, iPhone 3GS, and 4th-generation iPod touch. It also enables users to receive video calls on the iPad and the 3rd-generation iPod touch. But are you sure your privacy is protected on Skype?