Tagged: Mobile Devices

In Unanimous Opinion, SCOTUS Defends Cell Phone Privacy

In a landmark decision for digital privacy, the U.S. Supreme Court unanimously decided that warrantless searches of cell phones are not permitted by the Fourth Amendment. The Court looked at two cases to see if the warrantless searches of the defendants’ cell phones were reasonable and allowed under the Fourth Amendment. The Court ruled that they were not reasonable, but allowed for exemptions in emergency situations, such as preventing a terrorist act.

Don’t Be Evil: San Francisco Artist Spoofs Google’s Free WiFi

A San Francisco media artist named Harris David Harris has created a fake public WiFi network that looked very much like the free one that Google offers to its employees who take private shuttles to and from work in Silicon Valley. His “d0ntb33vil” project — which mimics Google’s motto — also serves as his MFA thesis project in the Digital Arts and New Media program at UC Santa Cruz.

Instead of getting Internet access, Google employees saw an image of the sidewalk in front of them.

Apple’s iOS 8 Operating System Strikes a Blow for Privacy

Apple’s new operating system, iOS 8, has made it much harder for marketers to track your cell phone, and thus harder to track you.

While this is undoubtedly a good move for those concerned with protecting their privacy, others have raised concerns that Apple may be doing this to push their own tracking technology, iBeacon.

Centrify Survey Reveals Some of Us Think Mobile Security is Not Our Problem

If you are accessing corporate or sensitive data on your mobile phone, you should use a VPN like PRIVATE WiFi to protect your communications. But some people are not taking steps to protect that data, according to a new survey. The most disturbing findings? 15% of employees say they feel “minimal to no” responsibility to protect corporate data stored on their mobile devices. And 10% do not have any password, PIN, or other security measures in place to protect their mobile devices they use for work purposes.

Hackers at the World Cup: Beware the Risky Free WiFi in Brazil’s Soccer Stadiums

If you are lucky enough to be at the 2014 World Cup in Brazil, chances are you will have access to the public WiFi networks set up just for the event. At least half of the 12 World Cup stadiums will have public WiFi available, with over 2,300 access points.

This includes inside the stadiums as well as the areas close by, such as parks, public transit stations, and squares. So that means that not only will those inside the stadium have access to public WiFi, but many thousands of other soccer fans outside as well.

Unfortunately, the World Cup (and its public WiFi) is attracting more than just soccer fans.

Facebook’s Nearby Friends: Building ‘IRL’ Connections While Undermining Your Privacy

Nearly two years ago we reported that Facebook was planning to launch a new feature that would help users locate their friends “In Real Life.” And now “Nearby Friend” is a reality, allowing mobile users to see which of their contacts is in their current vicinity. This tool is optional, and you can also set it for specific groups of friends.

Before turning it on, let’s take a deeper look into the privacy repercussions of using the feature.

Why You Should Worry About Wearable Tech and Wireless Security

They track our movements, monitor our health, and record where we’ve been and what we’ve seen.  They’re wearable computing devices – one of the hottest trends in tech today. According to a 2013 Nielsen survey, 15% of U.S. consumers already own and use some form of wearables – everything from smart watches and fitness bands to glasses that record video.

So before you don that wearable tech, read on and consider how your data could be exploited.

Smartphones and the Rise of Contextual Apps

One way to think about your mobile phone is that it’s basically a tracking device. The new thing in the app world is something called “contextual apps.” Contextual apps are mobile apps that can figure out where we are or what we are looking at and then present us with all kinds of information about that spot. Does that sound dangerous? Keep reading to learn more.