You’ve heard VPN used several times, but do you REALLY know how it works? In this latest “Ask the Expert” series, Private WiFi’s CEO Kent Lawson explains what a virtual private network really does to ensure your computer safety, particularly at your most vulnerable moments — using the Internet in WiFi hotspots such as a coffee shop, hotel room, or airport lounge.
Tagged: online privacy
As concerns with internet privacy continue to loom, minors are joining social networks at a rapid speed. What are children and teens doing or saying on these sites? Parents need to protect the online security of their children. In this edition of The Social Media Privacy Report, we lay out some suggestions to keep kids safe as they use social networks.
College is supposed to be fun. It is a time many look back upon with smiles and fond memories. Of course, final exams and uppity professors can put a temporary cramp in an otherwise extended party. The last thing a college student wants to worry about is their identity being stolen. However, with 24% of all identity theft complaints being in the 18-29 year old age bracket, it is a reality college students need to be prepared for. Read on to learn about simple protective measures that can make a significant difference in protecting your teen’s belongings and personal identifying information.
Nearly 100% of U.S. teens go online and the majority are using wireless devices to do it. When you add free public WiFi access points at parks, libraries, cafes and entire cities to the equation, parental controls are history.
Did you know that Facebook claims legal ownership of whatever we upload to them? Turns out you have no right to retrieve your information or any ability to permanently delete it. As CEO Kent Lawson reports in this article, that is just one example of a “downside” to sharing data, photos, or other sensitive personal information via “the cloud,” which is simply a metaphor for the Internet. Not ready to lose control of your personal information? Then keep reading to learn more about “the cloud” — where it’s been and, more importantly, where it’s going.
More than 50% of Americans use Facebook, but what about the younger demographic; should they be allowed to use social media sites? In this post we discuss Everloop, the new and “safe” social network for tweens.
So you take pictures with your smartphone and post them online. What’s the worst thing that could happen? What personal information could possibly be exposed? Where’s the threat? Unfortunately, even as careful as some people may be about sharing personal information online, they may be unwittingly exposing information through a process called “geotagging.” Geotagging is the embedding of geospatial information into media files.
You may want to turn off the GPS in your camera, according to CEO Kent Lawson. His new post explores the security risks in sharing photos via email, Facebook, Flickr, or any other photo-sharing site, since the date, the time, and even the location, are easily accessible and could fall into the wrong hands.
CEO Kent Lawson discusses the recent political unrest in Egypt, the role of social networking in the digital revolution, and how, in this day and age, a country simply cannot function without the Internet.
Location Based Services are becoming more popular than ever. On smartphones, users are making the technology mainstream as they locate nearby services and check-in to businesses and establishments. But sharing this much information via social media can hinder your internet security and online privacy.
Many people spend a lot of time on Facebook, often “chatting” with friends. But are you really chatting with your friends? Facebook hacking is becoming more prevalent. Here are some warning signs that friends’ accounts have been hacked, and tips to help you avoid becoming a victim too.
The Commerce Department is now tasked with developing an identity management system for individuals on the Internet, and one of the objectives clearly is to facilitate Internet commerce. This week, CEO Kent Lawson writes about the inherent privacy implications of having one master login identity. How do you feel about a national Internet ID?