Flying from New York to San Francisco last week, I had the opportunity to check out the (unencrypted) GoGo wifi service on the plane. As my interest was purely curiosity, I used a tool that just lists the names of the websites that people are visiting. So what are people doing on the Internet at 36,000 feet?
Author: Kent Lawson
A personal VPN must be intelligent enough to know what the connection is and only activate when needed.
At PRIVATE WiFi, we not only devised that capability, we patented it.
I’m currently in San Francisco, attending the annual RSA Conference with 25,000 other participants. Richard Clarke, the National Security Advisor under Presidents Bill Clinton and George W. Bush, gave the keynote speech at the Cloud Security Alliance (CSA) Summit, which is part of the larger RSA Conference.
A new executive order contains a set of industry standards and best practices to help businesses manage cybersecurity risks. The government and the private sector worked together to create several new standards to understand and prevent such risks.
“In a country where we expect free WiFi with our coffee, why shouldn’t we have it in our schools?” President...
In a riveting article, The New York Times provides a detailed report unveiling how Eastern European hackers were able to gain access to financial and personal data for 110 million Target customers, with little trouble.
Businesses are tracking you. Airports are tracking you too. As you shop in your city or enjoy a preflight cocktail at the airport bar, tracking systems are watching you. They are able to do this by placing tracking sensors that use location data emitted by your cell phone when it has WiFi turned on.
The tide is changing online, and companies need to make a commitment to users that their information is just that, theirs. Helping with this promise is the Electronic Frontier Foundation (EFF). They have released an annual report titled, “Who Has Your Back?” taking a closer look at the privacy policies of major Internet companies. Read on to learn which companies are protecting your privacy.
TED is a non-profit organization which organizes and hosts a variety of speakers from all walks of life. Recently, TED hosted a series of talks called “The Dark Side of Data.” In Part 1 of our series we reviewed online privacy, and in Part 2, we reviewed three types of online attacks.
Today’s final installment of our 3-part series investigates Avi Rubin’s talk about smart device hacking — phones, refrigerators, and even pacemakers can be hacked. Rubin is a professor of computer science and director of Health and Medical Security at Johns Hopkins. He works on computer and information security, with a focus on electronic medical records.
TED is a non-profit organization which organizes and hosts a variety of speakers from all walks of life. Recently, TED hosted a series of talks called “The Dark Side of Data.” In Monday’s Part 1 of our series about these talks, we discussed Big Data. Today in Part 2, we review the talk by Mikko Hypponen on the three types of online attacks. Mikko is the chief research officer at F-Secure Corporation in Finland, and is an expert in computer viruses. He’s also an expert on how to protect digital privacy in the age of government surveillance.
TED Talks are a very large collection of 15-minute presentations from various experts around the world on just about any topic you can think of — and many that you could not. TED is a non-profit which organizes and hosts a variety of speakers from all walks of life.Recently, TED hosted a series of talks called “The Dark Side of Data” in which different speakers explained how Big Data can be a force for good, and how it can be abused.
Acxiom, one of the top data brokers in the country, is in business to research publicly held information, compile data on you, and then sell this to advertisers. And business is booming: Acxiom made well over a billion dollars in profits last year. So I was curious as to what exactly Acxiom would reveal about the information they had collected on me.