Recently, a single security contractor at the Korean Credit Bureau, a risk management and fraud detection service, was able to download and steal consumer records of over 20 million people, from three of South Korea’s major credit card companies. That’s nearly half the population of South Korea!
Category: News & Features
With pressure mounting from civil liberties groups, public interest advocates and shareholders, AT&T, Verizon, and Credo will now publish annual transparency reports highlighting the government’s request for data collection and the impact it has on the population.
More than 40 percent of government employees are putting themselves and their agencies at risk with their mobile device habits, according to Cisco and the Mobile Work Exchange’s report “The 2014 Mobilometer Tracker: Mobility, Security, and the Pressure In Between.” As part of the study, an assessment tool called the Secure Mobilometer was developed to understand mobile (in)security and vulnerabilities. The tool provided insight into the mobile device habits of government agency employees. The results show one singular truth: government employees and agencies need to take significant steps to secure confidential data.
The phrase, ‘nothing in life is free,’ holds true especially with regard to Facebook. While you may think you are...
Over the past two years, a privacy backlash has been developing around the world. According to the latest The Truth About Privacy study from McCann, especially those in younger age groups have become more selective about sharing their personal information online. That’s why they’ve moved to private apps such as Snapchat to connect with friends. But how much do they protect your online privacy?
The UK government has recently released a new Cyber Streetwise website which aims to change the way consumers and small businesses view online safety by providing the skills and knowledge needed to address cyber security.
Today, automobiles are outfitted with high-end wireless systems and gadgets, making car lovers and everyday consumers swoon. At the 2014 Consumer Electronics Show (CES) in Las Vegas, car technology was at the forefront, but the most important component to any new technology is security, and this piece seemed to be missing from the thrilling reveal at CES. These gadgets are just another way in which cybercriminals can gain access to your personal information.
If you haven’t marked your calendar yet, Data Privacy Day (DPD) is less than one week away. On January 28th, we’re encouraging everyone to make protecting privacy and data a greater priority. PRIVATE WiFi has teamed up with the National Cyber Security Alliance and countless other corporations, governments and organizations to empower the masses to own their online presence.
How careful are you when you use WiFi hotspots? How would you feel if you learned that you had just connected to an Evil Twin – a fake hotspot designed to steal your sensitive information? These are two of the questions Trend Micro got answers to in its 2013 Mobile Security Report. What it found won’t be reassuring for anyone who uses public WiFi hotspots.
As bad as it would be to lose your personal information, what if it came at a price tag of millions of dollars? According to a recent article in the Financial Times, this is exactly what has been happening in London over the last few months.
Hotel WiFi may be an ideal way to stay on top of your work and keep in touch with your family when you’re away from home. But it’s also the perfect way for hackers to grab your sensitive information, as a recent experiment conducted by the IT security company Smarttech dramatically demonstrated. Find out just how easy it is to hack a hotel WiFi hotspot and what you can do to protect yourself before you log in.
A recent report in Der Spiegel indicates that the NSA has been able to access supposedly protected information from top foreign leaders and U.S. citizens. The agency’s hacking unit, which comprises more than 2,000 people, is called the Tailored Access Operations (TAO) and is considered to be the intelligence agency’s secret weapon. Read on to find out more about the TAO unit and how the scope of the NSA’s powers is just one more reason to be concerned about the erosion of privacy in our new digital age.