More than 40 percent of government employees are putting themselves and their agencies at risk with their mobile device habits, according to Cisco and the Mobile Work Exchange’s report “The 2014 Mobilometer Tracker: Mobility, Security, and the Pressure In Between.” As part of the study, an assessment tool called the Secure Mobilometer was developed to understand mobile (in)security and vulnerabilities. The tool provided insight into the mobile device habits of government agency employees. The results show one singular truth: government employees and agencies need to take significant steps to secure confidential data.
Category: News & Features
The phrase, ‘nothing in life is free,’ holds true especially with regard to Facebook. While you may think you are...
Over the past two years, a privacy backlash has been developing around the world. According to the latest The Truth About Privacy study from McCann, especially those in younger age groups have become more selective about sharing their personal information online. That’s why they’ve moved to private apps such as Snapchat to connect with friends. But how much do they protect your online privacy?
The UK government has recently released a new Cyber Streetwise website which aims to change the way consumers and small businesses view online safety by providing the skills and knowledge needed to address cyber security.
Today, automobiles are outfitted with high-end wireless systems and gadgets, making car lovers and everyday consumers swoon. At the 2014 Consumer Electronics Show (CES) in Las Vegas, car technology was at the forefront, but the most important component to any new technology is security, and this piece seemed to be missing from the thrilling reveal at CES. These gadgets are just another way in which cybercriminals can gain access to your personal information.
If you haven’t marked your calendar yet, Data Privacy Day (DPD) is less than one week away. On January 28th, we’re encouraging everyone to make protecting privacy and data a greater priority. PRIVATE WiFi has teamed up with the National Cyber Security Alliance and countless other corporations, governments and organizations to empower the masses to own their online presence.
How careful are you when you use WiFi hotspots? How would you feel if you learned that you had just connected to an Evil Twin – a fake hotspot designed to steal your sensitive information? These are two of the questions Trend Micro got answers to in its 2013 Mobile Security Report. What it found won’t be reassuring for anyone who uses public WiFi hotspots.
As bad as it would be to lose your personal information, what if it came at a price tag of millions of dollars? According to a recent article in the Financial Times, this is exactly what has been happening in London over the last few months.
Hotel WiFi may be an ideal way to stay on top of your work and keep in touch with your family when you’re away from home. But it’s also the perfect way for hackers to grab your sensitive information, as a recent experiment conducted by the IT security company Smarttech dramatically demonstrated. Find out just how easy it is to hack a hotel WiFi hotspot and what you can do to protect yourself before you log in.
A recent report in Der Spiegel indicates that the NSA has been able to access supposedly protected information from top foreign leaders and U.S. citizens. The agency’s hacking unit, which comprises more than 2,000 people, is called the Tailored Access Operations (TAO) and is considered to be the intelligence agency’s secret weapon. Read on to find out more about the TAO unit and how the scope of the NSA’s powers is just one more reason to be concerned about the erosion of privacy in our new digital age.
We all do it: start typing into the status update bar on Facebook and then use our (better) judgment to delete those thoughts and not share them with the world. Facebook calls it “self-censorship,” and according to a report by Slate’ s Jennifer Golbeck, the social network has been tracking and studying our unpublished thoughts.
Put simply: the posts that you have consciously decided to not share, are being analyzed by Facebook. Read on to discover how Facebook did this as well as what it means for your privacy now and in the future.
How did hackers steal 40 million credit card numbers from Target customers? How much money are the cards selling for on the black market? And what’s the best way to prevent your computer from getting infected with malware — and avoid becoming an identity theft victim?
Keep reading to learn the answers to those questions, as well as how to make it harder for cybercriminals to get their hands on your private data.