Category: News & Features

Federal Workers Are Not Protecting Their Mobile Devices

More than 40 percent of government employees are putting themselves and their agencies at risk with their mobile device habits, according to Cisco and the Mobile Work Exchange’s report “The 2014 Mobilometer Tracker: Mobility, Security, and the Pressure In Between.” As part of the study, an assessment tool called the Secure Mobilometer was developed to understand mobile (in)security and vulnerabilities.  The tool provided insight into the mobile device habits of government agency employees. The results show one singular truth: government employees and agencies need to take significant steps to secure confidential data.

Do Self-Destructing Messaging Apps Really Protect Your Privacy?

Over the past two years, a privacy backlash has been developing around the world.  According to the latest The Truth About Privacy study from McCann, especially those in younger age groups have become more selective about sharing their personal information online. That’s why they’ve moved to private apps such as Snapchat to connect with friends. But how much do they protect your online privacy?

Is Your Car an Unsecured Public Hotspot?

Today, automobiles are outfitted with high-end wireless systems and gadgets, making car lovers and everyday consumers swoon. At the 2014 Consumer Electronics Show (CES) in Las Vegas, car technology was at the forefront,  but the most important component to any new technology is security, and this piece seemed to be missing from the thrilling reveal at CES. These gadgets are just another way in which cybercriminals can gain access to your personal information.

Ready for Data Privacy Day? Take The My Privacy IQ Quiz

If you haven’t marked your calendar yet, Data Privacy Day (DPD) is less than one week away. On January 28th, we’re encouraging everyone to make protecting privacy and data a greater priority. PRIVATE WiFi has teamed up with the National Cyber Security Alliance and countless other corporations, governments and organizations to empower the masses to own their online presence.

Trend Micro Report: WiFi Users Are Careless About Security At Public Hotspots

How careful are you when you use WiFi hotspots?  How would you feel if you learned that you had just connected to an Evil Twin – a fake hotspot designed to steal your sensitive information? These are two of the questions Trend Micro got answers to in its 2013 Mobile Security Report.  What it found won’t be reassuring for anyone who uses public WiFi hotspots.

Irish Hotels Warned About WiFi Security Risks

Hotel WiFi may be an ideal way to stay on top of your work and keep in touch with your family when you’re away from home. But it’s also the perfect way for hackers to grab your sensitive information, as a recent experiment conducted by the IT security company Smarttech dramatically demonstrated. Find out just how easy it is to hack a hotel WiFi hotspot and what you can do to protect yourself before you log in.

The New Big Brother: The NSA’s Hacking Unit

A recent report in Der Spiegel indicates that the NSA has been able to access supposedly protected information from top foreign leaders and U.S. citizens. The agency’s hacking unit, which comprises more than 2,000 people, is called the Tailored Access Operations (TAO) and is considered to be the intelligence agency’s secret weapon. Read on to find out more about the TAO unit and how the scope of the NSA’s powers is just one more reason to be concerned about the erosion of privacy in our new digital age.

You Are What You Type: Facebook Tracks What You Decide Not to Post

We all do it: start typing into the status update bar on Facebook and then use our (better) judgment to delete those thoughts and not share them with the world. Facebook calls it “self-censorship,” and according to a report by Slate’ s Jennifer Golbeck, the social network has been tracking and studying our unpublished thoughts.

Put simply: the posts that you have consciously decided to not share, are being analyzed by Facebook. Read on to discover how Facebook did this as well as what it means for your privacy now and in the future.

How Hackers Used Malware to Steal 40 Million Credit Card Numbers from Target

How did hackers steal 40 million credit card numbers from Target customers? How much money are the cards selling for on the black market? And what’s the best way to prevent your computer from getting infected with malware — and avoid becoming an identity theft victim?

Keep reading to learn the answers to those questions, as well as how to make it harder for cybercriminals to get their hands on your private data.