Posts tagged "Privacy"
Unless you’ve been living under a rock (or haven’t been on the internet in the past 24 hours), you most likely know that intimate photos of celebrities like Jennifer Lawrence and Kate Upton have been exposed (pardon the pun) to the public.
While it is not yet verified, Apple has said it is “actively investigating” the possibility that iCloud accounts have been hacked. The photos surfaced immediately after an Apple “Find My iPhone” exploit was revealed, so Apple’s own security is being questioned. As of now, Apple is saying that iCloud has not been systematically hacked, but that the breach of celebrity photos was a limited, targeted attack. Whether or not iCloud was exploited in any way for these pointed attacks hasn’t been determined.
Facebook Privacy Settings… Some may say it’s too little, too late. I’m relieved that Facebook is finally responding to concerns about their confusing and weak privacy settings. The social media giant (who has been losing customers of late) has recently made several changes to their settings.
Facebook Privacy Settings Update
- Additional photo settings. Your current profile photo and cover photos have traditionally been public by default. Soon, Facebook will let you change the privacy setting of your old cover photos.
- More visible mobile sharing settings. When you use your mobile phone to post, it is somewhat difficult to find who your audience is because the audience selector has been hidden behind an icon and this could lead to unintended sharing. In this Facebook privacy settings update, they will move the audience selector to the top of the update status box in a new “To:” field similar to what you see when you compose an email so you’ll be able to see more easily with whom you are sharing.
The answer is so simple that you probably won’t believe it.
How do the world’s most powerful, wealthy and well connected people keep their lives more private than the average American?
Former President Jimmy Carter recently revealed one of two truely non-secret tactics that get completely overlooked because of their simplicity: snail mail. When asked about NSA surveillance by NBC’s Andrea Mitchell, Carter responded:
“As a matter of fact, you know, I have felt that my own communications were probably monitored, and when I want to communicate with a foreign leader privately, I type or write the letter myself, put it in the post office and mail it,” Carter said.
Snapchat Hacked! Is there any sense of wonder left when another Internet giant (or any corporation, for that matter) gets hacked and loses your private information? No, the mystery died years ago, which is why we’ve basically forgotten about Target already. Of course Snapchat.com was hacked. Here’s the recipe for how your corporation can be like theirs:
- Collect a ga-gillion pieces of user data all while…
- Paying lip service to privacy and security measures until…
- Your database is hacked, the press circles & customers revolt while…
- You pay expensive recovery costs and belatedly decide to…
- Implement security & privacy measures that could’ve saved you a ga-gillion.
Breach Happens, no matter how big or how small you are. But breach destroys only when you are unprepared. When it comes to privacy, the most effective medicine is getting burned. Snapchat is lucky to have experienced it early in their lifetime. When will you get hacked? Will it disappear in 11 seconds…
Would you like to give the people you care about some peace on earth during this holiday season? Take a few minutes to pass on our 12 privacy tips that will help them protect their identities, social media, shopping and celebrating over the coming weeks. The more people that take the steps we’ve outlined in the 12 Days of Christmas, the safer we all become, collectively.
Have a wonderful holiday season, regardless of which tradition you celebrate. Now sing (and click) along with us one more time.
On the 12th Day of Christmas, the experts gave to me: 12 Happy Holidays,
11 Private Emails,
10 Trusted Charities
9 Protected Packages
8 Scam Detectors
7 Fraud Alerts
6 Safe Celebrations
Fiiiiiiiiiiive Facebook Fixes
4 Pay Solutions
3 Stymied Hackers
2 Shopping Tips
And the Keys to Protect My Privacy
What makes a privacy expert nervous? Glimpsing the size of the iceberg under the surface. When National Security Agency contractor Edward Snowden became a whistle blower earlier this year, I think we all knew we were really just seeing the tip of the iceberg about exactly how much information the NSA was gathering on the average American citizen. And it was a pretty large tip to start with.
Here’s a reminder of what started the whole thing. Snowden provided reporters at The Guardian and The Washington Post with top-secret documents detailing two NSA surveillance programs being carried out by the U.S. Government, all without the average voter’s knowledge. One gathers hundreds of millions of U.S. phone records and the second allows the government to access nine U.S. Internet companies to gather all domestic Internet usage (so they are tapping pieces of your phone calls and emails, in other words). The intent of each program respectively is to use meta-data (information about the numbers being called, length of call, etc., but not the conversation itself, as far as we know) to detect links to known terrorist targets abroad and to detect suspicious behavior (by monitoring emails, texts, social media posts, instant messaging, chat rooms, etc.) that begins overseas. As a privacy expert, I understand the need to detect connections among terrorists; the troubling part is the scope of the information being gathered.
Universities perfect learning environment for data security
Higher Ed Organizations are among the highest risk groups to become victims of identity theft and data breach. Because students are relative “beginners” when it comes to personal finances, because university environments are predicated on trust and credibility, and because of the recent progress towards a mobile-centric, social-networking-dominated campus, higher education’s digital footprint is constantly exposed to manipulation.
“The most engaging speaker I’ve ever heard – period.” Debbie Bumpous, NSU Chief Information Technology Officer speaking about John Sileo
“John Sileo was the secret sauce in launching our cyber security awareness program” – University of Massachusetts Director of IT
Facebook is masking privacy erosion with a deceptive executive summary. The latest changes make me very uncomfortable in three ways:
- It appears that Facebook has left open the option to collect and utilize your mobile phone number when you access Facebook from your mobile device. That is valuable information to advertisers who want to text, call or serve up ads to you directly.
Do you want to know how to turn off Facebook Graph Search?
If you walk onto a used-car lot and brag to the salesman that you’re rich, who’s to blame: the salesman for exploiting that information to sell you a car for more than it’s worth, or you for naively sharing in the first place? Both! The same is true in the hacking of the Facebook Graph Search data; Facebook AND poorly informed users SHARE the responsibility for this latest breach.
In case you haven’t heard the latest, Brandon Copley, a mobile developer in Dallas, Texas, was able to exploit Facebook’s Graph Search to collect 2.5 million phone numbers of Facebook users. Copley is not a malicious hacker; he was simply trying to show how vulnerable the information is that people leave “public” on Facebook.