With the latest privacy or information breach from Facebook, like many, you may be thinking about can cancelling your account or perhaps locking things down a bit more. Did you know though that you can request a download of all of your personal information – these are the data that others have apparently managed to access. [Read more…] about Accessing Your Facebook Data – Here’s How to get it
Sharing information is fast and simple (perhaps too easy) and for many, it really is quite tempting to over-share, however, while doing so you may also be giving up loads of personal information without even realizing it. Case in point, Facebook. Facebook is by far, the most popular social network out there where people are giving up their personal information or their friends are giving it up. There’s a number of things that could be happening with your posts or posts about you on Facebook that may be giving up more information than you really are comfortable with.
“Introduction to Windows 10 Security (a $24.95 value) FREE for a limited time” An 87 page, fully updated guide to understanding security in Windows 10.
If you use google services then you likely have a location history stored by Google – don’t worry though, only you can see it! By accessing your history you can view all the places you’ve been (while location sharing was enabled on your device).
Create a no fly zone around your property? Yep, that’s pretty much what a non-profit is enabling people to do, however, it has yet to be determined how much weight this “no fly zone” would have or if it could be enforced as a private area.
A valuable resource for parents was released today and it’s pretty darned nice – and useful! The social media guide for parents has been developed by the Liahona Academy (be sure to check out their website and the other valuable resources they provide) and is delivered as a free web-based resource and a comprehensive infographic – jam-packed with useful tips!
social media guide for parents
Some useful things pointed out in the guide include details of facebook’s new policy that enables kids to post publicly, and other tips and tricks regarding ways to safeguard user privacy.The guide also describes all the public social sites that are popular with teens and explains what they are and how they are used and they also suggest several social media monitoring tools.
Loads of buzz today in the news and on social media as a result of the Commander in Chief addressing the nation on the topic of security and privacy. The speech was delivered against a background set by numerous proposals, including various bills in Congress and the recommendations of the president’s Review Group on Intelligence and Communications Technologies, on which I served (and most of whose recommendations were endorsed in today’s speech).
Highlights of the speech can be identified in the following Wordle, and according to Bloomberg, there were 7 main topics of interest touched on that deserve special attention.
Yep, this topic simply won’t go away…The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with US intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable.
Image credit (phonespyonline.com)
An interesting service known as shotspotter can not only differentiate between gunshots and pyrotechnics, the service has also managed to map out the location of all (most) gunshots in the D.C area since 2009, painting an interesting picture that easily identifies areas of the city where you might want to be careful, particularly if you aren’t packing in order to protect yourself!
Some interesting research findings have revealed some startling findings when it comes to the state of application security. Quotium research shows the large majority of security managers feel their organization’s applications are still vulnerable to hacker attacks, despite best efforts to employ wide range of solutions to prevent application threats. One of the most interesting findings of this study is the gap between the efforts put into protecting applications and the actual state of the applications. While almost all organizations invest time, money and energy into protecting their infrastructure, using one or more types of service or technology, most applications remain vulnerable and are still being attacked. Findings of the results reveal the following:
- 11% of security managers think their company’s apps are secure
- 50% believe their apps are vulnerable
- 80% think off the shelf apps are vulnerable