Posts tagged "Privacy Expert"

NSA Angry Birds Help the Government Spy on Your Intimate Details

nsa birdsNSA Angry Birds are Stalking You

So you’ve had a rough day at the office.  You plop down on your couch with a cold beverage nearby, ready to let the day go.  You have twenty minutes until your chicken pot pie dings, and the thought of chicken reminds you of, well… Angry Birds. Harmless fun. NOT!

While you may be enjoying a mindless game, somewhere far off in cyber land others are just beginning to work very hard.  WHO THEY ARE: advertising companies and intelligence agencies alike. WHAT THEY ARE DOING TO YOU: gathering all of the most personal data off of your mobile device: everything from your name, age, sex, location, and perhaps even your political alignment or sexual orientation—and lots more!

Posted in Cyber Data Security, Online Privacy by Identity Theft Speaker .
Tags: , , , , ,

Data Privacy Expert on the Irony of Dictionary.com’s Word of the Year

Dictionary.com has chosen its “word of the year”. Thank the etymological gods it’s not selfie, twerk or hashtag. No, this year’s most relevant, most searched word is:

Privacy.

Call me geeky, but this is happy news to privacy experts, because it raises consciousness that this stuff (your right to keep certain information to your self) actually matters.

 And consciousness has definitely been raised in 2013:

  • Data security and privacy experts everywhere should thank Edward Snowden for exposing the NSA surveillance programs that monitor every American’s phone calls, Facebook posts and emails for signs of terrorism (and any other data they care to intercept).
  • Thanks to SnapChat for making deleted photos recoverable (despite claims they disappear).
  • Additional kudos to Google Glass for raising awareness on how easy it is to capture intellectual property as criminals videotape their way through Fortune 500 offices, record ATM PIN numbers of the bank customer in front of them and deploy instant facial recognition software in a variety of social engineering schemes.

Posted in Cyber Data Security, Online Privacy by Identity Theft Speaker .
Tags: , , ,

Does the NSA or Google Spy More on You? [Burning Questions Ep. 4]

[youtube http://www.youtube.com/watch?v=LsezLe4l4fE&rel=0]

Today’s Burning Question for online privacy expert John Sileo:

“Who is the bigger spy, the NSA or Google?”

I thought that was a really fascinating question.  Of course, it comes because in the last couple of months the NSA has been outed by Edward Snowden, the former NSA employee.  The NSA (National Security Agency) has been spying on our phone calls- who we’re calling and when, our emails- who we’re emailing and what about, and even our social media posts.

The latest scandal is called “Muscular”.  Somehow, the NSA has gotten between the transmissions of Google and Yahoo.  In other words, the NSA has been “sniffing” the emails going back and forth between the two largest email providers in the US and this has angered the tech giants like Google, Yahoo, and Facebook.

Posted in Burning Questions (Video), Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , ,

HoGo Document Protection: 10 Questions w/ Digital Privacy Expert John Sileo

Hogo Document Protection

By Mike Spinney, HoGo (Document Protection Simplified)

John Sileo is a kindred spirit when it comes to fighting the good fight against data breach and identity theft. I met John about seven years ago when we were both part of a joint project to raise awareness over the issue of physical document protection and we’ve been friends ever since. I admire what John does to help make people more aware of their personal risk and take steps to prevent identify theft. A two-time victim of identify theft, John has refused to wallow in his victimization and instead has become a privacy expert in his own right and taken his powerful, personal message to audiences around the world raising identity theft prevention awareness as one of the issues premiere speakers.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,

Privacy Expert: NSA Intercepting Your Address Books, Buddy Lists

Snowden_Leak_Tip_of_the_Iceberg_of_NSA_Surveillance_Program__141492What makes a privacy expert nervous? Glimpsing the size of the iceberg under the surface. When National Security Agency contractor Edward Snowden became a whistle blower earlier this year, I think we all knew we were really just seeing the tip of the iceberg about exactly how much information the NSA was gathering on the average American citizen.  And it was a pretty large tip to start with.

Here’s a reminder of what started the whole thing.  Snowden provided reporters at The Guardian and The Washington Post with top-secret documents detailing two NSA surveillance programs being carried out by the U.S. Government, all without the average voter’s knowledge. One gathers hundreds of millions of U.S. phone records and the second allows the government to access nine U.S. Internet companies to gather all domestic Internet usage (so they are tapping pieces of your phone calls and emails, in other words). The intent of each program respectively is to use meta-data (information about the numbers being called, length of call, etc., but not the conversation itself, as far as we know) to detect links to known terrorist targets abroad and to detect suspicious behavior (by monitoring emails, texts, social media posts, instant messaging, chat rooms, etc.) that begins overseas. As a privacy expert, I understand the need to detect connections among terrorists; the troubling part is the scope of the information being gathered.

Posted in Online Privacy by Identity Theft Speaker .
Tags: , , , , , , ,

Facebook Privacy: New Data Use Policy Banks on User Laziness

facebook privacy 2Is there such a thing as Facebook privacy? You’ve might have heard that Facebook is proposing a new Data Use Policy and Statement of Rights and Responsibilities (formerly known as a privacy policy). No one refers to it as a Privacy Policy anymore, because there is absolutely no sign of privacy left. And if you read the email from Facebook alerting you to the changes, or even the summary of changes that they provide, you are left with no clear idea of the magnitude of those alterations (you’d have to read the actual suggested changes).

Facebook is masking privacy erosion with a deceptive executive summary. The latest changes make me very uncomfortable in three ways:

  1. It appears that Facebook has left open the option to collect and utilize your mobile phone number when you access Facebook from your mobile device. That is valuable information to advertisers who want to text, call or serve up ads to you directly.

Posted in Online Privacy, Social Media Privacy by Identity Theft Speaker .
Tags: , , , , , , , , ,

Why the boss should also be the privacy expert

Privacy Expert Boss

If you’re the head of a company, it’s your duty to be no less than a privacy expert. Cyber criminals are betting on the fact that you aren’t one, and your whole company could suffer if you don’t take action to become one.

We’ve discussed before the necessity of keeping employees well-trained against cyber attacker’s tricks, such as spear-phishing. Well, it turns out that the big bosses are actually even more likely to fall for social engineering attacks according to a recent article in the Wall Street Journal.

The article quoted a study by Verizon that indicates these executives are often exempt from company-wide security rules and are more likely to open email or click on links that expose their company’s secure information.  Especially at a time when so many are hit with phony emails, no one can afford to be lax on cyber security. CEOs and other high-level bosses are usually highly visible, public-facing, have access to proprietary information, and are often disengaged from the online security process: in other words, they are the perfect target. 

Posted in Online Privacy by Identity Theft Speaker .
Tags: , ,

5 Disastrous Decisions that Destroy Small Business – and How to Avoid Them

Interactive Webinar, Sponsored by Deluxe Corporation, Featuring Privacy Expert John Sileo

ST. PAUL, Minn., Oct 04, 2012 (BUSINESS WIRE) — Cyber criminals sabotaged John Sileo’s business – and nearly landed him in jail. Now he’s determined to help small business owners prevent the disastrous mistakes that loom ever-larger in the age of identity theft, mobile computing and social media.

Sileo will share his story – and the lessons he learned – in an hour-long interactive webinar on Tuesday, Oct. 9 at 2 p.m. EST. Titled “5 Disastrous Decisions that Destroy Small Business,” the webinar is sponsored by Deluxe Corporation and designed to provide business owners with simple, actionable tools to help protect their operations and enhance their efficiencies.

RenderImage.jpg

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , ,

What Do Mitt Romney and Duchess Kate Have in Common?

Privacy. Or lack of it, to be specific. This past week, nude photos of Duchess Catherine (formerly Kate Middleton) were published in several French tabloids. The photos were taken from hundreds of meters away using sophisticated photographic equipment to capture a moment meant to be highly private.

Also this week, Mitt Romney was secretly videotaped at a small fundraising event dismissing 47% of the electorate as victims who take advantage of government and the taxation system.

Put aside for a minute what you think of Kate or Mitt, and ask yourself what you BELIEVE about our right to privacy.

Some people say that in the digital surveillance age, you are naive to think that anything is private. Everything outside of your own walls is fair game. But Romney and the Duchess thought that they were operating inside of their own walls. Others argue that we are entering a dangerous age of constant surveillance, and that the government and corporations are gaining too much access to our images, words and thoughts.

Posted in Digital Reputation & Trust, Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , , , , , ,