Latest Posts

Online Privacy and Teens: Help Them Care if They Don’t

facebook teen
image-15497
Before you read this article, stop and picture yourself as a 16 year old.  Now that you’ve recovered from the trauma of that, think about this question: what thoughts consumed your time – your favorite band, your first car, your first love, your first job, your first password?  Certainly not the latter, and you most likely weren’t thinking about online privacy issues.

It’s no surprise then that today’s teens don’t think about them much either, although they do more than most of us ever had to.  The Pew Research Center recently conducted a survey entitled Teens, Social Media, and Privacy and found a variety of interesting statistics.

Teens share more about themselves on social media sites than they did according to the previous survey from 2006.  A few of the more significant ones:

  • 91% post a photo of themselves (up from 79%)
  • 71% post their school name (up from 49%)

Posted in Online Privacy, Social Media Privacy by Identity Theft Speaker .
Tags: , , , , , , ,

Summer School for Parents: Protecting Your Kids’ Social Media Privacy

girls phones summer
image-15477
School is out for the summer and the tasks that often fall upon the shoulders of your local schools are now sitting squarely on yours.   In addition to making sure your kids practice their math facts, read regularly and get plenty of exercise, you’ll want to watch out for how they spend their free time when it comes to using Facebook, Tumblr, Instagram, Twitter, YouTube and other sites that can expose their social media privacy.

Social Media refers to web-based and mobile applications that allow individuals and organizations to create, engage, and share new user-generated or existing content in digital environments through multi-way communication.  Okay, that’s too technical. Social media is the use of Internet tools to communicate with a broader group. Some of the most common examples are listed above.  If you have elementary aged children, they may use more secure, school-controlled forms such as Schoology, Edmodo or Club Penguin, but if your kids are older, I can almost guarantee they’re into Social Media sites whether you know if or not.

Posted in Online Privacy, Social Media Privacy, Uncategorized by Identity Theft Speaker .
Tags: , , , , , ,

Scorecard grades tech companies’ online privacy protection efforts

Online Privacy Protection Scorecard

We trust our information with companies every day, but online privacy protection may not be their highest priority.

Some of the most widely-used tech companies in the world do a miserable job of protecting users’ online privacy. The Electronic Frontier Foundation has gathered data on the privacy protection efforts practiced by organizations like WordPress, Apple, Comcast and others (many of whom have also been victims of data security breaches recently) for its annual “report card.” Then it awarded stars to the companies as if they were hotels.

The results are abysmal for anyone who still thinks that corporate behemoths have their users’ best interests at heart.

Stars were given based on how well a company performed in various categories. Out of 18 companies measured, only two passed with flying colors in all six categories: Twitter and internet service provider Sonic.net. The rest scored poorly. Facebook earned 3 out of 6 starsApple and AT&T scored one star and Verizon struck out with zeroes across the board. If this were a real report card, most of these companies would have been expelled.

Posted in Online Privacy by Identity Theft Speaker .
Tags: ,

How long will Weiner’s bad online reputation haunt him?

Weiner Online Reputation

Anthony Weiner is notorious for a gaffe made on Twitter, but will his online reputation recover?

I’m sure everyone remembers the infamous 2011 incident when Representative Weiner became something of a national punchline for lewd tweets that revealed his “private data,” so to speak.

Or do we remember?

At the time, Weiner’s indiscretions left him a laughingstock and a near-disgrace in one fell swoop. Now, as he ramps up a possible New York City mayoral campaign, he’s returned to the same social platform that almost cost him his political career. Is it possible that we will forget and forgive so soon?

A natural byproduct of our 140-character driven world is that everything is always old news. By the time the next tweet or Facebook post appears, we have forgotten the last one. Our online reputation, on the other hand, never disappears. And at some point, we will again value character in our public figures – making digital reputation a permanent, if often inaccurate, representation of that character.   

Posted in Digital Reputation & Trust by Identity Theft Speaker .
Tags:

2 Truths & a Lie: Venture Capital Frenzy Misses Cyber Security Mark

Cyber Security Venture CapitalUSA Today recently opined that the venture capital flooding into the cyber security marketplace is justified. Unlike the dotcom boom and bust cycle of the late 90s, it says, the current spending on securing information capital is justified, as the Internet and corporate networks are in dire need of better protection. Without even a moment’s hiccough, this is undeniably true.

Take some recent cases in point: China hacking into the New York Times and Wall Street Journal, or the Syrian Electronic Army cracking into the Associated Press and 60 Minutes. If you’re looking for corporate examples, look no further than the $45 million stolen by cyber thieves via MasterCard pre-paid debit cards. Cyber security is the new darling of the Obama administration, the media and Sandhill Road because all three are finally learning how much they have to lose (or in the case of VCs, gain) by ignoring cyber security.

Posted in Cyber Data Security, Online Privacy by Identity Theft Speaker .
Tags: , , ,

Gladys Kravitz is Sniffing FREE WiFi Hotspots for Your Secrets

Is Gladys watching your Free WiFi Hotspot?

The free WiFi hotspot ritual is habitual. You head to your favorite café to get some work done “away from the office”. Justifying your $4 cup of 50 cent coffee with a Starbucks-approved rationalization (“I work so much more efficiently at my 3rd spot!”), you flip open your laptop, link to the free WiFi and get down to business. The caffeine primes your creativity, the  bustling noise provides a canvass backdrop for your artful work and the hyper-convenient Internet access makes it easy for someone else (think organized criminal) to intercept everything you send through the air.

Posted in Burning Questions (Video), Cyber Data Security, Identity Theft Prevention, Video Tips by Identity Theft Speaker .
Tags: , , , , , , ,

Are Millennials ignoring online privacy protection?

Millennials Online Privacy Protection

The Millennial generation tends to have a lax approach to online privacy protection – and it might put all of our security in jeopardy.

Those in their teens, 20s and early 30s – the “Millennials” – have widely prompted discussions as they enter and redefine the modern workplace. Recent information gives us a more in-focus picture of the general operating philosophy of this age group when it comes to handing out personal information over the internet. It’s been found that a devil-may-care attitude is much too prevalent.

A survey from the University of South California’s Annenberg Center for the Digital Future revealed that more than half of the Millennials it questioned would willingly give their personal information to companies in exchange for some sort of coupon or incentive. And then a disconnect occurs because the same study interestingly showed that 70 percent of those same Millennials believed their personal data should be kept private.

Posted in Digital Reputation & Trust, Online Privacy by Identity Theft Speaker .
Tags: , ,

Data breach sees millions violated in LivingSocial hack

Data Breach Living Social Hack

Do you use the discount site LivingSocial? If so, your email and password could now be a little more “social” than you wanted thanks to a new data breach that occurred on April 26.

A data breach has punctured LivingSocial and resulted in the exposure of the personal information of at least 50 million users. The leaked information includes names, birthdays and email addresses – very useful pieces of data if you’re an identity thief trying to figure out a way to get into someone’s profile or make a profit selling that same information. But what makes this attack even more devastating is that hackers were also able to get a hold of encrypted passwords.  Even though the passwords were encrypted through processes called hashing and salting, it likely will not take hackers long to figure out the original passwords.

Posted in Cyber Data Security by Identity Theft Speaker .
Tags: ,

Mobile security training imperative for new gadgets like Google Glass

Mobile Security Training Google Glass

As technology gadgets get ever smaller and more pervasive, there’s never been a better time to increase your focus on mobile security training. Users of Google Glass could discover their digital risks the hard way.

The world is gaga over Google Glass, the head-mounted electronic interface that promises to pack everything your computer can do (and more) into a wearable display. But despite all of the excitement surrounding Glass, it appears to be lacking in security. The trial version of the product is currently only available to relatively few developers, but some have already discovered an easy way to bypass the built-in operating system.

The device might be new, but the operating system it uses is old. In fact, it’s the same OS used in some Android phones. It reportedly took hacking specialist Jay Freeman a mere couple of hours to “jailbreak” Glass. As with phones and other devices, once the initial settings have been bypassed, the device can be configured in ways contrary to the original design. Another user was similarly able to “root” the system (take it over at the most basic level) by manipulating its “debug mode.”

Posted in Cyber Data Security by Identity Theft Speaker .
Tags: ,