681 Results
Robert Siciliano Security Analyst at Safr.me
Most websites should have a privacy policy (although I don’t think it’s always the easiest thing to find). And then once you do find it, you’ll see a huge amount of what I consider to be legal mumbo jumbo. And because you really should care about this stuff, the question becomes how do you sort through all this stuff? Most privacy policies usual...
01 February 2014 /security
Target continues to be tangled up in chains due to its December 2013 data breach that current estimates say affected 110 million customers. Target is known as proficient and prolific in the use of mobile devices and other means for collecting consumer data. This proficiency has backfired, resulting in the retail giant struggling to regain consume...
28 January 2014 /security
Being stuck at an airport due to winter weather can be a real downer, but with an assortment of devices, apps and other instruments for connecting to the world, you can make that down time pass in a jiffy. With today’s technology, gone are the days where you nearly go bonkers doing endless crossword puzzles or reading one celebrity magazine after...
22 January 2014 /security
If your personal information gets compromised, a thief will open up financial accounts in your name. However, they will not pay the bills, and this will ruin your credit. Whether bad credit results from the legitimate credit holder’s irresponsibility or from identity theft, your ability to buy a car, rent a nice place, purchase a home or even get...
20 January 2014
There’s an app that can practically read your mind via your mobile device. The technology is called predictive analysis, and Google’s Now app is at the forefront. Other apps that utilize predictive analysis include Grokr and Osito: predicting the smartphone user’s next move. How does this work? Snippets of information are assembled via an algori...
17 January 2014 /security
It’s the New Year so time for new starts and new resolutions. With a new year upon us, now is a good time to clean out the clutter. Clutter is overwhelming, messy and inefficient and it transcends in both our physical and digital lives. Here are some tips to help clear the clutter out of your digital world. 1. Backup the Data on Your Devices You ar...
Defenses of a U.S. government agency were duped by an experimental scam created by security experts. The “scam” involved Emily Williams, a fictitious attractive woman with a credible online identity (including a real photo that was allowed by a real woman), posing as a new hire at the targeted agency. Within 15 hours, the fake Emily had 55 Linked...
13 January 2014 /security
Tech devices are rapidly evolving from those you carry around with you in a pocket to those you wear on an arm, and they seem to be getting smaller and smaller. We have the laptop as the progenitor, culminating in the smartphone and tablet. And beyond: Google Glass, a computer you wear, freeing your hands, that can connect to the Internet via voi...
12 January 2014 /security
Shopping online can be just as dangerous to your security as leaving your car unlocked in the mall parking lot. Consumer Reports notes the following: Don’t judge a website by its cover. A malicious website can look legitimate, even though it aims to nab your personal data, even identity, or sell counterfeit products. Others aim to lure you in “wi...
08 January 2014 /security
A thief got a hold of woman’s debit card information and raided her bank account. This true story is described in a recent St. Louis Post-Dispatch article. Thieves can wire money over the Internet and get the cash by showing a false ID, says the article. This kind of fraud is more common than people think. In the woman’s case, Visa detected the t...
06 January 2014 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.