» Who can you trust with your private data?

Who can you trust with your private data?

July 6, 2010 by Steve Hannaford
Posted in: In this week's e-newsletter, Latest News & Views, Regulations & Compliance

It’s not just professional cybercriminals you should be hiding your sensitive data from. It’s also some of the most commonly used applications and powerful institutions in the computer world, who are either taking your data without your consent or doing a bad job at protecting it.

That fact was made clear by some recent news stories:

  • Google has been collecting passwords and e-mail messages, it is claimed. Apparently, Google’s roving Street View cars that present neighborhood views of locations across the world, have been intercepting local Wi-Fi communications. A lawsuit has been brought in France, but the practice goes on in a number of countries. Google’s response: Yes we collect the info, but it’s fragmentary, and we don’t use this stuff. Trust us.
  • Twitter recently settled a suit with the Federal Trade Commission, admitting that allowed hackers to take control of several Twitter accounts, including those of President Obama and Fox News. The agreement sets up an independent security auditor that will assess how the company is doing, The company has vowed to take measures to prevent “unauthorized access to nonpublic information and honor the privacy choices made by consumers.”
  • Social networking giant Facebook faces a number of class-action lawsuit over its callous disregard for customer privacy, by making so-called private information on user accounts easily available, both to the general public and to marketers. The controversy was inflamed by Facebook founder Mark Zuckerberg’s public pooh-poohing of anyone’s privacy concerns, the company’s default setting of having the default set at no privacy at all and its policy of making that hard to change.
  • AT&T is, for now, the sole mobile source for iPad 3G users in the United States. Well, it didn’t take long. A group of hackers easily obtained the e-mail addresses of 114,000 iPad owners, using a security hole in AT&T’s website. Fortunately, in this case the hackers were part of a group that it specializes in exposing security vulnerabilities, and they quickly informed AT&T, who fixed that vulnerability. The conclusion: AT&T should have a lot of expertise on board, but they left a door wide open. How many more are there?
  • Share/Bookmark delivers the latest IT and Imaging news once a week to the inboxes of over 200,000 IT and Imaging professionals.

Click here to sign up and start your FREE subscription to DocuCrunch!

Tags: , , , ,

Comments are closed.



  • How to Select a Web Host
    November 27, 2011 by marketing

    Creating a new website?  Not sure how to choose from among all the options?  Need shared hosting, small business hosting, or VPS hosting?  Lots of email accounts? 5-star reliability rating? Fortunately, there’s information available to help. The Best Web Hosts is great resource that will help you select the best web hosting company. It features reviews, rankings, and definitions that can help make your job of selecting a new web host more effective.

  • SMART Steps Towards Workload Automation
    January 19, 2010 by Luke Marchie

    Consolidating job scheduling into a single, comprehensive workload automation solution is a critical first step to effective Workload Automation (WLA).

    Download the free whitepaper here! More…

  • Identifying and Thwarting Malicious Intrusions
    January 12, 2010 by Luke Marchie

    Identifying and Thwarting Malicious Intrusions

    The phenomenal growth in social media has opened the door for all new malicious intrusions from gangs of cyber criminals. Utilizing the trusted relationships in social networking and benefiting from immature security and content controls, hackers are seeing increased performance in their attacks.

    Download the free whitepaper here More…

  • The Security Issues with Web 2.0
    January 12, 2010 by Luke Marchie

    The collaborative benefits of Web 2.0 technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. With these technologies come new types of attack vectors.

    Download the free whitepaper here


  • Network-Critical Physical Infrastructure: Optimizing Business Value
    December 29, 2009 by Luke Marchie

    To stay competitive in today’s rapidly changing business world, companies must update the way they view the value of their investment in Network-Critical Physical Infrastructure (NCPI). No longer are simple availability and upfront costs sufficient to make adequate business decisions. Agility, or business flexibility, and low total cost of ownership have become equally important to companies that will succeed in a global, ever-changing marketplace.

    Download the free whitepaper here! More…

  • The New World of eCrime: Targeted Brand Attacks and How to Combat Them
    December 26, 2009 by Luke Marchie

    Nothing is more valuable to a business than its reputation. That is why brand attacks, which leverage a company’s valuable brand for nefarious purposes, must be battled on every possible front. Brand attacks are the new form of eCrime, and they’re being launched with new and rapidly evolving exploits, including phishing and—most recently—malware.

    Download the free whitepaper here! More…

  • DDoS: The Mother of All Cyber Threats
    December 16, 2009 by Luke Marchie

    DDoS: The Mother of All Cyber Threats

    Don’t wait until your business is targeted. A Forrester Consulting study commissioned by VeriSign revealed that nearly 75 percent of the 400 study respondents have experienced one or more DDoS attacks in the past year. Yet, most e-commerce businesses are not prepared for a large-scale DDoS attack. Could your business afford three or more hours of downtime? Avoid that revenue loss by registering for this free white paper

    Click here to download the free white paper More…

  • View more offers

    Quick Vote

    • Does your office have a color printer or copier?

      View Results

      Loading ... Loading ...

  • advertisement