Virus

Help I’ve Been Hacked

There is a continuum among computer users when it comes to security knowledge and dealing with malware issues on a PC. From outright novices, up toward those who are proficient through business or school usage, and ultimately into the land of true security professionals. No matter where you fit on such a spectrum, having a personal…

Unsubscribe

Email Trust – OTA Unsub Best Practices Audit

Has it really been 10 full years since the U.S. CAN-SPAM Act of 2003t took effect?  Yes, and then some… The CAN-SPAM Act in the United States takes some heat on the international stage – as an “opt-out” law, it’s considered akin to “best practices” more so than “high standards” for…

LuMaxArt Graduation Concept

OTA Announces 2014 Honor Roll Methodology

The Online Trust Alliance announced the methodology behind the forthcoming 2014 Online Trust Audit and Honor Roll, evaluating leading websites and mobile applications. This marks the fifth consecutive year OTA has conducted its Honor Roll Audit and Honor Roll report. As an independent online trust benchmark study, the Online Trust…

3D Judges Gavel

Data Breach Payout for Consumers

In the wake of the Target data breach in December 2013, I’ve continued to think about the impact of data loss to consumers.  Historically courts have not shown to find “harm” being done to consumers where their data was lost or misused for marketing.  Typically there must be some financial…

n92131548n

Data Security Starts With Your Password

I am a happy user of Evernote, a fantastic web-based clipping service that I (and 65 million others) use to remember stuff.  Folks who know me, know I need the help.  😉 I recently received an email from them – about a data breach involving passwords.  They were concerned for my…

Danger de mort

Exploring Privacy Harm

We live in an online world, where increasingly the value proposition as users is a trade of our information and attention.  In exchange for our time and attention – we receive this value  – the free-use of innovative, fun or useful services online.  I’ve mentioned this issue of “Data Harm” previously,…

slide

Snowden 101

Jay Cline is a well-respected expert in privacy, and in case you missed until now, as I had – has written a great summation of the Eric Snowden saga. Be sure to check out Jay Cline: What will Snowden leak next? over at ComputerWorld, when you get a chance. At one…

YAHOO in 2001.

Yahoo! Mail Under Wiretapping Fire

Wendy Davis of Mediapost reported last week that Yahoo is also now being sued for scanning emails to target ads to their users. This comes on the heels of Gmail – also managing a class action suit in progress for essentially the same issue. Privacology.com Contributor Ben Isaacson recently discussed the latest…

schneier

Key Resource: Schneier on Security

I wanted to take a moment and recommend one of my favorite resources for security and privacy intelligence. Schneier on Security. When it comes to security – both online and off – there are few in the world  I think of as more qualified an expert as Bruce Schneier.  I’ve…

slide

Event: Morning of Mobile Privacy

If you are in New York City this coming October 17th, count yourself lucky… The Mobile Leaders Alliance and Celtra have teamed up on a great event to educate the industry on mobile privacy. A Morning of Mobile Privacy is timely – the issues in online privacy continue to flourish, but as…