Personal Information Protection
19 views | +0 today
Follow
Personal Information Protection
A consolidation of information and software pertaining to the protection of personal information on the web.
Your new post is loading...
Your new post is loading...
Scooped by Napoleon BlownApart
Scoop.it!

Data Privacy Day 2013: Microsoft releases privacy trends study and video series

For Data Privacy Day, Microsoft surveyed U.S. adults about privacy trends. About half of the people feel no or little control over the collection and tracking of their personal info.
more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

Online Privacy Policies Are Lengthy, Complicated and Reveal Alarming Trends | ITBusinessEdge.com

Online Privacy Policies Are Lengthy, Complicated and Reveal Alarming Trends | ITBusinessEdge.com | Personal Information Protection | Scoop.it
TRUSTe, a leading online privacy solutions provider, recently released its first privacy index as part of its new "Privacy Pulse" information series
more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

Top 5 online privacy trends in 2013 - iVPN.net Blog

Top 5 online privacy trends in 2013 - iVPN.net Blog | Personal Information Protection | Scoop.it
As 2012 draws to a close we take a look back at what we think will be the top five threats to online privacy over the coming year. Think we've missed som
more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

NSW/ACT Privacy and Personal Information Protection Act 1998 No 133

Click here to edit the title

more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

Online Privacy

Online Privacy | Personal Information Protection | Scoop.it
Rampant violation of online privacy is a problem of epic proportions--and impossible to stamp out.
more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

Internet privacy - Wikipedia, the free encyclopedia

Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail either Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website. PII refers to any information that can be used to identify an individual. For example, age and physical address alone could identify who an individual is without explicitly disclosing their name, as these two factors are unique enough to typically identify a specific person.

Internet privacy forms a subset of computer privacy. A number of experts[weasel words] within the field of Internet security and privacy believe that privacy doesn't exist; "Privacy is dead – get over it"[1] according to Steve Rambam, private investigator specializing in Internet privacy cases. In fact, it has been suggested that the "appeal of online services is to broadcast personal information on purpose."[2] On the other hand, in his essay The Value of Privacy, security expert Bruce Schneier says, "Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of surveillance."[3][4] Privacy concerns have been articulated from the beginnings of large scale computer sharing.[5]

People with only a casual concern for Internet privacy need not achieve total anonymity. Internet users may protect their privacy through controlled disclosure of personal information. The revelation of IP addresses, non-personally-identifiable profiling, and similar information might become acceptable trade-offs for the convenience that users could otherwise lose using the workarounds needed to suppress such details rigorously. On the other hand, some people desire much stronger privacy. In that case, they may try to achieve Internet anonymity to ensure privacy — use of the Internet without giving any third parties the ability to link the Internet activities to personally-identifiable information of the Internet user. In order to keep their information private, people need to be careful with what they submit to and look at online. When filling out forms and buying merchandise, that becomes tracked and because the information was not private, companies are now sending Internet users spam and advertising on similar products.

more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

Anti-virus reviews | Anti-virus deals, ratings, user reviews and prices - PC Advisor

Anti-virus reviews | Anti-virus deals, ratings, user reviews and prices - PC Advisor | Personal Information Protection | Scoop.it
The latest Anti-virus reviews at PC Advisor. Anti-virus user reviews, ratings, buying advice and price comparison
Napoleon BlownApart's insight:

Filter by company has a very extensive list of anti-virus software publishers

 

more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

Antivirus software - Wikipedia, the free encyclopedia

Antivirus or anti-virus software is software used to prevent, detect and remove malware (of all descriptions), such as: computer viruses, malicious BHOs, hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies. This page discusses the software used for the prevention and removal of malware threats, rather than computer security implemented by software methods.

A variety of strategies are typically employed. Signature-based detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. To counter such so-called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses by looking for known malicious code, or slight variations of such code, in files. Some antivirus software can also predict what a file will do by running it in a sandbox and analyzing what it does to see if it performs any malicious actions.

No matter how useful antivirus software can be, it can sometimes have drawbacks. Antivirus software can impair a computer's performance. Inexperienced users may also have problems understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection, success depends on achieving the right balance between false positives and false negatives. False positives can be as destructive as false negatives.[1] Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack.[2]

more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

Malware - Wikipedia, the free encyclopedia

Malware, short for malicious (or malevolent) software, is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software.[1] 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.[2]

Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software, and other malicious programs; the majority of active malware threats are usually worms or trojans rather than viruses.[3] In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states.[4][5] Malware is not the same as defective software, which is software that has a legitimate purpose but contains harmful bugs that were not corrected before release. However, some malware is disguised as genuine software, and may come from an official company website. An example of this is software used for harmless purposes that is packed with additional tracking software that gathers marketing statistics.

Malware has caused the rise in use of protective software types such as anti virus, anti-malware, and firewalls. Each of these are commonly used by personal users and corporate networks in order to stop the unauthorized access by other computer users, as well as the automated spread of malicious scripts and software.

more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

Firewall Software Downloads for Windows - CNET Download.com

The most downloaded Firewall Software software, including ZoneAlarm Free Firewall, PeerBlock, and Comodo Firewall
more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

Hitachi Construction Machinery : About Personal Information Protection

more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

Pew: Americans turning on to online privacy | Digital Trends

Pew: Americans turning on to online privacy | Digital Trends | Personal Information Protection | Scoop.it
A new report from the Pew Internet & American Life project finds Americans are increasingly minding their privacy settings and online reputations...including unfriending people
more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

Homepage for the Office of the Australian Information Commissioner - The OAIC

more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

I2P - Wikipedia, the free encyclopedia

I2P (Invisible Internet Project) is a computer network layer that allows applications to send messages to each other pseudonymously and securely. Uses include anonymous web surfing, chatting, blogging and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node. The software is free and open source and is published under multiple licenses. The name I2P is derived from Invisible Internet Project, which, in pseudo-mathematical notation, is represented as I²P.

I2P is beta software. Developers emphasize that there are likely to be bugs in the software and that there has been insufficient peer review to date. However, they believe the code is now reasonably stable and well-developed, and more exposure can help development of I2P.

The network itself is strictly message-based (like IP), but there is a library available to allow reliable streaming communication on top of it (similar to TCP, although from version 0.6 there is a new UDP-based SSU transport). All communication is end-to-end encrypted (in total there are four layers of encryption used when sending a message), and even the end points ("destinations") are cryptographic identifiers (essentially a pair of public keys), so that neither sender nor recipient of a message need to reveal their IP address to the other side or to third-party observers.

more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

US advocacy groups welcome net privacy bill

US advocacy groups welcome net privacy bill | Personal Information Protection | Scoop.it
PRIVACY and consumer groups have welcomed a "Do Not Track" bill introduced in the US Senate that will let internet users block companies from gathering information about their online activities.
more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

How we test antivirus and security software

How we test antivirus and security software | Personal Information Protection | Scoop.it
Testing security suites isn't glamorous, but effective software can be all that keeps you from an infected machine. Here's how CNET determines security suite performance. Read this post by Seth Rosenblatt on Internet security and firewall.
Napoleon BlownApart's insight:

CNet.com anti-virus testing methodology. (2013)

more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

Personal firewall - Wikipedia, the free encyclopedia

A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. Typically it works as an application layer firewall.

A personal firewall differs from a conventional firewall in terms of scale. A personal firewall will usually protect only the computer on which it is installed, as compared to a conventional firewall which is normally installed on a designated interface between two or more networks, such as a router or proxy server. Hence, personal firewalls allow a security policy to be defined for individual computers, whereas a conventional firewall controls the policy between the networks that it connects.

The per-computer scope of personal firewalls is useful to protect machines that are moved across different networks. For example, a laptop computer may be used on a trusted intranet at a workplace where minimal protection is needed as a conventional firewall is already in place, and services that require open ports such as file and printer sharing are useful. The same laptop could be used at public Wi-Fi hotspots, where strict security is required to protect from malicious activity. Most personal firewalls will prompt the user when a new network is connected for the first time to decide the level of trust, and can set individual security policies for each network.

more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

Anti-Malware Software Review 2013 | Best Malware Protection Software | Best Maleware Removal - TopTenREVIEWS

Anti-Malware Software Review 2013 | Best Malware Protection Software | Best Maleware Removal - TopTenREVIEWS | Personal Information Protection | Scoop.it
Which anti-malware software is right for you? Take a few seconds and easily compare several top rated malware programs with a side-by-side feature comparison chart and see how each stacks up.
more...
No comment yet.
Scooped by Napoleon BlownApart
Scoop.it!

US to scan people's private web traffic

US to scan people's private web traffic | Personal Information Protection | Scoop.it
Individuals in the US will have their web habits scanned in the name of cyber security.
more...
No comment yet.