Understanding the difference between privacy and security will explain why a privacy program is dependent upon a security program, thereby making a cooperative, interdependent relationship between the teams (and the Chief Privacy Officer and Chief Security Officer) a necessity.
You cannot have privacy protection without strong cyber security.
While NSA whistleblower Edward Snowden weighs into Allo controversy, Google 'cyber overlord' Thai Duong argues end-to-encryption is nice but what people really want is disappearing messages.
Disappearing messages is adressering a basic human communication need, to be spontaneous and private. But, without proper end-2-end encryption that privacy is just a scam, like Snapchat. Tricking people into thinking that their whims will disappear makes people honest and such honesty should be protected and private. You don't have to go further than to all the breaches of Snapchat to see what people want to use such a service for. Of the record, often means highly sensitive and private messaging, including highly private pictures.
Can a compromise ever be reached over the use of end-to-end encryption? Perhaps, but it's not down to the intelligence agencies or the tech companies to decide.
Encryption is a necessity for a working and trust worthy Internet. Everyone can agree on that. The problem is the misuse of encryption. Misuse for criminal or terrorism intent. But also misuse by government agencies that want the public to trust Internet while they develop methods of mass surveillance.
The whole is situation is created by the governmental misguided use of mass surveillance, as well as the idea of using Internet as a weapon in cyberwar between states.
We have to make a choice; shall we as a society accept that there are people that use this tool for criminal activity, while protecting the majority, or should we plan for a police state of mass control?
Interesting though, that this is a non-issue when it comes to the weapons and arms industry. Everyone seems to agree that we need arms and military to protect us, while there still are people using guns to kill each other. We hear the argument "it's not the gun that kills". The same goes for encryption. It's not encryption that enables terror and criminality. It is bad people, and sometimes oppressive systems.
US intelligence chief says the Internet of Things will create new opportunities for surveillance and hacking.
When you buy a connected house appliance, be very selective. Google. Read blogs. Don't buy things from shady manufacturers. Here is actually an opportunity for all those price comparison sites, open a department for security comparisons in relation to the price, and maybe the manufacturers will wake up.
Since the 2013 Snowden disclosures revealed the extent of government surveillance programs it's been a standard claim by intelligence agencies, seeking to..
With unprotected IoT devices surveillance is "going light". This will be especially true if you install a device that is harvesting your data, for whatever purpose. Harvested data means harvested data, open for any external hacking and access.
The court has ruled that it's reasonable for a company to check employees' email and instant messaging and that doing so doesn't violate their right to confidential correspondence.
This ruling just point at the fact that company provided tools are company owned, and that if they have a policy to not allow company tools to be used for private matters, they are allowed to control and enforce these rules. It says nothing about the modern business landscape with for instance BYOD.
Ghost Security Group has reportedly discovered an Android mobile application used by members of the ISIS organization for secure…
The market drive to make app development simple, makes it possible for anyone to develop their own app. Including terrorist organisations. So, the idea of preventing commercial apps from using encryption will not prevent any unwanted communication. Then you must also ban app development. Or mobile phones.
The encryption tech is also needed to protect ordinary people, corporations as well as governments. It is a crucial tool for normal police investigative work with informers and infiltration which happens to be the only tactic that really works. That's why the US government has supported the development of TOR. They need secure channels for their field agents to communicate without being too obvious, a way to hide the old crypto machine in plain sight.
Mass surveillance cannot compete with old fashion police work.
Some government agencies use terrorist attacks to justify limiting encryption. TechRepublic spoke with two UN reporters who explained why encryption is critically important for all citizens.
Like any tool encryption can be misused for bad things. But, encryption is essential for protecting people from criminals stealing assets, your identity and your privacy. Also democracy is built upon the freedom of speech and freedom of thinking. Even if you have thoughts that are negative for the society.
Edward Snowden lists services that will protect your privacy with just a few downloads.
Snowden makes his recommendations. You don't have to use the same apps but you should consider using the same type of apps. The positive side effect is that you do not only protect your privacy, you also protect yourself from hackers, cyber criminals, identity theft, etc.
If you see this notification, it might be time to buy a new computer.
Facebook want to protect your data with a new security notification. Good work Facebook! But it's not only about protecting your data. They are actually protecting their data. By keeping your account clean and accurate, they know that the data is accurate for their own monetization.
Anyway, it is still a step in the right direction. And remember to turn on their two-factor authentication.
The latest survey from Deloitte has revealed businesses that respect the privacy of its customers are more likely to be trusted.
Caring for your customers include caring about their data and privacy. Businesses that respect the privacy of its customers are more likely to be trusted, and who wants to do business with someone they don't trust?
If you want to protect your data, privacy, and communications from corporations, government snoops, or hackers, end-to-end encryption is a great way to start. It's the type of encryption Apple and Google added to their mobile devices and smartphones...
Products subsidized by harvesting your data will prevail. You will have to pay the full prize for a product or service if you want to be protected and private. There is no such thing as a free service or lunch.
In the grab bag of Google/Alphabet's big projects for 2016 is Project Abacus. It's basically the company's plot to kill the password in cold blood, by replacing...
Strong authentication is much needed and good, but harvesting all your personal data is bad. You can create the most sophisticated AI based entry system, but it will still be of no use when the communication and central servers and clouds are still open holes for exploitation.
Google will now have an even better profile of you that they will sell to the highest bidder.
Tech industry hits back at plans to create legal framework for hacking by spies, military and police.
A backdoor for one agency means a backdoor for any agency, country or cyber criminal. It also means that communication will become point-2-point encrypted and secure with backend offered by more insightful states that care about privacy, like the Netherlands for instance. We will see a huge shift in competitive power from US and to safe havens. Of course US tech CEOs are worried.
The greatest mysteries of this world and beyond... a curated repository of knowledge featuring the darkest, strangest, weirdest, and most amazing of science,...
Is your TV or smartphone spying on you right now? There may be no escape... even when you're offline. Dark5 presents 5 corporations that may be secretly tracking you and mining your personal data for profit.
Blackhat’s keynote speaker says it’s up to us to make sure the Net is our liberator, not our oppressor
Will Internet be centralized and controlled by corporations and governments, resembling state controlled TV? Or will it be freely accessible to grow global democracy and freedom? Will it be a closed system or something in between?
Privacy advocates warn feds about surreptitious cross-device tracking.
Ad companies gets sneakier by the day in the ways they try to harvest your data for their targeted ads business. One can just speculate who else use this kind of technology, since much is derived from the latest malware and hacking developments.
Apple has pulled several apps from its store, following security researchers' findings that hundreds of iOS apps have been accessing users' private data.
Apple shows that they are taking privacy seriously by cracking down on apps developed using a shady 3rd party SDK.
This again proves the point that developers must be more on top of security and privacy issues. Even if you are a small independent developer. And it's for this type of developer we developed apptimate.io.
Sharing your scoops to your social media accounts is a must to distribute your curated content. Not only will it drive traffic and leads through your content, but it will help show your expertise with your followers.
How to integrate my topics' content to my website?
Integrating your curated content to your website or blog will allow you to increase your website visitors’ engagement, boost SEO and acquire new visitors. By redirecting your social media traffic to your website, Scoop.it will also help you generate more qualified traffic and leads from your curation work.
Distributing your curated content through a newsletter is a great way to nurture and engage your email subscribers will developing your traffic and visibility.
Creating engaging newsletters with your curated content is really easy.