The Electronic Privacy Information Center (EPIC) is asking the FTC to ban vulnerable IoT-enabled toys from the marketplace.
David Bisson reports.
Published December 8, 2016 4:12 pm in Encryption, Privacy, Vulnerability 3
The Electronic Privacy Information Center (EPIC) is asking the FTC to ban vulnerable IoT-enabled toys from the marketplace.
David Bisson reports.
Published August 3, 2016 5:14 pm in Privacy, Security threats 3
A technologist with the Federal Trade Commission (FTC) argues frequent mandatory password changes don’t actually improve security.
David Bisson reports.
“Life is short, have an affair” was the slogan of infidelity website Ashley Madison.
What they didn’t say was that you might be chatting to a computer program.
Published August 31, 2015 10:22 pm in Data loss, Law & order, Privacy 2
A recent ruling against Wyndham Hotels may not cause a dramatic acceleration in security practices of many corporations, but it is perhaps the kick-start that is needed to move both corporate security as well as the Infosec profession in a positive direction.
Guest contributor Bob Covello reports.
Published December 6, 2013 10:14 am in Android, Fake anti-virus, Google, Privacy 1
Tens of millions of Android users have installed the Brightest Flashlight Free app, not realising that the app engaged in dirty tricks to share information about users’ location and devices with advertisers without consent.
Published February 8, 2013 4:27 pm in Guest blog, Law & order, Naked Security, Spam, Twitter 0
The firm behind fake websites such as “News 6 News Alerts,” “Health News Health Alerts,” or “Health 5 Beat Health News” has had to cease its deceptive operations after it was fined by the FTC.
Published May 20, 2010 2:04 pm in Guest blog, Law & order, Naked Security, Spam
Read more in my article at Naked Security.
Published February 23, 2010 4:57 pm in Data loss, Guest blog, Naked Security, Podcast
Read more in my article at Naked Security.
Published November 18, 2008 6:40 pm in Data loss, Guest blog, Law & order, Naked Security
Read more in my article at Naked Security.
Published October 14, 2008 10:12 pm in Guest blog, Law & order, Naked Security, Spam
Read more in my article at Naked Security.