Yahoo wants to spy on users through smart advertising

“Yahoo has filed a patent for a type of smart billboard that would collect people’s information and use it to deliver targeted ad content in real-time.

Using a combination of sensors, including microphones and cameras located either on the billboard or on drones nearby, it would watch and listen to people near the billboard to get a sense of who they were and how they were reacting, which would help it to tailor what it showed them.The patent showed that the billboard might work with advertising exchanges, meaning that it wouldn’t just display its own ads, but might also put them devices including tablets, phones, smartwatches and TVs.
“The ubiquity of mobile devices and the ability to craft individualized marketing strategies to meet the needs and interests of specific consumers have made a compelling case for such techniques as the most efficient use of marketing budgets. Nevertheless, a significant portion of such budgets is still devoted to more traditional channels.”

Source: Yahoo wants to spy on users through smart advertising

Thanks to SC Magazine

Facebook Crowned Privacy Villain Of 2016 By European Privacy Rights Group

“Facebook has access to a wide range of personal data, and it tracks your movements across the web, whether you are logged in or not. And the devil is in the default: To opt out, you are expected to navigate Facebook’s complex web of settings.

On 6 October, the Belgian Big Brother Awards took place in Brussels. The negative prize for the worst privacy abuser was unanimously granted to Facebook by the professional jury. The public confirmed Facebook’s title as the ultimate privacy villain of the year – a big majority of the votes went to the social network that is successfully harvesting and generating personal data from people all around the world.”

Source: Facebook Crowned Privacy Villain Of 2016 By European Privacy Rights Group


Thanks to Topix

Exclusive: Yahoo secretly scanned customer emails for U.S. intelligence

Yahoo Inc last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said three former employees and a fourth person apprised of the events.

SafeJunction protects your documents and emails from prying eyes.

Source: Exclusive: Yahoo secretly scanned customer emails for U.S. intelligence – sources | Reuters\

Thanks to Reuters

The Intersection of Data Encryption and Compliance

Compliance requirements are the major basis for implementing an encryption solution. Discover what your business needs to know about data encryption and compliance.

Source: The Intersection of Data Encryption and Compliance – Peak 10

Thanks to Peak 10

SafeShare takes EFSS to a whole new level

SafeJunction‘s SafeShare takes Enterprise File Synchronization and Sharing (EFSS) to a whole new level.  According to Gartner, “EFSS refers to a range of on-premises or cloud-based capabilities that enable individuals to synchronize and share documents, photos, videos and files across multiple devices, such as smartphones, tablets and PCs.”

Enterprise File Synchronization and Sharing is designed to eliminate file duplication while providing secure access within an Enterprise.

As one of the ESFF leaders Citrix suggests: “The primary benefit of EFSS is the ability to securely share files such as documents, photos and videos across multiple devices and with multiple people. The synchronization, or copying, capability allows files to be stored in an approved data repository, then accessed remotely by employees from PCs, tablets or smartphones that support the EFSS product.  EFSS is often viewed by companies as a means to deter employees from sharing corporate data via public cloud storage and file-sharing services such as Google Drive or Dropbox, which are outside of IT’s control. EFSS products include security capabilities such as authentication, data encryption, containerization and tracking features to protect enterprise data. Still, not all EFSS offerings include encryption to protect data after it’s transferred locally to a user’s device.”

SafeShare revolutionizes EFSS by allowing the “container” to be shared by an authorized user inside the Enterprise security system and transferred outside to any public cloud storage or file-sharing service such as Google Drive or Dropbox while maintaining the security and privacy of the file or document.  This enables Enterprise users to send privileged items like contracts, agreements, licenses, HIPAA protected perdsonal information, and sensitive financial information to stakeholders, vendors and contractors, customers, and other unprotected users of their Enterprise information.


Thanks to SafeJunction

Yahoo Says at Least 500 Million Accounts Breached in Attack

“Says the attacker was a “state-sponsored actor.” Read More Below

The public acceptance and tolerance of data breaches including the theft of their identity information and also occasional credit card account compromises continues despite so much evidence that there is a need for caution.  Its one of the strange anomalies of the digital age.

Source: Yahoo Says at Least 500 Million Accounts Breached in Attack | Data Center Knowledge

Thanks to Data Center Knowledge

9 keys to having a HIPAA-compliant cloud

“For a public IaaS cloud environment to be compliant with strict data privacy laws from HIPAA certain controls must be put in place. Here are 9 examples:

  1. Implement audit controls: Use tools such as AWS’ Cloudtrail and S3 buckets as key components of a logging infrastructure.
  2. Review system activity: Leverage audit logs to enable the review of activity within your system.
  3. Identity and Access management controls: Keep track of every user who logs into a cloud environment and what they do; alert administrators if settings are changed.
  4. Disaster recovery: Ensure there are backups of all data to satisfy contingency plan requirements, including emergency mode operation.
  5. Evaluate your security posture: Conduct vulnerability scans, penetration tests, and code scans on systems processing Personal Health Information (PHI).
  6. Establish a proper Business Associate Agreement: Outline key responsibilities between you and your vendors. These should address responsibilities for keeping data safe, how to provide patients with access to their data, and what to do in the case of a data breach.
  7. Access Controls: Ensure users are unique and logged. Enable auto logoff features, robust authentication features, and stateful security groups.
  8. Encrypt PHI and other sensitive data: Encrypt all data in motion and in rest using a purpose-designed approach.
  9. Ensure transmission security: Effectively enable the proper encryption of data in transit using AES 256 encryption (SSL and TLS) as well as object keys where feasible.”

Please look to SafeJunction for your PHI data in motion and data at rest.

Source: 9 keys to having a HIPAA-compliant cloud

Thanks to Network World

Internet of Things a Spyglass on Workers?

“Congress is showing some bipartisan support for the “internet of things,” but some worker advocates say lawmakers may be overlooking the employee privacy implications of technological advances in the workplace.The House Sept. 12 passed with overwhelming bipartisan support a resolution (H.Res. 847) calling on policy makers to come up with a strategy to encourage the internet of things.The buzz phrase refers to the increasing power of technology to allow machines and people to communicate with each other via linked sensors, whether it’s a pacemaker that sends performance information to doctors or crop sensors that tell farmers when it’s time for more water.”

SafeJunction protects your IoT identity and data,

Source: Internet of Things a Spyglass on Workers? | Bloomberg BNA


Thanks to Bloomberg BNA

Changing Tactics: The Rise of the Privacy Advocates

Justin Brookman of the Center for Democracy and Technology certainly thinks privacy advocates are gaining traction. Five years ago, for example, the public really wasn’t engaged in the conversation about privacy at all.

“The issues weren’t intuitive to them, and the message wasn’t getting out,” Brookman said.

The privacy conversation continues with increased awareness of threats to Internet users identities and information.  Until there’s a major event, breach, or high profile privacy breach, users will continue to assume that they won’t get hacked, have their financial services compromised, or be embarrassed.  SafeJunction continues to believe that our privacy products will continue to be relevant, but market adoption will be slow.

Changing Tactics


Thanks to