What is the world coming to? Obviously an off-shore exploit. No self-respecting US citizen – crook or not – would defile our national treasure Star Trek. To boldy go where no man has gone before. Hmmmm! Source: Shameless crooks fling Star Trek-themed ransomware at world • The Register Thanks to The Register
Source: Shameless crooks fling Star Trek-themed ransomware at world | The Cloud Is Huge 2.0
Thanks to The Cloud is Huge
ISP lobby groups make case against the FCC’s broadband privacy rules.
And now begins the nit picking argument about language and the meaning of terms in the law that govern enforcement and permitted acts that affect public communications and the Internet. “Sensitive” is the favorite these days. Its become the new speak for “privacy”, as if the Fourth Amendment of the US Constitution doesn’t protect a citizens “sensitive” information or property. Many of our long standing concepts about what is and what is not private are being turned on their heads by changes in surveillance technologies (read: security cameras and recording systems) and the new realities of 21st century living.
Source: ISPs say your Web browsing and app usage history isn’t “sensitive” | Ars Technica
Thanks to Ars Technica
Two proposed settlements involving Google drew very different reactions from two federal judges on Thursday in San Jose, with one headed toward approval and the other drawing a rebuke over the clas…
SafeJunction technology prevents providers like Google from viewing or analyzing emails in-transit or even after they are stored.
Source: Judge Has Doubts About Gmail Privacy Deal
Thanks to Courthouse News Service
IoT and its diverse connected devices poses a serious threat to the security of our homes, automobiles, businesses, and personal devices. Consumers need to realize that there’s more to connectivity and access than meets the eye. And privacy is at the heart of the challenge.
What is the future of IoT going to be like? Ahmed Banafa gives us 10 key points to take into account while illuminating the future of this promising technology
2.Standards and Ecosystems
3.Event Stream Processing
5.Processors and Architecture
6.Low-Power, Wide-Area Networks
7.Low-Power, Short-Range IoT Networks
8.Device (Thing) Management
Source: 10 Predictions for the Future of IoT – OpenMind
Thanks to OpenMind
Right or wrong, Edward Snowden’s revelations about NSA surveillance have focused attention on the Fourth Amendment and national security in ways that our founding father’s never could have imagined.
After the June 2013 leaks by Edward Snowden about NSA surveillance of Americans’ communications, Pew Research Center began an in-depth exploration of people’s views and behaviors related to privacy. Here’s what we learned.
Source: The state of privacy in America | Pew Research Center
Thanks to Pew Research
The message: Your mobile and computing devices can be attacked, breached, infected, or otherwise compromised anytime – anywhere – and without warning. The important truth about technology in the 21st Century is that its fraught with danger AND you ignore the threats until YOU become a victim.
Source: Top Story: Malicious fake app bricks phone and installs ransomware | Komando.com
Thanks to Komando.com
Personal information, particularly health care information, is being exposed in more places, through more “things” and to more people every day, which is creating new risks for people, businesses, health care organizations, governments and society as a whole. People all around the world are more concerned than ever about their privacy and the security of the personal information they share with others, with good reason.
The coming of age of privacy awareness is imminent. The question for today is “will you express your opinion and take action?”
Source: Blogs | StaySafeOnline.org
Thanks to StaySafeOnline
- Privacy – or a lack of it – is what drives concern about IoT in the USA (70%) and France (69%) versus a global average of 62%
- While around the world 54% name security their number one concern, in the UK it’s significantly higher (67%)
- 65% of Chinese and 61% of South African mobile users demand transparency from wearables providers over the use of their data compared to 52% worldwide
- 17% of Indians don’t want their TV to be connected to the internet compared to just 10% of the global sample.
Source: IOT Report 2016
Thanks to MEF – Mobile Ecosystem Forum
How can businesses continue to respect privacy concerns while still permitting the use of big data to drive business value?
Companies will now have an even greater obligation to protect the personal information entrusted to them, no matter how it’s processed’
Big data use is expected to grow exponentially in the next few years now that the noise and excitement over the volumes of data we have at our fingertips are starting to be replaced by action and practical experimentation, and many organizations start to really capitalize on their investments in analytics, data collection and storage.
The facts of Internet life in 2017 are that privacy still seems unimportant to most users, but the increasing number of incidents of abuse and cyber crime will attract more and more public attention.
Source: Big Data vs. Privacy: A balancing act
Thanks to Predictive Analytics Times
“In the past year, regulators and privacy advocates have taken potshots at Microsoft over its data collection policies. Today, Microsoft announced some new privacy-related initiatives, including a significant change to the way Windows 10 collects telemetry data.”
It remains to be seen whether attention to privacy and the issues that surround it in 2017 will continue to attract more attention and concern. Hopefully!
Source: Microsoft tries to soothe regulators and critics with new privacy controls | ZDNet
Thanks to ZDNet