What is the world coming to? Obviously an off-shore exploit. No self-respecting US citizen – crook or not – would defile our national treasure Star Trek. To boldy go where no man has gone before. Hmmmm! Source: Shameless crooks fling Star Trek-themed ransomware at world • The Register Thanks to The Register
Source: Shameless crooks fling Star Trek-themed ransomware at world | The Cloud Is Huge 2.0
Thanks to The Cloud is Huge
“An accusation for which the president again offered no evidence sets off another spasm surrounding his young administration.”
SafeJunction holds the privacy of citizens and lawfully conducted investigations, including conversations, documents, and materials gleaned thereby to be of the highest importance in a free democracy. We believe that an individual’s right to privacy in the conduct of lawful personal and business affairs is a right, not just a privilege to be taken lightly.
Source: What Can Be Gleaned From Trump’s Allegations of Wiretapping – The New York Times
Thanks to The New York Times
THIS IS SERIOUS!
House Intelligence Committee
Thanks to The 21st Century
ISP lobby groups make case against the FCC’s broadband privacy rules.
And now begins the nit picking argument about language and the meaning of terms in the law that govern enforcement and permitted acts that affect public communications and the Internet. “Sensitive” is the favorite these days. Its become the new speak for “privacy”, as if the Fourth Amendment of the US Constitution doesn’t protect a citizens “sensitive” information or property. Many of our long standing concepts about what is and what is not private are being turned on their heads by changes in surveillance technologies (read: security cameras and recording systems) and the new realities of 21st century living.
Source: ISPs say your Web browsing and app usage history isn’t “sensitive” | Ars Technica
Thanks to Ars Technica
Two proposed settlements involving Google drew very different reactions from two federal judges on Thursday in San Jose, with one headed toward approval and the other drawing a rebuke over the clas…
SafeJunction technology prevents providers like Google from viewing or analyzing emails in-transit or even after they are stored.
Source: Judge Has Doubts About Gmail Privacy Deal
Thanks to Courthouse News Service
IoT and its diverse connected devices poses a serious threat to the security of our homes, automobiles, businesses, and personal devices. Consumers need to realize that there’s more to connectivity and access than meets the eye. And privacy is at the heart of the challenge.
What is the future of IoT going to be like? Ahmed Banafa gives us 10 key points to take into account while illuminating the future of this promising technology
2.Standards and Ecosystems
3.Event Stream Processing
5.Processors and Architecture
6.Low-Power, Wide-Area Networks
7.Low-Power, Short-Range IoT Networks
8.Device (Thing) Management
Source: 10 Predictions for the Future of IoT – OpenMind
Thanks to OpenMind
Right or wrong, Edward Snowden’s revelations about NSA surveillance have focused attention on the Fourth Amendment and national security in ways that our founding father’s never could have imagined.
After the June 2013 leaks by Edward Snowden about NSA surveillance of Americans’ communications, Pew Research Center began an in-depth exploration of people’s views and behaviors related to privacy. Here’s what we learned.
Source: The state of privacy in America | Pew Research Center
Thanks to Pew Research
“There is no such thing as absolute privacy in America; there is no place outside of judicial reach,” Comey said at a Boston College conference on cybersecurity. He made the remark as he discussed the rise of encryption since 2013 disclosures by former National Security Agency contractor Edward Snowden
revealed sensitive US spy practices.
“Even our communications with our spouses, with our clergy members, with our attorneys are not absolutely private in America,” Comey added. “In appropriate circumstances, a judge can compel any one of us to testify in court about those very private communications.”
But, he also said Americans “have a reasonable expectation of privacy in our homes, in our cars, in our devices.
“It is a vital part of being an American. The government cannot invade our privacy without good reason, reviewable in court,” Comey continued.
The privacy conversation continues in 2017 as the White House sends mixed messages. And new threats to computing devices and TVs remind us to be vigilent and not assume that we are protected from surveillance, hacking, and cyber crime.
FBI Chief Comey on Privacy
Thanks to the FBI and CNN
“Keep your home and loved ones safe with these time-tested home security tips.
- Survey your home, thinking like a would-be burglar.
- Have a look at the locks on your doors, the length of the screws used to secure the hinges, and the screws used in the striker plates that the deadbolts rest in.
- Securing the door frames themselves makes good sense.
- Consider the landscape around your home.
- Doors and locks themselves should be of the highest quality.
- Consider the space in-between the door and its frame.
- Windows can be secured in a number of ways.
- Use multiple locks on doors.
- Consider installing exterior lighting in key areas to light the most vulnerable doors and windrows.
- Identify things in your yard that could be of use to a burglar.
- Hide your valuables from plain view.
- Consider investing in protective window film or window bars if you live in a high risk area.
- Do not leave mail in the mailbox for any length of time, or leave flyers or advertising paraphernalia in the door.
- Use timers for lights inside your home, if you go away regularly from your home at night.
- For the same reasons that one shouldn’t leave mail and adverts in the door or mailbox, one also should take care not to leave any outside lights burning all night into the day.
- If you live in a neighborhood that has been plagues with home invasions, it is a good idea to create a safe room inside your home for you and your family.
- Engrave your valuables with an engraving tool, putting your name on them.
- Don’t stash all of your valuables in one place.
- This goes with tip # 17: photocopy all the contents of your purse or wallet.
- Join or start a neighborhood watch program, if this is possible.
- If you go out,whether to work or just about town, consider leaving the radio or television on, and preferably on a talk program. this, with the other tip of leaving lights on timers, can go a long way to confusing a would-be burglar.
- If you like animals, and don’t have any sorts of allergies or similar issues, consider getting a dog.
- Most garages have doors leading to the house from the inside of the garage, and most often these are the least protected entrances. Give these doors the same consideration as you would your front or back doors!
- This last one is so obvious, but you would be surprised how many of my neighbors do it: do not leave home with the windows open!”
Source: 24 Home Security Tips for 2017 | Live Safely
Thanks to Live Safely
The message: Your mobile and computing devices can be attacked, breached, infected, or otherwise compromised anytime – anywhere – and without warning. The important truth about technology in the 21st Century is that its fraught with danger AND you ignore the threats until YOU become a victim.
Source: Top Story: Malicious fake app bricks phone and installs ransomware | Komando.com
Thanks to Komando.com