Yet another messenger to adopt the Snapchat feature.
Without SnapChat or Telegraph, you can also set anything to disappear from everyone’s view – except those you want to be able to see it, use it, or destroy it. And they don’t have to share anything with you except a means of identifying themselves in advance. Curious?
Check out SafeJunction
Source: You can set your photos and videos to disappear from Telegram
Thanks to Marsha Collier and Mashable
Although there’s little press these days, Privacy and Security should be at the top of your list when prioritizing your IoT Project needs.
Why, you ask? Would you leave an unlocked car on the street? Would you use a debit card without a chip or pin?
The answer is simple. You wouldn’t.
7 Things to Consider When Planning Your IoT Project
Thanks to and your friends at SafeJunction
Personal information, particularly health care information, is being exposed in more places, through more “things” and to more people every day, which is creating new risks for people, businesses, health care organizations, governments and society as a whole. People all around the world are more concerned than ever about their privacy and the security of the personal information they share with others, with good reason.
The coming of age of privacy awareness is imminent. The question for today is “will you express your opinion and take action?”
Source: Blogs | StaySafeOnline.org
Thanks to StaySafeOnline
- Privacy – or a lack of it – is what drives concern about IoT in the USA (70%) and France (69%) versus a global average of 62%
- While around the world 54% name security their number one concern, in the UK it’s significantly higher (67%)
- 65% of Chinese and 61% of South African mobile users demand transparency from wearables providers over the use of their data compared to 52% worldwide
- 17% of Indians don’t want their TV to be connected to the internet compared to just 10% of the global sample.
Source: IOT Report 2016
Thanks to MEF – Mobile Ecosystem Forum
Transform your engineering processes and tools to gain a competitive advantage from the Internet of Things
IoT design will ultimately improve simplicity, functionality, and (Yes, Virginia) security!
Source: The impact of the Internet of Things on product development – Embedded Computing Design
Thanks to IoT Design
“How to Enable WhatsApp Two-Step Verification Passcode to Prevent Your Account from Being Hacked”
This isn’t rocket science folks – even though it adds a step that takes an additional minute to secure your transaction. Is your privacy worth an extra minute?
Source: WhatsApp Adds 2-Step Verification Passcode — Enable this Security Feature
Thanks to The Hacker News
“As the Internet of Things becomes more widespread, consumers must demand better security and privacy protections that don’t leave them vulnerable to..
As mobile applications, wearables and other Wi-Fi-connected consumer products replace “dumb” devices on the market, consumers will not be able to buy products that don’t have the ability to track them. It is normal for consumers to upgrade their appliances, and it most likely does not occur to them that those new devices will also be monitoring them.”
Source: The IoT threat to privacy
Thanks to Tech Crunch
Key escrow – the process of keeping a set of keys for yourself “just in case” – has always been the US government’s modus operandi when it comes to security.
The TechCrunch article is a must read – for a number of reasons, not the least which are the conclusions. In my “guarded” opinion not having locks at all is ludicrous. In this case, I was tempted to offer no opinion at all (since it might be useless), but I am reducing risk (slightly) by taking issue with the premise and the conclusion. The facts speak for themselves, yet another thread might be No Passwords At All because they might be cracked or Don’t Lock Your Car because criminals know how to break in. Aren’t we forgetting the deterrent or delaying possibilities?
Also, I seriously doubt that the author ever managed a company security office. If he did, I want to know his secret.
Source: Security experts have cloned all seven TSA master keys | TechCrunch
Thanks to TechCrunch
Encrypted comms company Silent Circle, which also makes a security-focused Android smartphone called the Blackphone, has announced it’s closed a $50 million Series C round of financing, led…
Looks like investors are beginning, finally, to see the value of encryption. Go SafeJunction!
Source: Encrypted comms company Silent Circle closes $50M Series C | TechCrunch
Thanks to TechCrunch
The internet is a dangerous place with all sorts of shady people out to get your personal data. One of the best ways to keep your accounts secure is with 2-factor authentication.
The slight inconvenience is worth the effort. But just don’t get caught without your cellphone or you’ll be back to cumbersome codes again. This user likes the cumbersome codes, though. My opinion is that the easier we make authentication and verification, the easier it will be to breach it.
Source: Google adds 2-step verification approval prompt on Android devices
Thanks to Ryan Whitwam in Google, News and Android Police