Tag Archives: privacy

Convenience Traded for Privacy: Samsung Televisions

Cool new technologies like the Samsung voice controlled television, are a great convenience. They are also a huge window for the Samsung company to get into your homes. When you enable voice control, all noises are transmitted to Samsung and … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Convenience Traded for Privacy: Samsung Televisions

Anthem Health Insurance Breach

Anthem was the target of a very sophisticated external cyber attack. Based on what they know at this time, there is no evidence that credit card or medical information were targeted or compromised, just the other information that makes it … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Anthem Health Insurance Breach

Data Privacy Day: 2015

Every January 28th, is Data Privacy Day. A good reminder to police yourself and clean up your digital footprint you left on the Internet. The 2nd Annual Report on How Personal Technology is Changing Our Lives, reports that Privacy is … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Data Privacy Day: 2015

770,000 Records From One of Australia’s Largest Travel Insurance Companies

Around the number of 770,000 records of personal information consisting of travel insurance clients, names, phone numbers, email addresses, travel dates and prices for policies was stolen around December 18th. Aussie Travel Cover notified 3rd party agents, but did not … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on 770,000 Records From One of Australia’s Largest Travel Insurance Companies

Privacy? Not in the US

In a recent post from the FBI: The FBI and Congress have thus far failed to enact meaningful restrictions on what types of data can be submitted to the system, who can access the data, and how the data can … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Privacy? Not in the US

Encrypting Your Android Phone

I’ve been a huge fan of Android based phones. New Android phones will be encrypted by default, but if you have had your smart phone for over a month, you probably do not have encryption enabled. Why would you want … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Encrypting Your Android Phone

Fake Cell Phone Towers & CryptoPhone

Seventeen fake cellphone towers were discovered across the U.S. last week. They were discovered by using the CryptoPhone, an Android-based secure mobile phone with 360° mobile device security for secure messaging and voice over IP communication on any network. “What … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Fake Cell Phone Towers & CryptoPhone

User Based (Health) Insurance?

I almost wanted a fitbit. I started to see a lot of them at work and in general. They seemed to grow in popularity like Crocs did 10 years ago. I decided to wait it out and watch people wear … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on User Based (Health) Insurance?

Digital Profile

Ubisoft created a video game called Watch Dogs, though some of the threats may be far reaching in their risk analysis, if you have a Facebook profile and are active on it, try out the Digital Shadow. I can appreciate … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Digital Profile

Mikko Hypponen: How NSA Ruined Our Trust

Airgap, blackpearl, cineplex, xkeyscore, prism, creek, crossbones, cultweave, cybertrans, dishfire, doublearrow, dragonfly, wealthycluster, hightide, skywriter, jollyroger, kingfish, liquidfire, messiah, nightsurf, normalrun, mailorder, pinwale, taperlay, tarotcard, twistedpath, yellowstone. If you have nothing to hide, can you be trusted with secrets? How … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Mikko Hypponen: How NSA Ruined Our Trust