9 Calif. law enforcement agencies connected to cellphone spying technology News10 submitted numerous public records requests to every major law enforcement agency in Northern California to find out which departments are using StingRay technology. A StingRay is a device law enforcement uses to track people and collect real time data from every cellphone within a certain radius. MORE: Cellphone spying technology being used throughout Northern California Some agencies provided documentation, but none would discuss how StingRays work, or even admit they have them.
FTC sees privacy threats in the 'Internet of Things' - Katy Bachman - POLITICO As consumers buy up fitness trackers, Internet-connected thermostats and even Web-enabled cars and toothbrushes, the Federal Trade Commission has a message: It’s watching. The agency is warning that as millions of new smart devices make people’s daily lives more convenient, they’re also collecting reams of personal information that raise new privacy and data security concerns. Story Continued Below The nascent sector — known as the “Internet of Things” and embraced by companies from Google to Intel — is still largely unregulated, and the FTC is hoping a set of recommendations it released Tuesday will goad companies into building consumer data protections into their systems. “The only way for the Internet of Things to reach its full potential for innovation is with the trust of American consumers,” said FTC Chairwoman Edith Ramirez. Not all the commission members are on board with her campaign.
Net Threats Experts say liberty online is challenged by nation-state crackdowns, surveillance, and pressures of commercialization of the Internet As Internet experts look to the future of the Web, they have a number of concerns. This is not to say they are pessimistic: The majority of respondents to this 2014 Future of the Internet canvassing say they hope that by 2025 there will not be significant changes for the worse and hindrances to the ways in which people get and share content online today. And they said they expect that technology innovation will continue to afford more new opportunities for people to connect. Still, some express wide levels of concern that this yearning for an open Internet will be challenged by trends that could sharply disrupt the way the Internet works for many users today as a source of largely unfettered content flows. The Net Threats These Experts Fear
Privacy, security threats in the 'Internet of Things' If HIPAA is helpless in protecting information on fitness trackers, and voice-controlled TVs, smart thermostats and Internet-accessible appliances do almost nothing to ensure privacy, what will the convenience of connected things eventually cost consumers? The Federal Trade Commission warned last month about the serious privacy and data security risks, noting that the number of Internet-connected devices will double, to 50 billion, by 2020. We chatted with Shaun Murphy, a former Department of Defense communication systems security consultant who this year is launching PrivateGiant, an online-security firm. He says the threat is potentially greater than personal information giveaways on Facebook and other social media.
Phone surveillance Phone surveillance is the act of performing surveillance of phone conversations, location tracking and data monitoring of a phone. Before the era of mobile phones, these used to refer to the tapping of phone lines via a method called wiretapping. Wiretapping has now been replaced by software that monitors the cell phones of users.
How to Protect Your Computer from Hackers, Spyware and Viruses This article has been inspired by a situation I ran into while visiting a cousin in India. Since I’m in the IT field, she asked me to take a look at her computer since it was acting “funny”. The “funny” part was that the computer would automatically restart whenever you tried to install ANY software onto it or download any program from the Internet. The first thing I noticed was that there was no anti-virus software installed on the computer, so my first goal was to install an anti-virus program and check for viruses. But of course, the virus that was already on the computer would not let me install or download anything! Smart virus!
The Five Biggest Threats to Your Kids’ Privacy, and What You Can Do About Them Remember back in school, when your teachers warned that everything you did would go on your permanent record? It turns out your teachers have become right. That permanent record is the Internet. It’s hard to be a fully functioning adult in 2014 and not leave behind a digital trail. Malware Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency. The term badware is sometimes used, and applied to both true (malicious) malware and unintentionally harmful software. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states. Spyware or other malware is sometimes found embedded in programs supplied officially by companies, e.g., downloadable from websites, that appear useful or attractive, but may have, for example, additional hidden tracking functionality that gathers marketing statistics. Purposes Malware by categories on 16 March 2011.