Items Tagged with "internet"
June 05, 2012 Added by:Rebecca Herold
Big Data and associated analytics can be used to improve business and customer experiences and bring innovation and medical breakthroughs. However, organizations must make sure they don’t cross that line of customization and business improvements into creepiness and full-blown privacy invasion...
June 04, 2012
“A public health model encompasses several interesting concepts that can be applied to internet security. As use and reliance on the Internet continues to grow, improving Internet health requires all ecosystem members to take a global, collaborative approach to protecting people from potential dangers online”...
June 01, 2012 Added by:Ahmed Saleh
You should acknowledge that Cookies are widely used and can't really be avoided. If you wish to enjoy your internet surfing experience by navigating to “cookie creating websites” you should have a clear understanding of how cookies operate, and how to protect them from being abused...
May 31, 2012 Added by:Ali-Reza Anghaie
Consider we might be putting our cyber soldiers on the wrong line. Sure, there are growing ranks of cyber counter-terrorism practitioners across both private and public space, except that's only to meet the enemy we really want to see - the one that suits perhaps what we're comfortable doing or getting funding for...
May 30, 2012 Added by:Electronic Frontier Foundation
Senator Ron Wyden recently introduced a bill demanding access to draft texts of international trade agreements under negotiation such as the Trans-Pacific Partnership Agreement that carry provisions that could severely choke off users' rights on the Internet. This is a great positive step in the right direction...
May 25, 2012 Added by:Pierluigi Paganini
The Deep Web is considered the place where everything is possible, you can find every kind of good and service for sale, but most of them are illegal. The hidden web offers cybercrime great business opportunities, hacking services, malware, stolen credit cards, weapons, etc...
May 25, 2012 Added by:Fergal Glynn
Did you know that this year the number of Wi-Fi connected devices will exceed the world’s population? This incredible statistic highlights the ubiquitous nature of Wi-Fi. However, the convenience of public Wi-Fi practically everywhere comes at the cost of greater risk to users...
May 24, 2012 Added by:Jayson Wylie
IPv6 has created a vast address space and only portions are taken up by the typical allocations. A paid for, theme based, segmented and constrained IPv6 sub-network would provide users with some feeling of safety in an environment where that is not offered today...
May 24, 2012 Added by:Electronic Frontier Foundation
The Netherlands is the first country in Europe to establish a legal framework supporting net neutrality. The law contains language that restricts when ISPs can wiretap users, and limits the circumstances under which ISPs can cut off a subscriber's Internet access altogether...
May 21, 2012 Added by:Infosec Island Admin
Listed below are tips to protect your business, yourself and your family from various forms of Internet fraud. For information on the most common complaints and scams, see the annual reports of the Internet Crime Complaint Center a partnership of the FBI and the NWCCC...
May 20, 2012 Added by:Theresa Payton
We recently learned Skype has known about a bug that shows your IP address, which can let someone track you and your account down to the city level. How long have they known about it? According to one group - for 18 months. Sometimes online services providers just don’t care...
May 18, 2012 Added by:Javvad Malik
I’m simply asking the question that if Lord Sugar read something he didn’t agree with, and instead of privately sharing his thoughts or being in any way constructive, why did he expose the email address of Kevin OSullivan and invited 2 million people to DDoS his inbox?
May 17, 2012 Added by:Electronic Frontier Foundation
At issue is whether the Office of the United States Trade Representative (USTR) had authority to enter into the controversial IP enforcement agreement on behalf of the United States when the Deputy U.S. Trade Ambassador signed ACTA in October 2011...
May 16, 2012 Added by:Marc Quibell
The point is that hiring managers will look you up online, and your 'Internet Presence' will be scrutinized, and even more so because these are most likely technical people and know where to look. It's time to grow up and stop being that anonymous troll...
May 13, 2012 Added by:Jayson Wylie
There is a reason the security world refers to exploitation on the Internet to activity ‘in the wild’. A comparison can be made to the lawless, tough and unforgiving world of the Wild West in American history. You can get your stuffz or scalp taken...
May 11, 2012
“Internet crime is a growing problem that affects computer users around the world and causes significant financial losses. The IC3 is an efficient mechanism for the public to report suspicious e-mail activity, fraudulent websites, and Internet crimes..."