Blog Posts Tagged with "Consumers"

69dafe8b58066478aea48f3d0f384820

The Need for Advancements in Browser Based Security

March 08, 2012 Added by:Headlines

"Data protection is fast becoming a product and service differentiator. It is incumbent on business leaders to take a holistic view of these issues and understand how they are undermining consumer trust. Now is the time for businesses to make data protection a priority..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Do You Have A False Sense of Security for Mobile?

March 02, 2012 Added by:Robert Siciliano

With unit sales of smartphones and tablets eclipsing those of desktop and laptop PCs, cybercriminals will continue setting their sights on mobile, and increased mobile Internet use will continue exacerbating security and data breach issues. Protect yourself...

Comments  (1)

Ebbcdce0dfc85abf519d8b44a017f687

On President Obama’s Consumer Privacy Bill of Rights

February 29, 2012 Added by:Brian Dean

If new legislation is passed, those who have already embraced the CPBR concepts will be well positioned to comply with it. Also, meeting these objectives will meet your clients’ expectations, including those detailed by the CPBR, creating a competitive advantage...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Obama Unveils Blueprint for Online Privacy Bill of Rights

February 23, 2012 Added by:Headlines

The Obama Administration today unveiled a “Consumer Privacy Bill of Rights” as part of a comprehensive blueprint to improve consumers’ privacy protections and ensure that the Internet remains an engine for innovation and economic growth...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Google Wants to Get to Know You Better... Uh-Oh

February 19, 2012 Added by:Kelly Colgan

The company that started out as a little search engine has grown into a behemoth that dabbles in everything from social networking to picture sharing to 3D modeling. And it plans to integrate information pulled from all of those Google services you use to learn more about you...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Secret Service Hits $250 Million Cell Phone Cloning Ring

February 07, 2012 Added by:Headlines

U.S. Secret Service’s New York Field Office recently investigated a sophisticated operation in which information from the cell phone accounts of tens of thousands of people is stolen to support a black market in international calling...

Comments  (0)

Ebbcdce0dfc85abf519d8b44a017f687

Data Privacy: Oxymoron, Wishful Thinking, or Strategic Goal?

February 03, 2012 Added by:Brian Dean

Consumers are desensitized to breaches, as evidenced by the meager rate of consumers applying for free credit monitoring services after a company breach. If you analyze the data that was breached, sometimes you have to ask, “Why are they even collecting all of that data?”

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Symantec: Too Many Doubts - Disable pcAnywhere Software

January 26, 2012 Added by:Pierluigi Paganini

"At this time, Symantec recommends disabling the product until Symantec releases a final set of software updates that resolve currently known vulnerability risks," Symantec said in the white paper...

Comments  (4)

Af9c34417f8e5e0d240850bb353b5d40

pcAnywhere Source from 2006 Still Alive and Kicking

January 26, 2012 Added by:Keith Mendoza

Even if a complete software rewrite is done, it's not really a complete rewrite. Someone in the development team--usually the person who was working on the last version before the so-called rewrite--will copy parts of code from the old source code...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Email Preferences or Security Invasion?

January 24, 2012 Added by:Allan Pratt, MBA

Where do I draw the line about providing personally identifiable information? And what happens to the information I provide? Will the retailer ever sell the information – and what happens if the company’s database is hacked? All we need to do is remember Zappos...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

OTA: 2012 Data Protection and Breach Readiness Guide

January 24, 2012 Added by:Headlines

In 2011, over 558 incidents were reported at a cost to U.S. businesses of more than $6.5 billion dollars. It is estimated over 50% were a result of a server exploits; of which 96% were avoidable if the recommendations outlined in the OTA report had been implemented...

Comments  (0)

D03c28fd5a80c394905c980ee1ecdc88

Shopper Trust and the Zappos Ordeal

January 23, 2012 Added by:Bill Mathews

Often merchants just sell your information outright to make revenue off the data they’ve collected. Usually this is reserved for more nefarious merchants, and sometimes it is done out of ignorance of their own policies. But make no mistake – it DOES happen...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

WOMMA Releases Social Media Marketing Privacy Guidelines

January 19, 2012 Added by:Headlines

WOMMA applauds the FTC's efforts at making transparency a key point. While it is not yet clear what effect these developments have had on the online marketing industry - we appreciate the agency's efforts to allow industry leaders to develop self-regulatory initiatives...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Social Security Numbers: The All-Purpose Identifier

December 12, 2011 Added by:Robert Siciliano

Banks, motor vehicle registries, doctors’ offices, insurance companies, and even utilities often require a Social Security number to do business. Why? Sometimes it’s because it is attached to tax or criminal records, but most often it’s because the number is attached to your credit file...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Cyber Crime Creates More Victims Per Hour than Babies Born

December 10, 2011 Added by:Kelly Colgan

As more shoppers turn to their laptop, iPads and mobile phones to get items crossed off their list, thieves are on the prowl to hack into systems to obtain customer information – email addresses, passwords, credit card data, PayPal account info, etc...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Mobile App Makers Must Protect Children’s Privacy

December 05, 2011 Added by:Kelly Colgan

Mobile applications do much more than entertain, inform, or otherwise make life more convenient. Depending on the app, companies can access private information as varied as phone and email contacts, call logs, calendar data, and data about the device, and therefore our location...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »