SafeJunction recently completed development of its Digital Identity Vault privacy platform and seeks funding to complete the commercial version of its Windows client as well as development of its Mac client and mobile apps for both the iPhone and Android platforms.

Source: Sci/Tech Nation | SafeShare Privacy Funding Campaign Launched

SS-50

 

Thanks to Sci/Tech Nation

“people have become more conscious of the danger of having their computer commandeered for nefarious purposes and have taken steps (such as the use of anti-virus software or being more careful about sites visited) to prevent its occurrence.”

Source: Cyber-security’s dirty little secret: It’s not as bad as you think • The Register

Thanks to the Register

 

“The Industrialization of Hacking has created a faster, more effective, and more efficient sector profiting from attacks to our IT infrastructure. By monetizing malware with cryptocurrency these professional, entrepreneurial, and resourceful hackers have created cybercriminal business models that share many similarities with legitimate businesses. They have a revenue stream, a budget, market researchers, a global pool of developers, QA analysts and testing, help desk support, and even guarantees.”

Source: Addressing the Challenges Cybercrime-as-a-Service Serves Up | SecurityWeek.Com

Thanks to SecurityWeek

 

“We are our faces, in a way we are not our Twitter profiles, social-security numbers, or even legal names. Although vast amounts of data are collected about most Internet users, they’re tied to what are essentially bureaucratic identifiers, like browser cookies or email addresses. Almost everything that represents me online is ultimately a jumble of numbers and letters, and nearly all of it—with some cost or sacrifice—can be changed. Even victims of fraud or domestic violence can apply to the government for a new social-security number. A face, though—that’s different. We’re stuck with our faces. It’s prohibitively expensive to change them beyond recognition, if it’s even possible. Facial recognition and other biometrics bind data about us to us like nothing else. And, once corporate metadata can recognize and glom onto our bodies—in all their “everlasting sameness”—we can never escape that link.”

Source: How Good Is Facial Recognition Technology, Really—and How Should We Regulate It? – The Atlantic

Post Navigation