SafeJunction recently completed development of its Digital Identity Vault privacy platform and seeks funding to complete the commercial version of its Windows client as well as development of its Mac client and mobile apps for both the iPhone and Android platforms.

Source: Sci/Tech Nation | SafeShare Privacy Funding Campaign Launched

SS-50

 

Thanks to Sci/Tech Nation

“people have become more conscious of the danger of having their computer commandeered for nefarious purposes and have taken steps (such as the use of anti-virus software or being more careful about sites visited) to prevent its occurrence.”

Source: Cyber-security’s dirty little secret: It’s not as bad as you think • The Register

Thanks to the Register

 

“The Industrialization of Hacking has created a faster, more effective, and more efficient sector profiting from attacks to our IT infrastructure. By monetizing malware with cryptocurrency these professional, entrepreneurial, and resourceful hackers have created cybercriminal business models that share many similarities with legitimate businesses. They have a revenue stream, a budget, market researchers, a global pool of developers, QA analysts and testing, help desk support, and even guarantees.”

Source: Addressing the Challenges Cybercrime-as-a-Service Serves Up | SecurityWeek.Com

Thanks to SecurityWeek

 

“We are our faces, in a way we are not our Twitter profiles, social-security numbers, or even legal names. Although vast amounts of data are collected about most Internet users, they’re tied to what are essentially bureaucratic identifiers, like browser cookies or email addresses. Almost everything that represents me online is ultimately a jumble of numbers and letters, and nearly all of it—with some cost or sacrifice—can be changed. Even victims of fraud or domestic violence can apply to the government for a new social-security number. A face, though—that’s different. We’re stuck with our faces. It’s prohibitively expensive to change them beyond recognition, if it’s even possible. Facial recognition and other biometrics bind data about us to us like nothing else. And, once corporate metadata can recognize and glom onto our bodies—in all their “everlasting sameness”—we can never escape that link.”

Source: How Good Is Facial Recognition Technology, Really—and How Should We Regulate It? – The Atlantic

I guess the data didn’t “stay in Vegas”.  Another of the continuing saga of online security and privacy breaches that have become part of the cyber landscape.

And don’t expect NFC generated access systems like those used in the iPhone and other smartphones to protect you.  Te Hard Rock problem is caused by flaws in the eCommerce infrastructure security of the hotel, not your payment system, card or device.

Hard Rock Hotel and Casino warns of potential payment card hack | PCWorld.

Thanks to PCWorld

HIPAA – Health Insurance Portability and Accountability Act of 1996 – protects your identity and healthcare data that is kept (or shared) by your healthcare providers themselves, not online web services that provide unverified health tips and information.

So beware.

How nine out of ten healthcare pages leak private data | Naked Security.

Thanks to Naked Security

Post Navigation