SafeJunction recently completed development of its Digital Identity Vault privacy platform and seeks funding to complete the commercial version of its Windows client as well as development of its Mac client and mobile apps for both the iPhone and Android platforms.
Source: Sci/Tech Nation | SafeShare Privacy Funding Campaign Launched
Thanks to Sci/Tech Nation
Thanks for visiting TransXfer – one of the information sites of the SafeJunction family of privacy solutions.
We regret having been gone for a few weeks, but are now back with continued, topical information for friends of privacy and information security.
Please visit safejunction.com – our parent company – for product and services announcements.
“people have become more conscious of the danger of having their computer commandeered for nefarious purposes and have taken steps (such as the use of anti-virus software or being more careful about sites visited) to prevent its occurrence.”
Source: Cyber-security’s dirty little secret: It’s not as bad as you think • The Register
Thanks to the Register
“The Industrialization of Hacking has created a faster, more effective, and more efficient sector profiting from attacks to our IT infrastructure. By monetizing malware with cryptocurrency these professional, entrepreneurial, and resourceful hackers have created cybercriminal business models that share many similarities with legitimate businesses. They have a revenue stream, a budget, market researchers, a global pool of developers, QA analysts and testing, help desk support, and even guarantees.”
Source: Addressing the Challenges Cybercrime-as-a-Service Serves Up | SecurityWeek.Com
Thanks to SecurityWeek
“We are our faces, in a way we are not our Twitter profiles, social-security numbers, or even legal names. Although vast amounts of data are collected about most Internet users, they’re tied to what are essentially bureaucratic identifiers, like browser cookies or email addresses. Almost everything that represents me online is ultimately a jumble of numbers and letters, and nearly all of it—with some cost or sacrifice—can be changed. Even victims of fraud or domestic violence can apply to the government for a new social-security number. A face, though—that’s different. We’re stuck with our faces. It’s prohibitively expensive to change them beyond recognition, if it’s even possible. Facial recognition and other biometrics bind data about us to us like nothing else. And, once corporate metadata can recognize and glom onto our bodies—in all their “everlasting sameness”—we can never escape that link.”
Source: How Good Is Facial Recognition Technology, Really—and How Should We Regulate It? – The Atlantic
“The alleged criminals and their accomplices are said to have used the notorious banking trojans to steal money from online bank accounts both within the European Union as well as from other financial institutions elsewhere in the world, laundering the proceeds through money-mule networks along the way. Last week’s operation brings the total number of arrests up to 60 since the investigation first began, with 34 of those being related to a money laundering operation that was recently busted by Dutch law enforcement authorities.”
Source: Zeus and SpyEye crime syndicate taken down by Europol | Naked Security
Thanks to Naked Security
To think that we’ve come to a time in history when civilians have become targets.
Source: Are you a legitimate military target? | CSO Online
Thanks to CSO Online
As if we thought there was an end in sight, yet another hack. As long as expect to use a free service “The Internet” the benefits of exploiting the service for gain or giggles will continue unabated.
Army’s Public Website Hacked by Unknown Intruders – NBC News.
Thanks to NBC News
I guess the data didn’t “stay in Vegas”. Another of the continuing saga of online security and privacy breaches that have become part of the cyber landscape.
And don’t expect NFC generated access systems like those used in the iPhone and other smartphones to protect you. Te Hard Rock problem is caused by flaws in the eCommerce infrastructure security of the hotel, not your payment system, card or device.
Hard Rock Hotel and Casino warns of potential payment card hack | PCWorld.
Thanks to PCWorld
HIPAA – Health Insurance Portability and Accountability Act of 1996 – protects your identity and healthcare data that is kept (or shared) by your healthcare providers themselves, not online web services that provide unverified health tips and information.
How nine out of ten healthcare pages leak private data | Naked Security.
Thanks to Naked Security