All eyes will be on Capitol Hill this morning when the House Judiciary Committee holds a key hearing on the controversial Stop Online Piracy Act, which has drawn wide opposition from a variety of groups and companies for its broad language supposedly designed to prevent copyright infringement. The bill, which has been revised a number of times, could have wide-ranging effects on the way the Internet works.
Browsing Category: Social Engineering
The W3C has proposed a standard for implementing the Do Not Track mechanism for both users and site owners, wading into what has become a contentious and fractious debate. The proposed standard, known as the Tracking Preference Expression, is designed to give users the ability to tell sites what data they can collect, and allow those sites to inform users what they collect, in turn.
Google, which has faced a pile of criticism over its privacy policies and practices, especially as they relate to wireless and mobile devices, says it is changing the way that it maps people’s wireless access points in its efforts to provide accurate location information. The company said it is now encouraging users to add a “_nomap” extension to the SSID of their access points if they don’t want Google to map them.
The deal will settle an FTC case alleging privacy violations on the social network by forcing users to opt in to any changes to default privacy settings, according to a report in the Wall Street Journal.
After months as a consumer-only beta, Google finally opened up its Google+ social network to companies this week, launching Google Brand pages. While response to the new brand pages was tepid (Robert Scoble penned a rather scathing review), it didn’t take long for folks poking around the new feature to identify a serious shortcoming: Google brand pages allow pretty much anyone to stake out a page for any brand, regardless of their affiliation with it.
[img_assist|nid=10213|title=Joe Gottlieb|desc=CEO, Sensage|link=none|align=right|width=115|height=115]The “up side” of social networks like Facebook, Twitter and G+ are well known. But the down side of these networks for both users and for organizations that employ them are only now becoming clear. Worms, malware and spam are just the beginning of the security problems engendered by the social net. In this exclusive interview, conducted via e-mail, Threatpost editor Paul Roberts asked Joe Gottlieb, the CEO of security event management firm Sensage, about the many, subtle ways that social networks are eroding organizations’ online defenses.
Online criminals registered far fewer Web domains for use in phishing attacks in the first half of 2011, in what may signal a decrease in phishing scams, according to a global phishing survey released this month by the Anti-Phishing Working Group (APWG).
The investor services company told Threatpost that an investigation has determined that data stolen by a rogue employee didn’t contain shareholder data. However, the company still hasn’t retrieved two USB drives containing company email and documents that outline some of Computershare’s closely held business plans.
Financial Records of Millions At Risk After Computershare Insider Copies Data To USB… Then Loses The USB
Computershare, the investor services firm, has filed suit against a former employee it charges with making off with thousands of pages of proprietary company documents, including information on shareholder names, account numbers and financial holdings.
Poor design and usability issues make leading online privacy management tools ineffective, according to researchers at CMU’s Cylab. The report said the results suggest that the current system of industry-led opt out protections is “fundamentally flawed.”