FACEBOOK TWITTER
RSS FEED

receive privacy industry news

Email:

most commented

questions + feedback

Have a question or a privacy issue that you'd like us to investigate ? Send an to our editors with your comments.

Managing BYOD Security Threats: VPNs Mitigate The Risks

BYODSuitcase

It’s clear that the era of BYOD is here to stay. Workers are no longer confined to an office desk and computer, and instead are able to do work from anywhere: home, their local coffee shop, and while taking public transportation. The proliferation of public wireless networks has made this possible, and while this has freed employees up to do work from nearly everywhere, it also has introduced many security challenges. Read More

  • PrintPrint
  • emailemail

Identity Protection: 5 Tips to Stay Mobile Secure in 2015

mobileidentitytheft

Living a mobile lifestyle does not come without risk, especially where your identity is concerned. But staying mobile secure doesn’t have to be complicated. Consider this: 94.2% of identity victims say they are still highly engaged online and via their mobile devices despite having had their personally identifiable information stolen, according to a recent study from The Identity Theft Resource Center.

So how do we stay safe? Just follow these five tips! Read More

  • PrintPrint
  • emailemail

Don’t Get Hacked At CES

vegas hack

It’s that time of year again – when more than 150,000 gadget geeks, techies and businesses from around the world descend on Las Vegas for the mother of all trade shows – the International Consumer Electronics Show. With over 3,200 exhibitors previewing and showcasing their high tech products, CES is the perfect place for tech enthusiasts to network. So you’d think it would be safe for attendees to connect their laptops and mobile devices to the event’s public WiFi hotspot.  But you’d be wrong. Like most big events, CES can be a hot spot for hackers.  If you’re going to be there, make sure you don’t become a target. Read More

  • PrintPrint
  • emailemail


Don’t Give Your Data Away: Blur Your Passwords, Payments, and Privacy

Blur Abine

Now is the time to make your online activity a blur. Why? Here are some startling reasons: In the last 18 month, over 157 million US credit card holders have been notified of a breach. Furthermore, the typical web surfer is tracked by 11 companies at each site they visit - resulting in over 2,500 unique tracking and data collection attempts weekly. This is the new reality of the Internet in 2014 – and as 2015 approaches, the treat level will only increase. Read More

  • PrintPrint
  • emailemail

Holiday Shopping Goes Mobile: Be Cyber Secure [INFOGRAPHIC]

HolidayGift

As the holiday shopping bustle approaches, don't just think about buying the perfect gift and getting a great deal. For a happy and healthy season, remember that being cyber secure when you make your holiday purchases online is just as important!

This year PRIVATE WiFi has teamed up with the National Cyber Security Alliance to help consumers be safe online when using their mobile devices are they shop. Check out our infographic learn more about the the threats of holiday shopping on the go and follow our five tips for cyber secure shopping. Read More

  • PrintPrint
  • emailemail

CNN Meets With PRIVATE WiFi to Understand Public WiFi Exploits, Privacy Dangers

CNN Walk In the Park PRIVATE WiFi

CNN International, arguably the world’s largest and most dominant cable news channel, sat down with PRIVATE WiFi this week to better understand the exploits and dangers on public WiFi networks.

CNN aired its "Walk in the Park" segment to showcase various hacking scenarios and the vulnerabilities of public WiFi – whether in a public park setting, hotel, airport, or similar location offering “free” WiFi. Read More

  • PrintPrint
  • emailemail

ITRC Victim Impact Survey Findings LIVE Event

identity theft handprint

On Wednesday, October 29, learn about the ITRC's most recent survey report, “Identity Theft: The Aftermath.” A panel of experts will discuss the survey's key findings, with a special emphasis on the emotional impact of identity theft on victims, and ways in which the industry as a whole can leverage this information to better serve victims and consumers.

Can’t make it to the event in Washington, DC, but want to be involved? Join in live on Twitter and follow along with the hashtag #IDTheftImpact. Keep reading for more details about this very important event. Read More

  • PrintPrint
  • emailemail

Q&A: Founder of ‘Savvy Cyber Kids’ on Cybersecurity Best Practices

Ben Halpert NCSAM

Because October is National Cyber Security Awareness Month, and in part to raise public awareness of the dangers of identity theft, we recently chatted with author and technology guru Ben Halpert. Several years ago he launched Savvy Cyber Kids, a nonprofit that has joined the U.S. Department of Homeland Security’s STOP.THINK.CONNECT. campaign's national network, forming a partnership that will promote cybersecurity awareness to children nationwide. Keep reading to learn why he launched Savvy Cyber Kids and various topics related to keeping kids as safe as possible online. Read More

  • PrintPrint
  • emailemail

WiFi Footprint: Personal VPNs Endorsed as WiFi Hotspots and Autoconnect Functionality Proliferate

Global WiFi Footprint

"WiFi footprint" is a simple term for a complex issue: the exploding pace of WiFi hotspot creation is not abating and soon a roamable, global alternative network will become our reality.

In a world seemingly saturated in WiFi, the notion of autoconnecting to these networks might seem appealing. However, whether using a laptop or mobile device, security threats remain a constant. Read More

  • PrintPrint
  • emailemail

University of Maryland Professors to Study WiFi Hotspot Behavior

computer WIFI trends and research

Two University of Maryland professors, David Maimon, an expert in online criminal behavior, and Jonathan Katz, the Maryland Cybersecurity Center director, recently received a $200,000 grant from the National Science Foundation to study how people access and use public WiFi hotspots.

Find out what the duo plans to do with the funds -- including looking into why some users may be assuming that it’s safe to access sensitive information on public WiFi hotspots at "upscale" places. Read More

  • PrintPrint
  • emailemail