Security Mistakes and Exploitation of Mobile Apps

Security Mistakes and Exploitation of Mobile Apps

Security mistakes in mobile app development are quite common and can lead to the user’s mobile device being compromised and his or her data being manipulated by the hacker. As the race for supremacy in the smartphones business increases, vendors’ focus on creating more sophisticated apps for their customers leads them to use the services …

Read moreSecurity Mistakes and Exploitation of Mobile Apps

Protecting sensitive data through encryption and other means

Data Security system Shield Protection Verification

One of the most common ways of sensitive data when transferring digitally is to make use of encryption. Commonly used encryption methods include symmetrical keys, asymmetrical keys and hybrid keys. Cryptography that employs symmetric keys often uses the same key for decrypting and encrypting data. In order for encryption and decryption to remain secure, it …

Read moreProtecting sensitive data through encryption and other means

Age of big data, student privacy at risk – is no child left un-mined?

Student privacy at risk - no child left un-mined

It is the era where people are sharing photos of their kids, containing children in even small mortarboards on Facebook and other social media sites. However, unlike to an era ago, now’s youngest graduates are storing up a major data stream. Generally as government and medical documents have been computerized — few of them to …

Read moreAge of big data, student privacy at risk – is no child left un-mined?

LG and Samsung smartwatches leave private data unencrypted

LG and Samsung smartwatches leave private data unencrypted

Hackers can hack the private information from Samsung and LG smart watches with ease, investigators have come to an end that none among both of the brands encrypting private data. The researchers alert, both LG and Samsung watches are leaving personal data of users vulnerable and not keeping their privacy intact. At the University of …

Read moreLG and Samsung smartwatches leave private data unencrypted

NSA mass surveillance reformed, now Govt. won’t collect the data instead mobile firms will

Google, Apple and More Bring Privacy Doubts to Obama

Advocates of reforming NSA (National Security Agency) practices are currently focusing on other controversial plans that American Freedom Act didn’t mention. Now that the National Security Agency’s bulk surveillance programs have efficiently been neutered, what is the future of privacy? The president of America, Barack Obama singed a reformed act of the NSA (National Security …

Read moreNSA mass surveillance reformed, now Govt. won’t collect the data instead mobile firms will

Facebook’s European Union woes remain, FB’s privacy settings under scrutiny of watchdogs

Facebook's European Union woes remain as watchdogs clamp down

The social media giant Facebook has turn out to be an old-timer of the fights battled over data security, net neutrality and internet privacy, and it doesn’t look similar social platforms will be able to escape from inspection anytime shortly. US companies have turn out to be a target of watchdogs in the EU (European …

Read moreFacebook’s European Union woes remain, FB’s privacy settings under scrutiny of watchdogs

RadioShack Vended Users’ Private Data to Settle its Debts, FTC not Pleased

RadioShack Vended Your Private Data to Settle Its Debts. The FTC Isn’t Too Pleased with It.

RadioShack’s monetary death may leave techies with minimum room to purchase gizmos and their data on the sale square: Customer information that the vendor gathered over years was among the resources available to be purchased to the higher bidder as a feature of RadioShack’s insolvency. A note from the FTC (Federal Trade Commission) to the …

Read moreRadioShack Vended Users’ Private Data to Settle its Debts, FTC not Pleased

Cyber Security, impact to the user and cost?

Cyber Security, impact to the user

How often do you read emails or articles depicting the threats directed at users of emails or the Internet?  Figuratively speaking the statistics are over whelming, the following links depict the size of the ‘Risk’ and it’s growing!!: Email statistics 2014 – 2018 Internet users live stats I’m not making reference to major companies or …

Read moreCyber Security, impact to the user and cost?

Federal Court: NSA mass phone surveillance ruled illegal

A government petitions court has ordered the NSA’s mass collection of huge number of United States’ telephone records is illegitimate. The system was uncovered by Edward Snowden, National Security Agency informant; the ACLU appealed its claim construct to mainly on Snowden’s disclosures. A panel consisting three-judges of the American Circuit Court in New York passed …

Read moreFederal Court: NSA mass phone surveillance ruled illegal

Google is Planning to Boost up Android Privacy Controls

Google is Planning to Boost up Android privacy controls

An awesome news for Android users who have been bugging Google to accomplish more to help ensure their security. Google is ready to provider more privacy controls to Android users. According to Bloomberg report, the giant is wanting to give Android fans essentially more control over what information Android apps can access as a component …

Read moreGoogle is Planning to Boost up Android Privacy Controls