Rovio Denies Providing Angry Birds User Data To The NSA, Points Finger At Third-Party Ad Networks

Posted by & filed under Advertisement, app, data mining, ethics, Gaming, Privacy, Security.

Description: Rovio is being accused of allowing third party snooping agents to tap into their gaming user’s data. Rovio denies co-operation with any government surveillance. Source: TechCrunch Date: January 28, 2014  A new report originating from the ongoing Snowden document trove presents the terrifying possibility that our casual gaming habits offer government surveillance agencies a look at some key… Read more »

Apple Says It Has Never Worked With NSA To Create iPhone Backdoors, Is Unaware Of Alleged DROPOUTJEEP Snooping Program

Posted by & filed under app, Apple, data mining, iphone, IS ethics, Privacy, Security.

Description: A statement was released by Apple claiming that they have never worked with the NSA  In fact, they state that their customers’ privacy is of high importance and steps are constantly being taken to deter “malicious hackers”. Source: Tech Crunch Date: December 31, 2013 Apple has contacted TechCrunch with a statement about the DROPOUTJEEP NSA program… Read more »

Hello Biometrics, Goodbye Passwords?

Posted by & filed under Biometrics, Business Intelligence, industry analysis, national culture, Personalization, Security, voice recognition.

Description: Researchers at Purdue University say it’s coming soon: Biometrics – identification by human traits – is leading the way forward, making it possible to log in with a simple scan of your iris or fingerprint. Source: Globe&Mail Date: December 5, 2013  Your personal features are about to become the highest level security method against anything worth… Read more »

Nest Protect Smoke Detector Talks To You

Posted by & filed under app, Hardware, health, Security, smartphones, WI-Fi.

Description: A new smoke detector has just been launched that operates through your WiFi. The “Nest Protect” has many different features including path lighting and prevention methods. Source: CNET Date: November 19, 2013 Nest Protect’s smoke detector let’s you know when dangerous situations are happening in your home no matter what room you are in via WiFi… Read more »

The private information Facebook now makes public

Posted by & filed under FaceBook, IS ethics, Privacy, Search, Security, Social Media.

Description: Facebook’s recent privacy recalculation prevents excluding your profile picture, cover photo, and other formerly hide-able information from search results. Source: CNET Date: November 12, 2013 You may have been one of the many Facebook users contacted by the company last week about the demise of the “Who can look up your Timeline by name” search setting…. Read more »

Microsoft Reportedly Wants to Replace the Cookie

Posted by & filed under Analytics, data analytics, ethics, microsoft, Privacy, Security, Software, user habits.

Description: Microsoft is working on a tracking technology that would extend to mobile devices and gaming consoles, says AdAge. But will the cookie crumble away without a fight? One tech jounalist gives his opinion. Source: CNET Date: October 10, 2013   Microsoft may be aiming to replace the famous (or infamous) browser cookie with its own brand… Read more »

Marketer Advising Coke and Microsoft Questions Ethics of Widespread Web Tracking

Posted by & filed under data analytics, Digital Policy, Ecommerce, ethics, marketing, Privacy, Security, user habits.

Description: Following what customers are doing after they leave a digital store on the web is both effortless and commonplace for companies. Unlike in the physical world, it’s hard to notice when you are followed on the web. As the practice expands, some marketers are beginning to doubt whether tracking is the right thing to… Read more »

Student Hacker Expelled After Pointing Out Massive Security Flaw

Posted by & filed under education, Security.

Description: It appears that a security flaw across Quebec’s higher education system has ended in one student’s expulsion. After exposing a major system weakness Ahmed Al-Khabaz was voted out of his school’s computer science department. Source: FastCompany Date: January 22nd, 2013 Last fall, a 20-year-old computer science student named Ahmed Al-Khabaz at Dawson College in Montreal… Read more »

Google’s data mining raises questions of national security

Posted by & filed under Analytics, cloud services, cyber war, data analytics, data mining, Data storage, Digital Policy, Security.

Description: Free cloud service providers collect and store massive amounts of personal data. While this data is usually well-protected and secure, given the right incentive, there is no question that hackers could compromise the security of even the largest cloud service providers. So what are governments doing to protect their sensitive data? Source: TheGuardian  Date: October 15,… Read more »

10 Incredibly Simple Things You Should Be Doing To Protect Your Privacy

Posted by & filed under data mining, disruptive technology, education, fraud, hackers, Internet, Privacy, Security, smartphones.

Description: Everyone is at risk of a personal security breach, even Wired‘s Mat Honan. These 10 simple tips can help you improve your privacy online. Source: forbes.com Date: August 23rd, 2012 Over the weekend, I wound up atWashington, D.C.’s Trapeze School with a group of friends. Before one of them headed up a ladder to… Read more »