How Google keeps your secrets private

Posted by & filed under Google, Privacy.

secrets private Description: How does a company that collects so much information from its users keep all that data private? Source: cnn .com Date: Jan 25, 2012 As part of that tune-up, Google on Tuesday made the major announcement that it has streamlined its privacy policy. Instead of 70 policies across each of its products… Read more »

Big Data is watching you

Posted by & filed under data analytics, M-commerce, market intelligence, marketing.

Description: In the past few years, companies have amassed trillions of digital bread crumbs: from credit card transactions, from people’s online wanderings on social media and search sites, from GPS devices embedded within smart phones. Source: theglobeandmail.com Date: Jan 6, 2012 The Christmas season may still be a recent memory, but many marketers are already… Read more »

Did The iPhone’s ‘Find My Friends’ Already Out A Cheating Wife?

Posted by & filed under Apple, Cyberforensics, EXAM ARTICLE, FaceBook, IS ethics, Privacy, Security.

Description: Welcome to iCheers, where everybody knows your whereabouts. Both Apple and Foursquare are offering new tools for iOS5 that will let us know where our friends are at all times. Source: Forbes.com Date: Oct 17, 2011 Late Saturday night, “ThomasMetz” posted to MacRumors (via 9to5Mac) about how he turned his wife’s iPhone into a… Read more »

Hackers learn to ditch black hats for white collar security jobs

Posted by & filed under cyber terroism, cyber war, EXAM ARTICLE, hackers.

Description: Computer hacking has always been a pursuit driven more by geeky passion than a quest for profits. But it is now becoming a pathway to earning serious money. Source: globeandmail.com Date: Oct 10, 2011 A decade ago, a skilled hacker who discovered a software security flaw had two choices: he could tell the company… Read more »

No Cards, No Cash. Just a Phone.

Posted by & filed under e-payment, Ecommerce, EXAM ARTICLE, fraud, Google, industry analysis, M-commerce, revenue model, Security, smartphones.

Description: Plenty of companies would love to get their hands on our wallets. But Google wants to go one step further: it wants to be our wallets. Source: NYT.com. Date: Sept 21, 2011 Its new phone software, called Google Wallet, is intended to replace the credit cards in our actual wallets. It does sound pretty… Read more »

Police Lesson: Social Network Tools Have Two Edges

Posted by & filed under FaceBook, MySpace, Social Media, Twitter.

Description: Social networking tools like Facebook and Twitter can be valuable assets for law enforcement agencies, helping them alert the public, seek information about crimes and gather evidence about the backgrounds of criminal suspects. Source: NYtimes.com Date: April 6, 2011 Most social media policies try to balance a police department’s interests against First Amendment protections for… Read more »

Data Mining: How Companies Now Know Everything About You

Posted by & filed under M-commerce, Privacy, revenue model.

Description: There is now an enormous multibillion-dollar industry based on the collection and sale of this personal and behavioral data. Source: Time.com Date: March 10, 2011 Google’s Ads Preferences believes I’m a guy interested in politics, Asian food, perfume, celebrity gossip, animated movies and crime but who doesn’t care about “books & literature” or “people &… Read more »

Banks fight fraud with new social networking weapons

Posted by & filed under cyber terroism, Digital Policy, fraud, Privacy, Security.

Description: An older type of social network, and it’s being used to help detect fraud. It is the connections between people in the physical world. Source: Globe&Mail.com Date: March 8, 2011 Banks, telecoms providers and insurance companies, among other businesses, are using analytic software to correlate all of their various data sources to produce visualizations of relationships… Read more »