Healthy Paranoia: A Nice Note That Brightened My Day!

November 26th, 2008

Recently I was pleasantly surprised to receive the following message…

Read the rest of this entry »

Continued Use Of Site Means Consent to Privacy Policy Changes?

November 25th, 2008

I speak with many folks about the importance of published website privacy policies, along with the issues of obtaining consent…not implied but explicit/express…to change the terms of privacy policies.
I also participate in LinkedIn, and I have found it to be a great and valuable tool to network and communicate with other information security and privacy practicitioners.
So, today when I logged in I was quite interested to see the following banner posted on the home page…

Read the rest of this entry »

Cloud Computing & Privacy

November 24th, 2008

While doing some research on cloud computing and considering the privacy and information security implications, I ran across a recent (11/18/2008) report from the Constitution Project, “Liberty and Security: Recommendations for the Next Administration and Congress“.
The following is an excerpt from page 184…

Read the rest of this entry »

Cloud Computing & Privacy

November 24th, 2008

While doing some research on cloud computing and considering the privacy and information security implications, I ran across a recent (11/18/2008) report from the Constitution Project, “Liberty and Security: Recommendations for the Next Administration and Congress“.
The following is an excerpt from page 184…

Read the rest of this entry »

Cloud Computing & Privacy

November 24th, 2008

While doing some research on cloud computing and considering the privacy and information security implications, I ran across a recent (11/18/2008) report from the Constitution Project, “Liberty and Security: Recommendations for the Next Administration and Congress“.
The following is an excerpt from page 184…

Read the rest of this entry »

Vishing Very Vicious

November 23rd, 2008

Ah, the fun and joys of texting, and everything else that accompanies cell phones and smart phones!
The dirty dogs who created phishing saw great opportunity to move their electronic social engineering scam to the phone to try and dupe anyone who falls for their seductive lures of saving large sums of money, winning huge pots of money, or otherwise seeing or participating in salacious activities and fun. Vishing criminals also try tactics of scaring you into giving them your personally identifiable information (PII) by threatening you with lawsuits, or worse.

Read the rest of this entry »

Vishing Very Vicious

November 23rd, 2008

Ah, the fun and joys of texting, and everything else that accompanies cell phones and smart phones!
The dirty dogs who created phishing saw great opportunity to move their electronic social engineering scam to the phone to try and dupe anyone who falls for their seductive lures of saving large sums of money, winning huge pots of money, or otherwise seeing or participating in salacious activities and fun. Vishing criminals also try tactics of scaring you into giving them your personally identifiable information (PII) by threatening you with lawsuits, or worse.

Read the rest of this entry »

Vishing Very Vicious

November 23rd, 2008

Ah, the fun and joys of texting, and everything else that accompanies cell phones and smart phones!
The dirty dogs who created phishing saw great opportunity to move their electronic social engineering scam to the phone to try and dupe anyone who falls for their seductive lures of saving large sums of money, winning huge pots of money, or otherwise seeing or participating in salacious activities and fun. Vishing criminals also try tactics of scaring you into giving them your personally identifiable information (PII) by threatening you with lawsuits, or worse.

Read the rest of this entry »

France Performing Audits To Check For Spam

November 20th, 2008

While doing some research on data protection laws in France, I found it interesting to learn that this past September the French data protection authority (CNIL) stared auditing businesses to check for unlawful spam operations.

Read the rest of this entry »

There’s No Good Reason Why Barack Obama Should Give Up His BlackBerry

November 19th, 2008

If security is done effectively and correctly, this is just silly…

Read the rest of this entry »