Digital Smarts Blog

You are here

29
Oct

Watch Out for Man-in-the-Middle Attack on iCloud

A new kind of attack is being made on Apple’s iCloud, called a “man-in-the-middle attack”. This kind of attack is when a hacker puts a fake website between the user and the real website they were aiming for. The messages still go back and forth between the user and the site, but the man in the middle can siphon off information such as user IDs and passwords. If you use iCloud, Apple has posted on its website specific examples of what users should look for on all major browsers – Safari, Chrome and Firefox – to ensure that their connection is safe.

29
Oct

Watch Out for Man-in-the-Middle Attack on iCloud

A new kind of attack is being made on Apple’s iCloud, called a “man-in-the-middle attack”. This kind of attack is when a hacker puts a fake website between the user and the real website they were aiming for. The messages still go back and forth between the user and the site, but the man in the middle can siphon off information such as user IDs and passwords. If you use iCloud, Apple has posted on its website specific examples of what users should look for on all major browsers – Safari, Chrome and Firefox – to ensure that their connection is safe.

28
Oct

Time to Rename the Smartphone?

Is the term smartphone outdated and clunky? With WiFi calling, FaceTime, Google Hangouts, Skype, and other alternative conversational technologies available, what does it even mean to have a "phone call" these days? In this article by Tyler Wells Lynch, he suggests the term “smart” is a redundant and lazy way to describe our phones, and challenges readers think of a better name for these devices.

28
Oct

Time to Rename the Smartphone?

Is the term smartphone outdated and clunky? With WiFi calling, FaceTime, Google Hangouts, Skype, and other alternative conversational technologies available, what does it even mean to have a "phone call" these days? In this article by Tyler Wells Lynch, he suggests the term “smart” is a redundant and lazy way to describe our phones, and challenges readers think of a better name for these devices.

27
Oct

Are You Ready for the Biometric Revolution?

From fingerprint readers to voice imprints, more and more businesses are using biometrics for many purposes -- but the question now is are consumers prepared to handle the privacy implications? If you have a driver’s license, a passport and a Facebook account, you are likely already documented in at least three different facial recognition databases. In defense of the data collectors, most biometrics are not secrets. A fingerprint or facial feature is unique to each individual, but they are not secret or able to be protected the way a password is. You can always change your password but biometrics are for the most part immutable. With that in mind, it is important to note the law doesn't recognize a right to privacy over anything that is revealed to the public. In this case, that includes just showing your face.

27
Oct

Are You Ready for the Biometric Revolution?

From fingerprint readers to voice imprints, more and more businesses are using biometrics for many purposes -- but the question now is are consumers prepared to handle the privacy implications? If you have a driver’s license, a passport and a Facebook account, you are likely already documented in at least three different facial recognition databases. In defense of the data collectors, most biometrics are not secrets. A fingerprint or facial feature is unique to each individual, but they are not secret or able to be protected the way a password is. You can always change your password but biometrics are for the most part immutable. With that in mind, it is important to note the law doesn't recognize a right to privacy over anything that is revealed to the public. In this case, that includes just showing your face.

22
Oct

YikYak Still Creating Problems At Schools

YikYak, a location based app that allows users to post anonymous statements online, is in the news again with schools making complaints about inappropriate use of the app leading to cyberbullying and intimidation. If your school is having issues with this app, its use can be blocked on school grounds by visiting YikYak Support and making a request.

22
Oct

YikYak Still Creating Problems At Schools

YikYak, a location based app that allows users to post anonymous statements online, is in the news again with schools making complaints about inappropriate use of the app leading to cyberbullying and intimidation. If your school is having issues with this app, its use can be blocked on school grounds by visiting YikYak Support and making a request.

21
Oct

Watch Out for Whisper

Whisper, the social networking app that lets users post anonymous messages, may have been tracking its users' locations - even those users who have opted out of the service's geolocation features. According to an in-depth report by The Guardian, the service is also accused of closely monitoring the activity of noteworthy individuals. While the company denies these allegations, it is an excellent example of how “anonymous” is a relative term. Learn more about other “temporary” apps that are popular today in the article by Common Sense Media entitled Snapchat and 6 Other Messaging Apps That Let Teens Share (Iffy) Secrets.

21
Oct

Watch Out for Whisper

Whisper, the social networking app that lets users post anonymous messages, may have been tracking its users' locations - even those users who have opted out of the service's geolocation features. According to an in-depth report by The Guardian, the service is also accused of closely monitoring the activity of noteworthy individuals. While the company denies these allegations, it is an excellent example of how “anonymous” is a relative term. Learn more about other “temporary” apps that are popular today in the article by Common Sense Media entitled Snapchat and 6 Other Messaging Apps That Let Teens Share (Iffy) Secrets.

20
Oct

Could Parents Be Liable for a Nasty Facebook Page?

Can parents be liable for a nasty social networking page created by their child and used to bully another? It is a question that many schools and parent groups are debating these days and is now playing out in a Georgia courtroom. Recently the Georgia Court of Appeals reversed a lower court's decision, ruling that a jury be allowed to consider parents liable for their child’s internet activity. Up for deliberation in this case is whether the parents are responsible for failing to supervise their son's use of the home computer, which was used to engage in bullying by creating a false Facebook page filled with sexual and racist comments and altered pictures. The parents were aware that the page was online for 11 months before it was deactivated by Facebook.

20
Oct

Could Parents Be Liable for a Nasty Facebook Page?

Can parents be liable for a nasty social networking page created by their child and used to bully another? It is a question that many schools and parent groups are debating these days and is now playing out in a Georgia courtroom. Recently the Georgia Court of Appeals reversed a lower court's decision, ruling that a jury be allowed to consider parents liable for their child’s internet activity. Up for deliberation in this case is whether the parents are responsible for failing to supervise their son's use of the home computer, which was used to engage in bullying by creating a false Facebook page filled with sexual and racist comments and altered pictures. The parents were aware that the page was online for 11 months before it was deactivated by Facebook.

19
Oct

The Next Thing To Look Out For – Anonymous Facebook App

Connecting with friends and family has always been the mission of Facebook., and anonymity has long been discouraged on the site. Now Facebook is reportedly working on a mobile application that would let users interact anonymously, allowing them to have discussions on topics (and people) they might not want linked back to their Facebook profile. What remains to be seen is how Facebook would protect the service from violating its terms of agreement or being hijacked by trolls and cyberbullies.

19
Oct

The Next Thing To Look Out For – Anonymous Facebook App

Connecting with friends and family has always been the mission of Facebook., and anonymity has long been discouraged on the site. Now Facebook is reportedly working on a mobile application that would let users interact anonymously, allowing them to have discussions on topics (and people) they might not want linked back to their Facebook profile. What remains to be seen is how Facebook would protect the service from violating its terms of agreement or being hijacked by trolls and cyberbullies.

18
Oct

Privacy vs. Convenience – Where Do You Stand?

If it comes down to privacy versus convenience, where do you stand? According to a recent survey from Gigya, convenience wins for most people. The company, which allows consumers to use their Facebook or Twitter log-ins to sign in (a.k.a. social sign-in) to a wide range of Web sites, found that users fear the worst when it comes to privacy but are still willing to put convenience above those concerns. The survey polled 4,000 respondents in the United States and Britain on their thoughts about data privacy. It was found that 60 percent of Internet users opt to use their Facebook, Twitter or Google account credentials to log in to other sites — even though they may fear those sites aren't careful with their data.

18
Oct

Privacy vs. Convenience – Where Do You Stand?

If it comes down to privacy versus convenience, where do you stand? According to a recent survey from Gigya, convenience wins for most people. The company, which allows consumers to use their Facebook or Twitter log-ins to sign in (a.k.a. social sign-in) to a wide range of Web sites, found that users fear the worst when it comes to privacy but are still willing to put convenience above those concerns. The survey polled 4,000 respondents in the United States and Britain on their thoughts about data privacy. It was found that 60 percent of Internet users opt to use their Facebook, Twitter or Google account credentials to log in to other sites — even though they may fear those sites aren't careful with their data.

17
Oct

Feds Claim the Right to Impersonate People on Facebook

Federal drug-enforcement officials are claiming the right to impersonate people on Facebook in order to ensnare suspected criminals. A woman whose phone was confiscated found that officials had harvested photos from it and used them to establish a fake Facebook page in her name. Officials insist they were within their rights to use her identity for a "legitimate law enforcement purpose," but some of those pictures included were those of her young son and niece. A Facebook spokesman declined to comment on the case. The site’s “Community Standards” state “Claiming to be another person, creating a false presence for an organization, or creating multiple accounts undermines community and violates Facebook’s terms.” The spokesman said there is no exception to this policy for law enforcement.

17
Oct

Feds Claim the Right to Impersonate People on Facebook

Federal drug-enforcement officials are claiming the right to impersonate people on Facebook in order to ensnare suspected criminals. A woman whose phone was confiscated found that officials had harvested photos from it and used them to establish a fake Facebook page in her name. Officials insist they were within their rights to use her identity for a "legitimate law enforcement purpose," but some of those pictures included were those of her young son and niece. A Facebook spokesman declined to comment on the case. The site’s “Community Standards” state “Claiming to be another person, creating a false presence for an organization, or creating multiple accounts undermines community and violates Facebook’s terms.” The spokesman said there is no exception to this policy for law enforcement.

16
Oct

Software Group Launches Student Privacy Pledge

There has been a lot of press about some of the issues regarding privacy and student data that is collected by schools. The Software and Information Industry Association (SIIA) has joined with the Future of Privacy Forum to announce a new pledge for companies that make products for K-12 students. Companies who have signed the pledge promise not to sell student information or target ads based on students’ behavior. These companies will also only use data for specific educational purposes and will impose limits on how long that information is held.

16
Oct

Software Group Launches Student Privacy Pledge

There has been a lot of press about some of the issues regarding privacy and student data that is collected by schools. The Software and Information Industry Association (SIIA) has joined with the Future of Privacy Forum to announce a new pledge for companies that make products for K-12 students. Companies who have signed the pledge promise not to sell student information or target ads based on students’ behavior. These companies will also only use data for specific educational purposes and will impose limits on how long that information is held.

Pages