Privacy issues have been highlighted by a recent Newsweek report that “mysterious devices sprinkled across America—many of them on military bases—that connect to your phone by mimicking cell phone towers and sucking up your data“ and an earlier Florida Today report that “[l]ocal and state police, from Florida to Alaska

Continue Reading 18+ States Rely on “Stingrays” (Fake Cell Towers) for Surveillance – Is this an Invasion of Privacy?

Most people freely attach devices to the Internet throughout their home without contemplating any privacy risk, but a recent home inspection of “network-attached storages (NAS), Smart TVs, router, Blu-ray player” by Kaspersky Lab security analyst David Jacoby proved otherwise.  As a result of this inspection a report was issued entitled

Continue Reading 3 IoT (Internet of Things) Cyber Threats to Privacy in Your Home That Might Surprise You

My 2011 eCommerce Times column “Cloud Computing – New Buzzword, Old Legal Issues” reminded many folks that “the technology concept behind cloud computing has been around for more than 50 years, and the legal issues are equally old.”  Obviously the reasons Cloud systems crash are equally old news

Continue Reading 9 Common Reasons Cloud Systems Crash: Things to Remember When Negotiating Cloud Contracts

Unsuspecting children downloaded apps from the Google Play store with “unlimited in-app charges without Google requiring entry of a password or other account holder involvement to obtain the account holder’s consent before the charges were incurred” according to FTC (Federal Trade Commission) Chair Edith Ramirez.  On September 4, 2014

Continue Reading $19 Million Settlement for Droid App Charges between Google and FTC

Dell’sAnatomy of a cyber-attack” focuses on malware because malware “comes in various forms, some more nefarious than others, ranging from annoying sales pitches to potentially business-devastating assaults.”  This “how to” report from Dell makes the point that you “need to understand the enemy before you can defeat

Continue Reading “How to Stop Malware” – Strategies and Tools of Cyber Criminals