By Jason Cheung on April 30, 2019 | Tagged with internet, mozilla
Mozilla released their third annual report on the state of the internet and its impact on global society [1]. They asked the following five questions about the internet and identified both positive and negative trends since their report in 2018: Is it safe? How open is it? Who is welcome? Who can succeed? Who controls […]
Read More | No Comments
By Jason Cheung on April 24, 2019 | Tagged with biometric data, Digital identity, identity theft, surveillance
In this blog post, we will look at: What are voice biometrics? Why would companies want to start using voice biometrics? Are there risks in using voice biometrics? We may be becoming more familiar, and even more comfortable, with using biometric identifiers for authentication or security keys. A common usage of a type of biometric […]
Read More | 1 Comment
By Jason Cheung on April 9, 2019 | Tagged with corporate responsibility, Data, data abuse, Data Protection, data regulation, data security, Hacking, information fiduciary, private data
In this second half, we will look at: Are there adequate legal repercussions for losing customer data to hackers? Ways to assess the strength of a potential information fiduciary before doing business and creating an account Critical perspectives Are there adequate consequences for information fiduciaries if they expose my data? The difficulty in establishing liability […]
Read More | 1 Comment
By Jason Cheung on April 2, 2019 | Tagged with corporate responsibility, Data, data abuse, Data Protection, data regulation, data security, Hacking, information fiduciary, private data
In this two-part blog post, we will look at: What is an ‘information fiduciary’? What you should do when an information fiduciary you trust gets hacked? Are there adequate legal repercussions for losing customer data to hackers? Ways to assess the strength of a potential information fiduciary before doing business and creating an account What […]
Read More | No Comments
By Jason Cheung on April 2, 2019 | Tagged with anti-virus, Government Surveillance, Hacking, malware, privacy, smartphone, spyware, surreptitious, surveillance
A report by Vice News [1] published last week points to a report made by the cybersecurity group Security Without Borders [2] about Android malware that disguises itself as innocuous apps on Google’s Play Store. While disguising malicious software as harmless applications is not a technique that is new [3], the article published by Vice […]
Read More | No Comments
By Jason Cheung on March 19, 2019 | Tagged with biometric data, cybersecurity, fingerprint, In the News, personal data
Do you use fingerprints as part of the security of your mobile phone? If you think that the unique characteristics of your fingers provide adequate protection from unauthorized access to your personal information, read on! According to a report by TheNextWeb [1], researchers at New York University have created a set of master fingerprint keys […]
Read More | No Comments
By Jason Cheung on February 26, 2019 | Tagged with file compression, freeware, In the News, security flaw
According to a report by ZDNet [1], WinRAR, a popular Windows software for file compression and decompression, is at risk of a security flaw unless updated. Researchers at Check Point Software Technologies [2], a cybersecurity company, discovered a vulnerability in the .ACE file format of compressed files. WinRAR is well known for offering its software […]
Read More | No Comments
People said…