By Eden Solarik on July 22, 2022 | Tagged with Cyber Security, Digital identity, Hacking, Instagram, Social media
If you haven’t had one of your social media accounts hacked, consider yourself lucky—but don’t assume that you will be safe forever.[1] According to a survey by the University of Phoenix, nearly two thirds of adults have had a social media account hacked.[2] Often, scams start by sending an automated link from an already-compromised friend’s […]
Read More | No Comments
By Rachael Bradshaw on August 10, 2021 | Tagged with cybercrime, cybertheft, data, Data, Data Collection, data security, Hacking, identity theft, password, pharming, Phishing, safety, security
Data Breach: Don’t Let it Get You! by Amruta Phansalker Check out the end of this post for a fun quiz to see if you can spot potential data breaches! We hear of data breach incidents often. But what are they exactly, and why should we worry about them? Did you know that your data […]
Read More | No Comments
By samantha summers on July 11, 2019 | Tagged with astrology, cybersecurity, data, Data Collection, Digital identity, Digital literacy, Hacking, intellectual property, Network Smarts, privacy, safety, Social media, social_network, surveillance
We all can do more to protect ourselves online, but sometimes it can be difficult to know where to start. To help you out, we’ve come up with simple steps each Zodiac sign can take to increase their online safety. Let us know if your sign’s advice speaks to you, and let us know how […]
Read More | No Comments
By Monique Rodrigues on April 11, 2019 | Tagged with Academic Honesty, Canvas, computer science, Data Collection, Data Ownership, Digital identity, Digital Identity Digest, education, Events, Hacking, law, learning analytics, Learning Management System, public interest technology, sociology, technology, UBC, universities
What are universities doing with all the data they collect about you? The Ubyssey published an article about how UBC intends to use students’ data to provide insights to support teaching and learning through its learning analytics project. Although it sounds like a positive development in education, some people are concerned about whether the extensive […]
Read More | No Comments
By Jason Cheung on April 9, 2019 | Tagged with corporate responsibility, Data, data abuse, Data Protection, data regulation, data security, Hacking, information fiduciary, private data
In this second half, we will look at: Are there adequate legal repercussions for losing customer data to hackers? Ways to assess the strength of a potential information fiduciary before doing business and creating an account Critical perspectives Are there adequate consequences for information fiduciaries if they expose my data? The difficulty in establishing liability […]
Read More | 1 Comment
By Jason Cheung on April 2, 2019 | Tagged with corporate responsibility, Data, data abuse, Data Protection, data regulation, data security, Hacking, information fiduciary, private data
In this two-part blog post, we will look at: What is an ‘information fiduciary’? What you should do when an information fiduciary you trust gets hacked? Are there adequate legal repercussions for losing customer data to hackers? Ways to assess the strength of a potential information fiduciary before doing business and creating an account What […]
Read More | No Comments
By Jason Cheung on April 2, 2019 | Tagged with anti-virus, Government Surveillance, Hacking, malware, privacy, smartphone, spyware, surreptitious, surveillance
A report by Vice News [1] published last week points to a report made by the cybersecurity group Security Without Borders [2] about Android malware that disguises itself as innocuous apps on Google’s Play Store. While disguising malicious software as harmless applications is not a technique that is new [3], the article published by Vice […]
Read More | No Comments
By elyse hill on October 2, 2018 | Tagged with Data Collection, Hacking, In the News, privacy
Last month, researchers from Lancaster University in England released work detailing a new technique where a smartphone’s built-in speaker and microphone can act as a sonar system to steal the phone’s unlock pattern. Sonar (Sound Navigation and Ranging) uses sound propagation to detect the surrounding objects and their movements [1]. In this case, the development […]
Read More | 5 Comments
People said…