Meridian Star

New Today

January 28, 2013

Is your online data out of control?

If you are an Internet social butterfly, it just might be

(Continued)

The women claim their former lovers, angry at being dumped, published the photographs in an attempt to humiliate them, in an act of revenge.

"I'm going after the revenge porn industry," attorney John Morgan told the Houston Chronicle. "Those sickos who post private information of women without their knowledge."

It may be an extreme example, but it highlights the difficulty consumers have in maintaining control over their image in the Internet age. But what about other kinds of private data?

Little or no control

Microsoft, citing a survey showing 45 percent of U.S. adults feel they have little or no control over the personal information companies gather about them while they are browsing the Web or using online services, is promoting new privacy features in Windows 8.

"As online activities have become a valuable part of daily life, privacy is incredibly important,” said Brendon Lynch, Microsoft's chief privacy officer.

Microsoft has produced a series of web videos that explains how consumers can use the new privacy tools in the operating system.

Mobile threats

Privacy risks, of course, are not confined to your desktop PC but increasingly are found on your mobile devices. Trend Micro, a security software company, found an explosion in Android threats in 2012, with new Android malware outpacing PC malware by a ratio of 14 to three.

Social media platforms continued to grow as areas of concern with attackers targeting them more, users putting themselves at risk by oversharing on them, and their legitimate services being co-opted to support cybercriminal activities, the company said.

How does your mobile device become compromised? In many cases it's done by downloading an app that is actually a front for malware. You can provide some measure of protection by only downloading apps from reputable sources. An app promoted through an unsolicited text or email is probably compromised.

The future may be even more hazardous. For 2013 Trend Micro expects hackers to infiltrate legitimate cloud services, using a blog or social media site like Facebook to transmit commands. Every web site now is supposed to have a privacy policy. It might be a good idea to read them.

Story provided by ConsumerAffairs.

Text Only
New Today
Biz Marquee
New Today
Poll

Do you think the city of Meridian should aggressively enforce the city's code enforcement laws on litter, abandoned homes and overgrown lots by issuing tickets and stiff fines?

Yes
No
     View Results
Facebook
Facebook
Twitter Updates
Follow us on twitter
AP Video
Fighting Blocks Access to Ukraine Crash Site Dangerous Bacteria Kills One in Florida Workers Dig for Survivors After India Landslide Texas Scientists Study Ebola Virus Smartphone Powered Paper Plane Debuts at Airshow Southern Accent Reduction Class Cancelled in TN Raw: Deadly Landslide Hits Indian Village Obama Chides House GOP for Pursuing Lawsuit New Bill Aims to Curb Sexual Assault on Campus Russia Counts Cost of New US, EU Sanctions 3Doodler Bring 3-D Printing to Your Hand Six PA Cops Indicted for Robbing Drug Dealers Britain Testing Driverless Cars on Roadways Raw: Thousands Flocking to German Crop Circle At Least 20 Chikungunya Cases in New Jersey Raw: Obama Eats Ribs in Kansas City In Virginia, the Rise of a New Space Coast Raw: Otters Enjoy Water Slides at Japan Zoo NCAA Settles Head-injury Suit, Will Change Rules Raw: Amphibious Landing Practice in Hawaii
Hyperlocal Search
Premier Guide
Find a business

Walking Fingers
Maps, Menus, Store hours, Coupons, and more...
Premier Guide