The Commercial-News, Danville, IL

Community News Network

January 24, 2013

Is your online data out of control?

If you are an Internet social butterfly, it just might be

(Continued)

The women claim their former lovers, angry at being dumped, published the photographs in an attempt to humiliate them, in an act of revenge.

"I'm going after the revenge porn industry," attorney John Morgan told the Houston Chronicle. "Those sickos who post private information of women without their knowledge."

It may be an extreme example, but it highlights the difficulty consumers have in maintaining control over their image in the Internet age. But what about other kinds of private data?

Little or no control

Microsoft, citing a survey showing 45 percent of U.S. adults feel they have little or no control over the personal information companies gather about them while they are browsing the Web or using online services, is promoting new privacy features in Windows 8.

"As online activities have become a valuable part of daily life, privacy is incredibly important,” said Brendon Lynch, Microsoft's chief privacy officer.

Microsoft has produced a series of web videos that explains how consumers can use the new privacy tools in the operating system.

Mobile threats

Privacy risks, of course, are not confined to your desktop PC but increasingly are found on your mobile devices. Trend Micro, a security software company, found an explosion in Android threats in 2012, with new Android malware outpacing PC malware by a ratio of 14 to three.

Social media platforms continued to grow as areas of concern with attackers targeting them more, users putting themselves at risk by oversharing on them, and their legitimate services being co-opted to support cybercriminal activities, the company said.

How does your mobile device become compromised? In many cases it's done by downloading an app that is actually a front for malware. You can provide some measure of protection by only downloading apps from reputable sources. An app promoted through an unsolicited text or email is probably compromised.

The future may be even more hazardous. For 2013 Trend Micro expects hackers to infiltrate legitimate cloud services, using a blog or social media site like Facebook to transmit commands. Every web site now is supposed to have a privacy policy. It might be a good idea to read them.

Story provided by ConsumerAffairs.

Text Only
Community News Network
E-edition
AP Video
Renewed Violence Taking Toll on Gaza Residents 2 Americans Detained in North Korea Seek Help US Employers Add 209K Jobs, Rate 6.2 Pct House GOP Optimistic About New Border Bill Gaza Truce Unravels; Israel, Hamas Trade Blame Raw: Tunisia Closes Borders With Libya Four Rescued From Crashed Plane Couple Channel Grief Into Soldiers' Retreat WWI Aviation Still Alive at Aerodrome in NY Raw: Rescuers at Taiwan Explosion Scene Raw: Woman Who Faced Death Over Faith in N.H. Clinton Before 9-11: Could Have Killed Bin Laden Netanyahu Vows to Destroy Hamas Tunnels Obama Slams Republicans Over Lawsuit House Leaders Trade Blame for Inaction
NDN Video
Under Armour Launches Biggest Women's Campaign with Inspiring Ad NYPD chokehold death of Eric Garner was homicide: medical examiner Christina Aguilera Pulls a Demi Moore! Man with no arms throws first pitch Chapter Two: Composing for a film in retirement Is Justin Bieber Dating a Model? Guardians of the Galaxy (Trailer) 'Sharknado 2:' Hottest Memes Surfing The Net Snoop Dogg Narrating Animal Footage Is Perfect Raw: Obama Gets Hug From Special Olympian Recapping a Blockbuster MLB Trade Deadline Tigers Acquire David Price - @TheBuzzeronFOX Russell Brand Slams Sean Hannity Over Gaza Conflict Segment Woman's Dive Goes Terribly Wrong Brian Williams Reports on Daughter Allison Williams' 'Peter Pan' Casting News Did Jimmy Fallon Look Up Heidi Klum's Dress? What Drama? Miranda Kerr Poses Topless Plane crashes in San Diego Costco parking lot Justin Bieber Takes To Instagram To Diss Orlando Bloom You Won't Believe the Celeb Cameos in "Sharknado 2"
Must Read