Privacy in Public

Recent revelations that a driver for Uber and Lyft streamed video of passengers riding in his vehicle raised questions about whether consumers can expect privacy in any space they do not control, such as when they are driving on public streets, shopping at the mall or riding in someone else’s…

Continue Reading
Google Headquarters

Should Facebook and Google Pay Us for Our Personal Information?

Facebook, Google and other online services provide consumers free access to their platforms. However, nothing is truly “free.” We pay with our data and these companies make billions of dollars selling our personal information to advertisers and others. Now some people are starting to ask if the big tech companies…

Continue Reading

Does Privacy Matter if You Have Nothing to Hide?

When the news broke about Cambridge Analytica harvesting and using the personal information of Facebook users, many people discovered for the first time how much data Facebook stores on users and to how many companies they sell that data. But does it really matter how much Facebook, Google, Amazon and…

Continue Reading
Typing on keyboard

Using the Tor Browser for Private Web Surfing

Are you looking for a way to browse the Internet without leaving a trail of cookies and tracking pixels? One way is by using the Tor browser. Tor stands for “The Onion Router” because the layers of encryption are comparable to the layers of an onion. Tor works by connecting…

Continue Reading
Smart Device

Smart Devices Become Tools for Domestic Abusers

According to the Centers for Disease Control, one in three women and one in six men have been victims of physical violence or stalking by an intimate partner. Today, smart technology has given these abusers new ways to harass their victims. Apps and other tools designed to track children or…

Continue Reading
Webcam

Sextortion Scam Uses Real Passwords to Scare Victims

The Federal Bureau of Investigation (FBI) defines “sextortion” as “a serious crime that occurs when someone threatens to distribute your private and sensitive material if you don’t provide them images of a sexual nature, sexual favors or money.” In a new twist to this old crime, the criminals attempt to…

Continue Reading
GDPR: It’s Not Just for Europe

GDPR: It’s Not Just for Europe

In May 2018, the General Data Protection Regulation (GDPR) went into effect in the European Union (EU). The GDPR gives consumers in the EU greater control over their personal data and how it is used. Time reports that, “corporations need to explicitly ask if they can collect your data, they’re…

Continue Reading
Cryptocurrency and Blockchain

Podcast: Cryptocurrency and Blockchain

Cryptocurrencies such as Bitcoin are being promoted to consumers as investments, but many people do not understand what cryptocurrencies are or how they work. This interview will explore the world of cryptocurrencies and will also address how blockchain keeps cryptocurrencies and other data secure. Expert: Gustav Schmidt, a banking attorney…

Continue Reading
Little Things Mean a Lot

Little Things Mean a Lot

Which Harry Potter character are you?  Which Disney Princess are you? What cat is best suited to you? Which country best reflects your personality? Your Facebook feed may be filled with dozens of cute quizzes and surveys such as this. They can be fun, but answering those seemingly innocuous surveys…

Continue Reading
Protect Yourself (and Your Children) from “Revenge Porn”

Protect Yourself (and Your Children) from “Revenge Porn”

In “revenge porn” private photos or videos are shared without permission. These images are usually sexually explicit and shared to embarrass the victim. Some may be posted to revenge porn sites, but more often they are posted to social media where friends and family of the victim will see them.…

Continue Reading
Protect Your Computer from Cryptojacking

Protect Your Computer from Cryptojacking

Cryptocurrency has entered the mainstream, with companies including Microsoft, Dish Network and Overstock.com accepting payment in Bitcoin. Of course, Bitcoin is only one of many digital currencies in use. These currencies are not backed by any bank or government and use blockchain technology to record and reconcile all transactions. Cryptocurrencies…

Continue Reading
Caller ID Spoofing and Robocall

Caller ID Spoofing and Robocalls

Spammers and scammers have resorted to caller ID spoofing to mask their identities and to get consumers to pick up the telephone. We have all received robocalls, those annoying recorded calls that try to sell us something or try to scam us. The Federal Trade Commission received 4.5 million complaints…

Continue Reading
What is a VPN?

What is a VPN and Do You Need One?

Do you ever access the Internet using public WiFi? Most of us do at one time or another at the library, the coffee shop, a hotel or other public place. Public networks can be convenient, but the downside is that you never know who might see your data. One way to…

Continue Reading
Farewell to Facebook

Farewell to Facebook?

Is it time to say goodbye to your Facebook account? Facebook has a long history of privacy missteps, but the discovery that data was gathered from 50 million users without the users’ permission made people more aware of the volume of data collected and sold by Facebook. As a result,…

Continue Reading