This article tries to shed some light on how identity theft and the second life of stolen identities. Stolen identity information is freely available on Darknet. Unfortunately, there is little individuals can do to protect themselves from identity thieves lurking on the Darknet to do them harm. For organizations, the best strategy is to educate […]
Recently Microsoft has revealed that it is expanding the coverage of “right to be forgotten” mechanism in Europe. Microsoft will now use location signals such as IP addresses to delist URLs on all versions of its search engine Bing. If someone in France successfully requests delisting of a URL on Bing, in addition to delisting […]
The problem now is wide reuse of the same password for different services, as it is much easier for people than to remember tens of different passwords. However, reuse of passwords may lead to bad consequences – hack of one account may allow attacker to accesses also other accounts. Reuse of passwords was reason for recent […]
There are tech companies out there selling spy tools to governments. Those tools let governments to spy on their citizens. Actually, everyone can by spy tools if they can afford them. And there is no check on who’s buying those tools and how they are used. Full article
Question about IP addresses as personal data is bit tricky. IP address (short for Internet Protocol address) is a unique numerical label assigned to an information technology device (e.g., a computer or smartphone) participating in a network using the Internet Protocol system to identify itself and communicate with other devices. IP addresses can be static or […]