Skip to main content

Home/ 91.113 Exploring the Internet/ Group items tagged personal

Rss Feed Group items tagged

P Krolak

Google hacking exposes large caches of personal data - 0 views

  •  
    Google hacking, which has been on the rise this summer, is a bit of a misnomer. Also known as Google dorking, Google hacking refers to cybercriminals' enterprising use of Google's advanced search functions to find caches of valuable data ripe for the taking.
Beibei Yang

Nowhere To Run Know Where To Hide - 1 views

  •  
    "What is WikiLeaks? Who is Julian Assange? What's happening and how does one access WikiLeaks? Find all answers here! "
  •  
    Found this on slideshare.net. Personally, I think the slides are good enough for the class.
P Krolak

SAIC: Medical records for 4.9 million TRICARE beneficiaries were stolen - Nextgov - 0 views

  •  
    Science Applications International Corp. said backup computer tapes containing sensitive health information of 4.9 million Military Health Care System TRICARE beneficiaries treated in the San Antonio, Texas, area since 1992 were stolen from an employee's car Sept. 14.
P Krolak

shred-financial-documents-mainstreet: Personal Finance News from Yahoo! Finance - 0 views

  •  
    by Matt BrownellFriday, October 21, 2011 According to financial services consulting firm Javelin Strategies and Research, identity theft affects 11 million people a year, at a cost of $54 billion. If you don't want to become a statistic, a good place to start is to get a shredder.
P Krolak

When Gadgets Betray Us by Robert Vamosi - 0 views

  •  
    When Gadgets Betray Us gives us a glimpse into the secret lives of our gadgets and helps us to better understand-and manage-these very real risks. Technology is evolving faster than we are. As our mobile phones, mp3 players, cars, and digital cameras become more and more complex, we understand less and less about how they actually work and what personal details these gadgets might reveal about us. Robert Vamosi, an award-winning journalist and analyst who has been covering digital security issues for more than a decade, shows us the dark side of all that digital capability and convenience. Hotel-room TV remotes can be used to steal our account information and spy on what we've been watching, toll-booth transponders receive unencrypted EZ Pass or FasTrak info that can be stolen and cloned, and our cars monitor and store data about our driving habits that can be used in court against us.
1 - 5 of 5
Showing 20 items per page