Archivo de la etiqueta: Security

Destacado: No existe un firewall… “La Conexión es el ROI” – gracias a @Israel_Garcia


Isra García. Human media. Más allá del social media.

Internet no tiene un firewall. Podemos conectar con todos y con todo, el que escucha y lee, el que comenta y aporta, el que comparte, el que hace ruido y molesta, el que podría cambiarlo todo, y el que actualmente lo cambia.

Ver el artículo completo! :)

Lo que ahora haces en esta nueva economía a través de la web social, cambia las personas con las que conectas, cambia lo que recibes, cambia el resultado de lo que otros deciden hacer. Lo que hacemos es tan potente porque conecta a personas, las unas con las otras a través de interacciones humanas. Conecta y alinea empresas y marcas con audiencia, y lo mejor de todo a personas con ideas.

La conexión siempre cambia y cambiará el resultado.

Foursquare community… policy change!


 

2012 has been a pretty huge year. We’ve released over fifty new features, welcomed nearly 15,000,000 new people to Foursquare, and had our 3,000,000,000th check-in. It’s a bit clichéd to say this, but your support really is what keeps us going day after day.

As our product evolves, one of the things we do is update our policies to match it. And a big aspect of that is privacy (something we think about a lot). This email lays out a couple changes that we’ll be making to our privacy policy in the coming month, and explains how they affect you and what you can do about it.

Logo for Foursquare

We know that privacy policies can be dense, so we put together a high-level document that we think of as our “Privacy 101.” It describes, in an easy-to-read way, how we build privacy into our product. While it doesn’t replace the legal need for the complete description of our privacy practices (which you can read here), we hope it helps you better understand how we think about privacy. We’ve also added new explanations of how privacy works throughout the app in our FAQs, including our default privacy settings and how they can be adjusted.

In addition to creating and refining those documents, we want to point out two specific changes to our policy, both of which will go into effect on January 28, 2013… > Sigue leyendo

How Strong Is Your Password?


See on Scoop.itGabriel Catalano human being | #INperfeccion® a way to find new insight & perspectives

 

 

October is National Cyber Security Awareness Month (NCSAM 2012)

So what can you do? The idea of NCSAM is to help get the word out and to protect yourself.

It more important than ever to safely manage your passwords. Password theft has increased by 300% so far in 2012, and that trend will continue to grow. So how can you manage those passwords safely?

With social media, email, shopping, banking and dating, a lot of your life is online and on your phone. Each one of these applications uses a password to protect your sensitive data, but how do you keep them all straight?

Here are some tips from DHS.gov to share with friends, family and your social networks: Sigue leyendo

Virus informático se propaga por Skype, alertan a usuarios


im a geek

Se ha lanzado una advertencia sobre un nuevo virus de Skype que ataca a las cuentas de usuario, según informes dados a conocer esta semana.

Skype atacado por nuevo malware

A través de mensajes enviando enlaces falsos de Internet, Skype sufre de una nueva amenaza, la cual ya está confirmado y se está trabajando en solucionar el problema.

Cómo puede apreciarse en la foto superior, el ataque de virus informático para Skype se transmite al dar click a un enlace que uno de los contactos envía, en donde se pregunta sobre una foto de perfil; no es la primera vez que una amenaza así ataca a los servicios de mensajería instantánea, pues en el momento que MSN estaba en su apogeo, los ataques de virus y spyware eran comúnmente propagados por este medio. Sigue leyendo

Privacidad, abusos y reacciones (sobre Silent Circle y armas que se imprimen)


enriquedans.com | El Blog de Enrique Dans

Llevamos cierto tiempo hablando acerca de la pérdida de privacidad y, fundamentalmente, de dos de sus vertientes: el uso de nuestra información personal por parte de empresas, y la vigilancia por parte de gobiernos. El segundo caso, la construcción de sistemas de monitorización y control de la actividad de los ciudadanos por parte no solo de regímenes totalitarios, sino de gobiernos de todo tipo con pretextos variados, acaba de encontrarse con un serio obstáculo.

Silent Circle es la última creación de Phil Zimmermann, uno de esos nombres absolutamente míticos en el ámbito de la seguridad y la criptografía. Creador de Pretty Good Privacy, el programa de cifrado de correos electrónicos más utilizado en el mundo, Phil fue objeto de una investigación criminal de más de tres años por parte del Gobierno de los Estados Unidos por supuestamente violar la Arms Export Control Act por haber liberado el programa en la red.

Ahora, Phil ha constituido una empresa fuera de los Estados Unidos, ha reunido a un plantel de programadores y ex-militares expertos en seguridad (y un perro, Sullivan, como Director of Vision :-) y ha puesto el foco en las comunicaciones a través del móvil, una de las herramientas más amenazadas por sistemas de vigilancia y espionaje de todo tipo. A cambio de $20 al mes, la empresa proporciona un servicio de uso sencillísimo y al alcance de cualquiera para hacer un número ilimitado de llamadas, videoconferencias, mensajería de texto, correos electrónicos y almacenamiento. La declaración de principios es clarísima:

We DO NOT have the ability to decrypt your communications across our network and nor will anyone else – ever. Silent Phone, Silent Text and Silent Eyes all use peer-to-peer technology and erase the session keys from your device once the call or text is finished. Our servers don’t hold the keys… you do. Our secure encryption keeps unauthorized people from understanding your transmissions. It keeps criminals, governments, business rivals, neighbors and identity thieves from stealing your data and from destroying your personal or corporate privacy. There are no back doors, nor will there ever be.  >>>>  Sigue leyendo

Just 15% Of Smartphone Users Trust All Mobile Apps With Personal Info


marketingcharts.com

truste-mobile-app-privacy-trust-july2012.pngOnly 15% of smartphone users trust all mobile applications with their personal information,according to [download page] a survey released in July 2012 by TRUSTe, conducted by Harris Interactive. Instead, mobile app consumers take a variety of steps to protect their personal information: 38% research the app online, and 34% check to see if an app has a privacy policy.30% will read that privacy policy (if it is provided), and 21% check for a third-party trustmark or seal. 19% will ask friends about trustworthiness.

Only 14% of smartphone users this year believe that their app stores only offer privacy-safe apps. That is down significantly from 25% in 2011, reveals the “2012 US Online and Mobile Privacy Perceptions Report.” Faced with a mobile app they distrust, 85% of smartphone users do not download it, while 8% limits the information they share with the app, 4% limit their usage of the app, and just 3% report they do not change their behavior.

Smartphone Users Uncomfortable Sharing Many Forms of Data

Smartphone users feel safest sharing their gender with mobile apps, with 49% saying they would consent to do so, with age (36%) and email (35%) following. On the other end of the spectrum, just 1% would consent to sharing their list of contacts, 3% their photos and videos, and 5% their home addresses. Only 6% of app users would consent to sharing web-surfing behavior, a key element of online behavioral advertising (OBA), and 58% expressly indicate they do not like OBA. Finally, 28% say they would not consent to sharing any personal data with mobile apps.

University of California-Berkeley researchers in July found a similar reticence about sharing personal contacts. While 82% of mobile owners store contact information on their devices, 81% of device owners would probably (30%) or definitely (51%) not allow social networking applications to mine those contacts for friend suggestions, and 93% would probably (18%) or definitely (75%) not allow a coupons app to mine the list in order to offer coupons to their contacts, per findings.

50% Would Opt Out Of OBA Sigue leyendo

How to avoid a bad QR code


QR Code Press | http://bit.ly/JvPCqa
QR Code Security

Not all forms of quick response code are friendly, so you need to learn smartphone security.

Though they may be fun to use, scanning a quick response code could put your device at risk, so make sure that you learn a few important tips in smartphone security to help to keep malicious software away.

QR code security is just a matter of a little common sense and well applied paranoia.

Knowing how to avoid a bad QR code can save your device and your privacy, regardless of what operating system it uses, from Android to iOS. The malicious software that is currently out there is designed to attack most of the major devices available.

The problem with QR code security is that it’s impossible to tell where scanning it will lead. Sigue leyendo

Las mujeres gestionan las redes sociales mejor


redes sociales mujeres

http://www.ticbeat.com

El Pew Internet & American Life Project ha publicado el informe ‘Privacy Management on social media sites’, en el que muestra cómo las mujeres son más listas a la hora de gestionar la privacidad en las redes sociales. Éstas, por lo general, adoptan una postura más reservada y comparten menos datos que los hombres.

El estudio llevado a cabo por Pew Internet & American Life Project, perteneciente a la firma Pew Research Center, ha visto publicados sus resultados en el informe ‘Privacy Management on social media sites’. De éste se desprenden algunas conclusiones interesantes.

La más general es que las mujeres utilizan mejor las redes sociales a la hora de gestionar su privacidad. La investigación revela que los perfiles de Facebook, LinkedIn y MySpace del 67% de las féminas sólo los pueden ver sus amigos, mientras que únicamente el 48% de los hombres tienen esta configuración. Sigue leyendo

INFOGRAPHIC: Privacy On Facebook Versus Google Plus Posted by Jackie


By Cohen
http://www.allfacebook.com/infographic-privacy-on-facebook-versus-google-plus-2011-10 

Which site offers more privacy, Facebook or Google Plus? A pretty good comparison between the two appears in an infographic below.

Peer One Hosting created the infographic that illustrates how neither site outdoes the other in the way of privacy.

How Do You Reinvent Something as Common as the Padlock?


Talking with Master Lock‘s Lea Plato, lead designer of the ingenious Speed Dial combination lock.

Introduced in 2009, Master Lock’s Speed Dial is the first “directional” combination lock. It replaces a series of numbers with a sequence of up-down and left-right movements (like a video-game cheat). We talked to Lea Plato, one of the designers who worked on the lock, about how the lock came to be and why it’s easier to use than what we’re all used to.

Co.Design: The Speed Dial lock does away with numerical combinations and replaces them with left-to-right and up-and-down movements. What inspired the change?

Lea Plato: The combination lock for lockers has been around for so long, so Master Lock is trying to push different ideas. The Speed Dial is a very different and unexpected design. That’s what attracted us to the idea.

The face of the lock—just four arrows—is clean and straightforward. How did that design come about?

We were trying to play off of simplicity. We wanted the appearance of the lock to match that simplicity. It’s really basic—up, down, left, and right—and easy to remember. So nothing too fancy.

The center button has a nice accent ring around it to show that this is what you push on to make the movements. And the arrows are really simple triangles to suggest which direction you should be moving it in. A lot of the design of the actual body of the lock is driven by the interior mechanism. But we also wanted to give it a nice round shape so it fits well in your hand and it’s easy to move that button up and down.

Another thing we focused on is how everyone could use it. A lot of the numbers are too small for people to see. If you’re visually impaired, you don’t have to see anything to be able to open this lock. Or if your dexterity isn’t very good, the lock is still easy to use. We wanted the lock to be something that everyone can use without making it look like it was designed for just one person in particular. Sigue leyendo

Understanding The Discomfort of Social Anxiety


Can you overcome social anxiety?

http://www.psychologytoday.com

Srini Pillay, M.D.
Srini Pillay, M.D.

is the author of the book: Life Unlocked:
7 Revolutionary Lessons to Overcome Fear
.
He is also an Assistant Clinical Professor at Harvard Medical School.

Your current thought patterns are likely what keep you trapped in the prison of social anxiety. To unlock yourself from this prison, you will likely need to have to rewire your brain with new thoughts that take time to cement in the brain, but if you try this as a start, it will lead you up the correct path. Sigue leyendo

12 Ways the Tech Industry Is Screwing You (and How to Fight Back)


Whether you seek out cutting-edge tech gear or keep to a strict budget, the tech industry has ways to nickel-and-dime you out of your hard-earned cash. Here’s how to fight back.

Patrick Miller, PC World

You can’t install the apps you want on your smartphone. You can’t play the movies you bought on your PC. You can’t even walk into a store without getting upsold, enrolled, restocked, and recalled. Welcome to the world of tech in 2010, where your phone doesn’t work–and companies tell you that “you’re holding it wrong.”

Just because you venture into the tech marketplace with a credit card in your hand doesn’t mean you deserve to get screwed. Check out these 12 ways that the tech industry is pulling a fast one on you–and learn how to fight back.

Ridiculous Restocking Fees

Bought a laptop and realized it wasn’t for you? No problem, you can return it within 30 days–that’ll be $150, please.

Restocking fees are an easy way for vendors to make a tidy profit from a consumer’s buying misstep. The rationale for such fees may be to discourage cheapskates who have no intention of keeping a device from buying it, using it for a short time–say, for the length of a vacation–and then returning it; but the practical result is that you can get slapped with a fee ranging from 10 percent to 25 percent of the purchase price just for the privilege of returning a gadget you’re not happy with.

For example, Best Buy charges 10 percent for iPhone returns; 15 percent for opened laptops, projectors, digital cameras/camcorders, and GPS systems; and 25 percent for any special-ordered item. Amazon.com, Sears, and Newegg all charge a 15 percent restocking fee for computers and electronics, though each vendor’s specific rules vary–for example, Sears charges only if the returned item doesn’t include the original packaging, whereas Newegg dings you for anything you return after opening it.

Take the restocking fees into consideration before you buy. It’s illegal in some states to charge a restocking fee without notifying you in advance, but the notification could be buried in the return policy on the back of your receipt, so ask a salesperson before you swipe your credit card. You might discover that the $5 you save by buying a product from a particular vendor could be negated by the $50 it charges as a restocking fee. Buying a gift? Get a gift card if there’s any chance that the recipient might want to return the item you’re tempted to choose. Sigue leyendo

What’s New in Consumer Web


by Ellie Cachette

marijuana.leafConsumer advocacy groups seem upset with concerns about internet privacy, while research indicates the average consumer will and is sharing more information than ever if they are promised something of value in return.  Target starts selling Facebook credits gift cards and we already know how 7-11 stores are pimped out in Farmville branding. No one is talking about Foursquare anymore as all eyes were on Apple this week. On the bright side you can locate the best medicinal marijuana in your neighborhood using Weedmaps.com

Sigue leyendo

Zona de Promesas

Tecnología - Internet - Redes Sociales - Entrepreneurship - Música - Economía - Innovación

Fortune Tech: Technology blogs, news and analysis from Fortune Magazine

Fortune's tech team offers analysis and perspective on the world's most important developments.

Top Master | Blog

LOS PROGRAMAS DE MBA Y POSTGRADO MAS INFLUYENTES DE TODO EL MUNDO

La realidad alterna

Diario de sueños, cuentos, poesías y una novela en proceso

TechCrunch

Startup and Technology News

Unencumbered by Facts

Taking unsubstantiation to new levels

Carlos Cordero

Blog de tecnología

PsicoEmocions Blog

Un Pont entre la Psique i les Emocions

TEA PTLS NACHO

AUTISMO.TEA..PTLS

Comunicación & Marketing

De Lilian Lanzieri

Xtratexia

Dirección estratégica para la vida

Notes From The Internet

by Silvia Altamirano

StellarHIRE Partners

Founding Partner, StellarHire Partners - Executive Search Consultants. Recent engagements include Eloqua, SFDC, Tibco and Veeam.

ivanbrunpr's Blog

4 out of 5 dentists recommend this WordPress.com site

Matt on Not-WordPress

Stuff and things.

BLOGTEC

Noticias de Tecnologia.

Talento en Expansión

Tendencias y Mejores Prácticas en la Gestión de Personas de la Empresa 2.0

Two Leaves Tea SPAIN

Great Organic Tea! ✫✫✫✫✫ Te Organico en Piramides

Escuela de Dinero

El mejor Sitio en Español sobre lo básico para entender el Dinero y sus matemáticas relacionadas.

My Blog Daniel Palop

A topnotch WordPress.com site

Intentando dejar huella...

...en cada uno de los visitantes

Ideas Para la Clase.com

Portafolio de experiencias en la clase de español para Middle School.

littlegreybox

like. read. laugh. love.

déborah rueda

Un sitio más pero diferente sobre marketing on line

No solo los 80's

La mejor música de la historia

Molly Balloon's Blog

Identity + Dressing + Colour

El OJO PUBLICO. / Глаз общественности

Ver para contar & contar para ver. / Чтобы рассказать

Think Creative Idea

Marketing, publicidad, web y negocios

Social Media y más

Social Media, Redes Sociales, Marketing, SEO

The Coaching Alliance

El camino hacia el éxito

Luces y sombras de las marcas

Social Media, Marketing y Comunicación

CNN en Español: Ultimas Noticias de Estados Unidos, Latinoamérica y el Mundo, Opinión y Videos

Ultimas Noticias de Estados Unidos, Latinoamérica y el Mundo, Opinión y Videos

Javier GM Photography - México y más.

“A great photograph is a full expression of what one feels about what is being photographed in the deepest sense, and is, thereby, a true expression of what one feels about life in its entirety.” ~ Ansel Adams

Natalia Gómez del Pozuelo

Experta en comunicación y oratoria

aloyn

Alimentación, ocio y negocios, ALOYN, es un Grupo dirigido a Directivos y Propietarios de empresas, interesados en el mundo de la industria de alimentación y bebidas. Tanto por la parte de la industria productora como por la parte de la industria consumidora y/o distribuidora (Distribución Comercial, Horeca, Vending, Venta Directa, etc). También nos interesan las actividades ligadas al agroturismo y el enoturismo como magníficas actividades de promoción y difusión de la cultura gastronómica.

Blog de Jack Moreno

Un blog de Joaquín Moreno sobre recursos, literatura y ciencia ficción

Mashamour

Ensalada de Manjares

Infographic List

For those who love Infographics - www.infographiclist.com

URieLaRtE

hoy es el primer dia del resto de tu vida

be.blog

be. Intelligent Multimedia Education

unmonodelsiglo21

Un pequeño espacio virtual para pasarla bien

Curso Web 2.0

Diseña tu sitio web gratis y consigue visitas!

~~Mente en Gravedad~~

************************************************************************************************************

Seguir

Recibe cada nueva publicación en tu buzón de correo electrónico.

Únete a otros 4.353 seguidores

%d personas les gusta esto: