data security posts, articles, and infographics | Social Media Today
Sign up | Login with →

data security

Google Says Collecting Data from Unencrypted WiFi Networks Isn’t Illegal

April 17, 2014 by Jan Legnitto

Google and unencrypted WiFi

Do you think it’s legal to collect data transmitted over unencrypted WiFi networks? Google does. This month, Google asked the U.S. Supreme Court to review an earlier federal appeals court decision that could make it liable for hijacking data from unencrypted WiFi networks in neighborhoods that were part of its Street View program.[read more]


The Epic Fail Most Companies Make and How Social Business Can Help

February 11, 2014 by Anthony Zets

Data security risks

It seems an insane irony that amid the more than $60 billion dollars we spend annually around the world on information security, we routinely fail to secure some of the most mission-critical information from a totally obvious risk. The problem may be old, but there is a new solution.[read more]

76 Percent Say Free WiFi Can Lead to Identity Theft [INFOGRAPHIC]

November 18, 2013 by Elaine Rigoli

WiFi and Identity Theft

They're so popular, those ubiquitous mobile devices. For better or worse, we've evolved into a society that is a texting, online-banking, TMI-ing, forever-connected, 24/7-kind of world. But have you ever considered the negatives when you're doing all that in a public wireless hotspot?[read more]

How to Keep Your Internet Usage Private [INFOGRAPHIC]

September 24, 2013 by Aaron Elliott

Keep your internet usage private

It has never been top-secret that online activity is far from being private. Chat, email, photos, videos, file transfers, social networking data: they may be accessed through the click of a button, at any given time or place. Here are a few methods for keeping your private data away from Internet companies, and even the public.[read more]

The Death of the Password

February 13, 2013 by Mark Risher

Using no more processing power than what’s found inside a basic smartphone, it is now possible to generate all possible 8-letter passwords in a few hours. It’s shocking how many companies still rely on nothing more than username and password to secure sensitive data.[read more]

The Asocial Network: How Hackers Use Social Networks to Destroy Your Online Life

February 10, 2013 by Mark Risher

How well do you know your social network? With the way our online identities are increasingly linked, all it takes is one less-than-discriminating friend in your circle for a hacker to gain access to and destroy your online life.[read more]

Twitter Urges Members to Change Passwords Following Security Breach

February 4, 2013 by

“This attack was not the work of amateurs, and we do not believe it was an isolated incident,” stated Bob Lord, Twitter director of information security. “The attackers were extremely sophisticated, and we believe other companies and organizations have also been recently similarly attacked.”[read more]

Are You Accidentally Sharing Your Secrets Online?

December 14, 2009 by Rohit Bhargava

There is a character on Dilbert called Mordac. If you've seen him, you know he is a caricature of an unfortunately real person in many corporate organizations who worries solely about data security at the expense of usability, accessibility and just about anything else: We all hate Mordac. Of course, on a logical level, most of us...[read more]

Eight Steps to Responsible Surfing

August 7, 2008 by Doug Woodall

Web threats and attacks will continue to evolve, but surfers can protect themselves against the majority of malicious code by following eight different steps. To provide the greatest degree of security, surfers cannot rely entirely on technology, and should also address the behavioral issues that are most likely to create risky...[read more]