Will Canada’s Digital Charter Tackle Lack of Data Control, User Trust?
by Lee Rickwood
Among its stated goals, the Charter promises strong new measures to protect online privacy and to rein in the power of big tech companies over our daily data.
by Lee Rickwood
Among its stated goals, the Charter promises strong new measures to protect online privacy and to rein in the power of big tech companies over our daily data.
By Christine Persaud
As we enter a new year, chances are many of you will continue to shop online as you seek out great post-holiday deals and prepare for upcoming birthdays and other celebrations that involve gift-giving. And cybercriminals are banking on this growing trend, planning to capitalize on these web-based purchases, and the growth in smart connected devices, to try and steal personal information.
By Lee Rickwood
In many ways, it is an outrage that online safety and security has to be purchased at all: yes, our personal information is very valuable and well worth protecting, but there are those who say we should be paid when others make use of our digital data, not that we should pay to protect our data from them.
Can you spot the difference between a harmless passer-by and a potential criminal? Don’t worry — apparently HP RoboCop can. That’s the name given to a high-tech autonomous machine that has become an official member of the Huntington Park Police…
By Yasmin Ranade
Ransomware is a form of digital extortion, first introduced in 2007. While we may not be hearing about attacks as significant as WannaCry and NotPetya, ransomware cases that are reported indicate evolving approaches and hint at brewing underground activity – the silent evolution,
by Lee Rickwood
Respondents to a government survey indicated fears and concerns about data breaches, identity theft, hacking, lack of personal controls on how data are used, and excessive surveillance and tracking.
by Lee Rickwood
We are called users, but in fact we are unpaid workers. The results of all our labour: giant pools of digital information about us that are bought and sold and analyzed and packaged in order to generate corporate profits, if not influence public attitudes.
by Lee Rickwood
The GateKeeper-connected computer can be set to log-out of a session or to shut down completely when the transmitter that the user is carrying or wearing goes out of range.