Quantcast
Channel: Privacy | Michael Guadagno & Associates
Browsing all 30 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Do not give up your privacy so easily

In late January, the European Commission published a proposal “on the protection of individuals with regard to the processing of personal data.”  The proposal does not differ all that much from the...

View Article



Image may be NSFW.
Clik here to view.

Chinese Business in the Carolinas and Your Corporate Security Here & Abroad©

Written by: Alan J. Rosenthal, Rosenthal Consultants The states of South Carolina and North Carolina are getting numerous ‘friends’ from China making them the leader of U.S. states that are attracting...

View Article

Image may be NSFW.
Clik here to view.

Thief Outside the Home

Your Data Up for Grabs! The security of your data is a serious topic. You see news articles about governments and businesses waging war against cybercrime. The battle against the dark forces of...

View Article

Image may be NSFW.
Clik here to view.

Car Hacking: Can Your Vehicle Be Compromised?

Car hacking can be accomplished as easily as 1-2-3. All it takes is a great song shared with you by an acquaintance on a CD that you play in your car. While you are moving to the beat of the music and...

View Article

How to Stop a Spy

Lifehacker editor, Adam Dachis, provides an insightful and informative article this month entitled “How to Stop Spies from Digging Up Your Personal Information.” Read the full article at LIFEHACKER,...

View Article


Image may be NSFW.
Clik here to view.

Popular office phones vulnerable to eavesdropping

Cisco IP Phone easy to be hacked Bob Sullivan of The Red Tape Chronicles recently posted a story about how popular office phones are vulnerable to eavesdropping. “You can imagine the implications of...

View Article

Image may be NSFW.
Clik here to view.

Law Enforcement Using Cell Phone Tracking Devices

Stingray cell phone tracking device For more than a year, federal authorities pursued a man they called simply “the Hacker.” Only after using a little known cellphone-tracking device—a stingray—were...

View Article

Image may be NSFW.
Clik here to view.

Is Someone Watching you Inside your own Home: How do you Protect Yourself?

A video by an NBC National Investigative Reporter demonstrates how hackers can invade your privacy in the comfort of your own home. There are simple ways you can protect your privacy, which we use...

View Article


Image may be NSFW.
Clik here to view.

BYOC: The Mobile Cloud Computing Cyber Security Forecast

An outgrowth of Mobile Cloud Computing is BYOC (Bring Your Own Cloud).  However, instead of the Cloud service being taken to work, it is used abroad.  We are a far cry from the offices of yesteryear,...

View Article


Image may be NSFW.
Clik here to view.

Legal Surveillance Methods and Tools: How Do You Protect Yourself?

Is Someone Spying on You? In the past, people concerned about their safety and security had to rely upon large corporations to protect them, at great financial cost. But as electronics have gotten...

View Article

Image may be NSFW.
Clik here to view.

Thief Outside the Home

Your Data Up for Grabs! The security of your data is a serious topic. You see news articles about governments and businesses waging war against cybercrime. The battle against the dark forces of...

View Article

Image may be NSFW.
Clik here to view.

Car Hacking: Can Your Vehicle Be Compromised?

Car hacking can be accomplished as easily as 1-2-3. All it takes is a great song shared with you by an acquaintance on a CD that you play in your car. While you are moving to the beat of the music and...

View Article

How to Stop a Spy

Lifehacker editor, Adam Dachis, provides an insightful and informative article this month entitled “How to Stop Spies from Digging Up Your Personal Information.” Read the full article at LIFEHACKER,...

View Article


Image may be NSFW.
Clik here to view.

Popular office phones vulnerable to eavesdropping

Cisco IP Phone easy to be hacked Bob Sullivan of The Red Tape Chronicles recently posted a story about how popular office phones are vulnerable to eavesdropping. “You can imagine the implications of...

View Article

Image may be NSFW.
Clik here to view.

Law Enforcement Using Cell Phone Tracking Devices

Stingray cell phone tracking device For more than a year, federal authorities pursued a man they called simply “the Hacker.” Only after using a little known cellphone-tracking device—a stingray—were...

View Article


Image may be NSFW.
Clik here to view.

Is Someone Watching you Inside Your Own Home?

How Do You Protect Yourself from In-Home Spying? A video by an NBC National Investigative Reporter demonstrates how hackers can invade your privacy in the comfort of your own home. There are simple...

View Article

Image may be NSFW.
Clik here to view.

BYOC: The Mobile Cloud Computing Cyber Security Forecast

An outgrowth of Mobile Cloud Computing is BYOC (Bring Your Own Cloud).  However, instead of the Cloud service being taken to work, it is used abroad.  We are a far cry from the offices of yesteryear,...

View Article


Image may be NSFW.
Clik here to view.

Legal Surveillance Methods and Tools: How Do You Protect Yourself?

Is Someone Spying on You? In the past, people concerned about their safety and security had to rely upon large corporations to protect them, at great financial cost. But as electronics have gotten...

View Article

Image may be NSFW.
Clik here to view.

GPS Tracking and the Lay Person

Would you even recognize a GPS tracking device if you found one on your vehicle? Probably not, since some of the newer devices are smaller than a dime and easily masquerade as an auto part. As a cyber...

View Article

How do I protect myself online?

6 Ways to Protect Yourself Online This is a very timely question. As more and more of us turn to online shopping and working from home, we open ourselves up to hackers and other cyber scumbags to take...

View Article
Browsing all 30 articles
Browse latest View live




Latest Images