DIGITAL LIFE E-GUIDE. How to Claim Your Online Privacy

Similar documents
Have you ever seen an online ad with a product or brand that you searched just ten minutes ago? That s the result of customized advertising.

DIGITAL LIFE E-GUIDE How to Protect your Smartphone

DIGITAL LIFE E-GUIDE. Keeping Your Cloud Data in Check

What You Should Know About Cloud Storage

Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT -BASED THREATS

Primer CLOUD COMPUTING DEMYSTIFIED 5 CLOUD COMPUTING MYTHS EVERY SMALL BUSINESS SHOULD KNOW ABOUT

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

How Do Threat Actors Move Deeper Into Your Network?

Eco and Ego Apps in Japan

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

4 Steps to Effective Mobile Application Security

Interactive Communications International, Inc. Privacy Policy Your Privacy Rights

Security Threats to Business, the Digital Lifestyle, and the Cloud. Trend Micro Predictions for 2013 and Beyond

STOP. THINK. CONNECT. Online Safety Quiz

A number of factors contribute to the diminished regard for security:

THE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD

H&R Block Digital Tax Preparation, Online, and Mobile Application Privacy Practices and Principles

Learn about each tool in parental controls and find out how you can use them to secure you and your family.

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

Modern Table Website Privacy Policy

How to Configure Your Account s Privacy Settings

FitCause Privacy Policy

Adaptive Business Management Systems Privacy Policy

NorthStar Alarm Services. Website Privacy Policy

Privacy Policy for culinarydreamsinc.com

The Virtualization Practice

The ForeScout Difference

A number of factors contribute to the diminished regard for security:

DailyMailz may collect and process the following personal information about you:

Mobile Ad Tracking Impacts. App Marketing Results. How. Comparisons, advantages and limitations of today s ad tracking technologies

F-Secure Mobile Security. Android

RESEARCHBRIEF. Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market

Symantec RuleSpace Data Sheet

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

PRIVACY POLICY. Effective date: February 11, Holiday Privacy Statement

Kaspersky Security for Mobile

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

What Do You Mean My Cloud Data Isn t Secure?

ForeScout MDM Enterprise

What personal information do we collect from the people that visit our blog, website or app?

nexusfordevelopment.org Privacy Policy

PRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States.

NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS

WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION?

Cookie Policy. Introduction About Cookies

Web. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social.

Panda Security Affiliate Program USA

Consumerization Survey Report The Consumerization of IT

Zubi Advertising Privacy Policy

For additional information and evaluation copies of Trend Micro products and services, visit our website at

DESTINATION MELBOURNE PRIVACY POLICY

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

This guide aims to get you started on decluttering the most important aspects of your digital life.

Today s mobile ecosystem means shared responsibility

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview

WEBSITE PRIVACY POLICY. Last modified 10/20/11

Practical tips for a. Safe Christmas

Are free Android virus scanners any good?

1- Using Bonafeyed as a guest

DID YOU KNOW THAT... Javelin Strategy and Research projects a 78% increase in the U.S. shopper volume by % of owners of Webenabled

Testimony of Edward W. Felten Professor of Computer Science and Public Affairs, Princeton University

Table of Contents. Living In A Mobile World. There s Always An App For That. The UX Challenge. The Facebook + Mobile Opportunity

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Five Trends to Track in E-Commerce Fraud

WHAT INFORMATION IS COLLECTED AT MOTOROLA.COM.VN AND/OR MOTOROLA.VN AND HOW IS IT PROCESSED AND USED?

Privacy Policy. This privacy policy describes how RiskJockey will use the information collected when you visit the RiskJockey website.

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY

Intelligent, Scalable Web Security

Malware & Botnets. Botnets

Microsoft Windows XP Vulnerabilities and Prevention

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

Secure Web Gateways Buyer s Guide >

Thank you for visiting this website, which is owned by Essendant Co.

Privacy Policy MacID. Document last updated Sunday, 28 December 2014 Property of Kane Cheshire

Perception and knowledge of IT threats: the consumer s point of view

Your Privacy Center. Online Privacy Statement. About the Information We Collect

Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions

MOBILE APPS. QA Testing for mobile applications

Web Protection for Your Business, Customers and Data

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher

Koch Communications Privacy Policy

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Consumer Technical Product Marketing. TREND MICRO SafeSync 5.1 for Consumer Product Guide. SSFC - GLOBAL v2.3

The Truth About Enterprise Mobile Security Products

NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013.

Securing Corporate on Personal Mobile Devices

National Cyber Security Month 2015: Daily Security Awareness Tips

EUROPA-PARK is bindingly committed to its online data protection policy

online Online Payment Whatever the channel, an easy way to pay.

AdvancedMD Online Privacy Statement

OVERVIEW. Enterprise Security Solutions

SOLITEC products or services for which a separate privacy policy is provided.

ETHICAL ELECTRIC PRIVACY POLICY. Last Revised: December 15, 2015

OE Cloud Standard Terms of Service

Accenture Interactive Joint Point of View with Adobe. Making it Relevant Optimizing the Digital Marketing Experience

10 Quick Tips to Mobile Security

Transcription:

A DIGITAL LIFE E-GUIDE How to Claim Your Online Privacy

As more and more people go online for personal transactions like shopping and banking, you re bound to wonder how much information about you can be seen online. Because of the extraordinary integration of the Internet in our daily lives, cybercriminals are scoping out the privacy of our online identities in new and more interesting ways.

All About Ads Increased digital native use of the Internet piqued web companies interest in tracking what people do online. Companies have taken to promoting products and services where most people are in social networking sites, news blogs, and online entertainment channels. In fact, online advertising has become most websites cash cow. In 2010, Google revealed that 96 percent of its revenue came from advertising on its own sites and on sites that use its advertising products. Social networking giant Facebook s global advertising revenue was also slated to rise by an estimated 104 percent in 2011 to US$3.8 billion. Because some online advertising service providers like Google AdSense and Yahoo! Advertising Solutions allow ad customization of advertisements, you should be aware of the possibility that service providers and advertisers are tracking your online movements. Advertisers gather information, for instance, by learning what sites you visit and via the online profile forms you fill out.

Customized Advertising: Boon or Bane? Third-party advertising networks usually manage most sites advertising needs. Online advertising or ad networks act as bridges between advertisers and the owners of the sites they wish their ads to appear in. Ad networks use a central server to deliver the right ads to the right site visitors and to monitor users across their entire network. Ad networks also allow third-party companies to observe users online activities via their web browsing histories in order to know their preferences. Although matching users to Internet ads that may pique their interest may not be a problem to some, others may take this as a violation of their privacy. What most sellers find convenient and useful may be construed as invasion of privacy by the people they watch.

To protect your privacy while browsing the web, keep the following tips in mind: Regularly delete cookies. Cookies store site-related information that may be stolen for cybercriminal use. Deleting cookies can have a downside though, as doing so will require you to reenter your user name and password every time you access a site. Consider private browsing. Browsers offer this special mode as a means to keep your online activities a secret from prying eyes. Opting for private browsing opens a new browser session that deletes its history and cookies as soon as you close the window. Note though that this doesn t guarantee anonymity while your browser window remains open, allowing advertisers to still track you down. Use the NAI s opt-out tool. This tool allows you to opt out of being targeted by customized ads. As an organization that promotes online advertising self-regulation, the Network Advertising Initiative (NAI) allows you to opt out of advertising promotions its member companies run. As such, you will no longer be bothered by tailor-made ads companies you chose to block dole out.

The Pitfalls of Oversharing While ad networks have to guess what you re interested in based on your web preferences and usage patterns, social media sites have all the information they need as long as you feed it to them. Thanks to social media integration in multiple sites, social networking sites have easy access to your likes and dislikes. Social media mining is thus fast becoming a standard industry practice, especially among insurance and human resource (HR) companies. The Insurance Information Institute, for instance, said it monitored social media to find potential fraudsters, especially since fraud reportedly cost the insurance industry roughly US$30 million each year. Posts in social networking sites are now also being used as evidence in court hearings such as in a divorce proceeding wherein photos that have been uploaded to Facebook proved a husband s infidelity.

Redefining Privacy Confidential user information is ending up online, thanks in large part to today s youth. The new generation of young social networkers has a different attitude toward protecting and sharing information. They are more likely to reveal personal data to other parties. In a few years, privacy-conscious people will become the minority an ideal prospect for advertisers, or worse, attackers. Keeping what the Miranda Rights says What you say can and will be held against you in mind then only means that it s best to think very carefully before you post anything online. Avoid sharing too much, especially if you haven t figured out how to fully configure your chosen social networking site s privacy settings yet. For nifty tips, read the following CounterMeasures posts on making the most of Facebook s privacy settings: Part I Part II Part III

Is an App Really Worth the Risk? Security and privacy are becoming even more critical issues as more and more users download apps onto their mobile devices. Smartphones have become a favorite malware vector. We have seen apps in the guise of games spy on users. As such, you should make it a habit to check what permissions apps seek before installing them. Many apps are powered by ads, which means these are subject to the same privacy issues related to ad networks. As when browsing sites via your PC, cybercriminals can also track you down via mobile apps, games, and other software. Some apps require information prior to installation such as your location and personal details such as age and sex. This information is then sent to their developers and third-party companies such as ad networks and marketers. With the amount of personal information ios and Android apps collect, you should definitely weigh if downloading an app is worth putting your privacy at risk.

Your Information Is Precious! We hope that this e-guide taught you how precious your online information is and what the repercussions of dangling it in front of cybercriminals prying eyes can be. Downloading an app or subscribing to an online magazine and/or a newsletter is not as simple as it seems. You may not realize it but your personal information can be used in several malicious ways. Whether at home, at work, or on the go, no one should post just about anything and everything personal online for the world to see. Always guard against Internet fraud by protecting not just your systems and/or devices but, more importantly, your personal information.

TREND MICRO Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years experience, we deliver top-ranked client, server and cloud-based security that fits our customers and partners needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, our products and services stop threats where they emerge from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. TRENDLABS SM TrendLabs is a multinational research, development, and support center with an extensive regional presence committed to 24 x 7 threat surveillance, attack prevention, and timely and seamless solutions delivery. With more than 1,000 threat experts and support engineers deployed round-the-clock in labs located around the globe, TrendLabs enables Trend Micro to continuously monitor the threat landscape across the globe; deliver real-time data to detect, to preempt, and to eliminate threats; research on and analyze technologies to combat new threats; respond in real time to targeted threats; and help customers worldwide minimize damage, reduce costs, and ensure business continuity. 2012 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.