So you love Cheerios and you're not afraid to like the brand online, download coupons from the Web site, and sacrifice your legal rights for it. What?
People scratch their heads over the privacy policies on social sites like Facebook and Google, but here is first evidence of how those policies could warp as virtual and physical worlds blend.
"Although this is the first case I've seen of a food company moving in this direction, others will follow -- why wouldn't you?" said Julia Duncan, director of federal programs and an arbitration expert at the American Association for Justice, a trade group representing plaintiff trial lawyers. "It's essentially trying to protect the company from all accountability, even when it lies, or say, an employee deliberately adds broken glass to a product."
For more scoops of identity-related goodness, read on.
Paul Ducklin: "Heartbleed" - would 2FA have helped? Because of the global password reset pandemic, lots of Naked Security readers have asked, "Wouldn't 2FA have helped?" You know a password. You have possession of a mobile phone that receives a one-off authentication code. We're going to focus entirely on that sort of 2FA.
The Results of the CloudFlare Challenge Earlier today we announced the Heartbleed Challenge. We set up a nginx server with a vulnerable version of OpenSSL and challenged the community to steal its private key. The world was up to the task: two people independently retrieved private keys using the Heartbleed exploit.
Joseph Conn: 1 in 5 healthcare workers share passwords, survey warns More than 1 in 5 healthcare workers share their passwords with colleagues, a security no-no, but healthcare security pros can take some solace that such risky business is no worse in their industry than some others. Workers in the legal trade, for example, share passwords about as often as in healthcare (22%), according to findings in a report based on a survey of 250 healthcare IT security professionals in the U.S. and another 250 in the U.K.
Alex Ewerlof: Pebble steals your email address from an unsubscribed form Pebble makes smart watches -the kind of watch with a digital display that connects to your phone to show your messages and information that are shared via an application installed on the phone. Their website promises that it "can" do a lot and I have no doubt that there's at least one thing it can do great: stealing my information!
Christopher Mims: How the "internet of things" will replace the web Most of us don't recognize just how far the internet of things will go, from souped-up gadgets that track our every move to a world that predicts our actions and emotions. In this way, the internet of things will become more central to society than the internet as we know it today.
Info Sec UK April 29-May 1; London More than 13,000 attendees to Europe's largest free-to-attend conference. Identity management, mobile, managed services and more.
IIW May 6-8, Mountain View, Calif. The Internet Identity Workshop, better known as IIW, is an un-conference that happens at the Computer History Museum in the heart of Silicon Valley.
Glue Conference 2014 May 21-22; Broomfield, Colo. Cloud, DevOps, Mobile, APIs, Big Data -- all of the converging, important trends in technology today share one thing in common: developers.
European Identity & Cloud Conference 2014 May 13-16, 2014; Munich, Germany The place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Gartner Catalyst - UK June 17-18, London A focus on mobile, cloud, and big data with separate tracks on identity-specific IT content as it relates to the three core conference themes.
Cloud Identity Summit 2014 July 19-22, Monterey, Calif. The modern identity revolution is upon us. CIS converges the brightest minds across the identity and security industry on redefining identity management in an era of cloud, virtualization and mobile devices.
Gartner Catalyst - USA Aug. 11-14, San Diego, CA A focus on mobile, cloud, and big data with separate tracks on identity-specific IT content as it relates to the three core conference themes.