Incognito Mode: Are you Really Incognito?

Author(s):

Isabell Gaylord, ,

Incognito Mode

Introduction A lot of people have a wrong impression of Incognito Mode. Some users think this browsing mode covers your tracks completely from anyone, including both other computer users and the government. However, in reality, Incognito Mode is simply a way to keep your browsing history hidden. Additionally, Incognito Mode ensures that you log off … Read more

Social Media Data Exploitation

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

A man looks through graphs and charts of data exploitation in a futuristic black and grey room.

Former data analytics contractor Christopher Wylie blew the whistle on an independent company for harvesting the Facebook information of more than 50 million people in the United States, resulting in one of the most…

From the Winter 2017 Issue

Emerging Challenges: Wearable Fitness Devices, IoT and Cybersecurity

Author(s):

Shari J. Fagen, Esq., ,

Health and Fitness Devices Lead to New Risks  Wearable, IP enabled devices in the health and fitness industry range from simple fitness trackers for health enthusiasts to smart apparel that helps optimize athletes’ performance to health monitors and medical devices designed for personal and clinical use. These devices have the potential to radically improve human … Read more

From the Winter 2017 Issue

The Difference between Data Security and Privacy

Author(s):

Mark R. Heckman, Ph.D., CISSP, CISA, Professor of Practice, Shiley-Marcos School of Engineering University of San Diego

The difference between data security and privacy

Data Security and privacy are related, but distinct concepts. That may seem obvious to many people, but relatively few can clearly explain the difference. Privacy, moreover, is impossible without data security. This idea does not work the other way around, and the reason why that is true is often missed. Without a clear understanding of … Read more