Curation 403 - Issue 3
The Curation 403 series will be an issue in my newsletter where I try to curate interesting blog posts and videos on different topics, that could help inform and educate people on being internet aware
The Curation 403 series will be an issue in my newsletter where I try to curate interesting articles, blog posts, podcasts, and videos on different topics, that could help inform and educate people on being internet aware. While not every post in this series, would necessarily be the most recent resource, they would nevertheless, be pertinent and applicable to your day-to-day internet life.
If you think you have nothing to hide on the internet and your data would mean nothing, think again. How about your full name, date of birth, passwords, email, posts and personal information on social media? The list could be longer. Any data point linking to you personally is something you need to guard or keep private. This is a must read for everyone using the internet!
Think about everything you post on social media, what you search, the apps that are generating metadata (with or without your consent), what your phone knows about you …there is a worrying amount of data we generate every day that builds an impressive digital footprint. All this data is incredibly valuable to an adversary, whether this be an advertiser trying to sell you better, cheaper, faster services through abusing privacy and online tracking or an attacker who’s trying to steal your identity.
- Stuart Peck
Okay, so you read the first article and you aren’t convinced. Read this post, then! A hacker goes through how he hacked his friend without her noticing. Even data points like usernames and email addresses gathered through open source intelligence (OSINT) can go a long way in helping hackers hack you. This article also reveals why it isn’t smart to reuse a password or use the same email address across services on the web.
Alright uh I’m pretty sure the first thing you do when you’re hacking someone is find all their personal information. I’m talking about her email, phone number, address, star sign, whether she uses Android or Windows Phone, her birthday, and so on.
So, if you think your privacy and security awareness is not bad, why don’t you try answering these quiz questions and see where you rank? The questions are not very technical and are targeted to the average internet user. The answers to the questions can be found here.
Ashar Javed had an interesting idea to create security awareness quiz questions and asked me if I wanted to cooperate. The idea is to make this a community effort and make these questions available for everyone. These questions are not intended for security professionals but for the average computer user.
- John Opdenakker
I have written about how cookies work and how 3rd party cookies can be used to track you online. Though commonly used, cookies are not the only way you are tracked. Nixintel, a digital investigator and OSINT practitioner, does a great job in listing and explaining the various ways by which you could be tracked. Though the article is intended for OSINT practitioners and investigators, I think it is a great read given you are curious enough to learn more about privacy.
Well, I haven’t watched this yet, but I think this could be a good watch.
This documentary-drama hybrid explores the dangerous human impact of social networking, with tech experts sounding the alarm on their own creations.