Issue 1

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Issue 1

In April 2020, The New York Times reported that the video conferencing site Zoom was
engaging in undisclosed data mining during user conversations. This was done through a
subscription-based tool called LinkedIn Sales Navigator that Zoom offered to customers
for their marketing needs. When a user signed into a Zoom meeting, the tool would
transmit their data to a system that matched their profile with their LinkedIn profile. Even
when a user signed into a Zoom meeting with an anonymous name, the tool would still
connect their profile to their LinkedIn profile, potentially revealing their real name to
other users.There are several techniques and technologies that can be used to protect
internet privacy, particularly in the context of video conferencing. These include the use
of virtual private networks (VPNs), which encrypt internet traffic and hide a user's IP
address, as well as secure messaging apps that use end-to-end encryption to protect the
content of messages. Additionally, users can protect their privacy by using anonymous or
pseudonymous accounts, and by carefully controlling their privacy settings on social
media and other online platforms. It is also important for users to be aware of potential
privacy risks and to be cautious when sharing personal information onlineUsing these
techniques and technologies can help protect internet users from a variety of privacy
risks, including surveillance, identity theft, and data breaches. By encrypting internet
traffic and using secure messaging apps, users can prevent third parties from intercepting
and accessing their sensitive information, such as passwords and financial information.
Additionally, by using anonymous or pseudonymous accounts and carefully managing
their privacy settings, users can prevent their personal information from being shared
without their consent.

ISSUE 2

Phishing is a type of online scam where attackers send fake emails or text messages that appear
to be from legitimate companies or individuals in order to trick victims into revealing personal
information such as passwords and credit card details. According to Webroot, a cybersecurity
solutions provider, around 1.5 million new phishing sites are created each month. A study by
Verizon found that more than 30% of phishing messages are opened by their intended targets,
and 15% of people who fall for a phishing scam will be targeted again within the year. These
attacks can be highly effective, as they often use familiar branding and language to trick victims
into believing that the message is legitimate. It is important for individuals to be vigilant and
cautious when responding to unsolicited emails or text messages, and to never reveal personal
information unless they are certain of the sender's identity.To protect against phishing attacks,
individuals can use a number of different techniques and technologies. Some of these include:

 Use strong, unique passwords for each of your online accounts. Avoid using the same
password for multiple accounts, and make sure that your password is not easily
guessable.
 Enable two-factor authentication (2FA) whenever possible. This means that in addition to
your password, you will need to enter a code sent to your phone or email in order to
access your account. This makes it much harder for attackers to gain access to your
accounts even if they have your password.
 Be cautious when responding to unsolicited emails or text messages. If you receive a
message from an unknown sender or one that seems suspicious, do not click on any links
or open any attachments. Instead, contact the sender directly using a known email address
or phone number to verify their identity.
 Use reputable antivirus and firewall software to protect your devices. This will help
prevent malware from being installed on your computer and will alert you to any
suspicious activity.
 Use a virtual private network (VPN) when accessing the Internet. A VPN encrypts your
data and hides your IP address, making it much more difficult for attackers to track your
online activities.
 Keep your software up to date. Regularly update your operating system and other
software to ensure that you have the latest security patches and fixes. This will help to
protect against known vulnerabilities that attackers could exploit.

Overall, the benefits of applying these resolution Internet privacy techniques and technologies
are that they can help to protect your online accounts and personal information from being
accessed by attackers. By using strong, unique passwords and enabling 2FA, you can make it
much harder for attackers to gain access to your accounts. By being cautious when responding to
unsolicited messages, using reputable security software, and keeping your software up to date,
you can help to prevent malware infections and protect against known vulnerabilities. Using a
VPN can also help to encrypt your data and hide your IP address, making it more difficult for
attackers to track your online activities. These measures can help to keep your personal
information and online accounts safe from phishing attacks.

ISSUE 3

The Philippine National Police (PNP) has warned the public of a con artist posing as PNP Chief
Gen. Camilo Cascolan on Facebook. The con artist, whose identity has not been revealed, used
stolen identity data to create a fake Facebook account with Cascolan's name. PNP investigators
have identified the owner of the fake account and alerted Facebook to the account's violations.
The PNP has urged the public to be wary of such scams and to report any suspicious activity to
the authorities.The Philippine National Police (PNP) has not specified any particular internet
privacy techniques or network technologies that should be used to protect against such scams.
However, there are a few general best practices that individuals can follow to protect their
personal information and avoid falling victim to online scams.First, it is important to be cautious
when sharing personal information online, especially on social media. Avoid sharing sensitive
information, such as your full name, date of birth, or home address, unless you are certain that
the person or organization requesting it is legitimate.Second, use strong and unique passwords
for each of your online accounts, and avoid using the same password for multiple accounts. This
will help to prevent your accounts from being compromised if a password is leaked or
stolen.Third, be cautious when clicking on links or downloading files from unknown sources.
These can often contain malware or other harmful software that can compromise your personal
information.Finally, it is always a good idea to stay up to date with the latest security news and
alerts, and to follow the advice of law enforcement agencies like the PNP when it comes to
protecting yourself online.Additionally, you can consider using tools and technologies such as
encryption, virtual private networks (VPNs), and two-factor authentication to protect your
personal information and data while online. Encryption can help protect your data by making it
unreadable to anyone who does not have the appropriate decryption key. VPNs can help protect
your online activity by encrypting your internet connection and hiding your IP address. Two-
factor authentication adds an extra layer of security to your online accounts by requiring you to
provide a second form of authentication, such as a code sent to your phone, in addition to your
password. These tools and technologies can help keep your personal information and data safe
from online threats.

You might also like