Hacking Scandals: The Biggest, Baddest, And Scariest

Hacking Scandals: The Biggest, Baddest, And Scariest

[vc_row][vc_column][vc_column_text css_animation=”bottom-to-top”]

The Internet is a worldwide platform for sharing information. It is a community of common interests. No country is immune to such global challenges as cybercrime, hacking, and invasion of privacy.

—Lu Wei[/vc_column_text][vc_single_image image=”462″ img_size=”full” alignment=”center” onclick=”link_image” css_animation=”appear”][/vc_column][/vc_row][vc_row][vc_column][vc_column_text css_animation=”bottom-to-top”]Biggest Hacking Scandals of all Times[/vc_column_text][vc_column_text css_animation=”bottom-to-top”]Knives and guns are no longer the weapons of choice for criminals. A keyboard is. Hacking has become the most effective way to either gain the most reward or do the most damage in a single crime. And due to the fact that individuals and companies care more about locking their doors and installing security cameras than encrypting and protecting their digital information, it is arguably easier to rob data than a house or an office building. Additionally, as hacking has popularized, a hacking community has emerged, creating competition for the biggest or baddest hack. Here are just a few of the worst:[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text css_animation=”bottom-to-top”]1. and 2. Yahoo

Yahoo takes the cake when it comes to data breaches. Two breaches that their systems have undergone hold the top two places on this list. In September of 2016, Yahoo announced that two years prior 500 million Yahoo accounts had been breached. The evidence, according to Yahoo, pointed to a state-sponsored actor. A few months later, at the end of 2016, another Yahoo hacking incident came to light. A much bigger one. Yahoo announced that in August of 2013, 1 billion accounts had been breached, making it the largest hack on record. From the evidence that investigators found, the two hacking incidents were not linked. However, in both hacking incidents, everything from dates of birth and email addresses to encrypted security questions and answers and hashed passwords were stolen. Fortunately, no financial information was taken.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text css_animation=”bottom-to-top”]3. Myspace

This massive data breach garnered nowhere as much news as Yahoo and other lesser hacks. But that is not because it was not on a wide scale, it is simply because Myspace is no longer a company that garners as much news. The attack compromised 360 million Myspace accounts sometime before June of 2013. Usernames, email addresses, and passwords were all stolen. Myspace, its owner Time Inc., and investigators have not been able to nail down an exact date for when the attack took place, which is not uncommon as many hackers can get access to a system and stay there for months without being detected.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_single_image image=”464″ img_size=”full” alignment=”center” onclick=”link_image” css_animation=”appear”][vc_column_text css_animation=”bottom-to-top”]4. eBay

In early 2014, the massive online auction house was hacked. 145 million accounts were breached. It was a similar hack to the Yahoo ones, with email addresses, mailing addresses, birth dates and more being stolen. And still similarly to Yahoo’s hacks, no financial information was taken. The route of the hacking was identified: The hackers managed to obtain employee login credentials, which gave them access to the company’s corporate network.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text css_animation=”bottom-to-top”]5. LinkedIn

The LinkedIn hack was a special one because the information that was stolen was very publicly sold. In May of 2016, the hacker who stole the information, an individual going by the name ‘Peace’, attempted to sell 117 million LinkedIn emails and passwords—this was 100 million more accounts than the company had originally believed to have been affected by they 2012 hack.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text css_animation=”bottom-to-top”]6. Target

The Target hack may not be the largest hack of all time, but it has arguably been the most destructive hack. So destructive, in fact, that Target had to pay out $10 million to the victims of the massive data breach. The breach itself happened in 2013 and it affected 110 million individuals, who had all of their credit or debit card information stolen. This included everything from customer names and card numbers to the magnetic strip code and PIN data. Each victim, who could prove that their card information had been used or their credit history had been tarnished, could claim up to $10,000.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text css_animation=”bottom-to-top”]7. AOL

In 2003, a crime was committed by an AOL employee. He hacked into the corporate system to steal a list of AOL customers, their emails, and their screen names. The employee sold this list of 92 million email addresses for $28,000. It was then circulated among spammers who sent unwarranted marketing emails to all of the addresses on the list. It cost the company $400,000, not to mention the loss in customers that it likely triggered. The employee was found guilty in court, sentenced to 15 months in prison and slapped with a hefty fine.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text css_animation=”bottom-to-top”]8. Ashley Madison

While no financial harm came to any of the individuals who had their information stolen in the Ashley Madison hack, it has arguably become the most famous hack in recent years. The main reason for this is the loss of privacy. For a dating website that caters to married people, privacy is key. This privacy was lost when, first, the website was hacked and 32 million users’ information was stolen and then, second, that information was posted online for the world to see who was cheating on their spouse. The released data included user information, such as their names, addresses, passwords, and phones numbers, as well as transaction history on the website and descriptions of what the individual users were looking for.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text css_animation=”bottom-to-top”]These are just a handful of the hacks that have been perpetrated over the last few years. And these type of attacks are only becoming more and more common. Businesses, of every size and in every sector, as well as individuals, need to protect themselves. This is exactly what OrangeWebsite helps people and organizations do. We provide the highest level of protection against both hacking and governmental collection of private information. Try out our services with a 30-day money back guarantee, utilize our 24/7 technical support, and protect yourself, your information, and the information of those you do business with. For more information, please contact us.[/vc_column_text][/vc_column][/vc_row]

What Can We Learn from the Cloudflare Leak?

What Can We Learn from the Cloudflare Leak?

What Can We Learn from the Cloudflare Leak?

Cloudflare calls itself the “web performance and security company,” so it was a serious blow to its reputation when researchers discovered that it had a security bug that made sites' data visible on other sites. What was really disturbing was that supposedly secure data from HTTPS requests leaked out this way. Passwords, session cookies, credit card information, and other sensitive data simply showed up in random places.

Google researcher Tavis Ormandy discovered this problem on February 17, and tech media have attached the name “Cloudbleed” to it. Cloudflare provides services to millions of websites, and any of them could have suffered a loss of confidential data. Many of them have urged users to change their passwords. The risk to any individual is low, but the effect was so widespread that personal data could have been stolen from a significant number of people.

Cloudflare has fixed the bug, but the leaked data could still be lurking in the caches of search engines and edge servers, and data thieves now know to look for it.

Cloudflare's incident report explains that the problem stemmed from a buffer overrun bug. For efficiency reasons, low-level system software is often written in programming languages, such as C, which don't automatically guard against accessing memory structures outside their limits. An HTML parser had a bug of this type, resulting in its picking up data from whatever was past the end of a memory buffer. It could be anything, and sometimes it was private data from another website.

The risk in third-party services

Any website can have bugs in its software that open security holes. That's one reason HTTPS connections aren't 100% secure. Old versions of SSL (TLS) have problems. The “Heartbleed” bug in older versions of the widely used OpenSSL software showed it was possible to exploit the weaknesses. The latest version fixes the problem, but there's no guarantee that it's completely bug-free. Many websites still use old versions of OpenSSL, with known weaknesses.

When a site uses a third-party service such as a caching proxy or a content delivery network, it can gain or lose security. A top-quality CDN has better security measures than most do-it-yourself sites, and it filters requests to the sites' servers. It can absorb DDoS attacks that would kill a one-machine server. Cloudflare features a web application firewall (WAF) that protects sites at the application level from many kinds of attacks.

This comes at a price, though.

To get the full range of services from Cloudflare, a website has to hand over its most precious secret: its private SSL key. Without that datum, Cloudflare couldn't do anything with HTTPS requests and responses but pass them through. It wouldn't be able to see anything except what server and port number they were going to.

The fact that the breach included HTTPS data underscores this issue. If Cloudflare didn't have sites' private keys, it could never have leaked passwords that were properly sent through HTTPS. By the same token, it couldn't have provided a useful WAF to protect servers that use secure communication. Sharing a private key with a CDN creates a potential risk, even if there's an overall gain in security.

Vulnerability to governments

However, giving a CDN a site's private key opens up one serious hole, which no software can guard against. A government can demand it, compel the CDN to stay silent, and have access to all of the site's SSL transactions. Government agents can spy on it indefinitely, and the site's owners won't have a clue that it's happening.

In the United States, a National Security Letter can accomplish this. Anyone who receives one isn't allowed to say anything about it or challenge it in an open court hearing. The Electronic Frontier Foundation has called the power to issue them “one of the most frightening and invasive” surveillance power created by the PATRIOT Act.

Cloudflare has received at least two NSLs and possibly more. The FBI could have compelled it to turn over customers' private keys and not tell them. In a similar case, the FBI tried to compel Lavabit, a confidential email service, to turn over keys that would give it access to every user's private mail, even though it was just after Edward Snowden. Founder Ladar Levison was under a gag order not to disclose this until recently.

Other countries have similar or worse issues. The UK's Investigatory Powers Act gives law enforcement the authority to make telecommunication companies break their encryption. They would be under a compulsion of secrecy comparable to a National Security Letter. In the truly authoritarian states, the situation is even worse, with privacy being virtually non-existent.

How many websites do governments have access to, without their knowledge, because CDNs had to give up their private keys? There's no way to know.

The OrangeWebsite Difference

At OrangeWebsite we take your privacy seriously. We don't share our private keys, or yours, with third-party services. Government agencies in North America or Europe can't demand anything from us. We maintain state-of-the-art server security, performing regular security audits and keeping system software up to date. Optional two-factor authentication is available.

Nomad Capitalist has called Iceland the best host country for data privacy. The Icelandic Modern Media Initiative, passed by our Parliament in 2010, commits the country to freedom of information and expression. We allow anonymous registration, so that even torture or telepathy wouldn't get us to disclose your identity. Contact us to learn how to set up a secure, censorship-free website.

Data Centre Risk Index Names Iceland World’s Safest Location

Data Centre Risk Index Names Iceland World’s Safest Location

The 2016 Data Centre Risk Index, published by Cushman & Wakefield (C&W), has moved Iceland to the number one position among 37 countries as the safest location for remote data storage, while the United States dropped from the number 1 to the number 10 position. The reasons Iceland rose to the top of the list (as described below under "Methodology"), but what it means for key business decision makers around the globe is unmistakable: Iceland is the best country in the world to secure their data. What it means for the clients of companies like OrangeWebsite, located in Reykjavík, Iceland, is added reassurance that their data is safe and protected.

Why Is Remote Data Storage Important?

For companies large and small, unplanned downtime is a cost of doing business. That doesn’t mean, of course, that businesses should (or do) passively acquiesce to the eventuality of downtime. In fact, American businesses spend millions implementing strategies to avoid downtime, from moving operations to the cloud or data centres to training employees to ignore suspicious emails and documents.

What Is the Cost to Business of Downtime?

There’s a good reason businesses spend so much time and money preventing downtime episodes. Downtime means a loss or revenues during the period their systems are down, in addition to lost productivity and damage to their reputations. According to the Data Center Journal, revenue losses due to downtime episodes are increasing exponentially. The average cost per minute of downtime is $7,900, an increase of 41% over a one-year period. The average downtime episode lasts 86 minutes. Doing the math, that’s a cost—on average—of almost $700,000 for every incident of downtime.

What Systems Are Most Affected by Downtime?

Downtime can affect every aspect of business operations, but the two at the top of the list are business applications and technology services. Business applications are those operations which employees access through the company’s internal server to do their jobs. Technology services include email operations, as well as internet and intranet access. Loss of either business or technology applications impacts productivity—and costs money.

The loss of business applications can affect the productivity of every employee, from financial services to marketing to information systems. For example, downtime can bring down CRM operations, making customer communications disorganized at best, or lost entirely at worst. It can also mean the loss of ERP capabilities, eliminating the flow of business information and preventing data-driven decision making.

The loss of technology services, like email and internet access, means employees have reduced access to non-mobile phone and fax machines service. It also compromises use of a company’s intranet, which employees rely on to access and share documents.

The Pervasiveness of Remote Data Storage

Understanding the risks associated with in-house data storage, an increasing number of businesses are looking at remote data storage options, such as remote data centers and cloud computing. For example, a study by RightScale reports that 93 percent of businesses now use cloud services. In another study, Emergent Research predicted that twice as many small businesses will move all business operations to the cloud within 6 years.

Other companies, particularly those which run a wider variety of business applications and have more complex workloads, are opting to store data at remote data centres. Those data centres offer more customized solutions and greater control over their data and equipment, better meeting the needs of large, complex businesses.

The complication for business decision makers is that remote data centers are, themselves, at some risk for downtime episodes. In order to help business owners decide which data centers are at least risk, Cushman & Wakefield each year publishes its annual Data Centre Risk Index. In its 2016 report, Cushman & Wakefield describe the importance of their analysis:

“The index ranks key established and emerging locations by the most appropriate risks affecting data centre operations in today’s current climate. It has been designed primarily to support data centre due diligence and senior decision making when considering global investment and deployment activities."

Data Risk Index 2016: Methodology

Cushman & Wakefield’s analysis surveys more than 4,000 clients worldwide to rate the relative security of 37 countries along 10 key factors related to data centre risk. These include factors like ease of doing business, natural disaster, energy security and corporation tax, among others. Each factor is weighted based on its relative importance to potential risk, with natural disaster (15.38%) and political stability (12.82%) at the top of the list, and GDP per capital (5.77%) and corporation tax (6.41%) at the bottom.

The methodology employed shifts each year to reflect changing conditions. This year’s report reflects the growing concern among businesses related to political stability, natural disaster and energy security, which have surpassed concerns related to cost and connectivity. As they explain in their introduction:

“Natural disaster and a location’s coping capability ranked as the most important risk factors while political stability ranked second this year, collectively accounting for one third of overall decision making and implying a level of emotional sentiment throughout the survey following a number of major incidents over the past few years.”

Data Risk Index 2016: Key Findings

Among this year's most significant takeaways are the following:

Iceland was rated the world’s safest data centre location, followed by Norway and Switzerland The United States dropped from the number one to the number 10 position, scoring particularly low in “corporation tax (36th out of 37)” and “international bandwidth (15th of 37).” European countries offer on average the lowest risk environment, taking the top 5 index positions because of low risk for natural disaster and strong energy security ratings Singapore, South Korea and Hong Kong rated highly based on proximity to market, ease of doing business and IT infrastructure, and despite poor ratings for risk of natural disaster The 10 safest countries in the report are:

  • Iceland
  • Norway
  • Switzerland
  • Finland
  • Sweden
  • Canada
  • Singapore
  • Republic of Korea
  • United Kingdom
  • United States

The top 5 riskiest markets for data centers, according to C&W, are:

  • Nigeria
  • India
  • China
  • Turkey
  • Indonesia

Conclusion Businesses which are considering moving their data to a data centre, or moving from one data centre to another, should carefully weigh the conclusions of the most recent Data Centre Risk Index, and especially the particular factors which informed those conclusions.

Founded in 2006 and located in Reykjavík, OrangeWebsite is one of Iceland’s leading web hosting companies, a 100% green company offering top-quality and secure web hosting solutions for clients around the globe. Their servers are in Iceland, and all their data is stored and protected in Iceland. To learn more about the ways we can keep your company’s data safe and secure, contact us today.

Boost your search rankings with an SSL

Boost your search rankings with an SSL

How to Boost Your Search Rankings With An SSL

Why You Should Have an SSL Certificate

Have you been thinking about adding SSL security to your website? Have you been hesitating because it seems too complicated and expensive? Really, it’s neither. Half the traffic on the Web now goes over HTTPS / SSL connections, and it’s constantly growing. It’s not terribly difficult, even for a small business.

History of SSL, TLS, and HTTPS

The Web was originally designed for communication, not security. A request and its response travel through multiple routers, which aren’t necessarily trustworthy. They can read and even alter anything that passes through them. They can steal passwords, add scripts, or censor information.

As the Web grew, it became obvious that secure communication was necessary. In 1994, Netscape created the Secure Sockets Layer (SSL) to support encrypted communication on the Web. It let a browser communicate securely with a server, even if the two parties didn’t know each other. The HTTPS protocol sends requests and responses over SSL, keeping them safe from any “man in the middle.”

SSL has gone through a series of revisions over the years to improve its security. In 1999 the Internet Engineering Task Force (IETF) took over the standard, renaming it Transport Layer Security (TLS). Strictly speaking, SSL is obsolete, but the term is still widely used. The data document which lets a site transfer data over TLS is still almost always called an “SSL certificate.” We’ll stick with that usage here.

Why SSL is important

The most obvious reason for using SSL (TLS) is to protect confidential information in transit. Snoopers shouldn’t be able to intercept passwords, credit card numbers, and other data that needs to be kept secret. With widespread use of public Wi-Fi, this is more important than ever. Anyone with some simple equipment can intercept communications near a public Wi-Fi hotspot. The hotspot itself may belong to a criminal using it to collect personal information. There’s no easy way to tell a legitimate one from a malicious one.

Even owners of sites that don’t deal in personal information should consider using SSL. There are actually four benefits that it offers:

  • Authentication. It confirms that the response actually comes from the site it claims to come from (i.e., that no one else has hijacked the connection).
  • Non-repudiation. A third party can confirm that a message came from a given source without the originator’s cooperation.
  • Integrity. The information can’t be altered in transit without making the attempt obvious.
  • Confidentiality. No one else can read the information transferred.

Integrity is important even if confidentiality isn’t. An intermediary can alter data over an insecure connection. This is a concern for every site, whether they handle confidential data or not There can be several motives for modifying data in transit:

  • Censoring information. An autocratic government may want to block unfavorable news.
  • Adding false information or other content. Someone might want to deceive the recipient, engage in “hacktivism,” or damage a site’s reputation.
  • Inserting malicious scripts. Unauthorized JavaScript can make viewers download malware or redirect them to another site.
  • Modifying links. Changing a link on a page could send the user to a malicious site or steal form data.

How it works

An SSL certificate is a small data file which establishes a site’s cryptographic identity. More formally, it’s called an X.509 certificate. It uses the Public Key Infrastructure (PKI) to set up secure communication with a browser. This approach uses two digital keys which are paired together. The private key is stored only on the website’s host. The public key is included in the certificate, which is available to anyone to view.

To get a certificate, a website’s owner has to generate a private key and a certificate signing request (CSR). From here there are two options.

The cheap option is to self-sign the certificate. This costs nothing and it allows encryption, but it provides no authentication. Someone coming in with a browser has no assurance that someone else hasn’t taken over your domain or intercepted and changed the data packets. Anyone else can create a self-signed certificate and claim it’s from your domain. It’s of little value outside of personal and test sites.

The useful option is to get a signed certificate. This requires submitting the CSR to a certificate authority (CA), which will generate a digitally signed certificate. It says that the CA has confirmed that the certificate actually belongs to your domain. A signed certificate provides authentication as well as encryption.

But wait. How do you know that the CA is who it claims to be? The answer is that the CA can have its own certificate signed. All certificates, to be generally accepted, have to follow a chain of certificates back to a trusted (root) CA. A trusted CA’s certificate is widely available, and browsers ship with a set of root certificates from them.

Setting up the server

To use the certificate, a site needs an SSL-capable server. Most modern server, including Apache, Nginx, and IIS, support SSL. Each one has its own method of installing the certificate.

It’s vital to keep the private key strictly confidential. Anyone who grabs it can intercept all secure communications. At the same time, it needs to be safely backed up, in case it ever needs to be restored.

SSL will protect only information that’s accessed through an HTTPS URL. If a site was previously using HTTP URLs, it’s necessary to change them to use HTTPS. The old URLs should forward to the new ones, both to avoid breaking links and to help people who are too lazy to type “https://”.

The server needs to use an up-to-date version of TLS — and here, the difference between SSL and TLS is important. The old versions, designated as SSL, have known weaknesses. So does TLS 1.0, which is basically the same as SSL 3.0. An attacker with enough computing resources can break the encryption. A website needs to use TLS 1.1 or later to have good security.

Getting your certificate

Obtaining an SSL certificate isn’t complicated or expensive when you get it from us. OrangeWebsite’s options range from the simple, economical RapidSSL to strongly validated, multidomain certificates. Whether you use our domain hosting or another host, we offer installation service and stand by our certificates. You can get a validated certificate at annual prices starting from:

  • RapidSSL Standard (simple and available in minutes): €29.80 / $31.92
  • Comodo InstantSSL (business validation): €73.60 / $78.84
  • Comodo Multidomain EV (extended validation): €565.00 / $749.00
  • RapidSSL Wildcard (unlimited subdomains): €134.70 / $144.29
  • Comodo EV (single domain, extended validation, $250,000 warranty): €298.80 / $320.07

Prices may vary with currency fluctuations. Contact us if you have any questions.

Understanding the Right for Privacy on the Internet

An image of young girl working on laptop at home covering man's face with hand.

Limiting the amount of personal information on the internet can help to minimize the possible risks.

It seems like every time you check your newsfeed, there’s another story about someone’s privacy being violated online. Whether it was the GamerGate movement handing out Felicia Day’s personal information, the NSA collecting aggregate data from people online, or the hacktivist group Anonymous handing out information users thought was secure, it seems that online privacy is an easily-breached fence.

Just because privacy is regularly breached however doesn’t answer the bigger, more important question, do you have a right to privacy on the Internet?

What is Right to Privacy?

For those looking for the right to privacy in the American Constitution, stop searching because it’s not in print. The idea of the right to privacy is something that the U.S. Supreme Court has said is implied by other amendments in it, including the 4th, 5th, 6th, and 9th. The court argues that people have a right to keep their private lives private from the government. They have a right to not consent to unreasonable, warrantless searches, and to remain silent when they’re being asked questions without a representative.

What does It Mean on the Internet?

Most western governments have some sort of privacy law – but whether they’ve caught up with modern technology is another matter. The main issue when it comes to privacy on the internet isn’t only about government spying – by large, people’s information is not even being stolen from them, rather most people’s personal information is already out there for anyone who knows how to find it.

Let’s take an obvious example, Facebook. When you join the social network you agreed to its terms of service. This includes collecting your information, keeping records of everything that you post and keeping things you’ve deleted on file for 90 days or more in many cases. It also means that your information as a user – what you like, what you follow, your age, gender, pretty much of everything including your name and other personal details – can be sold to the highest bidder. This is called data mining and advertisers are typically use it to figure out what target audience likes, so they can create the best possible ads to entice those groups. Anyone who has ever seen an ad in their feed obviously targeted to them has probably figured this out by now.

That’s not all that is going on in a social network. For instance, you may have your privacy settings so that only friends can see your contents. But if just one of your friends likes or shared a post, then the control is out of your hand and now anyone in that friend’s network can see what happened. This was a major issue of a teacher whose pictures of herself at a brewery cost her job, even though she was certain none of her students could access her Facebook page or photos because of her privacy settings. They couldn’t, but it was a parent who found her page.

One Great Big Modern Mess

Just as British children today might not see why Brave New World is a terrifying book – since there are cameras everywhere and invasion of privacy is commonplace. It is often difficult for people to understand what they’re giving up in the age of the Internet. As soon as a picture, status or piece of personal information is put up somewhere on the web, it is actually been logged, archived and stored. If someone can legitimately find that information without violating any user agreements, that is not a violation of your privacy on the internet because you are the one who put it out there in the first place – it is also why law enforcement can use your Facebook feed to track you down and apprehend you. Same goes for corporate data mining – nothing you put up on a social network hosted by someone else is truly belongs to you anymore.

No Data Online is 100% Secure

An important thing for internet users is to understand that no data that is connected to world-wide-web is 100% secure. No matter if the service where the information is submitted, is using the latest security software and patches, hackers may still have their way to break in – and it has happened before numerous times with well-known internet services. If you have highly classified data, including pictures or documents you don’t want ANYONE to see, keeping those on offline storage is the only completely secure solution.

So What Can I Do?

For starters what you can do is limiting or stop putting your information out there if you don’t want the world to see it. Most of us are not willing to do that, so at the very least you should know how your information is being used and make sure you know what you’re actually agreeing to.

Finally, there are examples where invasion of privacy on the internet contributes a real crime. For instance, finding someone’s home address by checking public records is not illegal. Indiscriminately dispersing that information along with associated threat had constituted several crimes, like the rape and death threats faced by many online feminist activists. At a minimum level, threats like this should get the user banned and the individual may also be brought on charges like reckless endangerment, libel, or defamation of character, depending on the circumstances.

So even if you don’t always have a right to privacy on the internet, you do still have a right to safety. Many believed that is just not enough and numerous questions remain about digital law enforcement, at least it’s a good awareness to start with.

Find out more information about improving your privacy on the internet, please contact us. We will be happy to answer your questions and help you any way we can with this process.

Privacy on the Internet: Your Selfie is a Gold Mine for Marketers

An image of smiling friends taking selfie photo from nightclub with billiard.

The self-portrait you thought was private, could be used without your permission for marketing purposes.

We all love selfies. You constantly see the ones your friends take in your newsfeed and you post yours on Facebook and Twitter every chance you get. You take your self-portraits anywhere: at stores, restaurants, work, school, or the gym. You even love when your kids put their photos online, so you always press the ‘Like’ button.

There’s just one small catch, says an article from the Wall Street Journal. Several companies are now using your self-portraits for marketing purposes. They look for ones where you’re holding a clearly identifiable product, such as a Starbucks cup, or wearing a noticeable logo. And they prefer photos where you’re smiling, because it implies that you feel good about the things you’re wearing, holding, or consuming. Even the background is useful, since it shows these companies where and how you like to use their products.

Basically, this pictorial information is a treasure trove for market researchers. They can base new campaigns on the context in which their products are being used, and even send targeted ads to you specifically. Your selfie isn’t just a form of self-expression — it’s a promotion.

The privacy controls on Facebook generally prevent picture mining companies from using the images you post there. Unfortunately, the same can’t be said of Twitter, Tumblr, Flickr, or Pinterest. Pictures on those sites become grist for the marketing mill.

There are no clear laws to protect you against misuse of your photos, so about all you can do is write to the offending sites to express your displeasure. In the meantime, putting your selfies only on Facebook can offer you some measure of privacy. You can also encourage your kids, friends, and relatives to do the same.

Find out more information about improving your privacy on the Internet, please contact us. We will be happy to answer your questions and help you any way we can with this process.