I am moderating what will almost certainly be a fascinating discussion about BYOD, enterprise data security and device management at the BlackBerry Experience event at Montecasino in Fourways, Johannesburg today. The event is hosted by BlackBerry in partnership with ITWeb Events and will also take place in Durban and Cape Town later this month. The... Continue Reading →
That the respondent in the latest High Court Facebook defamation case, M v B, was ordered to remove defamatory posts on Facebook isn’t remarkable. What is more interesting about that case is that it reiterates a principle that a court will not step in and proactively block future defamatory posts. The applicant in this case,... Continue Reading →
Recent reports about hacked celebrity iCloud accounts seem to be attributable a vulnerability in iOS' Find My iPhone service which enabled someone trying to gain access to an iCloud account to use a brute force attack to guess the account password. A brute force attack involves guessing a large number of possible passwords until the... Continue Reading →
A recent New York Police Department attempt to engage with New Yorkers serves as a reminder that crowdsourcing positive feedback doesn't always work quite as well as you may hope, if it works at all. As Ars Technica reported: The Twitterverse was abuzz Tuesday evening after the New York City Police Department made what it... Continue Reading →
http://youtu.be/r4237MZIb8g SnapChat's privacy controls are what made it both enormously popular and troubling to its young users' parents. When SnapChat launched, it gave users the ability to share photos and videos which promptly vanished into the ether. This appealed to its typically young and privacy conscious users because they finally had a way to share... Continue Reading →
The last couple weeks saw two spectacular lapses in judgment in corporate Twitter accounts. The first was the pornographic US Airways tweet in response to a passenger’s complaints about a delayed flight and the second was an FNB employee’s flippant tweet about an ad personality’s activities in Afghanistan.
Each incident has unfolded a little differently. Both are stark reminders about the very serious legal consequences for misguided tweets.
I spoke to Kieno Kammies on 567 CapeTalk radio this morning about a troubling trend. As you can hear from the segment, below, the concern is partly about people being photographed in suspicious ways in public. One example is a person following women around shooting video of them or taking photos without their knowledge. This... Continue Reading →
Our email providers give themselves much more convenient access to your data through their terms of service or privacy policies. On one hand, this is level of access may be necessary to prevent disruptions and limit liability but, on the other hand, these permissions we, as users, grant providers like Microsoft, Google, Yahoo and others pretty broad access to our data without requiring them to obtain court orders or satisfy any external legal requirement.
Update (2014-02-26): The Next Web has reported that Hiroshima is once again in control of his envious Twitter handle, @N. This is a happy ending not only for me but also for sane employees and loyal users of Twitter's. Congrats to those, too.— Naoki Hiroshima (@N) February 26, 2014 //platform.twitter.com/widgets.js A good Twitter handle is... Continue Reading →