Stanford University recently examined the cellular metadata of a small group of volunteers. The study revealed participant information like medical conditions, interests in strip clubs and firearm ownership. Ultimately, researchers concluded that phone metadata is “unambiguously sensitive.”
Should consumers be concerned about abuse of cell phone metadata?
Listen to episode 129 of our Security Slice podcast and hear Craig Young and Tyler Reguly discuss why metadata studies distract consumers from bigger privacy issues, what the worst metadata abuse is, and why landlines leak more data than your cell.
Click Here to Listen to the Podcast
- Security Slice: The Five Senses of Breach Detection
- Security Slice: Plugging HTTPS Leakage
- Security Slice: World War XP
- Security Slice: Crowd-Sourced Security
Check out Tripwire SecureScan™, a free, cloud-based vulnerability management service for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology.
The Executive’s Guide to the Top 20 Critical Security Controls
Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].
Title image courtesy of ShutterStock