Talk:Be Your Own Security Expert: Difference between revisions
(Created page with "Maybe add some examples of social engineering? e.g. fraudsters calling and pretending to be bank staff.") Â |
No edit summary |
||
Line 1: | Line 1: | ||
Maybe add some examples of social engineering? e.g. fraudsters calling and pretending to be bank staff. | Maybe add some examples of social engineering? e.g. fraudsters calling and pretending to be bank staff. | ||
Panda 2017-01-22 | |||
I deleted the sentence 'For a law-abiding private individual the threat comes almost exclusively from criminals.'Â as it is not correct. For instance the Investigatory Powers Tribunal has decided that we were all under unlawful mass surveillance until Dec 2014. It then became lawful as some guidelines were published, but clearly law abiding individuals are under surveillance threat by non-criminals. Also the Investigatory Powers Act gives some powers to the state to access and modify someone's computer. |
Revision as of 15:52, 22 January 2017
Maybe add some examples of social engineering? e.g. fraudsters calling and pretending to be bank staff.
Panda 2017-01-22 I deleted the sentence 'For a law-abiding private individual the threat comes almost exclusively from criminals.' as it is not correct. For instance the Investigatory Powers Tribunal has decided that we were all under unlawful mass surveillance until Dec 2014. It then became lawful as some guidelines were published, but clearly law abiding individuals are under surveillance threat by non-criminals. Also the Investigatory Powers Act gives some powers to the state to access and modify someone's computer.