Linux Privacy - Page 55

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

Public-Computer Users Beware

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A college student was indicted on Thursday on charges he placed software on dozens of computers that allowed him to secretly monitor what people were typing, and then stole around $2,000 using information he gleaned. . .

Spyware found on one in three corporate networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

One in three European companies are harbouring spyware apps on their networks, a new study claims. Spyware applications, programs which surreptitiously send information from surfers' PCs to marketing outfits, are becoming a bigger problem, according to the Emerging Internet Threats Survey 2003. . .

Tackling Identity Theft

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A fourth man has been arrested as part of the largest identity theft case in U.S. history. Federal officials say Emanuel S. Ezediaro is charged with buying and selling credit reports of tens of thousands of people. If convicted of wire . . .

Beware the ‘Joe Job’

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Late last year, Steve Long opened up his e-mail account and got a huge surprise: A ton of rejected or redirected e-mails he didn't write. "I thought, 'Oh, I wrote in the wrong address.' 137 (e-mails) later I realized something's wrong," he said. . .

Spam Filtering With gzip

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I was reading through a bioinformatics book the other day, and was reminded of a useful shortcut for comparing a text against various corpora. A number of researchers have simply fed DNA sequence data into the popular Ziv-Lempel compression algorithm, to . . .

Services That Stop Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Smaller enterprises may be overwhelmed with the number of tactics needed to protect their connection to the Internet. Even large companies are often glad to offload this burdensome task. Engaging a service can provide a very high level of expertise focused . . .

Identity-theft Complaints Double, Tops List

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Complaints about identity theft nearly doubled in 2002 as the fast-growing crime topped the government's list of consumer frauds for a third consecutive year. The Federal Trade Commission reports that 43 percent of roughly 380,000 complaints involved the hijacking of . . .

Surveillance Plan Worries GOP Senator

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A senior Republican senator yesterday expressed concern that a Pentagon surveillance program could be used on U.S. citizens and may "have a chilling effect on civil liberties." In a letter to Attorney General John D. Ashcroft, Sen. Charles E. Grassley (R-Iowa) . . .

Better Bayesian Filtering

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Spam filtering is a subset of text classification, which is a well established field, but the first papers about Bayesian spam filtering per se seem to have been two given at the same conference in 1998, one by Pantel and Lin, and another by a group from Microsoft Research. . .

Brains Gather To Outsmart Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Unsolicited e-mail messages, or spam, are on track to make up the majority of traffic on the Internet. But a group of researchers and developers gathered here Friday hopes to halt that by coming up with better ways of blocking those . . .

The Canary in the Data Mine

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At the turn of the century just past, mining companies would use a brightly colored bird in the mine shaft to protect the lives of citizens. These canaries were more sensitive to the foul, noxious and deadly but invisible vapors that . . .

Is the RIAA "hacking you back"?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The RIAA is preparing to infect MP3 files in order to audit and eventually disable file swapping, according to a startling claim by hacker group Gobbles. In a posting to the Bugtraq mailing list, Gobbles himself claims to have offered his . . .

Don't Be An Accidental Spammer

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Email "spam" is in the eye of the reader-one person's valued information may be another person's spam. You know your list is truly opt-in, but people are so sensitive these days that you risk being branded as a spammer even if . . .