Linux Privacy - Page 55
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Identity theft is a growing problem in the U.S., with complaints rising 73 percent from 2001 to 2002. But there's a mistaken impression that identity theft is carried out merely by rogue hackers. That's not the case. If . . .
What do Viagra, stock tips, personal ads and activities with farm animals have in common? They are all the subject lines of unwanted, unsolicited e-mail messages, not-so-affectionately known as spam. The sheer volume of electronic junk mail has overwhelmed users' inboxes . . .
A sweeping new anti-terrorism bill drafted by the Justice Department would dramatically increase government electronic surveillance and data collection abilities, and impose the first-ever federal criminal penalties for using encryption in the U.S. . .
A college student was indicted on Thursday on charges he placed software on dozens of computers that allowed him to secretly monitor what people were typing, and then stole around $2,000 using information he gleaned. . .
One in three European companies are harbouring spyware apps on their networks, a new study claims. Spyware applications, programs which surreptitiously send information from surfers' PCs to marketing outfits, are becoming a bigger problem, according to the Emerging Internet Threats Survey 2003. . .
Downloading free music online has been a relatively risk-free hobby for millions of people during the past few years. While record companies, politicians and technology companies fought the battle on a big scale, you loaded your hard drive with Mp3 . . .
A fourth man has been arrested as part of the largest identity theft case in U.S. history. Federal officials say Emanuel S. Ezediaro is charged with buying and selling credit reports of tens of thousands of people. If convicted of wire . . .
Identity management is more than just granting and revoking user access to business systems. With the introduction of new auditing practices and regulations by the federal government, businesses are being held accountable for the security of their users' personal information. . . .
Late last year, Steve Long opened up his e-mail account and got a huge surprise: A ton of rejected or redirected e-mails he didn't write. "I thought, 'Oh, I wrote in the wrong address.' 137 (e-mails) later I realized something's wrong," he said. . .
I was reading through a bioinformatics book the other day, and was reminded of a useful shortcut for comparing a text against various corpora. A number of researchers have simply fed DNA sequence data into the popular Ziv-Lempel compression algorithm, to . . .
Smaller enterprises may be overwhelmed with the number of tactics needed to protect their connection to the Internet. Even large companies are often glad to offload this burdensome task. Engaging a service can provide a very high level of expertise focused . . .
Complaints about identity theft nearly doubled in 2002 as the fast-growing crime topped the government's list of consumer frauds for a third consecutive year. The Federal Trade Commission reports that 43 percent of roughly 380,000 complaints involved the hijacking of . . .
Employee misuse of corporate e-mail has been a source of liability for numerous organizations, and many are now moving to develop policies that define appropriate usage. Businesses are also increasingly adopting policies to ensure that government regulations are met, sensitive business . . .
A senior Republican senator yesterday expressed concern that a Pentagon surveillance program could be used on U.S. citizens and may "have a chilling effect on civil liberties." In a letter to Attorney General John D. Ashcroft, Sen. Charles E. Grassley (R-Iowa) . . .
Spam filtering is a subset of text classification, which is a well established field, but the first papers about Bayesian spam filtering per se seem to have been two given at the same conference in 1998, one by Pantel and Lin, and another by a group from Microsoft Research. . .
Unsolicited e-mail messages, or spam, are on track to make up the majority of traffic on the Internet. But a group of researchers and developers gathered here Friday hopes to halt that by coming up with better ways of blocking those . . .
From 1946 to 1960, the FBI operated 3,000 wiretaps and 800 bugs on the NAACP (National Association for the Advancement of Colored People). Agents spied on Dr. Martin Luther King Jr. as part of a concerted effort to thwart his organizing . . .
At the turn of the century just past, mining companies would use a brightly colored bird in the mine shaft to protect the lives of citizens. These canaries were more sensitive to the foul, noxious and deadly but invisible vapors that . . .
Technology company's lifeblood depends on the secrecy of its intellectual property. Most companies safeguard sensitive trade secrets with confidentiality agreements--but many of these agreements aren't as comprehensive as they need to be. . .
The chief security officer (CSO) position has matured to the point where the title isn't particularly jarring when you see it on a business card. However, the same probably cannot be said for the chief privacy officer (CPO) job. . .