Linux Privacy - Page 59

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

New Privacy Czar on Way

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Eager to head off criticism from privacy advocates and users over the expanded surveillance provisions in its forthcoming National Strategy for Securing Cyberspace, the Bush administration is expected to recommend appointing a federal "privacy czar" to act as watchdog. Chief among . . .

Who's spying on my Hotmail?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Think using Yahoo or Hotmail e-mail at work protects you from your boss' prying eyes? Think again. New spy software essentially lets employers or parents co-pilot virtually any kind of e-mail account, including private Web-based e-mail accounts like Yahoo and Hotmail. . . .

Identity Theft: Get Used To It

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

One of the strengths of digital communications is the ability to momentarily borrow an insanely expensive computer network, such as using the Internet, to deliver a message, make a purchase or look up information. . .

E-terrorism: Liberty vs. security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Federal agents concerned about scuba-related terrorist plans requested the entire database of the Professional Association of Diving Instructors. Unbeknownst to most of its members, the organization voluntarily handed over a list of more than 100,000 certified divers worldwide, explaining later that it wanted to avoid an FBI subpoena that would have required far more information to be disclosed.. . .

Dot Compost and the Danger to Your Privacy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I've been prowling eBay lately. Lots of good deals can be had these days, especially in used computer equipment. As the dot coms die, their assets may be sold by their secured creditors (banks, leasing companies and sometimes investors). That means . . .

Haiku'da Been a Spam Filter

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Refined poetry and ruthless legal prosecution have been brought together in the latest effort to stop spam. A hidden scrap of copyrighted poetry embedded in e-mails will be used to guarantee that any message containing the verse is spam free. . . .

Making [Privacy] Work

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The privacy policy is written and posted on a company's Web site. The 2002 privacy-policy notice, a complicated statement required of financial-services companies under the Gramm-Leach-Bliley Act, is in the mail. Top executives and perhaps even the board of directors have . . .

'Sweeping' Up After Identity Theft

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Recent cases indicate that federal courts are emphasizing the severity of identity theft by imposing significant prison sentences. In a recent osOpinion column about identity theft, the writer intimated that cops and legislators are "deaf to the cries of [identity theft] victims," and pointedly asked, "When will we begin to see the identity thieves behind bars?". . .

Digital privacy: A curmudgeon's guide

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Data curmudgeons feel like that about their personal information flowing into the "Bytegeist" of the burgeoning Internet. There are five strategies that people seem to employ to tackle the personal data privacy problem. In addition to the Curmudgeon, there is the Ignorer, the Avoider, the Deceiver and the Aggressor.. . .

Dangerous Games with Customer Data

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As enterprises amass huge volumes of customer data in their CRM systems, there's a growing temptation to disregard customers' privacy. Think about all the information you divulge when you buy from an e-commerce site: your name, mailing address,. . .

Police, students combat cybercrime

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In an unusual arrangement, Tulsa, Okla., police are teaming up with students at the University of Tulsa to help investigate and stop cybercrime. Within the next few weeks, the Tulsa police Cyber Crimes Unit is moving to a new office on the university campus. . .

Net Users Try to Elude the Google Grasp

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

These days, people are seeing their privacy punctured in intimate ways as their personal, professional and online identities become transparent to one another. Twenty-somethings are going to search engines to check out people they meet at parties. Neighbors are profiling neighbors. Amateur genealogists are researching distant family members. Workers are screening co-workers.. . .