Linux Privacy - Page 59
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Swindle, 65, is one of five commissioners at the Federal Trade Commission. The FTC's responsibilities involve policing the Internet for fraud and privacy violations; the agency recently compelled Microsoft to make changes to its Passport authentication system. . .
Governments worldwide have made it easier for authorities to augment citizen databases and eavesdrop on telephone and online conversations in order to fight terror, according to a survey of privacy regulations released Tuesday. The report, written by privacy activists Electronic Privacy Information Center and Privacy International, show the United States was not alone in passing new laws that value increased security over personal privacy.. . .
This annual report by EPIC and Privacy International reviews the state of privacy in over fifty countries around the world. It outlines legal protections for privacy, new challenges, and summarizes important issues and events relating to privacy and surveillance. . .
Eager to head off criticism from privacy advocates and users over the expanded surveillance provisions in its forthcoming National Strategy for Securing Cyberspace, the Bush administration is expected to recommend appointing a federal "privacy czar" to act as watchdog. Chief among . . .
A company that sent large numbers of unsolicited text messages to mobile phone users telling them they had won a mystery prize worth £500 has been fined £50,000 by the premium rate services regulator. . .
Think using Yahoo or Hotmail e-mail at work protects you from your boss' prying eyes? Think again. New spy software essentially lets employers or parents co-pilot virtually any kind of e-mail account, including private Web-based e-mail accounts like Yahoo and Hotmail. . . .
One of the most attractive things about Linux is the number of installation options one is presented with and how tempting it is to customize. But for a newbie, in terms of Web security and PC hygiene, that's also the worst . . .
One of the strengths of digital communications is the ability to momentarily borrow an insanely expensive computer network, such as using the Internet, to deliver a message, make a purchase or look up information. . .
Online advertising service DoubleClick Inc. has agreed to pay $450,000 and alter its privacy policies to end a 30-month investigation into its use of consumers' personal information by 10 states. . . .
Federal agents concerned about scuba-related terrorist plans requested the entire database of the Professional Association of Diving Instructors. Unbeknownst to most of its members, the organization voluntarily handed over a list of more than 100,000 certified divers worldwide, explaining later that it wanted to avoid an FBI subpoena that would have required far more information to be disclosed.. . .
I've been prowling eBay lately. Lots of good deals can be had these days, especially in used computer equipment. As the dot coms die, their assets may be sold by their secured creditors (banks, leasing companies and sometimes investors). That means . . .
Refined poetry and ruthless legal prosecution have been brought together in the latest effort to stop spam. A hidden scrap of copyrighted poetry embedded in e-mails will be used to guarantee that any message containing the verse is spam free. . . .
The privacy policy is written and posted on a company's Web site. The 2002 privacy-policy notice, a complicated statement required of financial-services companies under the Gramm-Leach-Bliley Act, is in the mail. Top executives and perhaps even the board of directors have . . .
Recent cases indicate that federal courts are emphasizing the severity of identity theft by imposing significant prison sentences. In a recent osOpinion column about identity theft, the writer intimated that cops and legislators are "deaf to the cries of [identity theft] victims," and pointedly asked, "When will we begin to see the identity thieves behind bars?". . .
Snoopers on the Internet could decode sensitive e-mail messages simply by tricking recipients into hitting the reply button, computer security researchers warned Monday. The flaw affects software using Pretty Good Privacy, the most popular tool for scrambling. . .
Data curmudgeons feel like that about their personal information flowing into the "Bytegeist" of the burgeoning Internet. There are five strategies that people seem to employ to tackle the personal data privacy problem. In addition to the Curmudgeon, there is the Ignorer, the Avoider, the Deceiver and the Aggressor.. . .
Copyright enforcement, the attempt by the entertainment industry to prop up their obsolete business models, is increasingly a danger to the legitimate use of information technology and, by extension, the future of the Internet community. . .
The government's preferred method of dealing with the challenges posed by technology by simply passing new legislation is now spilling over into the debate over Internet privacy.. . .
Is your company data an asset or a threat? The issue will be discussed with particular reference to the U.K. Information is a commodity. Indeed, for many companies it's the most valuable asset they possess, especially when it comes to customer relationships. . .
If it had the political nerve, the Transportation Security Administration could guarantee air safety by collecting passenger information from public and private databases, industry executives said at a recent Washington forum sponsored by the Council for Excellence in Government. . .