Linux Privacy - Page 60
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
As enterprises amass huge volumes of customer data in their CRM systems, there's a growing temptation to disregard customers' privacy. Think about all the information you divulge when you buy from an e-commerce site: your name, mailing address,. . .
In an unusual arrangement, Tulsa, Okla., police are teaming up with students at the University of Tulsa to help investigate and stop cybercrime. Within the next few weeks, the Tulsa police Cyber Crimes Unit is moving to a new office on the university campus. . .
These days, people are seeing their privacy punctured in intimate ways as their personal, professional and online identities become transparent to one another. Twenty-somethings are going to search engines to check out people they meet at parties. Neighbors are profiling neighbors. Amateur genealogists are researching distant family members. Workers are screening co-workers.. . .
Swissinfo web site on 21 July; subheadings as published: A record of almost every email sent to and from Switzerland is to be logged and stored for at least six months, under a new Swiss surveillance law. Since the beginning of . . .
Well-intentioned hackers are creating tools to help people circumvent web browsing controls in countries where the net is censored. The group of technology experts have produced two programs that help people swap messages that would otherwise be banned or to set up their own networks that help them keep in touch.. . .
Repeat after me: "Spam and viruses bad. Locked down mail servers good. Leaving relaying open bad. Locked down mail servers good. Leaving virus avoidance for the end user to deal with bad. Locked down mail servers good." Okay, now that we've . . .
From 1 August, ISPs in the UK will be required to be able to intercept your data. Yet the Home Office has failed to explain how they will be reimbursed. And the rules mean that criminals will easily be able to . . .
Dozens of laws, regulations, and self-regulatory programs govern privacy around the world. Further complicating a company's efforts to protect confidential client information are the nuances of privacy. Even when a practice that involves the sharing of some personal customer information is . . .
Scientists working for Europe's Telecommunications Standards Institute (ETSI) have devised a new security algorithm, known as A5/3, that will provide network operators and users of GSM mobile phones with an even higher level of protection against eavesdropping than they have already. . . .
This article is the second of three articles that will help systems administrators configure SMTP daemons and local mail delivery agents to filter out unwanted e-mails before they arrive in the end-users' in-box. . .
Yesterday, as we all know, Microsoft fed an 'exclusive' story about its new 'Palladium' DRM/PKI Trust Machine to Newsweek hack Steven Levy (a guy who writes without irony of "high-level encryption"), presumably because they trusted him not to grasp the technology well enough to. . .
Most of us register aliases, like John Doe and Juxta Position, on the Internet in return for information and services. The use of aliases maintains our privacy, reduces spam and thwarts. . .
Most folks dislike spam in their e-mail. Spam takes up our network, disk, and cpu resources. It requires that we weed through unwanted messages to find the ones that we requested. (I'm not going to try to convince you that spam is not good, you can check out some of the anti-spam resources listed in. . .
Plans to increase the number of organisations that can look at records of what you do online could lead to widespread abuse of personal information, warn experts. The UK Government this week unveiled a draft list of organisations that will be . . .
Companies that release customer data as a result of security mistakes could find themselves in the cross hairs of the Federal Trade Commission, especially if that release points to poor security practices. The FTC has only brought one case against . . .
The Senate Judiciary Committee on Thursday will examine proposed Justice Department guidelines that would give federal investigators new license to mine publicly available databases and monitor Web use. The changes, which come after a major FBI shakeup last week, have sparked . . .
Criminals will just use stronger encryption, warns expert. The UK government's new internet surveillance centre will become operational this summer, but it could make it harder rather than easier to catch paedophiles and terrorists by encouraging them to use stronger encryption.. . .
David Brin is a privacy heretic. He doesn't agree with those in the intelligence and law-enforcement communities who argue that Americans have to surrender freedoms to make their lives safe. Nor does he agree with advocates who argue that it makes sense to protect privacy at all costs -- certainly not if it means living with added insecurity. . . .
The recent ruling by a Philadelphia court in response to a challenge by the American Library Association (ALA) and the American Civil Liberties Union (ACLU) to the Children's Internet Protection Act (CIPA) represents another setback for Congressional prudes and the filtering software lobby.. . .
Telcos and ISPs may have to keep logs for four years. A European Parliament anti-terrorism law to allow police to spy on phone and internet users has been slammed by civil liberties groups.. . .