Linux Privacy - Page 68
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
This August 2nd article by Bruce Parens does a great job of explaining why the cryptography used by Adobe was easily compromised and the information Sklyarov presented at DEFCON. "E-book publishers might think of jailed Russian cryptanalyst Dimitry Sklyarov as their worst enemy... until they see his slide show.. . .
Privacy advocates hope a simmering dispute within the federal judiciary over Internet use will spark changes to federal laws on employer monitoring of company networks. A group of senior West Coast judges, angry that their online activity is monitored by a . . .
Just before their August recess, House lawmakers introduced two bills to change the way a new financial services law protects private customer data. Reps. Edward Markey, D-Mass., and Joe Barton, R-Texas, introduced H.R. 2720, the "Markey-Barton Consumers' Right to Financial Privacy . . .
A company that touts its facial identification system as a powerful new tool for security and crime fighting has received millions of dollars in federal funding to improve its surveillance technology for military and intelligence uses, according to documents and interviews.. . .
NEWARK -- Nicodemo S. Scarfo is not merely an affable computer aficionado, the son of Philadelphia's former mob boss and an alleged mastermind of a loan shark operation in New Jersey. He's also the defendant in a case that could . . .
Starting in October at London's Heathrow Airport, new iris recognition technology will enable selected passengers to look into a video camera at the passport control checkpoint and have their identity verified within seconds. The Heathrow program will be . . .
It's been two weeks since key personal data belonging to hundreds of victims, including Social Security numbers, started appearing in an Internet chat room, and it was still unclear Saturday where the data was stolen from. The incident has been described as one of the largest identity theft cases ever, because the data being posted also includes driver's license numbers, date of birth and credit card information - everything a criminal would need to open an online bank account, apply for a credit card, even create the paperwork necessary to smuggle illegal immigrants.. . .
The U.S. House of Representatives passed a measure on Monday that would require the Federal Bureau of Investigation to report how it uses the controversial e-mail wiretap system formerly known as Carnivore. Although the bill places no restrictions on how the . . .
Activists are planning an international day of protest. Their aim? To jam Echelon. But privacy experts warn that "trigger words" will not outsmart the global surveillance system. A group of Internet activists are hoping to bring attention to the US-led communications spy network, on 21 October, with a "Jam Echelon Day", but privacy experts are certain that the protests will have a minimal effect on the sophisticated surveillance system.. . .
Last week I got e-mail from eToys, the online retailer that went out of business last spring. Signed "Your Friends at eToys," it recommended I now do all my toy shopping at KBkids.com, the company that bought eToys' remaining inventory for . . .
A bill requiring federal law-enforcement officials to be more forthright when answering questions about electronic surveillance systems has passed the U.S. House. The bill, which passed by a unanimous voice vote Monday afternoon, would require the attorney general and the FBI . . .
First up, Peekabooty is a peer networking application which enables users in countries where Internet content is censored to host and retrieve forbidden content via encrypted communication with a trusted client, and so bypass national firewalls. We'll say flat out that . . .
Knowledge management software configured to include email servers in its search boundaries could leave companies open to prosecution Organisations may be in danger of breaching privacy regulations unwittingly, if knowledge management (KM) software is configured to include email servers . . .
The Computing Technology Industry Association (CTIA) has led a stinging attack on the UK Government's Private Security Issue Bill (PSIB), claiming that it is yet another burden on IT and network professionals. A spokesman for the CTIA said it would mean . . .
A majority of companies are lukewarm on two major pushes underway in the privacy community: membership in privacy consortiums and the adoption of a new standard called P3P. Redwood City, Calif.-based Zona Research found that more than half of the companies . . .
Set-top boxes can tell corporate HQ what you watched last night and even what you bought online. And now the interactive TV industry wants to sell that data to advertisers. Touted as a possible replacement for both PC and analogue television . . .
The Social Security Administration today is to issue a special alert to senior citizens to beware of hoax solicitations promising additional federal benefits and/or $5,000 in slave reparations in exchange for sensitive private information. The alert comes from the agency's Office . . .
Hitachi's new chip can be embedded in currency, and can then tell a computer or other 'reader' whether a bill is real or counterfeit. Hitachi this week unveiled a tiny Radio Frequency Identification (RFID) chip so small that it can be embedded in money or other documents.. . .
A tiny new chip from Hitachi could have massive implications for security - and also for your privacy Hitachi has developed a chip that could be woven into paper money to help identify counterfeits, and which could also have wide ramifications for the identification and surveillance technologies.. . .
Although providers of online financial services and others are taking steps to comply with new privacy laws, confusion over the Gramm-Leach-Bliley Act extends to companies affected by the legislation and to the government agencies enforcing it. Meanwhile, privacy advocates say . . .