Linux Privacy - Page 16
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
WikiLeaks is back at it again. After having announced back in May that it would resume its activity, the WikiLeaks team has released two new batches of documents in the span of two days.
The hackers who breached the US Office of Personnel Management accessed a second set of even more highly sensitive data, it was widely reported Friday, in revelations that make the breach one of the biggest thefts of data on federal workers.
A breach of U.S. government computers
Without public notice or debate, the Obama administration has expanded the National Security Agency's warrantless surveillance of Americans' international Internet traffic to search for evidence of malicious computer hacking, according to classified NSA documents.
Stingray is the code name for an IMSI-catcher, which is basically a fake cell phone tower sold by Harris Corporation to various law enforcement agencies. (It's actually just one of a series of devices with fish names -- Amberjack is another -- but it's the name used in the media.) What is basically does is trick nearby cell phones into connecting to it.
Wearable tech creates a new opportunity for private data to be collected, whether with or without the user's knowledge. And oftentimes, the user might have granted permission, without realizing quite what they were giving up.
A while back, we covered the controversy over a few Kickstarter projects aiming to provide something in increasing demand as of late: a foolproof way to connect any Wi-Fi capable device to the Tor anonymized network. Two such Tor "travel router" projects have since become actual product: InvizBox, from a team in Ireland, and the resurrected Anonabox, which was acquired by the tech holding company Sochule.
The U.S. started keeping from 1992 records of international phone calls made by Americans, under a joint program of the Department of Justice and the Drug Enforcement Administration, according to a newspaper report.
Some 30 percent of American adults say they have altered their digital behavior in the wake of Edward Snowden
Back in October, we highlighted the contradiction of FBI Director James Comey raging against encryption and demanding backdoors, while at the very same time the FBI's own website was suggesting mobile encryption as a way to stay safe. Sometime after that post went online, all of the information on that page about staying safe magically disappeared, though thankfully I screenshotted it at the time:
A group of technology companies, non-profits and privacy and human rights organizations have sent a letter to President Barack Obama, the director of national intelligence and a wide range of Congressional leaders, calling for an end to the bulk collection of phone metadata under Section 215 of the USA PATRIOT Act.
A Google software problem inadvertently exposed the names, addresses, email addresses and phone numbers used to register websites after people had chosen to keep the information private.
The Wikimedia Foundation which operates the popular online encyclopedia Wikipedia has filed an lawsuit against the National Security Agency (NSA) and the US Department of Justice (DOJ) of United States for violating user privacy.
Researchers sponsored by the U.S. government have reportedly tried to defeat the encryption and security of Apple devices for years.
In an effort to stop the U.S. government from spying on Wikipedia
A coalition of 63 non-governmental organizations (NGOs) from around the world are calling on national governments to support the establishment of a special rapporteur on the right to privacy within the United Nations.
Security and privacy are top concerns for many IT professionals, and it's especially relevant now, after 2014's highly publicized data breaches. Because of the constant concerns about security and privacy, Tech Pro Research, ZDNet's premium content sister site, conducted a new survey on the topic and compared the results back to a previous survey from 2013.