Linux Privacy - Page 17
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Lenovo is in hot water after being caught intentionally shipping laptops with software that steals web traffic using man-in-the-middle attacks.
The US National Security Agency (NSA) has infected hard disk firmware with spyware in a campaign valued as highly as Stuxnet that dates back at least 14 years and possibly up to two decades, according to an analysis by Kaspersky Labs.
Backed by a number of tech companies, California is eyeing state legislation to protect Relevant Products/Services its citizens from warrantless government surveillance of e-mails, text messages and cellphone communications. The proposed legislation is being backed by state senators Mark Leno, a Democrat, and Joel Anderson, a Republican.
Surf the Internet securely with your very own portable WiFi VPN/TOR router. You can configure a Raspberry Pi with Linux and some extra software to connect to a VPN server of your choice. The VPN connection encrypts your internet traffic so that hackers and spies can
The chairman of the youth wing of the Swedish Pirate Party successfully fooled attendees at a major Swedish security and defense conference into connecting to an open Wi-Fi network that he controlled
A new wave of U.S. National Security Agency (NSA) document leaks show the agency wasn
In some ways it may be fair to say that 2014 was the year when issues of survaillance and privacy became a huge part of our public discourse. And so I thought that re-posting this fantastic TED video by Glenn Greenwald on Why Privacy Matters is rather appropriate.
Remote code execution vulnerabilities in the standard implementation of the network time protocol (NTP) can be exploited by attackers to compromise servers, embedded devices and even critical infrastructure systems that run UNIX-like operating systems.
Thomas White (@CthulhuSec) warned users to steer clear of his Tor servers after he lost control following what he
The secret Foreign Intelligence Surveillance Court has authorized a 90-day extension to the Section 215 bulk telephone collection program used by the National Security Agency, giving the agency through the end of February to run the program in the absence of legislation establishing a new authority.
Want to help make sure your privacy is protected when browsing the Web, sending messages on social network services, and more? Then try out these five great browser add-ins.
Browsing the Web could be made a lot more secure Relevant Products/Services if sites used the HTTPS encryption protocol instead of HTTP, but installing the security Relevant Products/Services certificates that enable this has generally been difficult, time-consuming and sometimes costly as well.
As Net Neutrality debates swirl, privacy advocates at the Electronic Frontier Foundation and VPN provider Golden Frog have gone public with a Federal Communications Commission filing that got more attention for accusations that Verizon FIOS customers were having their Netflix streaming service throttled back.
Facebook has never had much of a reputation for letting users hide their identities online. But now the world
Facebook announced today that the social network will now be directly available to users as a Tor hidden service. The Tor Project is an Internet-traffic anonymization service that relays user traffic through a number of proxy servers all around the world in order to cloak their true IP address and identity.
Verizon Wireless has been subtly altering the web traffic of its wireless customers for the past two years, inserting a string of about 50 letters, numbers, and characters into data flowing between these customers and the websites they visit.
Senator Ron Wyden thought he knew what was going on. The Democrat from Oregon, who has served on the Senate Select Committee on Intelligence since 2001, thought he knew the nature of the National Security Agency
After a series of clashes with Google, Europe's data privacy watchdogs have drawn up a list of measures they'd like to see the search giant implement.
Former National Security Agency contractor Edward Snowden warned New Zealanders in a media blitz on Monday that all of their private emails, phone calls and text messages are being spied on despite government denials.
The FBI wants greater authority to hack overseas computers, according to a law professor. A Department of Justice proposal to amend Rule 41 of the Federal Rules of Criminal Procedure would make it easier for domestic law enforcement to hack into the computers of people attempting to protect their anonymity on the internet.