Linux Privacy - Page 24
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Despite opposition from privacy groups and regulators, Google's privacy policy update is set to go live today, March 1. But is this something that should have you worried, or is it much ado about nothing? Depends on who you ask.
Microsoft's privacy protection feature in Internet Explorer, known as P3P, is impractical to comply with while providing modern web functionality such as cookie-based features, Google said Monday in response to an accusation from Microsoft that Google had bypassed privacy protections in Internet Explorer.
Following the revelation that Google and other online marketing companies have been bypassing the mechanism for blocking third-party cookies in Safari, the Internet Explorer development team asked themselves whether Google might be doing the same thing in IE.
Website privacy policies, like end-user agreements, have become a morass of confusion that offer little in the way of clarity about what sites are and aren
Last week, Path iPhone app users were surprised (and quite disgruntled) to learn that the innards of their address books contacts email addresses and phone numbers had been uploaded to and stored on Paths servers. After a public outcry, Path immediately amended its practice to request user permission, and deleted its records.
A key part of any information security strategy is disposing of data once it's no longer needed. Failure to do so can lead to serious breaches of data-protection and privacy policies, compliance problems and added costs.
Google has whipped up a privacy brouhaha with a blog post announcing that the company is rewriting its privacy policy , consolidating user information across its services.
Teleconferencing vendors say they're trying to strike the right balance between security and usability after security researchers found they could dial in to the conference lines of major companies and manipulate video cameras to spy on boardrooms.
Google will be able to combine data from several Google services when a Google Accounts user is signed in, as part of a rewritten set of privacy policies that the company announced on Tuesday.
Calling it a significant victory for privacy rights, civil rights advocates Monday hailed a U.S. Supreme Court ruling that requires law enforcement officials to obtain a search warrant before they can attach a GPS tracking device to a vehicle.
An infiltration of a German federal security system last year has been traced back to a botched attempt by an unnamed security official to use a Trojan to monitor his daughter's internet usage, Der Spiegel reports.
2011 saw a number of significant privacy events. From Facebook and Google Plus dueling over privacy policies to concerns over what information your mobile phone actually knows about you. However, technology keeps moving forward, and privacy issues are sure to follow. For a peek into what experts expect in the year and years ahead when it comes to privacy, we turned to Rebecca Herold (aka the Privacy Professor) for answers.
Members of Anonymous have re-doubled their offensive against German neo-Nazis. The hacktivists of Operation Blitzkrieg this week launched a WikiLeaks-style website that aims to expose members of the far-right National Democratic Party (NPD) and other extremist groups, Der Spiegel reports.
While most attention today is placed on containing complex malware and outside hacking threats, enterprises could significantly improve their risk posture by taking a look at how well they manage the access they give privileged insiders, such as network and database administrators and other IT professionals. What most organizations find is that they don't have a firm enough grip on the access these users have.
A little-noticed section of the Stop Online Piracy Act could make it illegal to distribute Tor and other software that can "circumvent" attempts by the U.S. government to block pirate Web sites.
Executives from Microsoft and Google on Thursday gave a glimpse into the size of their privacy organizations, which are required for the companies to try to avoid running foul of complicated U.S. privacy regulations and prepare for changes coming to privacy laws around the globe.
Back in 1999, I remember being extremely agitated when Sun Microsystems CEO Scott McNealy said, "You have zero privacy anyway. Get over it!" regarding consumer privacy protections. "How arrogant is this guy?" I remember asking. Little did I know he was speaking the truth, albeit earlier than most of us wanted to hear it.
Revoking a digital certificate does not automatically invalidate, for instance, software signatures that have been made with this certificate. What matters is the revocation date, which determines the point in time after which a signature will no longer be validated.
Mozilla and Microsoft said Thursday they are revoking trust in all certificates issued by Digicert, a Malaysian intermediate certificate authority, after it was found that it had issued 22 certificates with weak 512 bit keys and missing certificate extensions and revocation information.