Linux Privacy - Page 25
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
As information and privacy commissioner of Ontario, Ann Cavoukian's jurisdiction is limited to the Canadian province. But that doesn't mean the effects of her post don't extend into territories across the globe.
When companies suffer a security breach today they face that core dilemma: Tell the world and hope the honesty helps others, or keep it under wraps to avoid tarnishing the brand and duck possible lawsuits? One thing is clear from the arguments below: It is time for the government to take the guesswork out of the equation.
As banks and other large companies spend large amounts of money on building firewalls and using complex technology to fortify their systems, it is often their own employees who are letting identity thieves in the door.
Who is more likely to hand over their personal online information, a criminal hacker or an IT security professional? It seems they are all pretty bad if a female is involved, but
US ISP Sonic.net and Google have been forced to supply the US government with information about the email account of WikiLeaks volunteer Jacob Appelbaum; according to a Wall Street Journal report published on Monday (10 October), the companies were complying with a secret court order.
It's easy to set up a Virtual Private Network (VPN) for individuals. Trying to set up private networks over the public Internet for branch offices --
In an increasingly digital world, the real threat to citizens' privacy is data collection by corporations and not the Patriot Act, said former U.S. cybersecurity and counterterrorism advisor Richard Clarke.
The short version: Tor relays and bridges should upgrade to Tor 0.2.2.33 or Tor 0.2.3.4-alpha so users in Iran can reach them again.
Web spies are getting stealthier and stealthier. Recently they've been caught peering into our browser histories to determine the sites we've visited, even in so-called privacy mode with cookies disabled, as Dan Goodin described earlier this month on The Register.
Some 250,000 diplomatic dispatches from the US State Department have accidentally been made completely public. The files include the names of informants who now must fear for their lives. It is the result of a series of blunders by WikiLeaks and its supporters.
Judging by the frenzied claims of lawmakers like US representative Jackie Speier, enabling the Do Not Track feature ranks up there with locking doors and shredding credit card statements.
Google touts the Chrome OS as being free from traditional security concerns like malware, but it's still vulnerable to entirely different kinds of attacks, two researchers from the firm WhiteHat Security told Black Hat attendees here today.
Online privacy might be the biggest oxymoron of the early 21st century. Computer users are so ready to share the most innocuous details about their lives on social networks, for example, that it seems privacy has willingly been surrendered.
Code that exploits two iPhone flaws to allow people to jailbreak their devices could, ironically, force security-conscious users to use the vulnerabilities to jailbreak their own iPhones and apply a third-party patch.
The Electronic Frontier Foundation (EFF) has begun the EFF Tor Challenge to encourage the creation of more relays for the anonymising network. The Tor network relies on user-provided relays to handle the traffic that passes in, out and through the anonymising network which is used by activists around the world to protect their identity and circumvent internet censorship.
A high-rated Firefox extension with more than 7 million downloads secretly collects data about every website the open-source browser visits and combines it with uniquely traceable information tied to the user, an independent security researcher said.
Every time you turn around another company is reporting a serious data breach. Last week it was the LastPass online password management service that lost some e-mail addresses and master passwords, as CNET's Seth Rosenblatt reported in The Download Blog.
Almost everyone has a digital footprint these days. Think you could remove your tracks? Former skip tracer Frank Ahearn helps folks drop off the face of the Earth. In a world where we share more information online than ever before, it might seem impossible to disappear completely.