Linux Privacy - Page 26
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
OK. This column may make me sound like I'm about to make a hat out of tinfoil but bear with me because my paranoia is completely justified. I know the truth and it's not "out there" as in "The X-Files," it's right here and it's a harsh reality that people really don't want to admit to: The reality is that there is no real privacy any more.
Security companies and IT people constantly tells us that we should use complex and difficult passwords. This is bad advice, because you can actually make usable, easy to remember and highly secure passwords. In fact, usable passwords are often far better than complex ones.
Web browsers are ground zero for Internet security threats, and the debate over responsibility for preventing those threats has resulted in a Gordian knot. The people behind the new add-on for Firefox called Cocoon (download) want to cut through debate by serving the entire Web to you via proxy. (Cocoon is also available at GetCocoon.com.)
Mindlessly surfing from an insecure location such as a coffee shop, a hotel room or even your workplace? Sure you are and we can understand the need -and often times the urge- to be online. Hopefully, there
The Tor Project has become a vital mechanism for privacy advocates, human rights activists, journalists and others in sensitive positions to evade online censorship and persecution. And while the governments interested in limiting user access to the Internet and controlling content have had some recent success in preventing the use of the anonymity network, Tor members have been working on new methods for circumventing those restrictions.
Does the RSA SecurID two-token authentication system include a back door that was built in at the request of the U.S. government in exchange for letting RSA export SecurID?
WikiLeaks' founder Julian Assange told an Indian TV channel that the Indian Prime Minister Manmohan Singh was engaged in a deliberate attempt to mislead the public by suggesting that the veracity of cables between the U.S. government and its embassy and consulates in India cannot be established.
A former CIA Director says the U.S. Government is being too secretive about cybersecurity vulnerabilities. Retired four-star General and former CIA Director, Michael Hayden writes in a recent article that Uncle Sam is too quick to classify intelligence about software security holes, preventing the government and public sector from learning about them.
IT and security professionals routinely use USBs, smartphones, and tablets to move and back up confidential files, yet their organizations haven't made changes in the wake of the WikiLeaks leaks.
Solid state drives (SSDs) have a small security problem: they're tough to erase. That warning comes from researchers at the University of California at San Diego. "Sanitization is well-understood for traditional magnetic storage, such as hard drives and tapes," said the researchers' in their study summary.
In a recent interview with The H, Eben Moglen professor of law and legal history at Columbia University, and the founder, Director-Counsel and Chairman of the Software Freedom Law Center, spoke about his ideas for using simple hardware to free individuals from the tyranny of the client/server model imposed by current web services.
A considerable number of Facebook and Google users worry about privacy and malware when using the social networking site and search engine, according to a survey from Gallup Poll and USA Today.
Gamers on a forum accuse Sony of adding a rootkit to its latest version of PlayStation 3 firmware. Rootkits, in general, have a bad reputation. Security watchers often associate them with malware. In this case specifically, though, the alleged rootkit would allow Sony to peer into users' system files without their knowledge.
The class-action suit says that Apple allows for the tracking of iPhone and iPad users' browsing habits, without user consent. Apple has been hit with another lawsuit accusing it of privacy violations for the way it shares information collected from iPhone, iPad and iPod Touch users with advertisers.
When NYU art professor David Darts shows people his lunchbox, "a smile just starts creeping up on their face." Painted black with a white skull-and-crossbones, the metal box doesn't hold a pastrami on rye; instead, it's stuffed with networking equipment and batteries, and it hosts a Debian Linux install running a barebones Python-powered Web server.
The U.S. government has been stepping up its use of smart cards to help lock down its computer networks, but hackers have found ways around them.
The House Republicans' first major technology initiative is about to be unveiled: a push to force Internet companies to keep track of what their users are doing.
As much as half of the secret documents posted by WikiLeaks may have been siphoned from peer-to-peer users who incorrectly configured their file-sharing software, according to evidence gathered by a security firm.
Casino companies may not be the only ones keeping track of how many points you have on your player card.
The developers of the Tor (The Onion Routing project) anonymisation solution has released version 0.2.1.29 to close a hole that can be remotely exploited. According to the developers, the problem is caused by a heap overflow. Version 0.2.1.28, which was released in late December, had already fixed another heap overflow in Tor. This flaw could be exploited to remotely crash Tor and the developers didn't rule out that it could also have been exploited to inject and execute arbitrary code.