Linux Privacy - Page 27

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

Death to passwords

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Passwords are like the keys to your house: you use them every day, but almost never really think of them until you lose them. Or someone else finds them. The recent hack of Gawker, which operates sites such as Lifehacker, Gizmodo, and Deadspin, revealed some troubling news about the way many of us use passwords.

Snooping Represents A Growing Data Breach Threat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Who's reading over your shoulder? With more employees now working in public places, for a break from the office or while on the go, 57% said they've had to stop their work because of privacy concerns, and 70% think they'd be more productive if no one else could view what they're working on.

Review: 'HTTPS Everywhere' fends off Firesheep

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Web is an insecure place and getting more insecure all the time. The latest threat, the Firesheep add-in for Firefox, is particularly dangerous because it is exceedingly simple to use. Someone with absolutely no hacking experience can grab your private login information to sites such as Facebook and Amazon, and then log in as you and do anything they want, as if they were you.

Another Hacker

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A well-known and respected computer security researcher was detained for several hours Wednesday night by border agents who searched his laptop and cell phones before returning them to him.

Cellphones being hacked!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

These days, cellphone software, called X Spy, is popular. Once installed the owner can send it to other phones through messages. Then any information in the receivers' phones can be monitored.

SecTor 2010: Why security is the enemy of privacy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As we noted in last year's CSO article, " Six ways we gave up our privacy," people are increasingly -- and willingly -- throwing their privacy to the wind, thanks to an addiction to Google apps, GPS devices, the BlackBerry, iPhone and Android, and social networking sites like Facebook and Twitter. Some security experts believe privacy is dead already.

The Link Between Recent Privacy 'Breaches'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Facebook has been the subject of intense scrutiny over privacy concerns...again. Or, is it still? Facebook is not alone, however, as Twitter and Android have also been recent targets of privacy ire. Each of these privacy incidents has something else in common as well--they are a result of relationships with third-parties that users have approved.

Privacy? Run a background check on yourself

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

My company hired a new employee recently and as part of my responsibilities, I ran a basic background check for our new hire. If you've never seen a professional background check, you will most likely be shocked by the level of detail that can be gleaned from public records.

Fedora 14 Linux Boosts Security with OpenSCAP

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security is always a primary concern for enterprise IT managers, with a constant need to ensure that systems are kept updated and properly configured to prevent exploits. A new tool debuting in the upcoming Red Hat-sponsored Fedora 14 Linux release could prove a key ingredient in enabling properly secured systems.

Hackers Find New Ways To Assume Identities

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Although cyber scamming is nothing new, the way thieves use the data is constantly changing, and social media is a gateway to the latest scams. Identity theft experts fear that by sharing seemingly mundane personal details and preferences on social networking sites, people might be giving the bad guys clues about their security codes.