Linux Privacy - Page 27
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Facebook has added APIs for developers to access the home address and mobile numbers of users, so FarmVille can see where, as well as who, you are.
Computer hacker George Samuel Bronk, 23, of Citrus Heights California, pleaded guilty to seven felony charges which included hacking into e-mail accounts and Facebook accounts of women in 17 states and in England.
Adobe has finally made moves to improve 'cookie' management and privacy in its much maligned Flash Player. The area of focus is the local storage feature in Flash Player, which stores what are often mistakenly referred to as 'Flash cookies', said Emmy Huang, group product manager for Flash at Adobe, in a blog post.
Passwords are like the keys to your house: you use them every day, but almost never really think of them until you lose them. Or someone else finds them. The recent hack of Gawker, which operates sites such as Lifehacker, Gizmodo, and Deadspin, revealed some troubling news about the way many of us use passwords.
In a landmark decision issued today in the criminal appeal of U.S. v. Warshak, the Sixth Circuit Court of Appeals has ruled that the government must have a search warrant before it can secretly seize and search emails stored by email service providers.
Who's reading over your shoulder? With more employees now working in public places, for a break from the office or while on the go, 57% said they've had to stop their work because of privacy concerns, and 70% think they'd be more productive if no one else could view what they're working on.
The Web is an insecure place and getting more insecure all the time. The latest threat, the Firesheep add-in for Firefox, is particularly dangerous because it is exceedingly simple to use. Someone with absolutely no hacking experience can grab your private login information to sites such as Facebook and Amazon, and then log in as you and do anything they want, as if they were you.
We have already seen top Google Chrome extensions to secure your web browsing, now lets talk about Firefox add-ons a bit. Many of the Google Chrome extensions we featured are originally inspired by Firefox's top notch add-ons. So without much delay, lets start making Firefox a much more secure one.
Internet security concerns have amplified after a U.S. government report published last Wednesday claims that a percentage of the internet was hijacked this past April and was rerouted through Chinese servers.
Attorneys representing Texas resident Keith Dunbar on Wednesday filed a lawsuit against Google alleging that Gmail violates the Electronic Communications Privacy Act of 1986.
A well-known and respected computer security researcher was detained for several hours Wednesday night by border agents who searched his laptop and cell phones before returning them to him.
A state-owned Chinese telecommunications firm "hijacked" Internet traffic in April, affecting traffic from U.S. government domains and raising serious implications for Internet safety, according to a report by a Congressional commission.
These days, cellphone software, called X Spy, is popular. Once installed the owner can send it to other phones through messages. Then any information in the receivers' phones can be monitored.
As we noted in last year's CSO article, " Six ways we gave up our privacy," people are increasingly -- and willingly -- throwing their privacy to the wind, thanks to an addiction to Google apps, GPS devices, the BlackBerry, iPhone and Android, and social networking sites like Facebook and Twitter. Some security experts believe privacy is dead already.
Facebook has been the subject of intense scrutiny over privacy concerns...again. Or, is it still? Facebook is not alone, however, as Twitter and Android have also been recent targets of privacy ire. Each of these privacy incidents has something else in common as well--they are a result of relationships with third-parties that users have approved.
My company hired a new employee recently and as part of my responsibilities, I ran a basic background check for our new hire. If you've never seen a professional background check, you will most likely be shocked by the level of detail that can be gleaned from public records.
The Information Commissioner's Office has found a healthcare recruitment agency in breach of the Data Protection Act after it lost doctors' personal data that ended up being sold online.