Linux Privacy - Page 28

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

Can privacy be saved? Maybe

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Thanks to the explosion of social networking and all those nifty web apps people use to bank and shop online, the bad guys now have an endless supply of attack vectors to steal personal data. In fact, some security industry experts have declared privacy dead.

Safari autofill exploit can reveal user data

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The autofill option in Apple's Safari browser can expose personal data without the user's consent, a security researcher reported on Wednesday. It remains unclear as to whether the problem affects Safari specifically or all WebKit-based browsers, which include Google Chrome. It's recommended that Safari and Chrome users disable the autofill feature immediately, until further notice.

Auto-complete: browsers disclose private data - Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the run-up to his presentation at the Black Hat conference, Jeremiah Grossman of White Hat Security told The Register that users who allow their browsers to auto-complete frequently used form fields, such as names or email addresses, may become an easy target for data thieves. For instance, auto-complete data can reportedly be retrieved automatically via JavaScript in Safari 4 and 5.

Twitter Settles FTC Charges That It Failed to Protect User Data

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Social networking site Twitter on Thursday settled Federal Trade Commission charges that "serious lapses" in data security put its users at risk. The FTC in its administrative complaint (pdf) said these security lapses allowed hackers to obtain administrative control of Twitter and send out phony tweets from users including then-President-elect Barack Obama and Fox News.

Social Networking Bill Of Rights Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the aftermath of much-publicized breaches by heavyweights Google, Facebook, and AT&T, among others, attendees of the annual Computers, Freedom, and Privacy (CFP) conference spent last week creating a Users' Bill of Rights that is now available for public consumption, feedback, and approval.

Google Wi-Fi Data Capture Unethical, But Not Illegal

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Google is under global scrutiny for its "accidental" gathering of wi-fi data while driving about photographing the world with its Street View camera cars. In the court of public opinion Google's actions cross ethical boundaries, but whether or not the activities were illegal depends on the laws in place for the given jurisdiction. Businesses in the United States should understand that the interception of publicly available data traversing the airwaves is probably not illegal.

Wikileaks denies Tor hacker eavesdropping gave site its start

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Updated WikiLeaks has denied that eavesdropping on Chinese hackers played a key part in the early days of the whistle-blowing site. Wired reports that early WikiLeaks documents were siphoned off from Chinese hackers' activities via a node on the Tor anonymiser network, as an extensive interview with WikiLeaks' founder Julian Paul Assange by the New Yorker explains in greater depth.

Internet Identity Workshop reveals OpenID clashes

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There are too many identity-related trade shows and conferences spread over venues all over the world and not enough time to get to them all. It's a far cry from when we started this newsletter 10 years ago, and the increased interest in identity issues should be applauded, but I can't be everywhere at once!