Linux Privacy - Page 28
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
They say that some things last forever, like diamonds or true love or Twinkies. But should browser cookies used for tracking be added to that list?
Thanks to the explosion of social networking and all those nifty web apps people use to bank and shop online, the bad guys now have an endless supply of attack vectors to steal personal data. In fact, some security industry experts have declared privacy dead.
Comodo, a leading Internet security organization, announced today that it is offering a FREE annual subscription to BuyerTrust, a trustmark that is displayed on websites to build trust and confidence, with the purchase of any Comodo SSL Certificate.
We all know how annoying fingerprints on touchscreens can be, but now researchers believe they can actually leave your mobile phone susceptible to hacking.
The autofill option in Apple's Safari browser can expose personal data without the user's consent, a security researcher reported on Wednesday. It remains unclear as to whether the problem affects Safari specifically or all WebKit-based browsers, which include Google Chrome. It's recommended that Safari and Chrome users disable the autofill feature immediately, until further notice.
The Global System for Mobile Communications technology used by the majority of the world's mobile phones will get some scrutiny at next week's Black Hat security conference, and what the security researchers there have to say isn't pretty.
In the run-up to his presentation at the Black Hat conference, Jeremiah Grossman of White Hat Security told The Register that users who allow their browsers to auto-complete frequently used form fields, such as names or email addresses, may become an easy target for data thieves. For instance, auto-complete data can reportedly be retrieved automatically via JavaScript in Safari 4 and 5.
Perhaps there is finally something to deter Chatroulette.com users from their more offensive behavior: University researchers say that users of the popular video-chat site may not be as anonymous, or as private, as they think.
Oh dear, poor Google seem to be catching all kinds of flak over their Wifi Data Collection. The UK Met are already investigating them and they are being pulled to pieces in Germany too with France also weighing in. The latest to jump on the bandwagon is Australia which is stating they have breached the Australian Privacy Act.
In a survey of IT professionals published Wedneday, 67% of respondents admitted having accessed information that was not relevant to their role, and 41% admitted abusing administrative passwords to snoop on sensitive or confidential information.
If you have checked in with Foursquare in San Francisco in the last three weeks, Jesper Andersen probably knows where and when
Google has remotely removed two free apps from several hundred Android phones because the apps misrepresented their purpose and thus violated Android developer policies, according to a company spokesman.
Social networking site Twitter on Thursday settled Federal Trade Commission charges that "serious lapses" in data security put its users at risk. The FTC in its administrative complaint (pdf) said these security lapses allowed hackers to obtain administrative control of Twitter and send out phony tweets from users including then-President-elect Barack Obama and Fox News.
In the aftermath of much-publicized breaches by heavyweights Google, Facebook, and AT&T, among others, attendees of the annual Computers, Freedom, and Privacy (CFP) conference spent last week creating a Users' Bill of Rights that is now available for public consumption, feedback, and approval.
Google intercepted passwords and email content while it was collecting unsecured Wi-Fi data from households, the French privacy watchdog has found. The search and advertising company admitted in May that its Street View cars had harvested information sent over Wi-Fi networks.
Google is under global scrutiny for its "accidental" gathering of wi-fi data while driving about photographing the world with its Street View camera cars. In the court of public opinion Google's actions cross ethical boundaries, but whether or not the activities were illegal depends on the laws in place for the given jurisdiction. Businesses in the United States should understand that the interception of publicly available data traversing the airwaves is probably not illegal.
Updated WikiLeaks has denied that eavesdropping on Chinese hackers played a key part in the early days of the whistle-blowing site. Wired reports that early WikiLeaks documents were siphoned off from Chinese hackers' activities via a node on the Tor anonymiser network, as an extensive interview with WikiLeaks' founder Julian Paul Assange by the New Yorker explains in greater depth.
There are too many identity-related trade shows and conferences spread over venues all over the world and not enough time to get to them all. It's a far cry from when we started this newsletter 10 years ago, and the increased interest in identity issues should be applauded, but I can't be everywhere at once!