Linux Privacy - Page 30
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Privacy officials from 10 countries on Tuesday penned a letter to Google criticizing its approach to privacy, pointing to its Buzz and Street View products as examples.
In the spirit of being open, search engine outfit Google has stated under what conditions it will hand over data to governments or delete information on its websites.
I think this is one plugin we won't see released by Google for Chrome anytime soon. A computer security researcher has launched a project designed to provide people greater privacy when using Google, as the company expands the scope of data its collects about its users.
A researcher is working on technology he hopes will be able to control RFID tags and protect private information. "We are building our own RFID cards and adding features to them to make it visible and noticeable when someone is accessing the information," Nicolai Marquardt, a Ph.D. student at the University of Calgary said during the Computer Human Interaction conference in Atlanta Wednesday.
A block of 86 lines of C# code is creating a buzz online following claims it may make BitTorrent downloads untraceable. The code, sweetly named SeedFucker, is actually an exploit discovered last November that would allow a BitTorent user to fake the IP address of a server from where a file could be downloaded.
A man who forgot to remove a thumb drive from a shared computer that he was using, waived his privacy claims to the content on that device, a federal judge in Florida has ruled.
The Eraser developers have announced the availability of version 6.0.7 of their advanced security tool for Windows. Eraser is a software utility for securely deleting files and folders from different types of magnetic media, such as hard drives and floppy disks. It removes sensitive information by overwriting the area of the drive on which the data is stored one or more times using special algorithms.
Michael Spector (and yes, he's my brother) asked how to safely email passwords, account numbers, and other sensitive information. You can't trust Internet email with potentially compromising information, such as your credit card or account numbers, social security numbers, or important passwords. As your message moves from one server to another, several people have the opportunity to read it.
In January, Facebook Chief Executive, Mark Zuckerberg, declared the age of privacy to be over. A month earlier, Google Chief Eric Schmidt expressed a similar sentiment. Add Scott McNealy's and Larry Ellison's comments from a few years earlier, and you've got a whole lot of tech CEOs proclaiming the death of privacy--especially when it comes to young people.
In a ruling that could affect enterprises' privacy and security practices, the New Jersey Supreme Court last week ruled that an employer can not read email messages sent via a third-party email service provider -- even if the emails are accessed during work hours from a company PC.
Judiciary chairman Leahy says currently laws governing electronic communications are outdated and inadequate. Sen. Patrick Leahy, Democrat from Vermont and chairman of the Senate Judiciary Committee, said he plans to hold hearings on "much-needed updates" to the Electronic Communications Privacy Act of 1986 in the coming months.
Finally, there's something Google and Microsoft can agree on: Our electronic privacy protections are in serious need of an overhaul. They, along with Intel, AOL, AT&T, the ACLU, and a dozen other household names, have formed the Digital Due Process coalition, aimed at urging Congress to modernize the Electronic Communications Privacy Act (ECPA) -- the only thing keeping Johnny Law from pawing through your digital life.
For more information about this, have a look at David Baron
Internet standards expert, CEO of web company iFusion Labs, and blogger John Pozadzides knows a thing or two about password security
The Electronic Frontier Foundation (EFF) is warning that state agencies are probably able to routinely eavesdrop on SSL-encrypted internet connections. They refer to a draft research paper in which researchers Christopher Soghoian and Sid Stamm summarise the evidence for this supposition and describe a possible defensive strategy.
Nearly a quarter of people (23 per cent) polled in a survey by Symantec use their browser to keep tabs on their passwords. A survey of 400 surfers by Symantec also found that 60 per cent fail to change their passwords regularly. Further violating the 'passwords should be treated like toothbrushes' maxim (changed frequently and not shared), the pollsters also found that a quarter of people have given their passwords to their spouse, while one in 10 people have given their password to a
Now this is another interesting attack vector using little bits of data not many people consider. I have heard about this kind of technique before and considered how it
Read on for "The Ubuntu Option" for increased online banking security. Jay McLaughlin has me worried. I do my online banking from the same home computer the rest of the family uses for Web surfing and online games. I have the McAfee security suite loaded and do regular scans so accessing online banking should be protected. Right?
That little lock on your browser window indicating you are communicating securely with your bank or e-mail account may not always mean what you think its means. Normally when a user visits a secure website, such as Bank of America, Gmail, PayPal or eBay, the browser examines the website