Linux Privacy - Page 31
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
What are we permitted to post legally on the Internet? Who is responsible for the content of materials posted on Web sites? Two recent legal cases have highlighted the ongoing battles over control of information being posted on the Internet.
On Tuesday ThreatMetrix unveiled its new cloud-based transactional fraud network. Using its global database of device fingerprints
From the forthcoming version 4.1, Google is doing away with the Chrome feature which has attracted the most criticism: unique IDs. Until now, this token has been stored in the user_experience_metrics.user_id key in the User Data\Local State file in the Chrome installation folder (C:\User\[Name]\AppData\Local\Google\Chrome under Vista).
As strange as it might sound, there are times when I wish for the old days of the Internet circa the early 1990's. The days of Mosaic and Lynx, where there was no Flash, no Javascript and no Java. A simpler time where protecting your privacy and security wasn't as essential as it is today.
If the public wants online privacy it had better fight now for laws to protect it because businesses won't and individuals don't have the clout, security expert Bruce Schneier told RSA Conference.
A researcher here today released a free tool that impersonates a Twitter user's account in order to execute automated targeted attacks on the person's followers. Pedro Varangot, a security researcher with Core Security Labs, says the group wrote the tool as a way to demonstrate and test for how social networks can be used for spear phishing.
Long-established privacy and cryptology website Cryptome.org was pulled offline on Wednesday after Microsoft launched a legal offensive over its publication of Redmond's guide to internet wiretapping.
The Federal Trade Commission today finally voiced concern about the long-known problem of data leaking into criminal hands via LimeWire, BearShare, Kazaa and dozens of other peer-to-peer (P2P) file sharing networks.
Despite the changes that Google has made to Buzz following negative reaction to the service, the Electronic Privacy Information Center has filed a complaint with the US Federal Trade Commission charging the search giant with violating user privacy.
This is a discussion between Bruce Schneier, chief security technology officer of BT Global Services and the author of Schneier on Security, and a world-famous cryptographer, among other things, and Marcus Ranum, the CSO of Tenable Network Security and is a well-known security technology innovator, teacher and speaker. Both are highly-regarded security visionaries and this is a really great discussion of anonymity on the Internet today. Point: Bruce Schneier Universal identification is portrayed by some as the holy grail of Internet security. Anonymity is bad, the argument goes; and if we abolish it, we can ensure only the proper people have access to their own information. Counterpoint: Marcus Ranum: Obviously, we need to deal with reality, but you've made the mistake of assuming that just because something will always be there, it's right. By that logic, most crime would be OK, and I think we probably agree that it's not.
The Electronic Frontier Foundation has created an on-line tool that details the wealth of information a Web browser reveals, which can pose privacy concerns when used to profile users.
The TOR Project is advising users to upgrade to a new version of the software following a hack that compromised three of its servers. TOR, short for "The Onion Router," is a worldwide network of servers that are used to help anonymize people's Web surfing. Web traffic is randomly routed through many servers, masking critical information such as someone's true IP (Internet Protocol) address.
I must confess, I thought FCC Chairman Julius Genachowski had found a clever way to keep his bid for Net neutrality regulations from getting mired in the debate over online piracy. When the FCC agreed to start the rulemaking process in October, Genachowski made it clear that the regulations wouldn't apply only to the transmission of unlawful content. That's code for bootlegged copies of "Avatar" and "The Hangover."
A recent policy conflict between Google and the Chinese government is stirring up a lot of dust and creating a lot of confusion. Google recently announced A new approach to China in the Official Google Blog. The 12 January 2010 announcement makes allegations of security cracking by agents of the Chinese government in an attempt to gain access to dissidents
Internet cafes proliferate all throughout Asia and other remote countries, which makes getting online very easy and cheap. That said, as much as I love "the cloud," keeping data online comes with security concerns, especially in places where internet restrictions and heavy government monitoring are commonplace.
Perhaps Google's announcement that Chinese cyber attackers went after human rights activists' Gmail accounts has made you skittish about just how private your own messages are on the Google e-mail service.
If you're like me, you've taken to carrying important data on USB sticks or flash drives. They're handy, you can use them on any PC, and with built-in encryption even if you lost them it was no big deal. Bad news: It's now a big deal.
Am I sending sensitive information for hackers to sniff? Further concern is data security. With traffic taking place between the Netbook and the Internet cloud, hackers can sniff out Internet packages and intercept information between a PC and a Wi-Fi router. Most companies use encryption via VPN software to hinder hacking attempts, but this may not be possible with Chrome OS.
Developer Crowded Road has had a rather difficult time getting its Security Cam App approved. In fact, its claim its app was submitted to Apple back in December of 2008, yet was just approved recently. This lengthy approval time shouldn't be too surprising, as the idea of turning one's iPhone into a possible spying device could be a troubling concept to some.