Linux Privacy - Page 35

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

Computer Warming a Privacy Risk

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A security researcher has a devised a novel attack on online anonymity systems in which he literally takes a computer's temperature over the internet. The attack uses a phenomenon called "clock skew" -- the tendency for the precise clocks in modern computers to drift off of the correct time at slightly different rates, which can be affected by heat. "When a crystal is manufactured, it has a clock skew, and it's different for each crystal (throughout its) lifetime," explains Steven J. Murdoch, a Cambridge University researcher who discussed his work at the Chaos Communications Congress on Thursday.

Computer Security Expert Joins EFF

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Electronic Frontier Foundation (EFF) welcomes the newest member of its Board of Directors, computer security expert Edward W. Felten. A professor of Computer Science and Public Affairs at Princeton University, Felten recently demonstrated the ability to manipulate results on a Diebold electronic voting machine -- showing that the equipment was extremely vulnerable to "vote-stealing" attacks that would undermine the accuracy of vote counts. Felten's research interests include computer security and privacy -- especially relating to media and consumer products -- and technology law and policy. He has published about 80 papers in the research literature and two books. Felten was the lead computer science expert witness for the Department of Justice in the Microsoft antitrust case. He has also testified before the Senate Commerce Committee on digital television technology and regulation and before the House Administration Committee on electronic voting.

Copyright Tool Will Scan Web For Violations

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

To deal with the mounting copyright issues swirling around video and other content online, a start-up founded by some respected Silicon Valley executives is taking a novel approach: combing the entire Web for unauthorized uses. Privately held Attributor Corp. of Redwood City, Calif., has begun testing a system to scan the billions of pages on the Web for clients' audio, video, images and text -- potentially making it easier for owners to request that Web sites take content down or provide payment for its use. The start-up, which was founded last year and has been in "stealth" mode, is emerging into the public eye today, at a time when some media and entertainment companies' frustration with difficulties identifying infringing uses of their content online is increasing. The problem has intensified with the proliferation and increasing usage of sites such as Google Inc.'s YouTube, which lets consumers post video clips.

Web Facial Matching Stirs Privacy Worries

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A startup boasted on Tuesday that it had created a technology to recognize people's faces from photos posted online, causing a stir among some privacy advocates who worry about the implications of automated matching. The tool--from Swedish startup Polar Rose--converts two-dimensional images into three-dimensional profiles to compensate for colors and shadows and then applies a facial recognition algorithm to the result. The company is relying on its users to enter the names of known people into the database, turning a neat technological trick into valuable data.

Auditory Eavesdropping

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the information age, surveillance isn't just for the police. Marketers want to watch you, too: what you do, where you go, what you buy. Integrated Media Measurement, Inc. wants to know what you watch and what you listen to -- wherever you are. They do this by turning traditional ratings collection on its head. Instead of a Neilsen-like system, which monitors individual televisions in an effort to figure out who's watching, IMMI measures individual people and tries to figure out what they're watching (or listening to).

Report: Spam, Phishing Attacks Growing More Sophisticated

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Though botnets have caused a large volume of junk email in recent months, security researchers are more alarmed at the rise in their level of sophistication, warning that targeted phishing attacks are making their way into corporate email servers. "They've reached a level of sophistication that we usually associate with commercial grade products," said Mark Sunner, chief security analyst at MessageLabs in New York. "We've seen the activity change and now botnets are spammed out in discrete chunks." In November, the global amount of spam in email traffic grew to nearly 90% of all global email traffic, according to statistics kept by MessageLabs. And that percentage is expected to hold in December. In addition, the vendor reported that 1 in 200 emails contained some type of phishing attack. MessageLabs said more than 68% of all malicious emails intercepted recently have been phishing attacks, a steady increase over the previous months.

Who's Behind the Spam Surge

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As I discussed several weeks ago, everyone's seen that there has been a massive surge in spam over the last couple of months. More researchers are weighing in on what's behind it. One point many sources make, and I made in my last column, is that there was a "Christmas Spike" last year too. Spam shot up roughly from November 2005 through January 2006 and then tailed off until the late '06 surge, yielding a bowl-shaped curve for the year.

A Hard Lesson in Privacy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sometimes I hear a story that is simply breathtaking in its stupidity and potential for disaster. For your delectation, horror, and amazement, here is one relayed to me by a good friend a few days ago. He's living in a European country that shall remain unnamed; in addition, the names and some details have been changed to protect the guilty (and the very dumb). It was transmitted to me via Skype, so I've also cleaned up the spelling and punctuation common to IM conversations so that it's more readable.

Spam Now Worse than Ever Before

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new report from e-mail vendor Postini indicates that spam -- or unsolicited commercial e-mail -- is worse than it has even been. According to the San Carlos, California-based firm, the percentage of spam grew by 59 percent among the 70 billion e-mails that Postini processed from September to November alone, bringing the level of junk e-mail to a striking 91 percent of all e-mails sent. According to Postini, total levels of spam have risen by 120 percent in the last year. And, just as bad, spam is growing more complex.

9 Out Of 10 E-mails Now Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Criminal gangs using hijacked computers are behind a surge in unwanted e-mails peddling sex, drugs and stock tips. The number of "spam" messages has tripled since June and now accounts for as many as nine out of 10 e-mails sent worldwide, according to U.S. email security company Postini. As Christmas approaches, the daily trawl through in-boxes clogged with offers of fake Viagra, loans and sex aids is tipped to take even longer. "E-mail systems are overloaded or melting down trying to keep up with all the spam," said Dan Druker, a vice president at Postini.

Security: Using the Internet

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As I mentioned in my DEFCON highlights article back in September, I learned about a group called kaos.theory who discussed an anonymity tool called SAMAEL (Secure, Anonymizing, Megalomaniacal, Autonomous, Encrypting Linux). I haven

SpamThru Statistics

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In an earlier analysis, we revealed a botnet created by a trojan sometimes called SpamThru. By working with the anti-spam group SpamHaus and the ISP, we were able to receive access to files from the SpamThru control server. We have analyzed the files, and in this report we will look at some of the statistics and interesting finds. SpamThru operates in a limited peer-to-peer capacity, but all bots report to a central control server. The bots are segmented into different server ports, determined by which variant of the trojan is installed. The bots are further segmented into peer groups of no more than 512 bots, keeping the overhead involved in exchanging information about other peers to a minimum. In the following graph, the total count as recorded by the control server is shown for each control port.

Phishing kits banned by new Fraud Act

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The new law aims to close a number of loopholes in preceding anti-fraud legislation, which the Government said was unsuited to modern fraud. Until now there has been no single, general fraud law in English law, but an untidy mess of eight specific statutory crimes, such as 'obtaining property by deception,' and a vague common law offence of 'conspiracy to defraud'. Scotland does have a common law crime of fraud, committed when someone achieves a practical result by a false pretence.

Spam Levels Surge To Unprecedented Levels

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

No, you're not imagining things. You have been getting a lot of spam lately. That's because digital miscreants are using contaminated images and stealthy malware to unleash unsolicited email at unprecedented levels, according to new research from San Carlos, Calif.-based Postini Inc. and UK-based Sophos. Attackers use these tactics to hijack computers and turn them into spam relays, often without the user's knowledge. "Bot activity is the major driver here," said Daniel Druker, Postini's executive vice president of marketing. "Bot-infected machines become part of these zombie PC armies that are used to push out spam."

The Spammers Strike Back

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Everybody's seen it by now. Spam is up like gangbusters in the last few months. And not just in volume; a lot more of it is getting through filtering mechanisms that had previously been pretty reliable. It's an aggravating and depressing situation. A number of factors have contributed to the situation, and what they all have in common, unfortunately, is that spammers are getting much more sophisticated.