Linux Privacy - Page 38

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

Users still not wiping data from unwanted PCs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A fifth of secondhand PCs finding their way onto the resale market still contain sensitive data on their hard discs. Research by BT, the University of Glamorgan in Wales and Edith Cowan University in Australia, has found that while 41% of the disks were unreadable, 20% contained sufficient information to identify individuals. The research, based on the acquisition of 300 PCs from auctions, computer fairs and on-line purchases, also found that 5% of the machines held commercial information on organisations, and that 5% held

Is your bank responsible for protecting you from key loggers?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Where does your bank's responsibility to protect you and your online transactions end? Apparently the HSBC bank of Great Britain knew for 2 years that they had a vulnerability and did nothing about it. There are very few details about the vulnerability, but one thing is known -- an attacker would already have to have a key logger on the customer's system to take advantage of the vulnerability. Maybe I'm being naive, but if an attacker has a key logger on the system, I figure your online banking credentials being stolen is just the start of your worries.

FAQ: Protecting Yourself From Search Engines

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

AOL's publication of the search histories of more than 650,000 of its users should reinforce an important point: What you type in online may not be as private as you think. Search engines place a multibillion-dollar infrastructure at the hands of any random user who stops by their Web site. The price you pay, however, is that the company may hold on to your search queries--which can provide a glimpse into your life--forever. To offer some suggestions about preserving your privacy while using search engines, CNET News.com has prepared the following list of frequently asked questions.

E-mail Privacy In The Workplace

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Let's suppose you are an employer. You have a well-written and well distributed policy on privacy in the workplace. You expressly state that employees have NO expectation of privacy in ANYTHING they do. You own the hardware, you own the software, you own the network. You reserve the right to monitor every keystroke, every website, every e-mail, every IM session, every chat discussion, and even monitor the lyrics to any song they happen to be listening to on their iPods (sounds like a fun place to work, doesn't it?). You have your employees acknowledge that you have the right to do such monitoring, and they even swear that they consent to such monitoring.

Internet Privacy: A License for Libel?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"There are reasons that there are such strong First Amendment protections on the Internet," says Marc Rotenberg, executive director of the Electronic Privacy Information Center. "People should be given wide latitude to express their opinions, even if others feel it's offensive or constitutes libel."

Virtually Private

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I have been looking into metro Ethernet lately and talking with a number of Ethernet service providers about their services, and I was reminded of the confusing use of virtual private network and secure WAN pipes.

Toronto's New Wi-Fi Network Raises Concerns

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Wi-Fi network soon to be launched by Toronto Hydro Telecom Inc. (THT) has triggered concerns over user privacy, data security and even public health.The company has reiterated that the security features of the new network -- dubbed One Zone -- won't be intrusive. They will protect against criminal activity but will not be used to spy on people, THT said.

Picture This: A Sneakier Kind Of Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new strain of spam popping up in e-mail boxes is confounding consumers and corporate security officials. The spam contains images spouting everything from stock scams to Viagra, and its volume has more than doubled since April, according to analysis by anti-spam vendor IronPort Systems. Image-based spam accounts for 21% of all spam, compared with just 1% in late 2005, IronPort says. Marketers are deploying image-based spam because it is harder to detect than text-based spam, and consumers are more likely to read an e-mail with a picture or graphic, says Craig Sprosts of IronPort.

Identity is dead. Get over it.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Some years ago, Scott McNealy quipped that electronic privacy is dead and that we need to get over it.[1] Like many good one-liners, the assertion is an over-simplification but has enough piercing truth to it, to get heads nodding.

'Vishing' Attacks Use VOIP

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

VOIP's anonymous nature may be convenient, but it can also be used against you. Secure Computing today warned of a new phishing exploit on the loose -- dubbed "vishing" -- that uses voice-over-IP and good old-fashioned social engineering.

LINX members unite in the war against spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At the recent London Internet Exchange (LINX) AGM, the 200 strong membership agreed operational principles for spam management teams to share information while ensuring that customer privacy is not infringed. The decision was made following a review of a Best Current Practice (BCP) document on spam-busting techniques.

EU opens public consultation on RFID

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Fears about new Radio Frequency Identification technology (RFID), have prompted the EU to open a public consultation process. The commission has been holding discussions with government agencies and the private sector since March based on general themes of standardising RFID frequencies and formats across Europe, but now the emphasis has changed slightly to inform citizens on how the technology can improve quality of life without encroaching on individual privacy issues. With this in mind, the commission has initiated an online public consultation on its 'Your Voice in Europe' website.

Identity Thief Finds Easy Money Hard to Resist

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Note: free registration required to access this page By the time of Shiva Brent Sharma's third arrest for identity theft, at the age of 20, he had taken in well over $150,000 in cash and merchandise in his brief career. After a certain point, investigators stopped counting.

EFF Defends Tech Liberties

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In March 1990, when few people had even heard of the internet, U.S. Secret Service agents raided the Texas offices of a small board-game maker, seizing computer equipment and reading customers' e-mail stored on one machine. A group of online pioneers already worried about how the nation's laws were being applied to new technologies became even more fearful and decided to intervene. And thus the Electronic Frontier Foundation was born -- 16 years ago this Monday -- taking on the Secret Service as its first case, one the EFF ultimately won when a judge agreed that the government had no right to read the e-mails or keep the equipment.

Thinking about email security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With the National Security Agency (NSA) monitoring our phone calls, now might be a good time to think seriously about the security of our email as well. In particular, you might want to think about encrypting your email, and about whether it's safe in the hands of third-party providers like Yahoo!, Google, and Microsoft.

Identity Thieves Lurking in P2P Networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

June 23, 2006 (IDG News Service) -- Users of peer-to-peer file-sharing services may be sharing more than they bargained for, a former White House cybersecurity adviser warned Thursday. Security researchers have found thousands of files with sensitive information by searching through file-sharing networks, said Howard Schmidt, CEO of R&H Security Consulting LLC. Schmidt, who has also worked as chief security officer for Microsoft Corp., made the comments during an SDForum seminar in Palo Alto, Calif., on Thursday.

Universities Create ID Theft Research Center

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Utica College and Lexis-Nexis announced on Wednesday that they had teamed up with the FBI and the U.S. Secret Service as well as other universities to establish a center for researching identity theft and developing measures to protect consumer data. Utica College promised that the research hub, dubbed the Center for Identity Management and Information Protection (CIMIP), will bring together experts, allow access to sensitive data and produce actionable strategies for combating identity fraud. Other founding members include the Computer Emergency Response Team (CERT) Coordination Center at Carnegie Mellon University, Indiana University, Syracuse University, and IBM.