Linux Privacy - Page 38
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
If you use any number of popular web forums or even some commercial services like classmates.com, amazon.com, netzero.com or your provider's webmail service, you may not be aware that you're sending your credentials over the internet in the clear.
I was recently contacted by an America Online (AOL) vice president, Ted Hopper, about our BHO listing of "AOL Security Toolbar" which was described as having adware functionality. That phone call set into motion what ultimately is presented here.
A group of smart card and smart chip vendors are launching a campaign to talk up the security and privacy features of their products, even as researchers raise questions about their use in passports.
A fifth of secondhand PCs finding their way onto the resale market still contain sensitive data on their hard discs. Research by BT, the University of Glamorgan in Wales and Edith Cowan University in Australia, has found that while 41% of the disks were unreadable, 20% contained sufficient information to identify individuals. The research, based on the acquisition of 300 PCs from auctions, computer fairs and on-line purchases, also found that 5% of the machines held commercial information on organisations, and that 5% held
Where does your bank's responsibility to protect you and your online transactions end? Apparently the HSBC bank of Great Britain knew for 2 years that they had a vulnerability and did nothing about it. There are very few details about the vulnerability, but one thing is known -- an attacker would already have to have a key logger on the customer's system to take advantage of the vulnerability. Maybe I'm being naive, but if an attacker has a key logger on the system, I figure your online banking credentials being stolen is just the start of your worries.
AOL's publication of the search histories of more than 650,000 of its users should reinforce an important point: What you type in online may not be as private as you think. Search engines place a multibillion-dollar infrastructure at the hands of any random user who stops by their Web site. The price you pay, however, is that the company may hold on to your search queries--which can provide a glimpse into your life--forever. To offer some suggestions about preserving your privacy while using search engines, CNET News.com has prepared the following list of frequently asked questions.
Let's suppose you are an employer. You have a well-written and well distributed policy on privacy in the workplace. You expressly state that employees have NO expectation of privacy in ANYTHING they do. You own the hardware, you own the software, you own the network. You reserve the right to monitor every keystroke, every website, every e-mail, every IM session, every chat discussion, and even monitor the lyrics to any song they happen to be listening to on their iPods (sounds like a fun place to work, doesn't it?). You have your employees acknowledge that you have the right to do such monitoring, and they even swear that they consent to such monitoring.
"There are reasons that there are such strong First Amendment protections on the Internet," says Marc Rotenberg, executive director of the Electronic Privacy Information Center. "People should be given wide latitude to express their opinions, even if others feel it's offensive or constitutes libel."
KLA-Tencor isn't taking any chances with its intellectual property -- nor that of its semiconductor clients -
I have been looking into metro Ethernet lately and talking with a number of Ethernet service providers about their services, and I was reminded of the confusing use of virtual private network and secure WAN pipes.
The Wi-Fi network soon to be launched by Toronto Hydro Telecom Inc. (THT) has triggered concerns over user privacy, data security and even public health.The company has reiterated that the security features of the new network -- dubbed One Zone -- won't be intrusive. They will protect against criminal activity but will not be used to spy on people, THT said.
A new strain of spam popping up in e-mail boxes is confounding consumers and corporate security officials. The spam contains images spouting everything from stock scams to Viagra, and its volume has more than doubled since April, according to analysis by anti-spam vendor IronPort Systems. Image-based spam accounts for 21% of all spam, compared with just 1% in late 2005, IronPort says. Marketers are deploying image-based spam because it is harder to detect than text-based spam, and consumers are more likely to read an e-mail with a picture or graphic, says Craig Sprosts of IronPort.
One of the FBI's leading agents in the field of computer crime has warned that industrial espionage and targeted data theft are on the increase.
A federal district court judge refused a motion by the U.S. government to stop a lawsuit against AT&T for its alleged cooperation with the controversial domestic surveillance program run by the National Security Agency.
Some years ago, Scott McNealy quipped that electronic privacy is dead and that we need to get over it.[1] Like many good one-liners, the assertion is an over-simplification but has enough piercing truth to it, to get heads nodding.
VOIP's anonymous nature may be convenient, but it can also be used against you. Secure Computing today warned of a new phishing exploit on the loose -- dubbed "vishing" -- that uses voice-over-IP and good old-fashioned social engineering.
At the recent London Internet Exchange (LINX) AGM, the 200 strong membership agreed operational principles for spam management teams to share information while ensuring that customer privacy is not infringed. The decision was made following a review of a Best Current Practice (BCP) document on spam-busting techniques.
Fears about new Radio Frequency Identification technology (RFID), have prompted the EU to open a public consultation process. The commission has been holding discussions with government agencies and the private sector since March based on general themes of standardising RFID frequencies and formats across Europe, but now the emphasis has changed slightly to inform citizens on how the technology can improve quality of life without encroaching on individual privacy issues. With this in mind, the commission has initiated an online public consultation on its 'Your Voice in Europe' website.
Note: free registration required to access this page By the time of Shiva Brent Sharma's third arrest for identity theft, at the age of 20, he had taken in well over $150,000 in cash and merchandise in his brief career. After a certain point, investigators stopped counting.
In March 1990, when few people had even heard of the internet, U.S. Secret Service agents raided the Texas offices of a small board-game maker, seizing computer equipment and reading customers' e-mail stored on one machine. A group of online pioneers already worried about how the nation's laws were being applied to new technologies became even more fearful and decided to intervene. And thus the Electronic Frontier Foundation was born -- 16 years ago this Monday -- taking on the Secret Service as its first case, one the EFF ultimately won when a judge agreed that the government had no right to read the e-mails or keep the equipment.