Linux Privacy - Page 44

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

Community Spam Fighting Effort Faces Heat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Lycos Europe is offering a "screensaver that spams the spammers," using idle computer time to attack sites that have been blacklisted for abusive spamming practices. Monitoring of three of the targets housed on Chinese servers shows that two of the sites, bokwhdok.com and printmediaprofits.biz, have been knocked offline by the attack. A third target, rxmedherbals.info, has remained largely available, with intermittent outages.

Protect your organization's sites with a leak-proof security policy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Every organization requires some type of a network site security policy that will protect the organization's valuable assets -- everything from systems to data. The policy guidelines presented here will help you to establish an enterprise-wide program for how internal and external users will interact with a company's computer network, how the corporate computer architecture topology will be implemented, and where computer assets will be located. . . .

Securing Source Code Should Be a Priority

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The efforts of the "Source Code Club" to sell the source code to Cisco firewalls may be despicable, but they may also be a blessing in disguise. By making a public show of Cisco's inability to keep its secrets to itself, these desperados may actually be doing us all a big favor. . . .

Online Theft

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last year I was the victim of identity theft, a sobering reality in today's world. An unscrupulous criminal managed to social engineer his way past the formidable security checks and balances provided by my credit card company, my bank, and one of my investment accounts. . . .

Trading Privacy for Convenience

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A steady stream of passengers handpicked by AMR's American Airlines showed up yesterday at a sectioned-off area of National Airport's baggage claim to submit to the scans, present two forms of government identification and fill out a form that will be used to perform a criminal background check. . . .

New Worm Hijacks Webcams

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new worm can spy on users by hijacking their Web cameras, a security firm warned Monday. The Rbot.gr worm -- the latest in a long line of similar worms; one security firm estimates that more than 4,000 variations have appeared -- has the capability of turning Webcams against their owners, said officials at U.K.-based Sophos. . . .

Bosses may lose right to monitor without notice

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

California's Assembly has voted to require the state's employers to inform their workers in writing if email and other Internet activity is monitored at the office. If it becomes law, supporters said the bill would place the state at the forefront of protecting employee privacy online and may serve as a model for similar bills in other states. . . .

Spam: Made In The U.S.A.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Proof that the United States is capitalism's capital, a survey released Thursday said that nearly all the world's spam is spewed by a limited number of hard-core spammers within the U.S. . . .

Executive Conversation: Attacking the Phishing Threat - What Every Company Needs to Know

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

By now just about every person with an email inbox has been exposed to a phishing scam. Spoofs are showing up with alarming frequency and to make matters worse, criminals have upped the ante with increasingly sophisticated coding and graphics. Gone are the childishly misspelled emails from the High Prince of the Sudan. Advanced techniques leveraging secure phishing servers and high-quality reproductions have contributed to a lucrative criminal enterprise. . . .

CAN-SPAM Big Bust

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

LS: Some of you may remember that we at LinuxSecurity confidently predicted that the CAN-SPAM act was bound to fail. We might congratulate ourselves for this foresight, if only it weren't so obvious. No serious security or privacy expert thought that it stood a chance of reducing the volume of spam. Our question still remains: was CAN-SPAM really just a cover for Congress, so that they could pretend to be legislating against spam while instead doing the bidding of the Direct Marketing lobbyists? . . .

RIAA Subpoenas for John Does Valid

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A federal judge has handed a preliminary victory to the recording industry by granting its request to unmask anonymous file swappers accused of copyright infringement. U.S. District Judge Denny Chin ruled Monday that Cablevision, which provides broadband Internet access in Connecticut, New Jersey and New York, can be required to divulge the identities of its subscribers sued over copyright violations. . . .

RIAA Defends INDUCE Act; Explains Why It's No Betamax

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's not surprising that the RIAA would come out in defense of the INDUCE Act from Senator Hatch. They practically wrote the bill themselves. They had hoped to sneak it through without any debate, but a bunch of tech companies have stood up and pointed out how ridiculous this is. Meanwhile, plenty of others are showing what kinds of technology would be banned by the law. . . .

INDUCE Act targets P2P application creators

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

LS asks: if this happened in the early part of the last century, would we now be able to listen to popular music on the radio?US Senator Orrin Hatch (R-UT), a long-time ally of the RIAA and MPAA, has formally introduced the INDUCE Act to the US Senate Judiciary Committee. Following in the footsteps of the Pirate Act, the INDUCE Act would give the green light for copyright holders to sue the creators of peer-to-peer applications. . . .

E-Mail Snooping Ruled Permissible

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

LS: This story certainly appears at first glance to be a case of the court making a mind-numbingly stupid decision. However, the issues here are more subtle than they might first appear. The real issue is not that anyone thinks that email should not have privacy from random third parties, but rather that the law should be read to mean what it actually says. It can well be considered dangerous to allow arbitrary enforcement of laws in line with what they "should" have said, as opposed to what they do say. The best way to fix this is for wiretap privacy laws to be expanded to fit the modern age. Fortunately, if a bill preventing third parties from randomly reading each other's emails were brought before Congress, its hard to imagine that anyone would dare allow the record to show that they voted 'nay', so this situation seems fixable. . . .