Privacy

0a8cae998f9c51e3b3c0ccbaddf521aa

Federating Identity by Twitter - Am I Just Too Paranoid?

June 29, 2011 Added by:Rafal Los

When I go to see my stats I get this lovely looking pop-up box asking me to provide my Twitter credentials, and telling me all about what capabilities this app will have once is has access to my profile. Maybe I'm just entirely too paranoid - but what to you think... would you allow this?

Comments  (1)

69dafe8b58066478aea48f3d0f384820

EFF Releases 'Know Your Digital Rights' Guide

June 28, 2011 Added by:Headlines

"Sometimes police can search your computer whether you like it or not, but sometimes they can't. We wrote this guide to help you tell the difference and to empower you to assert your rights when the police come knocking..."

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

You Can't Fight Google, So Embrace Google

June 20, 2011 Added by:Allan Pratt, MBA

When creating a Google Profile, you may be as comprehensive or as minimal as you wish. But, without a doubt, include your name, photo, gender, professional overview, and some links. Take control of your Google Profile – it actually feels empowering in this era of too little online control...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

EFF Files Amicus Brief on Digital Search Warrants

June 20, 2011 Added by:Headlines

The Electronic Frontier Foundation (EFF), along with the American Civil Liberties Union (ACLU) and ACLU Vermont, urged the Vermont Supreme Court to reject prosecutors' demands to override a judge's instructions and allow a limitless warrant for a computer search...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Get Digitally Secure Before it’s Mandatory

June 17, 2011 Added by:Robert Siciliano

It is possible to secure systems against most cybercrime but that level of security often proves too inconvenient for consumers. As long as banks continue absorbing losses from fraud, consumers remain blissfully ignorant of the consequences of inadequate security...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Disabling Facebook's Facial Recognition for Privacy

June 08, 2011 Added by:Headlines

What is truly annoying about Facebook's setup from a privacy perspective is that users have very little control over what other members post about them, particularly when it comes to photos and tagging, and the facial recognition feature further aggravates the situation...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Should Halt Suspicionless Searches at Border

June 01, 2011 Added by:Headlines

"The continual evolution in how people use electronic devices in their everyday lives creates growing tension between the Fourth Amendment guarantees and what historically has been viewed as a narrow exception to the requirements for probable cause and a warrant..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Enemy of the State

May 31, 2011 Added by:Infosec Island Admin

You have the right to privacy in your papers and your domicile, but does this actually apply to digital papers, computers, hard drives, and anything you pass over telco lines to the cloud? Or is it considered public domain like your trash being placed at the end of your driveway?

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

Freedom versus Security

May 31, 2011 Added by:Luis Corrons

In a few years’ time, besides protecting ourselves against cyber-attacks we will also have to look for mechanisms that guarantee our rights against government abuse of power. Some people are talking about the introduction of “Internet passports” to identify Internet users...

Comments  (60)

69dafe8b58066478aea48f3d0f384820

Researcher Nabs Details from 35 Million Google Profiles

May 26, 2011 Added by:Headlines

“I wrote a small bash script to download all the sitemap-NNN(N).txt files mentioned in that file, and attempted to download 10k, then 100k, than 1M and then, utterly surprised that my connection wasn't blocked or throttled or CAPTCHA'd, [downloaded] the rest of them..."

Comments  (0)

A6a8f6bad925fe4167d82a398acc0d10

ECPA Amendments Restrict Use of Geolocation Data

May 26, 2011 Added by:Stephen Gantz

The bill explicitly defines geolocation information as, "any information concerning the location of an electronic communications device that is in whole or in part generated by or derived from the operation or use of the electronic communications device..."

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Dutch ISP KPN Admits to Deep Packet Inspection

May 23, 2011 Added by:Don Eijndhoven

On may 10th of this year at an investor meeting KPN's Director of Mobile Marco Visser played a hefty game of braggadocio by openly admitting to the use of Deep Packet Inspection (DPI) on its networks and being the first operator in the world to do so...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Predators Using Social Media to Stalk Kids

May 23, 2011 Added by:Robert Siciliano

With the openness of social media, predators know what a kid likes, doesn’t like, who their friends are, and often their phone numbers, where they live, go to school, sports teams they play on etc. The list goes on and on...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Las Vegas Wants to be Your Friend on Facebook

May 23, 2011 Added by:Rafal Los

Sadly, as your privacy shrinks - or as you give more and more of it away - the possibility of that crazy night in "Sin City" will follow you not just to work on Monday, but maybe to the next time a hacker is trying to penetrate your applications attack surface...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

EFF Seeks Answers About Secret FBI Surveillance

May 20, 2011 Added by:Headlines

"Even officials within the Justice Department itself are concerned that the FBI's secret legal theory jeopardizes privacy and government accountability, especially considering the FBI's demonstrated history of abusing surveillance law," said EFF Senior Staff Attorney Kevin Bankston...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Loyalty Cards vs. Privacy Concerns

May 13, 2011 Added by:Allan Pratt, MBA

When stores or restaurants offer a loyalty card, in exchange, the customer is asked to provide name, telephone number, email address, snail mail address, and possibly other defining characteristics or shopping preferences. But what happens to my confidential information?

Comments  (0)

Page « < 13 - 14 - 15 - 16 - 17 > »