Freedom versus Security

May 31, 2011 Added by:Luis Corrons

In a few years’ time, besides protecting ourselves against cyber-attacks we will also have to look for mechanisms that guarantee our rights against government abuse of power. Some people are talking about the introduction of “Internet passports” to identify Internet users...

Comments  (60)


Researcher Nabs Details from 35 Million Google Profiles

May 26, 2011 Added by:Headlines

“I wrote a small bash script to download all the sitemap-NNN(N).txt files mentioned in that file, and attempted to download 10k, then 100k, than 1M and then, utterly surprised that my connection wasn't blocked or throttled or CAPTCHA'd, [downloaded] the rest of them..."

Comments  (0)


ECPA Amendments Restrict Use of Geolocation Data

May 26, 2011 Added by:Stephen Gantz

The bill explicitly defines geolocation information as, "any information concerning the location of an electronic communications device that is in whole or in part generated by or derived from the operation or use of the electronic communications device..."

Comments  (0)


Dutch ISP KPN Admits to Deep Packet Inspection

May 23, 2011 Added by:Don Eijndhoven

On may 10th of this year at an investor meeting KPN's Director of Mobile Marco Visser played a hefty game of braggadocio by openly admitting to the use of Deep Packet Inspection (DPI) on its networks and being the first operator in the world to do so...

Comments  (0)


Predators Using Social Media to Stalk Kids

May 23, 2011 Added by:Robert Siciliano

With the openness of social media, predators know what a kid likes, doesn’t like, who their friends are, and often their phone numbers, where they live, go to school, sports teams they play on etc. The list goes on and on...

Comments  (0)


Las Vegas Wants to be Your Friend on Facebook

May 23, 2011 Added by:Rafal Los

Sadly, as your privacy shrinks - or as you give more and more of it away - the possibility of that crazy night in "Sin City" will follow you not just to work on Monday, but maybe to the next time a hacker is trying to penetrate your applications attack surface...

Comments  (1)


EFF Seeks Answers About Secret FBI Surveillance

May 20, 2011 Added by:Headlines

"Even officials within the Justice Department itself are concerned that the FBI's secret legal theory jeopardizes privacy and government accountability, especially considering the FBI's demonstrated history of abusing surveillance law," said EFF Senior Staff Attorney Kevin Bankston...

Comments  (0)


Loyalty Cards vs. Privacy Concerns

May 13, 2011 Added by:Allan Pratt, MBA

When stores or restaurants offer a loyalty card, in exchange, the customer is asked to provide name, telephone number, email address, snail mail address, and possibly other defining characteristics or shopping preferences. But what happens to my confidential information?

Comments  (0)


FBI Surveillance: If We Told You, You Might Sue

May 12, 2011 Added by:Headlines

"These businesses would be substantially harmed if their customers knew that they were furnishing information to the FBI. The stigma of working with the FBI would cause customers to cancel the companies' services and file civil actions to prevent further disclosure of subscriber information..."

Comments  (0)


Mozilla Defies DHS Internet Censorship Request

May 09, 2011 Added by:Headlines

Mozilla, the non-profit company behind the Firefox Web browser, has initially refused a Department of Homeland Security request to remove a third-party tool that allows users to circumvent government URL blocking efforts...

Comments  (0)


Assange Claims Automated Intelligence Gathering on Facebook

May 04, 2011 Added by:Headlines

"Facebook, Google, Yahoo – all these major US organizations have built-in interfaces for US intelligence. It’s not a matter of serving a subpoena. They have an interface that they have developed for US intelligence to use..."

Comments  (0)


Docs Provide Details on FBI's Surveillance Spyware

May 03, 2011 Added by:Headlines

The documents do not specifically discuss how the Computer and Internet Protocol Address Verifier software is installed on target computers, but previous reports indicate that the tool may be distributed via browser vulnerabilities similar to those exploited by malicious malware...

Comments  (0)


NSTIC: Questions I'd be Asking

May 01, 2011 Added by:Keith Mendoza

The NSTIC is still in its infancy. However, the White House is aggressively pushing for its implementation, and we will be seeing the Identity Ecosystem pretty soon. I just hope that these very basic questions are answered in a convincing way when that time comes...

Comments  (0)


Cookies and Your Privacy: Past, Present and Future

April 24, 2011 Added by:Theresa Payton

If restrictions to cookies become common place on the internet, the Internet Advertising Bureau will be forced to make major changes to the way they obtain information about internet users. This could alter the entire structure of internet advertising as we know it today...

Comments  (0)


Obama Outlines Strategy for Trusted Identities in Cyberspace

April 18, 2011 Added by:Headlines

This is NOT a government-mandated, national ID program; in fact, it's not an identity 'program' at all. This is a call by the administration to the private sector to step up, take leadership of this effort and provide the innovation to implement a privacy-enhancing, trusted system...

Comments  (0)


Representative Introduces Consumer Privacy Protection Act

April 18, 2011 Added by:Headlines

The legislation will define limits and the fair use of information collected by online marketers and retailers, and set forth provisions for better notifying consumers of their right to opt out of data collection...

Comments  (0)

Page « < 14 - 15 - 16 - 17 - 18 > »