Five Ways to Recognize Data Privacy Day

January 23, 2013 Added by:Allan Pratt, MBA

It is our responsibility, each and every one of us, to protect our data and our digital footprints, so here are five easy ways to recognize this annual event. But in order to be safe online on a regular basis, practice these activities on a monthly as opposed to annual basis...

Comments  (0)


How to Protect Your Privacy from Facebook's Graph Search

January 20, 2013 Added by:Electronic Frontier Foundation

Since Facebook removed the ability to remove yourself from search results altogether, we've put together a quick how-to guide to help you take control over what is featured on your Facebook profile and on Graph Search results...

Comments  (0)


Briefly on "The Network Use of Force Continuum"

January 08, 2013 Added by:Ali-Reza Anghaie

I have long said that history and legal precedent will eventually defend "hack back" techniques for those with well established procedures and some degree of market clout (e.g. DIB, Fortune 100s). I've even said, when discussing the Patriot Hacker "The Jester", that self-defense and stand-your-ground will almost certainly come into play and be successfully used in some legal context.

Comments  (0)


Turkey – Another story on use of fraudulent digital certificates

January 04, 2013 Added by:Pierluigi Paganini

It’s the news of the day, a fraudulent digital certificate that could be used for active phishing attacks against Google’s web properties. Using the certificate it is possible to spoof content in a classic phishing schema or perform a man-in-the-middle attack according Google Chrome Security Team and Microsoft experts.

Comments  (0)


How to get into your house through SmartTV

December 14, 2012 Added by:Pierluigi Paganini

Security experts posted a video that demonstrates how it is possible to attack a Samsung Smart TV exploiting a 0-day vulnerability to gain root access on it. The hacker could remotely wipe data from attached storage devices, monitoring and controlling the victim TV...

Comments  (0)


Mobile Devices get means for Tamper-Evident Forensic Auditing

December 13, 2012 Added by:Michelle Drolet

In order to detect security breaches and guarantee compliance, tamper “proofing” has not been sufficient. When it comes time for a forensic audit, the ability to detect unauthorized changes to digital files becomes invaluable in an investigation...

Comments  (0)


Warrantless Surveillance 101: Introducing EFF's New NSA Domestic Spying Guide

December 06, 2012 Added by:Electronic Frontier Foundation

On December 14th, we hope that the Northern District of California federal court will agree with us that our case challenging illegal domestic spying should move forward. Warrantless wiretapping isn't a state secret—it's a clear violation of FISA, other laws, and the Constitution...

Comments  (0)


TPP: Why it Matters in the USA

December 04, 2012 Added by:Electronic Frontier Foundation

We live in an interconnected world, and America's actions on the world stage affect us strongly here at home. Take action now to demand that the U.S. government open up the TPP drafts to the public, and that the government negotiate for your interests - not the entertainment companies'...

Comments  (0)


Social Media: Lightning Storm

December 03, 2012 Added by:Joel Harding

I worked for one company who wanted to get information out quickly to all their stakeholders. The problem was the company was mired in an unhealthy aversion to risk. Their mind-set was avoidance, whereas industry transitioned to risk mitigation. That company is doomed to fail...

Comments  (1)


How to turn any phone into a spy device with hardware hack

December 02, 2012 Added by:Pierluigi Paganini

Researcher Atul Alex has presented at the last edition of yhe International Malware Conference (MalCon) how it is possible to attack every mobile device with special hardware designed by using common electronic components...

Comments  (0)


Trading Away our Digital Rights: More Nations Join TPP

November 23, 2012 Added by:Electronic Frontier Foundation

As TPP talks trudge along with ever more Pacific nations participating in the meetings, our alarm over its intellectual property (IP) provisions has only grown. The IP language in this intricate trade agreement would harm users’ digital rights in profound ways, such as pressuring ISPs to become Internet cops...

Comments  (0)


Money Laundering Scenes In -The Digital World

November 20, 2012 Added by:gaToMaLo r. amores

By denying terrorist and criminals groups access to their money, authorities can stop them buying munitions and paying for suicide bombers. This approach has been highly successful in identifying and dismantling terrorist networks. Now they need to adapt and learn how this new DC works because it cannot be stopped...

Comments  (1)


New technologies raise serious doubts on privacy and security

November 12, 2012 Added by:Pierluigi Paganini

The major concerns are related to the use of cameras of video devices such as PC, mobile devices and TVs to identify the user and verify its rights for vision and of course to determine his habits with the purpose to pack it for the best offer in terms of contents...

Comments  (2)


Ubuntu Snafu: Privacy Is Hard, Let’s Go Shopping

November 10, 2012 Added by:Fergal Glynn

Amusingly, the plugin’s flood of attention means it is already racking up quite the bug count. For example, it does not currently do any NSFW prevention, and the results are returned in plaintext also. Have fun explaining that one to the ol’ boss-a-roni...

Comments  (0)


A Deep Dive into Facebook and Datalogix

November 06, 2012 Added by:Electronic Frontier Foundation

Facebook is partnering up with marketing company Datalogix to assess whether users go to stores in the physical world and buy the products they saw in Facebook advertisements. A lot of the reports aren’t getting into the nitty gritty of what data is actually shared between Facebook and Datalogix...

Comments  (0)


Please Don’t Tell Me You’re Still Using SSNs as IDs!

November 05, 2012 Added by:Rebecca Herold

I’ve been occasionally revisiting the topic of laws and regulations prohibiting the use of SSNs, most recently in 2008 when I identified over 45 U.S. federal and state laws regulating and often prohibiting, the use of SSNs as identifiers. I provide pointers at the end of this post to some other reports...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »