Blog Posts Tagged with "EFF"

7ddc1f3000a13e4dfec28074e9e7b658

Fake YouTube Site Targets Activists with Malware

March 17, 2012 Added by:Electronic Frontier Foundation

The fake YouTube page attacks users in two ways: it requires you to enter your YouTube login credentials in order to leave comments, and it installs malware disguised as an Adobe Flash Player update. To see if you have been infected, look for the following files...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

Ubuntu 12.04 Will Bring OS-Level Security Options

March 14, 2012 Added by:Electronic Frontier Foundation

In the upcoming release on April 26, Ubuntu 12.04 is introducing operating system-wide settings that let you delete portions of your activity log, disable logging for specific types of files and applications, or disable activity logging altogether...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

A Tale of Two Encryption Cases

March 12, 2012 Added by:Electronic Frontier Foundation

The issue in the decryption cases is not whether the decrypted contents of the computer are testimonial. Instead, the issue in these cases is whether the ACT of decrypting information on the computer is testimonial. The answer to that question is that it depends...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

HTTPS and Tor: Working to Protect Your Security Online

March 09, 2012 Added by:Electronic Frontier Foundation

EFF frequently recommends that Internet users who are concerned about protecting their anonymity and security online use HTTPS Everywhere, which encrypts your communications with many websites, in conjunction with Tor, which helps to protect your anonymity online...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

EFF to European Parliament: Protect Coders’ Rights

March 05, 2012 Added by:Electronic Frontier Foundation

EFF asked Parliament to protect the rights of researchers and whistleblowers. In the course of fixing a problem they could inadvertently violate laws and by reporting a vulnerability researchers could risk exposure to a lawsuit or criminal investigation...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

Google Circumvents Browser Privacy - Why We Need Do Not Track

February 26, 2012 Added by:Electronic Frontier Foundation

One way that Google can prove itself as a good actor is by providing meaningful ways for users to limit what data is collected. It’s time Google's third-party web servers start respecting Do Not Track requests, and time for Google to offer a built-in Do Not Track option...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

A Better Path for Applications: Respecting Users

February 20, 2012 Added by:Electronic Frontier Foundation

Even with industry standard security practices in place, data is still vulnerable to a breach or a subpoena. Companies collecting personal data have an obligation to keep as little personally identifiable data as necessary to provide their services...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Researchers Discover Widespread Cryptographic Vulnerabilities

February 15, 2012 Added by:Electronic Frontier Foundation

The consequences of these vulnerabilities are extremely serious. In all cases, a weak key would allow an eavesdropper on the network to learn confidential information, such as passwords or the content of messages, exchanged with a vulnerable server...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

What Actually Changed in Google’s Privacy Policy

February 14, 2012 Added by:Electronic Frontier Foundation

Google did a great job of informing users that the privacy policy had been changed through emails and notifications. Unfortunately, while the policy might be easier to understand, Google did a less impressive job of publicly explaining what in the policy had actually been changed...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

We Have Every Right to be Furious about ACTA

February 13, 2012 Added by:Electronic Frontier Foundation

While ACTA was only negotiated between a few countries, it has global consequences. First because it will create new rules for the Internet, and second because its standards will be applied to other countries through the U.S.’s annual Special 301 process...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Department of Justice Misdirection on Cloud Computing

February 08, 2012 Added by:Electronic Frontier Foundation

The DOJ has been unequivocal that cloud users have no right to challenge government access to "non-content" information held by Cloud systems - their location, their contacts, their communications patterns and more. Lawyers call this the "third party problem"...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Disappointing Ruling in Compelled Laptop Decryption Case

February 01, 2012 Added by:Electronic Frontier Foundation

A federal district court has handed down an unfortunate early ruling in a case. Prosecutors asked the court to force the defendant to either type an encryption passphrase into the laptop to decrypt the information or turn over a decrypted version of the data...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Concerns About the New AOL Instant Messenger

January 25, 2012 Added by:Electronic Frontier Foundation

The new preview version of AOL Instant Messenger raised concerns for us when it was first introduced, first because it started storing more logs of communications and second, because it apparently scanned all private IMs for URLs and pre-fetched any URLs found in them...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Mandatory Data Retention, Smart Meter Hacks and Silent SMS

January 23, 2012 Added by:Electronic Frontier Foundation

Silent SMS delivers a text message without the user being aware, but leads to the creation of a log with the cell phone company that reveals what cell phone towers the phone was closest to, revealing the phone’s location to help with tracking...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

Internet-Wide Protests Against the Blacklist Legislation

January 18, 2012 Added by:Electronic Frontier Foundation

The SOPA and PIPA blacklist bills are dangerous: if made into law, they would hamper innovation, kill jobs, wreak havoc on Internet security, and undermine the free speech principles upon which our country was founded...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

SOPA/PIPA: The Internet Goes to Washington on January 18

January 13, 2012 Added by:Electronic Frontier Foundation

Representative Darrell Issa, an outspoken SOPA critic and the author of alternative legislation called the OPEN Act, has announced that Congress will hold a hearing to hear from actual technical experts, technology job creators, Internet investors and legal scholars...

Comments  (0)

Page « < 1 - 2 > »