Blog Posts Tagged with "Privacy"

7ddc1f3000a13e4dfec28074e9e7b658

FBI’s Facial Recognition is Coming to a State Near You

August 07, 2012 Added by:Electronic Frontier Foundation

The FBI wants to be able to search and identify people in photos of crowds and in pictures posted on social media sites—even if the people in those photos haven’t been arrested for or even suspected of a crime. The FBI may also want to incorporate those crowd or social media photos into its face recognition database...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Do You Use Foursquare?

August 05, 2012 Added by:Allan Pratt, MBA

If we don’t continue to raise issues about online privacy and security, websites and their companies’ leadership will continue to demand access to our confidential information under the pretense of doing business, or in scarier terms, doing business as usual. One website that causes concern is Foursquare...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Chimps With Guns and the Bloggers Who Give Them Ammo

August 02, 2012 Added by:Infosec Island Admin

One must know the technology and the problems with it before using it cognizantly. This unfortunately is not the case in what is being advocated by Quinn Norton on Wired with regard to Cryptocat. Specifically where she makes declamations about overthrowing governments with things like untested crypto schemes...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Why the NSA Can’t Be Trusted to Run Cybersecurity Programs

August 01, 2012 Added by:Electronic Frontier Foundation

Senators John McCain and Kay Bailey Hutchison have proposed amendments that would hand the reins of our nation’s cybersecurity systems to the NSA. The agency's dark history, flouting of domestic law, and resistance to transparency makes it clear that the nation's cybersecurity should not be in its hands...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

EU Weighs in on Face Recognition Applications

July 29, 2012 Added by:Electronic Frontier Foundation

Face recognition in online applications is particularly problematic as personal data is sometimes used out of context by employers and law enforcement. Therefore, European privacy officials’ opinion recommending various practices for these applications could not have come at a better time...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Losing Trust: Canadian Data Breach Spotlights Human Error

July 27, 2012 Added by:Kelly Colgan

It’s not just about protecting ourselves from identity theft or fraud like when our account number or government-issued ID numbers are exposed. It’s what I like to call privacy for the sake of privacy. Just knowing that someone could be looking at our personal histories doesn’t sit well with the public...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

New Cybersecurity Bill Patches Serious Vulnerabilities

July 24, 2012 Added by:Electronic Frontier Foundation

We remain unpersuaded that any of the proposed cybersecurity measures are necessary and we still have concerns about certain sections of the bill, especially the sections on monitoring and countermeasures. But this was a big step in the direction of protecting online rights...

Comments  (0)

D03c28fd5a80c394905c980ee1ecdc88

Take Social Media Privacy into Your Own Hands

July 23, 2012 Added by:Bill Mathews

I've gotten in a lot of arguments lately about the end-user side of technology - privacy. Many in the security industry already know most of the things people are discovering, and have screamed warnings from the mountaintops to the folks below. Alas, this is the woe of being a security engineer...

Comments  (1)

68b48711426f3b082ab24e5746a66b36

Between You and Me, This is Not Private...

July 22, 2012 Added by:Fergal Glynn

If most websites can’t get password storage right, you can bet they can’t get storage of the content you are trusting them with right either. The private documents that you stored with your favorite cloud service are probably not encrypted in a way that only your account can decrypt, if they’re encrypted at all...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Ad Biz Disregards User Choices to Safeguard "Cybersecurity"

July 19, 2012 Added by:Electronic Frontier Foundation

Senator Rockefeller was skeptical about the industry’s claims that they needed to engage in pervasive tracking for cybersecurity purposes. He stated: “I just want to declare the whole cybersecurity matter a total red herring.” We agree that strong cybersecurity does not necessitate surveillance of our browsing habits...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Cybersecurity, Scare Tactics, and Sacrificing Privacy

July 13, 2012 Added by:Electronic Frontier Foundation

Efforts to break the partisan stalemate over the Cybersecurity Act, a bill that would allow Internet companies to monitor the communications of users and pass that data to the government without any judicial oversight, have backers of the bill attempting to drum up fears about catastrophic cyberattacks...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

No Data Retention Mandate in Smith’s New Legislation

July 12, 2012 Added by:Electronic Frontier Foundation

A controversial, anti-privacy data retention mandate is notably absent from the child protection bill recently introduced by Rep. Lamar Smith. Smith had previously introduced H.R. 1981, which would have mandated that ISPs collect and maintain data on Internet users not suspected of any crime...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FCC Seeks Public Comment on Mobile Data Collection Policies

July 10, 2012 Added by:David Navetta

The FCC revived an inquiry first launched in 2007 to investigate telecom carriers’ practices regarding the privacy and security of information stored on mobile communications devices, prompted by the recent controversy in which software installed on mobile phones was shown to be collecting data from customers...

Comments  (1)

37d5f81e2277051bc17116221040d51c

What Does it Take to be Digitally Secure?

July 09, 2012 Added by:Robert Siciliano

It’s no longer possible to deny that your life in the physical world and your digital life are one and the same. While you are present here on the ground, you also exist online, whether you know it or like it or not. Coming to terms with this reality will help you make better decisions in many aspects of your life...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Law Enforcement Sought 1.3 Million Cell Phone Records in 2011

July 09, 2012 Added by:Headlines

“Law enforcement agencies are looking for a needle, but what are they doing with the haystack? We need to know how law enforcement differentiates between records of innocent people, and those that are subjects of investigation, as well as how it handles, administers, and disposes of this information..."

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Should Businesses Be Able to Google Customers?

July 08, 2012 Added by:Allan Pratt, MBA

It should come as no surprise that businesses are taking advantage of the public’s fascination of placing their day-to-day activities on social networking sites. This may seem inappropriate and offensive, and it might be – but for the moment, it’s not illegal. We have only ourselves to blame...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »