List Headline Image
Updated by Shahid Sharif on Oct 21, 2017
 REPORT
22 items   4 followers   0 votes   450 views

Security, Compliance & Privacy

All about protecting yourself on the internet

Disruptions: So Many Apologies, So Much Data Mining

Last week, Arun Thampi, a programmer in Singapore, discovered that the mobile social network Path was surreptitiously copying address book information from users' iPhones without notifying them. David Morin, Path's voluble chief executive, quickly commented on Mr. Thampi's blog that Path's actions were an "industry best practice."

Electronic Security a Worry in an Age of Digital Espionage

He leaves his cellphone and laptop at home and instead brings "loaner" devices, which he erases before he leaves the United States and wipes clean the minute he returns. In China, he disables Bluetooth and Wi-Fi, never lets his phone out of his sight and, in meetings, not only turns off his phone but also removes the battery, for fear his microphone could be turned on remotely.

Somebody Watching Me: Social Media and Privacy - Blogcritics Sci/Tech

Every day we hear news about the privacy concerns of social media. Nothing you do online is truly anonymous. Even proxy servers, which are made to mask your IP address, are easily traced when they need to be.

How Paranoid Should I Be About Trusting Companies With My Personal Data?

Dear Lifehacker, I understand that signing up for "free" services like Gmail and Facebook require that I put my trust in a company and provide them with quite a bit of personal data. I know that data is supposed to be kept private, but with the amount of information and web activity that's tracked every day I'm started to worry.

How to avoid being tagged as a terrorist: Don't pay cash for coffee

February 10, 2012, 2:35 PM - It's difficult to figure out where you stand in the eyes of the law these days TSA, the Dept.

Will the PCI Standard lose relevance in the Mobile World?

Avivah Litan VP Distinguished Analyst 12 years at Gartner 30 years IT industry Avivah Litan is a Vice President and Distinguished Analyst in Gartner Research. Her area of expertise includes financial fraud, authentication, access management, identity proofing, identity theft, fraud detection and prevention applications…Read Full BioCoverage Areas: by Avivah Litan | February 13, 2012 | Submit a Comment Did I miss something?

Twitter stores full iPhone contact list for 18 months, after scan

Twitter Inc. has acknowledged that after mobile users tap the "Find friends" feature on its smartphone app, the company downloads users' entire address book, including names, email addresses and phone numbers, and keeps the data on its servers for 18 months.

EFF: Tens of thousands of websites' SSL "offers effectively no security" - Boing Boing

By Cory Doctorow at 10:39 pm Tuesday, Feb 14 The Electronic Frontier Foundation's SSL Observatory is a research project that gathers and analyzes the cryptographic certificates used to secure Internet connections, systematically cataloging them and exposing their database for other scientists, researchers and cryptographers to consult.

From encryption to darknets: As governments snoop, activists fight back

As the Arab Spring hits its first anniversary, tech activists around the globe are continuing their efforts to enable secure communications-especially in areas of the world that are in conflict or transition.

Apple Questioned by Congress on iPhone App Privacy - Forbes

Apple received a letter from Congress today, asking CEO Tim Cook to answers questions by Feb. 29 about how its app developers handle the privacy of iPhone users. It's in response to last week's news that Path, a social networking app, was caught by blogger Arun Thampi collecting address book [...]

FBI says social media monitoring won't infringe privacy rights

February 14, 2012 12:35 PM ET Computerworld - The FBI today said that its proposed plans to monitor social media sites as part of a broader strategy to improve real-time situation awareness will be fully vetted by the agency's Privacy and Civil Liberties Unit.

Online surveillance bill may breach privacy law, charter - Technology & Science - CBC News

A new bill that would require telecommunications providers to give police subscriber information without a warrant will likely be challenged in the courts if crucial changes aren't made, critics say. "A court challenge, I think will be inevitable, if this law passes as is," said University of Ottawa law professor Michael Geist, who holds a Canada Research Chair in internet and e-commerce law.

Facebook Is Tracking Your Every Move on the Web; Here's How to Stop It

Over the weekend, Dave Winer wrote an article at Scripting.com explaining how Facebook keeps track of where you are on the web after logging in, without your consent. Nik Cubrilovic dug a little deeper, and discovered that Facebook can still track where you are, even if you log out.

Android app permissions - How Google gets it right ... | Android Central

There's been a lot of news lately about a lapse in either security or judgment -- both, really -- at Apple that allows iOS applications to borrow your contact data and send it off to parts unknown without your consent. Apple has addressed the issue to members of the U.S.

Is cyberwar hype fuelling a cybersecurity-industrial complex? — RT

The raid that ravaged Megaupload was just the start. A powerful trade group that lists the biggest names in the entertainment biz as its members has called-out dozens of countries in their latest report and is insisting on sanctions against them.

Flash Zero-Day Used In Targeted Email Attacks - Dark Reading

Dark Reading is the premier online resource helping information security professionals manage the balance between protection and access. It offers breaking news and analysis on attacks, breaches and vulnerabilities, as well as strategies for protecting enterprise data. It also offers guidance on setting risk management and compliance policies.

Lawmaker Demands DHS Cease Monitoring Blogs, Social Media

Rep. Jackie Speier (D-California) said Thursday she wants the Department of Homeland Security to cease its social-media and news-monitoring operation.

Google Falsely Flagged as Malware by Microsoft

The world's most popular search engine was falsely identified by Microsoft as malware for four hours on Valentine's Day due to a faulty software security update, leaving many frustrated Internet Explorer users unable to access Google. The false positive affected searchers in the U.S., Middle East, Australia, New Zealand, and Denmark, according to ZDNet.

FBI cuts back on GPS surveillance after Supreme Court ruling

WASHINGTON - The FBI has begun cutting back GPS surveillance in an array of criminal and intelligence investigations following a Supreme Court ruling last month restricting its use, a federal law enforcement official said. The bureau began implementing the change the day after the Jan.

Google allegedly bypassed privacy settings to track user browsing in Safari

The Wall Street Journal reports that Google has been bypassing privacy settings in Safari intended to block websites from tracking user activity across the Internet. Stanford researcher Jonathan Mayer discovered that Google had been implementing code that bypasses Safari's user-determined privacy settings, and the Journal's own researcher independently confirmed Mayer's findings.

Defensive Security Podcast

Information Security Podcast

Defensive Security Podcast

Information Security Podcast