Browsing Tag: Privacy

Categories: Government

[img_assist|nid=898|title=|desc=|link=none|align=left|width=100|height=100]An unidentified man breached airport security at Newark Airport on Sunday, walking into the secured area through the exit, prompting an evacuation of a terminal and flight delays that continued into the next day. This problem isn’t common, but it happens regularly. The result is always the same, and it’s not obvious that fixing the problem is the right solution.

Read more...

Categories: Uncategorized

[img_assist|nid=2075|title=|desc=|link=none|align=left|width=100|height=100]Facebook was built as a powerful social connector, allowing users to befriend others with similar interests, locations, schools, and more. But as privacy concerns mount and users demand more protection, the social networking site’s philosophy has started to go down the toilet. Now that Facebook is eliminating regional networks — or groupings of people based on where they live — it’s becoming apparent that proclivities lean towards building fences rather than crossing them. Read the full story [PCWorld].  Also see: How to protect your privacy on Facebook and Twitter.

Read more...

Categories: Cryptography, Government

[img_assist|nid=1831|title=|desc=|link=none|align=left|width=115|height=115]Technologists already are worried about the security implications of linking nearly all elements of the U.S. power grid to the public Internet. Now, privacy experts are warning that the so-called “smart grid” efforts could usher in a new class of concerns, as utilities begin collecting more granular data about consumers’ daily power consumption. Read the full article. [Washington Post]

Read more...

Categories: Uncategorized

[img_assist|nid=1595|title=|desc=|link=none|align=left|width=115|height=115]A team of Catalan researchers has developed a protocol to distort the
user profile generated by Internet search engines, in such a way that
they cannot save the searches undertaken by Internet users and thus
preserve their privacy.  Read the full story [Science Daily]

Read more...

Categories: Malware

How
quaint seem the days when naïve hacker wannabes phished PayPal logons,
then posted them on IRC chat channels, to try to make a few bucks — but
mostly for bragging rights. That was circa 2002-2003.[img_assist|nid=1218|title=|desc=|link=none|align=left|width=100|height=100]
Fast forward to the present. At this moment, Facebook is being blanketed by two high-volume email phishing campaigns.  Read the full story [Byron Acohido/Last Watchdog]

Read more...

Categories: Uncategorized

[img_assist|nid=597|title=|desc=|link=none|align=left|width=115|height=115]Guest editorial by Eugene KasperskyThere seems to be quite a loud
response to what I thought was a rather simple idea. In this post, I am
going to go over the main points – somewhere when I have more time I’ll
share my ideas in detail so people could see exactly what I am
proposing.

Read more...

Categories: Uncategorized

Google Voice Mails have been discovered in Google’s search engine, providing audio files, names, and phone [img_assist|nid=512|title=|desc=|link=none|align=right|width=115|height=115]number as if you were logged in and checking your own voice mail. Some appear to be test messages, while others are clearly not.

Read more...