Browsing Tag: Privacy

Categories: Cryptography, Government

[img_assist|nid=1831|title=|desc=|link=none|align=left|width=115|height=115]Technologists already are worried about the security implications of linking nearly all elements of the U.S. power grid to the public Internet. Now, privacy experts are warning that the so-called “smart grid” efforts could usher in a new class of concerns, as utilities begin collecting more granular data about consumers’ daily power consumption. Read the full article. [Washington Post]

Read more...

Categories: Uncategorized

[img_assist|nid=1595|title=|desc=|link=none|align=left|width=115|height=115]A team of Catalan researchers has developed a protocol to distort the
user profile generated by Internet search engines, in such a way that
they cannot save the searches undertaken by Internet users and thus
preserve their privacy.  Read the full story [Science Daily]

Read more...

Categories: Malware

How
quaint seem the days when naïve hacker wannabes phished PayPal logons,
then posted them on IRC chat channels, to try to make a few bucks — but
mostly for bragging rights. That was circa 2002-2003.[img_assist|nid=1218|title=|desc=|link=none|align=left|width=100|height=100]
Fast forward to the present. At this moment, Facebook is being blanketed by two high-volume email phishing campaigns.  Read the full story [Byron Acohido/Last Watchdog]

Read more...

Categories: Uncategorized

[img_assist|nid=597|title=|desc=|link=none|align=left|width=115|height=115]Guest editorial by Eugene KasperskyThere seems to be quite a loud
response to what I thought was a rather simple idea. In this post, I am
going to go over the main points – somewhere when I have more time I’ll
share my ideas in detail so people could see exactly what I am
proposing.

Read more...

Categories: Uncategorized

Google Voice Mails have been discovered in Google’s search engine, providing audio files, names, and phone [img_assist|nid=512|title=|desc=|link=none|align=right|width=115|height=115]number as if you were logged in and checking your own voice mail. Some appear to be test messages, while others are clearly not.

Read more...

Categories: Web Security

We recently conducted a project focused on confidential data security [enterprisestrategygroup.com] that will be published soon. However, here are some interesting advance results that support this venerable security dictum. ESG asked 308 North American and European security professionals from large organizations (i.e. 1,000 employees or more) a number of questions about data security risks, policies, and technology safeguards. When asked to define the most important measures for protecting confidential data, nearly half of all respondents said, “communicating and training users on confidential data security policies.” This was the top response followed by, “physical security,” and “access controls for private data.”

Read more...