[img_assist|nid=2521|title=|desc=|link=none|align=left|width=100|height=100]The security researcher who created the MySpace XSS worm in 2005 has developed a technique that enables an attacker to accurately locate a Web user with GPS coordinates, without using IP-based geolocation.
Browsing Tag: Privacy
[img_assist|nid=898|title=|desc=|link=none|align=left|width=100|height=100]An unidentified man breached airport security at Newark Airport on Sunday, walking into the secured area through the exit, prompting an evacuation of a terminal and flight delays that continued into the next day. This problem isn’t common, but it happens regularly. The result is always the same, and it’s not obvious that fixing the problem is the right solution.
[img_assist|nid=2075|title=|desc=|link=none|align=left|width=100|height=100]Facebook was built as a powerful social connector, allowing users to befriend others with similar interests, locations, schools, and more. But as privacy concerns mount and users demand more protection, the social networking site’s philosophy has started to go down the toilet. Now that Facebook is eliminating regional networks — or groupings of people based on where they live — it’s becoming apparent that proclivities lean towards building fences rather than crossing them. Read the full story [PCWorld]. Also see: How to protect your privacy on Facebook and Twitter.
[img_assist|nid=1831|title=|desc=|link=none|align=left|width=115|height=115]Technologists already are worried about the security implications of linking nearly all elements of the U.S. power grid to the public Internet. Now, privacy experts are warning that the so-called “smart grid” efforts could usher in a new class of concerns, as utilities begin collecting more granular data about consumers’ daily power consumption. Read the full article. [Washington Post]
[img_assist|nid=1595|title=|desc=|link=none|align=left|width=115|height=115]A team of Catalan researchers has developed a protocol to distort the
user profile generated by Internet search engines, in such a way that
they cannot save the searches undertaken by Internet users and thus
preserve their privacy. Read the full story [Science Daily]
quaint seem the days when naïve hacker wannabes phished PayPal logons,
then posted them on IRC chat channels, to try to make a few bucks — but
mostly for bragging rights. That was circa 2002-2003.[img_assist|nid=1218|title=|desc=|link=none|align=left|width=100|height=100]
Fast forward to the present. At this moment, Facebook is being blanketed by two high-volume email phishing campaigns. Read the full story [Byron Acohido/Last Watchdog]
This Google TechTalk features Aleecia McDonald of Carnegie Mellon University discussing how we arrived at the current state of online privacy and how self-regulation works in practice.
[img_assist|nid=597|title=|desc=|link=none|align=left|width=115|height=115]Guest editorial by Eugene KasperskyThere seems to be quite a loud
response to what I thought was a rather simple idea. In this post, I am
going to go over the main points – somewhere when I have more time I’ll
share my ideas in detail so people could see exactly what I am
Google Voice Mails have been discovered in Google’s search engine, providing audio files, names, and phone [img_assist|nid=512|title=|desc=|link=none|align=right|width=115|height=115]number as if you were logged in and checking your own voice mail. Some appear to be test messages, while others are clearly not.