Explore Technology Certificate Programs That Fit Your Needs /// Click here to learn more.
Welcome Guest | Sign In
LinuxInsider.com
Russian Gang's Credentials Theft Exposes Web's Wild, Wild West Side
August 12, 2014
News that a Russian gang has stockpiled more than a billion purloined user name and password combinations has revved up the Internet's reputation as a post industrial Wild, Wild West. Just how much havoc will be raised by the gang remains to be seen. The data thieves so far appear content to use their ill-gotten trove for spamming, according to Hold Security, which discovered the credential cache.
Wikimedia Blasts Europe's 'Right to Be Forgotten'
August 06, 2014
The Wikimedia Foundation has released its first-ever transparency report -- and along with it a protest against Europe's "right to be forgotten" law. Wikimedia is the nonprofit owner of Wikipedia and other sites. "Denying people access to relevant and neutral information runs counter to the ethos and values of the Wikimedia movement," wrote Wikimedia attorneys Geoff Brigham and Michelle Paulson.
Cops Snag Child Pornography Suspect, Thanks to Gmail Scan
August 04, 2014
A routine scan of a Texas man's Gmail by Google has led to his arrest on child pornography possession and promotion charges. John Henry Skillern, 41, of Houston was arrested by police July 30 following a tip by Google to the National Center for Missing and Exploited Children. He has been charged with one count each of child pornography possession and child pornography promotion.
Federal Judge Unswayed by Microsoft's Objections to Data Demands
August 04, 2014
Microsoft's objections to a court order requiring it to turn over a customer's emails held on a server in Ireland have been rejected. Judge Loretta Preska of the U.S. District Court for the Southern District of New York last week issued an oral ruling in the case, reportedly saying the Electronic Communications Privacy Act of 1996 authorizes such extraterritorial collections of data.
Tor Has Been Breached - What Now?
August 01, 2014
News that two Carnegie-Mellon CERT researchers have developed an inexpensive way to breach the Tor network has the project, privacy advocates, and probably criminals who use the network equally concerned. The Tor Project posted has advised relays to upgrade to Tor 0.2.r.23e or 0.2.5.6-alpha to close the protocol vulnerability used by the researchers.
Facebook Staring at Fresh Privacy Class Action
August 01, 2014
Facebook is set for another legal battle over privacy, with a fresh class-action lawsuit fired up against the company. The legal action is the brainchild of Austrian law student Max Schrems, a noted campaigner against Facebook's treatment of user privacy. Schrems called on adult Facebook users around the world to join his suit after he filed a complaint in Vienna's commercial court.
Russia Cites Surveillance Concerns in Apple, SAP Source Code Demands
July 31, 2014
Russia wants Apple and SAP to turn over their source code in yet another instance of fallout resulting from leaks about NSA surveillance activities. The suggestion reportedly came last week, when Communications Minister Nikolai Nikiforov met with executives of the two companies: Peter Nielsen, Apple's general manager in Russia; and Vyacheslav Orekhov, SAP's managing director in Russia.
Leahy Bill Aims to Rein In Government Snooping
July 30, 2014
Government snooping on Americans would be curtailed under a bill introduced Tuesday in the U.S. Senate. The measure, sponsored by Senate Judiciary Chairman Patrick Leahy, D-Vt., would ban bulk collection of domestic information, limit the scope of searches by government agencies, and add transparency and reporting requirements. Further, it would reform procedures of the FISA Court.
OkCupid's Confessed Hijinks Get Thumbs-Down
July 29, 2014
OkCupid has admitted carrying out psychological experiments on its users. Because OkCupid doesn't really know what it's doing, it needs to experiment to see what works and what doesn't, according to cofounder Christian Rudder. Every Internet company needs to test different things with users, and website visitors are subjected to "hundreds of experiments," he argued. "That's how websites work."
BlackBerry Picks Secusmart to Tighten Mobile Security
July 29, 2014
BlackBerry on Tuesday announced plans to acquire Secusmart, a developer of high-security voice and data encryption and anti-eavesdropping technologies. Mobile devices increasingly are being used for more critical tasks and to store more critical information, noted CEO John Chen. "The acquisition of Secusmart underscores our focus on addressing growing security costs and threats."
Chinese Turn the Screws on Microsoft
July 28, 2014
China is ramping up its campaign against Microsoft, following its ban in May on the installation of Windows 8 on government computers. Officials of China's State Administration for Industry & Commerce reportedly have made unannounced visits to Microsoft offices in Beijing, Shanghai, Guangzhou and Chengdu. They apparently questioned staff in at least one office.
Do Facebook Searches to Show Disability Fraud Violate the Constitution?
July 28, 2014
Looking for evidence of disability fraud, the district attorney for Manhattan last year obtained 381 search warrants and served them on Facebook as part of a long-term investigation into a massive scheme. The search warrants were "sealed," which means they were not made public. Ultimately, 106 former New York police and firefighters were arrested.
Google to Search for the Meaning of Health
July 25, 2014
Google is seeking 175 volunteers from whom it will collect bodily samples in an effort to create their biochemical fingerprints and establish the baseline for a healthy body. The Baseline study, to be run by Google X labs, will seek to connect traditional clinical observations of health, such as diet -- or habits, such as smoking -- with molecular-level changes.
Black Hat Tor-Busting Talk Nixed
July 22, 2014
The Tor Project is working to remedy a vulnerability in its anonymity software following the sudden cancellation of a talk at next month's Black Hat security conference in Las Vegas that would have revealed it. The planned talk would have demonstrated a way to unmask users of Tor, the privacy-minded Web browsing software. CMU researcher Alexander Volynkin was to deliver the briefing.
iOS Insecurity - Designed by Apple?
July 22, 2014
The long-held belief that Android is the least secure of mobile OSes was shattered by security researcher and expert iOS hacker Jonathan Zdziarski over the weekend. Zdziarski unveiled a host of iOS vulnerabilities, the scope of which was staggering. They include undocumented services that bypass backup encryption and can be accessed both via USB and wirelessly.
Judge Rules Police Can Stuff Entire Email Accounts Into Evidence Lockers
July 21, 2014
Concerns about overly broad searches of digital data by law enforcement once again have emerged after a federal judge issued an opinion stating officials armed with a warrant can seize and hold a suspect's entire email account. Such an action would not violate the suspect's rights under the Fourth Amendment of the Constitution, said U.S. Magistrate Judge Gabriel Gorenstein.
'Buy' Button Could Turn Facebook Into Impulse-Shopping-Ville
July 18, 2014
Facebook is testing a function that would allow users to buy products without leaving the site or app. Small and medium-sized businesses in the U.S. that are taking part in the trial can add the Buy button to ads displayed in users' News Feeds or in posts on their pages. Users will see the Buy button in relevant ads whether they're on the Facebook website or using their mobile device.
Down the EU's Right-to-Be-Forgotten Rabbit Hole
July 17, 2014
Telecom regulators from each EU member state, together with the Article 29 Working Party -- a group comprised of a data protection authority representative from each state, the European Data Protection Supervisor, and the European Commission -- reportedly have invited search engines to a meeting next week. Microsoft, which just started fielding link removal requests to Bing, plans to attend.
Google's Project Zero Cybersecurity Watch: No Excuses
July 15, 2014
Google on Tuesday announced Project Zero, an effort to speed up the security bug-fixing process. A team of cybersecurity experts will go after vulnerabilities in any and all software, notify the vendors, and then file bug reports in a public database so users can track the issuance of patches. The Project Zero team has promised to send bug reports to vendors in as close to real-time as possible.
Report: NSA Stalked Prominent Muslim Americans
July 10, 2014
It's been known for years that the U.S. National Security Agency and the Federal Bureau of Investigation have targeted Muslim Americans. What hasn't been widely known is that their targets included lawyers and some who have served the United States at the highest levels. Five highly prominent Muslim Americans were listed on an NSA spreadsheet called "FISA recap."
Can I Get My Reputation Back?
July 09, 2014
Ray Donovan was U.S. Labor Secretary under Ronald Reagan and a colorful figure. During his tenure he was indicted by a Bronx, N.Y., grand jury on corruption charges stemming from a contract to build a subway line. The trial involved unions and the mob and was automatically sensational. The verdict turned on whether a construction company got a contract due to mob influence.
Your Abandoned Smartphone May Betray You
July 09, 2014
Doing a factory reset to wipe the data off smartphones does not work, and the data can be recovered, warned Avast. The company recovered tons of data, including more than 40,000 stored photographs, from 20 used Android phones purchased from eBay. Device owners need to overwrite their files to make them irretrievable, Avast said, touting one of the applications it offers.
Europeans Want Right to Be Forgotten - but Not for the Other Guy
July 08, 2014
Marie Antoinette may not have been too far off the mark when she intoned the immortal line, "Let them eat cake." When it comes to the right to be forgotten, it seems Europeans want both to have their cake and eat it. They are now up in arms over Google's having deleted links to various news stories from search results in Europe, calling the action part of a backroom campaign to change the law.
NSA's Eyes Trained Less on Terrorists Than on Average Joes and Janes
July 07, 2014
Nine out of 10 people whose information is being collected by the NSA are Americans who have nothing to do with people targeted by the agency. Data provided by former NSA contractor Edward Snowden includes some information pertaining to terrorist activities and possible threats to U.S. national security, as well as a few successes in antiterrorist work.

See More Articles in Privacy Section >>
Facebook Twitter LinkedIn Google+ RSS