Bookmark
Color-Coded Threat Level Advisory Under Attack | Threat Level | Wired.com
www.wired.com/threatlevel/2009/09/threatleveladvisory/, posted 2009 by peter in humor politics propaganda security terrorism usa
A proposal by the Homeland Security Advisory Council, unveiled late Tuesday, recommends removing two of the five colors, with a standard state of affairs being a “guarded” Yellow. The Green “low risk of terrorist attacks” might get removed altogether, meaning stay prepared for your morning subway commute to turn deadly at any moment.
...
The new system, if approved by the agency, would consist solely of Yellow, Orange and Red.
Bookmark
France passes harsh anti-P2P three-strikes law (again) - Ars Technica
arstechnica.com/tech-policy/news/2009/09/france-passes-harsh-anti-p2p-three-strikes-law-again.ars, posted 2009 by peter in copyright dinosaurism eu fascism p2p security
HADOPI 2 also preserves an earlier attempt to outlaw the "open WiFi defense" under which an accused file-sharer simply makes clear that anyone could have used his connection. Under the new law, all Internet users must keep their connections "secure" and are responsible for what happens on them.
Bookmark
"Anonymized" data really isn't—and here's why not - Ars Technica
arstechnica.com/tech-policy/news/2009/09/your-secrets-live-online-in-databases-of-ruin.ars, posted 2009 by peter in privacy recovery security
Companies continue to store and sometimes release vast databases of "anonymized" information about users. But, as Netflix, AOL, and the State of Massachusetts have learned, "anonymized" data can often be cracked in surprising ways, revealing the hidden secrets each of us are assembling in online "databases of ruin."
Bookmark
Goodbye, DRM; hello "stealable" Digital Personal Property - Ars Technica
arstechnica.com/tech-policy/news/2009/09/goodbye-drm-hello-stealable-digital-personal-property.ars, posted 2009 by peter in copyright dinosaurism media propaganda security
The playkey, unlike the title folder, can't be copied—but it can be moved. To give your friends and family access to the file in question, you can send them a copy but must also provide a link to the playkey. Under the DPP system, though, anyone who can access the playkey can also decide to move it to their own digital vault—in essence, anyone can take the content from you, and you would no longer have access to the media files in question if they did so.
Bookmark
Services' E-Mail Hacking Illegal, but Officials Need More Than That to Prosecute - washingtonpost.com
www.washingtonpost.com/wp-dyn/content/article/2009/09/06/AR2009090602238.html, posted 2009 by peter in business cloudcomputing communication email messaging privacy security
But such services as YourHackerz.com are still active and plentiful, with clever names like "piratecrackers.com" and "hackmail.net." They boast of having little trouble hacking into such Web-based e-mail systems as AOL, Yahoo, Gmail, Facebook and Hotmail, and they advertise openly.
Bookmark
One-minute WiFi crack puts further pressure on WPA - Ars Technica
arstechnica.com/tech-policy/news/2009/08/one-minute-wifi-crack-puts-further-pressure-on-wpa.ars, posted 2009 by peter in networking security wifi wireless
The hack is not a complete break; it only results in the ability to read and falsify particular short data packets, but cannot retrieve a WPA encryption key. Still, the rapid development of WPA hacks suggests that those paranoid about security ensure that their WiFi networks are using WPA2 with AES encryption rather than WPA with TKIP.
Bookmark
Blog of Rights: Official Blog of the American Civil Liberties Union » Quiz: What Do Facebook Quizzes Know About You?
blog.aclu.org/2009/06/11/quiz-what-do-facebook-quizzes-know-about-you/, posted 2009 by peter in community privacy security social
By default, Facebook’s privacy settings let applications access information on your profile even if you have restricted access to a specific network or friend group (as application privacy settings are separate from profile privacy settings). In addition, Facebook’s default settings allow applications run by your friends to pull information from your profile. Surprised? Check out your settings and see for yourself!
Bookmark
Offhand but on record | The Japan Times Online
search.japantimes.co.jp/cgi-bin/nc20090819a1.html, posted 2009 by peter in opinion privacy security
The lesson in all of this is that little we do is ephemeral anymore. We leave electronic audit trails everywhere we go, with everything we do. This won't change: We can't turn back technology. But as technology makes our conversations less ephemeral, we need laws to step in and safeguard our privacy. We need comprehensive data privacy laws, protecting our data and communications regardless of where it is stored or how it is processed. We need laws forcing companies to keep it private and delete it as soon as it is no longer needed, and laws giving us the right to delete our data from third-party sites. And we need international cooperation to ensure that companies cannot flaunt data privacy laws simply by moving themselves offshore.
Bookmark
Hackers Break Into Police Computer | Australian Federal Police
www.theage.com.au/technology/security/hackers-break-into-police-computer-as-sting-backfires-20090818-eohc.html, posted 2009 by peter in humor security
An Australian Federal Police boast, on the ABC's Four Corners program, about officers breaking up an underground hacker forum, has backfired after hackers broke into a federal police computer system.
Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
Bookmark
Ksplice - Ksplice Uptrack
www.ksplice.com/uptrack/, posted 2009 by peter in download free linux security software toread
Ksplice Uptrack is a new service that lets you effortlessly keep your systems up to date and secure, without rebooting.
|< First < Previous 157–166 (222) Next > Last >|