Items tagged with Privacy

There have been many stories to come out of the US over the past couple of years that have related to law enforcement requests of personal passwords, and now, it looks like Canada wants to get in on the action. This past week, traveler Alain Philippon was returning to the Great White North from the Dominican... Read more...
Encryption has been a feature of Android since 2011, though it's never been turned on by default. That was supposed to change with Android 5.0 Lollipop, as Google said in no uncertain terms back in September 2014 that users wouldn't have to give the feature a second thought. Unfortunately, it appears as though Google has backed down from its Read more...
It hasn't even been a single week since we learned that the NSA could have been involved in creating a bunch of malware that trickled out over the past decade, and already we have another scandal to munch on. Unfortunately, this one is even more disgusting -- if you can believe that. Via documents leaked to The... Read more...
Purchasing a new laptop can sometimes be a chore. For starters, simply finding one that's "right for you" takes time and effort, and once you do find it, you know that the "chore" part isn't over. Once you get that baby home, you'll have to begin mentally preparing yourself for the inevitable bloatware... Read more...
Samsung has confirmed that some of its slightly older Smart TV models are currently uploading recorded voice communication without any form of encryption to protect the user's privacy. This goes against what Samsung stated in a recent blog post clarifying the limited circumstances in which voice commands are recorded... Read more...
Security firms the world over dream of a day like this, but this one belongs to Kaspersky. The Russian-based firm has discovered the existence of a threat actor that could be linked to the US Government, and NSA in particular. Kaspersky has dubbed the group Equation, as it became clear that the folks involved loved... Read more...
It's not often that someone in the possession of a massive collection of passwords is willing to let it loose, and it's for good reason. It's perhaps for even greater reason why we so rarely see someone release a database that has both the usernames and passwords. With the effects that WikiLeaks and... Read more...
It's no secret that communications companies love to feed off of our data, and in the case of Verizon, it prefers to not even tell us about it. In October, it was discovered that Verizon had been tracking its customers via unique ID. Not long after, the technique was dubbed a "supercookie", as it was, in effect... Read more...
China is again tightening its grip on Internet access and policies (big surprise, right?), this time by issuing a ban on online accounts that impersonate people or organizations. China will also begin strictly enforcing a requirement that web users go by their real names, not nicknames, when registering for online... Read more...
Sometimes, it just makes sense to go open source. We've seen Microsoft do it, and we've seen Google do it. Now, we see none other than the US Department of Defense do it, with DShell, a network foresnics tool. It's an impressive thing to see the DoD release a home-built tool to the wild, but like most moves to open source, the agency has Read more...
Last January, some six or so months after Edward Snowden exposed much of the NSA's shady behavior to the world, a smartphone was announced that promised unparalleled levels of security. Called BlackPhone, we followed-up a month later to provide a price, $629, and some specs. Quad-core, 2GB of RAM, 16GB storage... all standard fare for a good Read more...
Another day, another revelation of how the government has pushed its spying efforts a bit too far. This time, it involves our vehicles and the Drug Enforcement Administration (DEA). I'm sure that little bit of information speaks volumes. In order to better combat the import and movement of drugs, the DEA has been... Read more...
Earlier this month, it was discovered that China was using man-in-the-middle (MITM) attacks against Microsoft Outlook and Mozilla Thunderbird email clients, as well as smartphone apps that use IMAP and SMTP protocols. Or did it? A spokesman for the Cyberspace Administration of China (CAC) claims the allegations that... Read more...
Dish Network is in hot water with the U.S. Federal Trade Commission (FTC) for outright violating the agency's Telemarketing Sales Rule (TSR), including the "Do Not Call" registry, by placing tens of millions of unsolicited calls to numbers that appear on the list. In all, Dish Network and its retail partners made some... Read more...
There's no arguing the fact that bullying is something that should be combated, but is that enough to go against the Fifth Amendment and require someone to hand over their password as part of an investigation? That's the reality Illinois schools could soon face, as their government has decided that if asked, a student... Read more...
If there's one thing Internet legend Kim Dotcom despises, it's being spied on. Likewise, he hates that governments take it upon themselves to spy not only on him, but everyone. Not long after his Auckland mansion was raided some three years ago, his love for privacy and security only skyrocketed. What eventually came... Read more...
Well... this is a little disappointing. Despite the fact that the importance of our security is at an all time high, and it's a subject battled every single day, it seems most people have fallen into a funk of not caring that much about it. That's if the most popular passwords leaked over the course of 2014 are any indication. You see, Read more...
Hot on the heels of president Obama's insinuation that the government should never have an issue accessing a person's data comes an even scarier prospect -- being the victim of a search warrant just because you take steps to enhance your privacy. As it happens, that could become the reality, if the FBI gets its... Read more...
It doesn't matter what you invent, someone will figure out a way to use it for nefarious purposes. And so it goes with the Internet, a wonderful tool for connecting the world in ways that weren't possible prior to its inception, yet it's also provided a means for cybercriminals to steal large amounts of personal data... Read more...
If you believe that your privacy is important - so important that the government can't even breach it - you're not going to like president Obama's latest comments. During a meeting at the White House with UK prime minister Dave Cameron, it was established that both leaders share the same stance on user privacy: you're... Read more...
The unfortunate reality that we had to come to grips with in 2014 is that hackers aren't going anywhere, and if anything, they're becoming a growing nuisance. That isn't likely to change in 2015, though U.S. President Barack Obama wants to see some changes in the way security breaches are handled. One of the things... Read more...
Pepcom’s Digital Experience gives the media a chance to take a sneak peek at some of the coolest gadgets as CES kicks off, so we checked out the latest gear from HP, Patriot, and the like. This year we found ourselves dodging a number of drones, including Parrot’s Bebop, which hovered at about eye-level, taking in the show with its built-in Read more...
First ... Prev 24 25 26 27 28 Next