| Sunday April 20th 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘privacy’ Archives

Best iFixit teardown ever: FBI tracking bug

Best iFixit teardown ever: FBI tracking bug

Ifixit and Wired got together to do a teardown of an FBI tracking gadget: "The device was loaned to us by a person who found the device on their car, and is similar to the one Yasir Afifi recently found underneath his own vehicle. The hand-assembled device is comprised of a GPS unit for receiving the car's position, an RF transmitter for [...]

Federal judge: Open WiFi doesn’t make you liable for your neighbors’ misdeeds

Federal judge: Open WiFi doesn’t make you liable for your neighbors’ misdeeds

A Federal judge in Illinois has once again rebuffed a copyright troll's request for easy court orders to allow him to connect IP addresses with people. The judge said that open wireless networks and other factors make the connection between IP addresses and defendants difficult, and that making it easy to connect people and IPs would invite [...]

Cellebrite Cell Phone Extraction Device

Cellebrite Cell Phone Extraction Device

We had to see for ourselves just how much data could be extracted, so we acquired a software program called Lantern from Katana Forensics, which was recently detailed on the tech blog Gizmodo. Although Lantern is not the same software Cellebrite uses, its a similar law-enforcement-grade data extraction application, which can nab surprising amounts [...]

In-depth look at SpyEye crimeware

In-depth look at SpyEye crimeware

Brian Krebs has an in-depth look at SpyEye, a "crimeware" trojan horse that is used to harvest personal information (especially banking credentials) from infected Windows machines. SpyEye's keylogger is capable of prioritizing the information it grabs by paying special attention to information from browser forms, including Chrome and [...]

Render frosted glass transparent with Scotch tape

YouTube user TheFarmacyMan discovered that his workplace frosted glass privacy screen could be rendered transparent by applying a piece of Scotch tape to it. A useful detail for anyone planning a caper novel or a robbery. A user called rawnoodles10 posits "..the glue on the tape fills in the small imperfections on the surface of the glass. [...]

Dropbox’s new security policy implies that they lied about privacy from the start

Dropbox’s new security policy implies that they lied about privacy from the start

Miguel de Icaza noticed that Dropbox's new security terms of service allows it to decrypt your stored files for law enforcement; but Dropbox has always claimed that it did not store the keys necessary to do this. This has been used as both a selling point ("we keep your files so safe, we can't access them") and an excuse ("don't ask us for help [...]

ACLU to Michigan cops: Stop searching mobile phones during traffic stops

ACLU to Michigan cops: Stop searching mobile phones during traffic stops

The ACLU is trying to get the Michigan state cops to stop dumping mobile phone storage during routine traffic stops. At present the Michigan troopers use something called a Cellebrite UFE that slurps up recently dialed numbers, SMSes, Facebook/Twitter posts, emails, bookmarks, Web history, cookies, notes, MMS, IMs, lists of recent Bluetooth [...]

iOS devices secretly log and retain record of every place you go, transfer to your PC and subsequent devices

iOS devices secretly log and retain record of every place you go, transfer to your PC and subsequent devices

Security researchers presenting at the Where 2.0 conference have revealed a hidden, secret iOS file that keeps a record of everywhere you've been. The record is synched to your PC and subsequently resynched to your other mobile devices. The file is not transmitted to Apple, but constitutes a substantial privacy breach if your PC or mobile [...]

App called “Creepy” pinpoints people’s location based on their social networking activity

App called “Creepy” pinpoints people’s location based on their social networking activity

The creator of Creepy, Yiannis Kakavas, calls his application a "geolocation information aggregator." It analyzes a person's tweets, Facebook posts, and Flickr stream to generate a map of where that person is and where he or she goes. You can enter a Twitter or Flickr username into the software's interface, or use the in-built search utility [...]

They’re Tracking Your Every Move and You May Not Even Know

They’re Tracking Your Every Move and You May Not Even Know

Sure there are reasons to save this "tracking" data... It's just that most of them are Orwellian nightmares. But as a German Green party politician, Malte Spitz, recently learned, we are already continually being tracked whether we volunteer to be or not. Cellphone companies do not typically divulge how much information they collect, so Mr. [...]

Michigan Supreme Court rules police have no right to privacy while on duty

Michigan Supreme Court rules police have no right to privacy while on duty

Note: High courts don't make things legal, just clarify what has been legal all along. In this case, it's something everyone has known was legal but police denied as long as possible in order to abuse their position/power. The suit was filed by Gary Brown, now a Detroit City Councilman but formerly a high-ranking police official. He and other [...]

Why you should always encrypt your smartphone

Why you should always encrypt your smartphone

You may have taken note that in California, among other areas, police can search your phone's contents without a warrant upon arrest. If you've password-protected or encrypted your phone, you're somewhat protected. If your phone's not directly on you, that's another layer. Tech news site Ars Technica explicates the finer points of arrest, [...]

Woz on Network Neutrality

Woz on Network Neutrality

Writing in the Atlantic, Apple co-founder and hardware wizard Steve Wozniak defends Network Neutrality, describing open, neutral networks as a boon to creators, innovators and entrepreneurs... Imagine that when we started Apple we set things up so that we could charge purchasers of our computers by the number of bits they use. The personal [...]

Twitter’s Response to WikiLeaks Subpoena Should Be the Industry Standard

Twitter’s Response to WikiLeaks Subpoena Should Be the Industry Standard

This may be the first time I ever gave a shit about Twitter. The request was approved by a magistrate judge in Alexandria, Virginia where a federal grand jury is looking into charges against WikiLeaks related to its acquisition and publishing of U.S. government classified information. The court order came with a gag order that prevented Twitter [...]

Spokeo may know more about you than you realize

Spokeo may know more about you than you realize

Spokeo is a new site that claims to not be your "grandma's phonebook." This is because it pulls a ton of info about you from all over the web into one place. And I mean a ton. More than you might be comfortable with, in fact. But luckily, it appears you can "remove your Spokeo listing from public searches for free" by following these simple [...]

Is reading your wife’s e-mail a crime?

Is reading your wife’s e-mail a crime?

A Rochester Hills man faces up to 5 years in prison -- for reading his wife's e-mail. Oakland County prosecutors, relying on a Michigan statute typically used to prosecute crimes such as identity theft or stealing trade secrets, have charged Leon Walker, 33, with a felony after he logged onto a laptop in the home he shared with his wife, Clara [...]

Hotel peephole doctored for easy removal and spying

Last week, as Kent Brewster was leaving his hotel room in the morning, he found a small piece of crumpled paper on the floor of his room; he realized that this had been used to plug up the peephole in the door, which had been doctored to allow people in the hallway to spy on the goings-on in the room. Says Kent: " The hotel manager took care [...]

Ron Paul: Groped by TSA, Calls for Boycott of Airlines

RateMyBackscatter.com

RateMyBackscatter.com

Now you don’t even have to be flying to be “scanned” by x-rays

Now you don’t even have to be flying to be “scanned” by x-rays

AS&E's vans can be driven past stationary vehicles to scan their contents or parked to see the innards of passing cars and trucks. The Z Backscatter Vans, or ZBVs, as the company calls them, send a narrow stream of X-rays off and through nearby objects and read which ones bounce back. Absorbed rays indicate dense material such as steel. [...]

 Page 2 of 18 « 1  2  3  4  5 » ...  Last »