Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

Uncategorized

Manufacturer Refurbished Asus Chromebook Flip C100PA

I have written often about Chromebooks. They are excellent low-cost laptop computers that do most of the tasks that most computer users want, although they cannot match the power of the laptops that cost five or ten times as much. Best of all, these laptops never get viruses and do a better job at protecting privacy than do Windows or Macintosh computers. Private information typically is not stored in the laptop […]

Continue Reading →

WhatsApp, Used by More than One Billion People, Now Gets an Encrypted and Secure Video Calling Feature

Facebook-owned instant app WhatsApp today announced it is bringing “fully encrypted” video calling feature to the service. Facebook’s WhatsApp, is adding fully encrypted video calling to its messaging app, a move that comes as privacy advocates worry about the potential for stepped-up government surveillance under a Trump administration. Trump, along with some leading congressional Republicans and FBI Director James Comey, has advocated requiring tech companies to turn over customer information […]

Continue Reading →

How to Spot Fake iOS and Android Apps

The New York Times and New York Post discovered hundreds of counterfeit shopping apps in Apple’s App Store. This is also a problem seen in Google’s Play store. While some of these apps will display annoying banner ads, others could have more serious consequences. Some apps may contain malware that could steal personal information. Scammers could also benefit from unsuspecting customers entering credit card information in these bogus apps. Details […]

Continue Reading →

AT&T Is Spying on Americans For Profit, New Documents Reveal

How do you feel about this? “AT&T has been secretly spying on its own customers, the Daily Beast reports. The revelation comes days after the top carrier announced plans to purchase Time Warner. The report claims that AT&T ran a program called Project Hemisphere through which it analyzed cellular data from the company’s call records to determine where a given individual is located and with whom they are speaking. The […]

Continue Reading →

Every Computer System is Subject To Vulnerabilities

Every computer system in the world is vulnerable to hackers and criminals, according to Marten Mickos, CEO of HackerOne. But not to worry, teams of ethical hackers could be an answer to the growing cybersecurity concerns. Mickos says, “There are far more ethical hackers, white hat hackers, in the world than criminals. So when you just invite the good guys to help you, you will always be safe. It’s like […]

Continue Reading →

US Efforts To Regulate Encryption Have Been Flawed

U.S. Republican congressional staff said in a report released Wednesday that previous efforts to regulate privacy technology were flawed. “Lawmakers need to develop a far deeper understanding of this complex issue before they attempt a legislative fix,” the committee staff wrote in their report. Comment: What a concept! Lawmakers who understand the technology being affected by their laws. The 25-page white paper is entitled Going Dark, Going Forward: A Primer […]

Continue Reading →

Senate Republicans Set Up Vote To Expand FBI Spying, Citing the Orlando Massacre as the Reason

U.S. Senate Majority Leader Mitch McConnell set up a vote late on Monday to expand the FBI’s authority to use a secretive surveillance order without a warrant to include email metadata and some browsing history information. The move was made although McConnell and others offered no proof as to the claimed reasoning that this legislation will ever prevent future attacks similar to the Orlando massacre. Privacy advocates immediately denounced the […]

Continue Reading →

New ‘Hardened’ Tor Browser Protects Users From FBI Hacking

Security researchers are now working closely with the Tor Project to create a “hardened” version of the Tor Browser, implementing new anti-hacking techniques which could dramatically improve the anonymity of users and further frustrate the efforts of law enforcement. It should be able to stop Big Brother from monitoring all your Internet communications and activities. You can read this interesting article at http://motherboard.vice.com/read/tor-is-teaming-up-with-researchers-to-protect-users-from-fbi-hacking.

Continue Reading →

Microsoft Windows Exposes Companies to Credit Card Data Theft

Researchers from FireEye have disclosed the details of cyberattack group leveraging a Microsoft Windows zero-day flaw in targeted attacks against over 100 US companies. The systems affected include Microsoft Windows Vista, Windows Server 2008, Windows 7, Windows 8.1, Windows Server 2012, Windows RT 8.1, and Windows 10. Dhanesh Kizhakkinan, Yu Wang, Dan Caselden and Erica Eng from FireEye’s security team said in a blog post on Wednesday that in March […]

Continue Reading →