In a piece for London’s Financial Times, Britain’s new spy chief Robert Hannigan said U.S. technology companies should offer “greater co-operation” in the fight against terrorism, by working with governments rather than working against their intelligence agencies in the wake of the Edward Snowden disclosures. Hannigan suggested that as the world celebrates the 25th anniversary of the Web, there should be a “new deal” between governments and the technology companies […]
Verizon users might want to start looking for another provider. In an effort to better serve advertisers, Verizon Wireless has been silently modifying its users’ web traffic on its network to inject a cookie-like tracker. This tracker, included in an HTTP header called X-UIDH, is sent to every unencrypted website a Verizon customer visits from a mobile device. It allows third-party advertisers and websites to assemble a deep, permanent profile […]
A new survey from Survata seems to indicate that Internet users are more afraid of their personal data being used by Google than the NSA. Details may be found at http://bgr.com/2014/10/28/google-vs-nsa-personal-data.
The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement in order to seize significant new powers to hack into and carry out surveillance of computers throughout the US and around the world.
Apple provides free encryption software with every Macintosh. The functionality is built into Disk Utility, a multi-purpose program that can be found on every Mac. Disk Utility has many uses but for the moment I will only describe the encryption of files or folders. Disk Utility will encrypt any kind of file: text, images, videos, databases, anything at all. To encrypt a file or folder, first create the item(s) to […]
An interesting article in Wired describes how the NSA, researchers in Israel, and possibly others steal data from computers not connected to the Internet. The method allows hackers and spies to surreptitiously siphon passwords and other data from an infected computer by using radio signals generated and transmitted by the computer and received by a mobile phone. You can read the article about “AirHopper” at http://www.wired.com/2014/11/airhopper-hack.
A new form of digital currency has appeared recently. It has been available for about six years but many people have not heard about it or else do not understand it. In the past year or two, publicity has increased, and now tens of thousands of computer users are using this new payment method to purchase everything from coffee and doughnuts to illegal drugs or to pay for charitable donations […]
With the government trying to sniff through your inbox, and hackers constantly looking for ways to exploit security holes and get at your personal data, you need a private and secure “tunnel” for your Internet connection. (You can read my earlier article, Why You Want to Use a VPN, at https://privacyblog.com/2014/11/01/why-you-want-to-use-a-vpn/). You can find many VPN services to choose from with a varying number of features and at all sorts […]
Do you have an iPhone that can be unlocked with your fingerprint? Don’t put anything on that phone should remain private! A Virginia Circuit Court judge ruled on Thursday that a person does not need to provide a passcode to unlock their phone for the police. The court also ruled that demanding a suspect to provide a fingerprint to unlock a phone would be constitutional.
The former head of the Central Intelligence Agency is cautioning Canadian officials to keep in mind the delicate balance between security and privacy when crafting new laws. In an interview with CBC Radio’s The House, retired U.S. general and former CIA director David Petraeus said that balance should be at the heart of an open and transparent debate. “The general thrust of this always has to be, again, to strike […]