A sharply-divided Supreme Court boosted privacy rights Monday by striking down as unconstitutional a Los Angeles city ordinance requiring hotel operators to show a list of registered guests to the police on demand. In a 5-4 decision, the court held that the guest-registry law violated the Fourth Amendment’s protection against unreasonable searches because the legislation gave hotel managers no chance to seek a ruling from a judge or magistrate before […]
Two years after the Edward Snowden leaks, millions of people worldwide have adopted encrypted and probably secure methods of using the Internet. The Tor network has doubled in size, Tails has tripled in users, PGP has double the daily adoption rate, but perhaps the most popular secure application is Off The Record, a product that provides encryption for instant messaging conversations. Off-the-Record (OTR) Messaging allows you to have private conversations […]
Louisiana Governor Bobby Jindal (R) has vetoed a plan to acquire the scanners in the Bayou State. In a signing statement Friday, Jindal wrote: Senate Bill No. 250 would authorize the use of automatic license plate reader camera surveillance programs in various parishes throughout the state. The personal information captured by these cameras, which includes a person’s vehicle location, would be retained in a central database and accessible to not […]
A security researcher recently discovered a vulnerability in the Login with Facebook feature found on many thousands of sites. Similarly, a bug within the Google App domain name interface exposed hundreds of thousands of individuals private data to the public. If you use either of these features to log into web sites, you need to read How Facebook & Google Website Logins Can Lead To Data Theft by Gavin Phillips […]
File storage services in the cloud are very popular these days — and for good reasons. Services such as Dropbox, Google Drive, SpiderOak, iCloud, Microsoft OneDrive, Amazon Cloud Drive, Amazon S3, Box, and numerous others offer free or very low cost file storage space that can be used for any of a number of reasons. Cloud storage serves as an added layer of data protection for your precious and irreplaceable […]
Here’s an interesting article about a huge waste of taxpayer dollars. Take a look at the article by security expert Bruce Schneier published on the CNN web site at http://www.cnn.com/2015/06/05/opinions/schneier-tsa-security.
If you use LastPass as your master password manager, you need to read the article at http://uproxx.com/technology/2015/06/lastpass-hack-update/. Now. This points up a weakness in all password managers: they provide a single point of failure. If a hacker manages to access your password manager software, he or she gains access to EVERYTHING.