Category Archives: infosec

Linux and Other Open Source Technologies Protect Online Privacy: Snowden by https://is.gd/PlAzLb

uqg6rtn

Edward Snowden, the whistleblower who is living in exile since 2013 when he uncovered NSA’s surveillance operations. However, the tech world’s robin hood makes quite a few virtual appearances and gives his views on the state of privacy.

Snowden’s latest Q&A interaction happened with OpenStack Foundation’s COO Mark Collier over a video conference call during the OpenStack Summit. Snowden emphasized that premium cloud platform and proprietary software are a dent on people’s privacy.

from https://is.gd/PlAzLb

Selected by Galigio via Computer Borders

Your smart TV’s privacy policy explained by https://is.gd/csR4Pe

Let’s be honest here — most of us don’t read the privacy policies for smart televisions. And even if we try to, it’s often difficult to read them, particularly on a television screen. Some televisions even display the massive policies five lines at a time.

from https://is.gd/csR4Pe

Selected by Galigio via Computer Borders

What you need to know about the privacy of the new smart camera Amazon wants you to put in your bedroom by https://is.gd/rTqna4

Amazon’s newest version of its Echo smart-home device, the Look, boasts a built-in video camera that can capture your outfits and provide fashion recommendations.

That’s a big step toward a lifestyle of the future.

But it also creates some important privacy issues that are worth keeping in mind if you’re considering buying the $199 Echo Look.

from https://is.gd/rTqna4

Selected by Galigio via Computer Borders

How to Enable/Disable ‘Location Tracking’ on ‘Opera’ browser? by https://is.gd/1vhof9

Opera Browser

A brief but effective tutorial about Enabling and/or Disabling ‘Location Tracking’ on ‘Opera’ browser.

from https://is.gd/1vhof9

Selected by Galigio via Computer Borders

Phishing with Unicode Domains by http://bit.ly/2pk366O

If I told you this could be a phishing site, would you believed me? tl;dr: check out the proof-of-concept Punycode makes it possible to register domains with foreign characters. It works by converting individual domain label to an alternative format using only ASCII characters.

from http://bit.ly/2pk366O

Selected by Galigio via Computer Borders

Why can’t Karen Sandler get the source code for her pacemaker? by https://is.gd/kXRkfk

hearth

Last week, the U.S. Food and Drug Administration threatened legal action against Abbott Laboratories after researchers demonstrated that some of its heart-monitoring devices were insecure and could be hacked. It’s not a new problem.

It’s not a new problem. The white hat hacker Barnaby Jack showed in 2011 how insulin pumps could be remotely hijacked by a hacker, and the lack of adequate cybersecurity regulations for medical devices has been well-documented.

But none of this has gotten Karen Sandler any closer to getting the source code for her pacemaker.

from https://is.gd/kXRkfk

Selected by Galigio via Computer Borders

Blackhat EU: Breaking Big Data by https://is.gd/fvOE3d

David Venable spent time as an employee of the National Security Agency”Privacy as we know it is dead”, said David Venable of Masergy Communications, as he began his talk, Breaking Big Data: Evading Analysis of the Metadata of Your Life at BlackHat Europe 2016.

from https://is.gd/fvOE3d

Selected by Galigio via Computer Borders