• Have you seen your digital footprint lately?

    Updated: 2013-01-28 17:33:04
    A Guest Post by Robin Wilton of the Internet Society   We are the raw material of the new economy. Data about all of us is being prospected for, mined, refined, and traded…   . . . and most of us don’t even know about it.   Every time we go online, we add to [...]

  • The Privacy Blog Podcast – Ep.4: Data Privacy Day – Privacy Legislation, Social Media, and Corporate Data Security

    Updated: 2013-01-22 22:31:42
    Welcome to first podcast of 2013. In honor of Data Privacy Day, which falls on January 28th, I’ll be discussing current data privacy and security issues facing both consumers and businesses by taking you through the pros and cons of privacy legislation, privacy in the context of social media, and corporate data security at the [...]

  • A peek at the cybercrime economy

    Updated: 2013-01-21 18:31:28
    The latest Java exploit has given another view into the workings of the cybercrime economy. Although I should not be, I am always startled at just how open and robustly capitalistic the whole enterprise has become. The business is conducted more or less in the open. Krebs on Security has a nice piece on an [...]

  • Looks like Java is STILL vulnerable / broken

    Updated: 2013-01-18 20:55:04
    I did not post on the recent Java vulnerability because the fixes came out so quickly, however, it looks like I relaxed too soon. Apparently there was a second vulnerability that did not get fixed. At this point, you should probably just disable Java in your browser. Gizmodo has a short article on how to [...]

  • Nokia does a man in the middle attack on your secure mobile browsing

    Updated: 2013-01-14 18:04:05
    Gigaom reports on a major security issue at Nokia, first announced in the “Treasure Hunt” blog. Their Asha and Lumia phones come with something they call the “Xpress Browser”. To improve the browser experience, the web traffic is proxies and cached. That is a fairly common and accepted practice. Where Nokia has stepped into questionable [...]

  • The Privacy Blog Podcast – Ep. 3: The Top Privacy and Security Events of 2012

    Updated: 2012-12-24 20:25:08
    Welcome to the December podcast – our last official podcast of 2012. In this episode, I’ll be running down some of the biggest online privacy and security events of the last year. From the Zappos and LinkedIn password breaches, to the epic hacking of reporter Mat Honan, I’ll be providing user tips and suggestions to [...]

  • Internet Explorer vulnerability allows mouse tracking

    Updated: 2012-12-12 21:56:26
    spider.io is talking about a bug they discovered in Microsoft Internet Explorer versions 6-10. Evidently the bug allows tracking of your mouse movement even if the browser window has been minimized and you have a different application active. They say that at least two companies providing display ad analytics are already using this exploit to improve [...]

  • Encryption Math(s)

    Updated: 2012-12-11 16:33:33
    Numberphile recently posted a video about the math behind RSA encryption.  In the video below, a brief description of public key cryptography is given and then we are shown a simple example of the math used to perform encryption and decryption (math example @ 2:25). In the video, James skips over the method for determining [...]

Current Feed Items | Previous Months Items

Dec 2012 | Nov 2012 | Oct 2012 | Sep 2012 | Aug 2012 | Jul 2012