Privacy

(get it in RSS or Atom)

Can you trust Tor's entry guards?

Onion

New research uses Tor entry guard computers to strip away the Dark Web’s anonymity features, exposing users and the hidden websites they visit.

60 Sec Security - Atari, Minitel, VAX, ZX Spectrum...and Jimmy Connors! [VIDEO]

The latest episode of our funny-but-serious 1-minute weekly video.

Enjoy.

Google defies French global 'right to be forgotten' ruling

Google defies French 'right to be forgotten' ruling

Google is set to defy a French data authority ruling on the global removal of right to be forgotten links.

How one school district is monitoring social media of students and teachers

Florida school district monitoring social media of students and teachers

They're trying to keep kids safe, but nobody's talking about who can access the data or what standards are used to capture it.

SSCC 209 - Can encryption be too good? [PODCAST]

Here's the latest episode of our weekly podcast that turns security news into useful advice...

Xen fixes another "virtual machine escape" bug

xen-480

Last time it was the floppy disk drive that let crooks squeeze out of jail - this time, the virtual CD-ROM is their springboard...

Websites can track us by the way we type - here's how to stop it

Keyboard. Image courtesy of Shutterstock.

Researchers have come up with a new Chrome extension that muffles our key-press duration and typing lags.

Facebook ordered to allow pseudonyms by privacy watchdog

Facebook. Image courtesy of 360b / Shutterstock.

Good news for every Little Miss Hot Mess and Jemmaroid von Laalaa out there: a German privacy watchdog has ordered Facebook to allow users to take out accounts under pseudonyms.

Children should have the right to be forgotten, says iRights campaign

Child. Image courtesy of Shutterstock.

A new children's privacy rights campaign has attracted backing from ministers, business leaders and academics.

Dmail promises self-destructing Gmail messages

Dmail promises self-destructing Gmail messages

After an email has been "destroyed" (or, rather, encrypted), recipients will see a message that the email has been killed. Should we trust it will do what it says with personal data?

How (not) to pay yourself a $14m bonus - 60 Sec Security [VIDEO]

Our weekly 1-minute security video...news with some fun in it!

Execs face the chop after being hit by data breach

Vacant chair. Image courtesy of Shutterstock.

With the often perceived need to hold someone to account for a data breach, the axe falls to the heads of senior executives.

SSCC 208 - (Cyber)crime and Punishment [PODCAST]

Join us for the weekly Chet Chat!

In this episode: Cybercrime (and punishment), crimeware, the Angler exploit kit, and how the Fourth Amendment applies to social networks.

Worried about Google's Your Timeline? Here's how to disable tracking

Google tracking

Don't fancy having Google map your movements and match them up with your photos? Here's how to disable Your Timeline or turn off Location Services altogether.

Privacy and targeting are among new video controls for Facebook Pages

Privacy and targetting are among new video controls for Facebook Pages

Now, video uploaders can discriminate - or is it target-market? - based not only on language and location, but also on gender and age.

Man becomes first to be convicted under UK's new revenge porn law

uk-arrest-1200

The 21-year-old threatened to post sexually explicit images of a 20-year-old woman, then sent the photos to the woman's family and shared them on Facebook.

Facebook can't say 'No' to New York, says New York

Facebook can't "plead the Fourth Amendment" on your behalf, says a New York appeals court - you have to do it yourself.

FBI again thwarts Tor to unmask visitors to a Dark Web child sex abuse site

FBI again thwarts Tor to unmask visitors to a Dark Web child sex abuse site

Did the FBI plant a drive-by installation of some kind of malware on hundreds of thousands of computers so it could track down paedophiles?

Baby, you can hack my car: researchers take over a Jeep from 10 miles away

Baby, you can hack my car: researchers take over a Jeep from 10 miles away

Two renowned security researchers have discovered a way to remotely hack into and take over a Jeep Cherokee, controlling the brakes and accelerator as well as other components.