Privacy - Page 2.5
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
If you want a secure Internet, you can't be nameless and faceless in cyberspace anymore. It's just that simple, although my friend and colleague Charlie Cooper, doesn't see it that way. He's wrong and I'm right, so I thought I would . . .
An independent review board concluded in its final report on Thursday that a controversial FBI electronic wiretap system was an effective law-enforcement tool, drawing fire from critics who said it was too invasive. In its final report to the U.S. Justice . . .
An independent review board said Thursday that a controversial FBI electronic wiretap tool was appropriate for law-enforcement use, changing little from its draft report released last month. In its final report to the U.S. Justice Department, a group of researchers at . . .
Existing Internet privacy concerns stemming from online "profiling" and other e-business data mining activities are "trivial" compared to the privacy-related issues that will face the world in the years ahead, IBM Chairman Lou Gerstner has said. "What are the implications for . . .
A government think tank, Foresight, has produced a report on the future of crime in a world that has gone online. The world of the criminal will be radically changed by new technology. Rather than nicking your car stereo, the thief . . .
A hacker called 'chad' leaves the online credit card clearing house hanging after exposing more than 55,000 credit card numbers. The FBI is investigating Creditcards.com was the victim of an extortion attempt by a cyberthief accused of hacking . . .