Posted January 16, 2013 US privacy organization EFF invites you to click on thumbnails of the summaries it managed to pry out of the government, but let’s save your finger muscles the workout with this summaries summary: ——————————. Read the full story, in which I use words, punctuation and the like, because I am not […]
Posted January 15, 2013 Medical diagnoses for cancer patients, names and Social Security numbers all went into the trash, unredacted and unshredded, probably in a very misguided effort to save a few bucks on proper record destruction. Read the full story on Naked Security.
Posted Jan. 14, 2013 Andrea Hernandez on Tuesday was ordered to wear an RFID tracking badge that she claims bears the “mark of the beast”, but by Friday she had turned the case right back around, asking a federal appeals court to overturn the order to either wear a chip-less badge or change schools. Here’s […]
Posted November 15, 2012 The space agency is now, finally, after yet another unencrypted laptop theft, scrambling to require full disk encryption agency-wide. For more, here’s the story.
Posted December 14, 2012 An Internet Explorer vulnerability allows hackers to track mouse cursor movement anywhere on the screen, even if a given window is inactive, unfocused or minimised. It can also compromise the security of virtual keyboards and keypads, thereby thwarting their use against keyloggers. Here’s more.
Posted December 12, 2012 Researchers have found a vulnerability in an unspecified model of a Samsung LED 3D TV that they exploited to get root access to the TV and any attached USB drives. The bug, which can be used to gain root access, affects multiple Samsung models and device generations, they say. Read all […]
Posted December 12, 2012 The data-kidnappers are demanding $4,000 to release thousands of patient records belonging to the Miami Family Medical Centre on Australia’s Gold Coast. Read more.
Posted December 12, 2012 The second of two FTC reports on kids’ mobile apps shows that the industry hasn’t improved with regards to privacy, with many apps sharing personal information with third parties, all without notifying parents or asking for their permission. Read the story now.
Posted December 11, 2012 A woman who tried to unlock a stolen iPhone unwittingly took her own photo. An application on the phone then automatically sent the photo to the owner, who called the police. It’s a good reminder that there are tools out there, either free or darn close to it, that can track […]