Tag Archives: Privacy

Tumblr is back on my good side

In a piece I wrote a couple of weeks ago I’d brought up the problem of Tumblr hosting phishing/malicious web sites.  Well after a few days of my feeding examples to Tumblr’s support team, and they taking down the sites, I haven’t … Continue reading

About these ads
Posted in Computer and Internet, Phishing, Privacy, Security | Tagged , , , , , | 1 Comment

Deepsec 2011: Are Companies “Evil” When it Comes to Privacy?

Last month I attended the In-Depth Security Conference (better known as Deepsec) 2011.  This was my first security conference (outside of Microsoft’s Bluehat) so I’m not sure exactly how to characterize it compared to the better known and larger Black … Continue reading

Posted in Computer and Internet, Privacy, Security | Tagged , , , , , | 1 Comment

Is Hotmail’s “Trusted Sender” feature more than just show?

One year ago Microsoft introduced a feature in Hotmail that marked mail from a set of “trusted senders”, primarily banks, with a Trusted Sender icon.  The idea was that if mail from your bank was marked with the icon you … Continue reading

Posted in Computer and Internet, Microsoft, Phishing, Privacy | Tagged , , , , , | 2 Comments

When are we going to get serious about computer/network security (Part 3 – WiFi)?

I recently updated my Samsung Focus with the Windows Phone 7 NODO update and received a feature I am not sure I wanted, support for the WISPr protocol.  WISPr support, long present on the iPhone, allows your AT&T smartphone to automatically and transparently switch … Continue reading

Posted in Computer and Internet, Privacy, Security | Tagged , , , , , , , , , , , | 1 Comment

TRUSTe gets its Tracking Protection List act together

When Microsoft added the Tracking Protection List (TPL) feature to the Internet Explorer 9 beta TRUSTe made available a beta TPL that has been widely criticized.  The problem with the TRUSTe beta TPL is that apparently what they did was just take everyone who … Continue reading

Posted in Computer and Internet, Microsoft, Privacy | Tagged , , , , , | 1 Comment

Microsoft IE9 Tracking Protection Lists (Part 2 – The How)

In Part 1 of my blog on the Microsoft Internet Explorer 9 (IE9) Tracking Protection List (TPL) feature I discussed why it was important to do something about tracking.  Now lets talk just a little bit about how tracking and … Continue reading

Posted in Computer and Internet, Microsoft, Privacy | Tagged , , , , , , | 2 Comments

Microsoft IE9 Tracking Protection Lists (Part 1 – The Why)

A very cool feature in Microsoft’s Internet Explorer 9 (IE9) is its support for Tracking Protection Lists (TPL).  TPLs are a mechanism for reducing how tracking of your activities on the web can be done by advertisers (and others).  I want to … Continue reading

Posted in Computer and Internet, Microsoft, Privacy | Tagged , , , , , , | 1 Comment

A Data Breach with real damage

Some of you aren’t going to be sympathetic on this one, but have you heard of PornWikiLeaks?  I was looking at CNet this morning and at the top of the list of most popular links was the story of how … Continue reading

Posted in Computer and Internet, Privacy, Security | Tagged , , | Leave a comment

I wonder what the number is for other industries

Ponemon Institute did a study of IT security in the energy industry. 75% admit to having suffered a data breach in the last 12 months. 71% of IT Security executives at global energy producers state that their executive management team … Continue reading

Posted in Computer and Internet | Tagged , , | Leave a comment

BP loses a laptop containing (unencrypted) personal information

Sadly A BP employee had the personal information about claimants from the Deepwater Horizon spill on a laptop with neither the files nor hard drive encrypted. And it was stolen (http://content.usatoday.com/communities/ondeadline/post/2011/03/bp-worker-loses-laptop-holding-data-for-13k-gulf-oil-spill-claimants/1?csp=34news). It isn’t clear if BP has inadequate policies, inadequate … Continue reading

Posted in Privacy, Security | Tagged , , , | Leave a comment