-
Recent Posts
Archives
- January 2026
- March 2024
- February 2022
- September 2021
- August 2021
- May 2020
- April 2020
- March 2020
- February 2020
- December 2019
- August 2019
- May 2019
- March 2019
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- April 2017
- April 2016
- March 2015
- February 2015
- November 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- September 2010
- July 2009
- March 2009
- January 2009
- December 2008
- September 2008
- May 2008
- April 2008
- December 2007
- November 2007
- September 2007
Categories
Meta
Category Archives: Privacy
TRUSTe gets its Tracking Protection List act together
When Microsoft added the Tracking Protection List (TPL) feature to the Internet Explorer 9 beta TRUSTe made available a beta TPL that has been widely criticized. The problem with the TRUSTe beta TPL is that apparently what they did was just take everyone who … Continue reading
Posted in Computer and Internet, Microsoft, Privacy
Tagged IE9, ie9 tracking list, ie9 tracking protection, Microsoft, Privacy, TRUSTe
1 Comment
Microsoft IE9 Tracking Protection Lists (Part 2 – The How)
In Part 1 of my blog on the Microsoft Internet Explorer 9 (IE9) Tracking Protection List (TPL) feature I discussed why it was important to do something about tracking. Now lets talk just a little bit about how tracking and … Continue reading
Microsoft IE9 Tracking Protection Lists (Part 1 – The Why)
A very cool feature in Microsoft’s Internet Explorer 9 (IE9) is its support for Tracking Protection Lists (TPL). TPLs are a mechanism for reducing how tracking of your activities on the web can be done by advertisers (and others). I want to … Continue reading
A Data Breach with real damage
Some of you aren’t going to be sympathetic on this one, but have you heard of PornWikiLeaks? I was looking at CNet this morning and at the top of the list of most popular links was the story of how … Continue reading
Posted in Computer and Internet, Privacy, Security
Tagged Data Breach, Privacy, security
Comments Off on A Data Breach with real damage
I’m glad I’m running IE9
I’ve installed all three of the latest browsers and will try them side-by-side for a while. Of course, the first thing one notices is that only IE9 has the Tracking Protection List feature. I’m working on a blog post on that … Continue reading
Posted in Computer and Internet, Microsoft, Privacy, Security
Tagged Chrome, Firefox, IE9, Phishing, Tracking Protection List
2 Comments
Sadly, data breaches are all too common
After blogging about BP’s lost laptop this morning I was checking my mail and discovered a note from one of my financial institutions about a breach at bulk email sender Epsilon that impacts me. Three of the largest credit card issuers … Continue reading
Posted in Computer and Internet, Privacy, Security
Tagged Data Breach, Epsilon, Phishing, SPAM
Comments Off on Sadly, data breaches are all too common
BP loses a laptop containing (unencrypted) personal information
Sadly A BP employee had the personal information about claimants from the Deepwater Horizon spill on a laptop with neither the files nor hard drive encrypted. And it was stolen (http://content.usatoday.com/communities/ondeadline/post/2011/03/bp-worker-loses-laptop-holding-data-for-13k-gulf-oil-spill-claimants/1?csp=34news). It isn’t clear if BP has inadequate policies, inadequate … Continue reading
When are we going to get serious about computer/network security (Part 1)?
I’m going to start a little series of posts to demonstrate that “we” aren’t serious about computer and network security. By “we” I mean everyone from individual users of mobile phones and computers through to the government, telecommunications carriers, and … Continue reading