-
Recent Posts
Archives
- February 2022
- September 2021
- August 2021
- May 2020
- April 2020
- March 2020
- February 2020
- December 2019
- August 2019
- May 2019
- March 2019
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- April 2017
- April 2016
- March 2015
- February 2015
- November 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- September 2010
- July 2009
- March 2009
- January 2009
- December 2008
- September 2008
- May 2008
- April 2008
- December 2007
- November 2007
- September 2007
Categories
Meta
Tag Archives: Privacy
Tumblr is back on my good side
In a piece I wrote a couple of weeks ago I’d brought up the problem of Tumblr hosting phishing/malicious web sites. Well after a few days of my feeding examples to Tumblr’s support team, and they taking down the sites, I haven’t … Continue reading
Deepsec 2011: Are Companies “Evil” When it Comes to Privacy?
Last month I attended the In-Depth Security Conference (better known as Deepsec) 2011. This was my first security conference (outside of Microsoft’s Bluehat) so I’m not sure exactly how to characterize it compared to the better known and larger Black … Continue reading
Posted in Computer and Internet, Privacy, Security
Tagged Chistopher Soghoian, Deepsec, Deepsec 2011, Encryption, InPrivate Filtering, Privacy
1 Comment
Is Hotmail’s “Trusted Sender” feature more than just show?
One year ago Microsoft introduced a feature in Hotmail that marked mail from a set of “trusted senders”, primarily banks, with a Trusted Sender icon. The idea was that if mail from your bank was marked with the icon you … Continue reading
When are we going to get serious about computer/network security (Part 3 – WiFi)?
I recently updated my Samsung Focus with the Windows Phone 7 NODO update and received a feature I am not sure I wanted, support for the WISPr protocol. WISPr support, long present on the iPhone, allows your AT&T smartphone to automatically and transparently switch … Continue reading
TRUSTe gets its Tracking Protection List act together
When Microsoft added the Tracking Protection List (TPL) feature to the Internet Explorer 9 beta TRUSTe made available a beta TPL that has been widely criticized. The problem with the TRUSTe beta TPL is that apparently what they did was just take everyone who … Continue reading
Posted in Computer and Internet, Microsoft, Privacy
Tagged IE9, ie9 tracking list, ie9 tracking protection, Microsoft, Privacy, TRUSTe
1 Comment
Microsoft IE9 Tracking Protection Lists (Part 2 – The How)
In Part 1 of my blog on the Microsoft Internet Explorer 9 (IE9) Tracking Protection List (TPL) feature I discussed why it was important to do something about tracking. Now lets talk just a little bit about how tracking and … Continue reading
Microsoft IE9 Tracking Protection Lists (Part 1 – The Why)
A very cool feature in Microsoft’s Internet Explorer 9 (IE9) is its support for Tracking Protection Lists (TPL). TPLs are a mechanism for reducing how tracking of your activities on the web can be done by advertisers (and others). I want to … Continue reading
A Data Breach with real damage
Some of you aren’t going to be sympathetic on this one, but have you heard of PornWikiLeaks? I was looking at CNet this morning and at the top of the list of most popular links was the story of how … Continue reading
Posted in Computer and Internet, Privacy, Security
Tagged Data Breach, Privacy, security
Comments Off on A Data Breach with real damage
I wonder what the number is for other industries
Ponemon Institute did a study of IT security in the energy industry. 75% admit to having suffered a data breach in the last 12 months. 71% of IT Security executives at global energy producers state that their executive management team … Continue reading
Posted in Computer and Internet
Tagged Data Breach, Privacy, security
Comments Off on I wonder what the number is for other industries
BP loses a laptop containing (unencrypted) personal information
Sadly A BP employee had the personal information about claimants from the Deepwater Horizon spill on a laptop with neither the files nor hard drive encrypted. And it was stolen (http://content.usatoday.com/communities/ondeadline/post/2011/03/bp-worker-loses-laptop-holding-data-for-13k-gulf-oil-spill-claimants/1?csp=34news). It isn’t clear if BP has inadequate policies, inadequate … Continue reading