Blog Posts Tagged with "Monitoring"

D13f77e036666dbd8f93bf5895f47703

I Know What You Tweeted Last Summer...

July 04, 2012 Added by:Theresa Payton

We have mentioned before that Twitter will send every tweet to the National Archives and the Library of Congress, so watch what you tweet. Now new tools unleash a trove of data in moments. For the 140 million and growing user base that tweets over 400 million tweets per day, this might be a little more than alarming...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Right to Internet Anonymity and Legal Implications

June 28, 2012 Added by:Plagiarist Paganini

Anonymizing services are based on the concept of distribution of routing information during a transmission. It is not known prior the path between a source and destination, and every node of the network manages minimal information to route the packets to the next hop without preserving history of the path...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Social Media Security: What Parents Should Worry About

June 21, 2012 Added by:Kelly Colgan

There’s no shortage of cautionary tales about social media risks for children. They’re all over the news. In a recent Harris Interactive poll, parents said their top concerns included sexual predators, cyberbullying and a desire to monitor their children’s activities online and on mobile phones...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

How to Activate 'Do Not Track' in Your Browsers

June 21, 2012 Added by:Electronic Frontier Foundation

Do Not Track combines both technology (a signal transmitted from a user) as well as a policy framework for how companies that receive the signal should respond. The following tutorial walks you through the enabling Do Not Track in the four most popular browsers: Safari, Internet Explorer 9, Firefox, and Chrome...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Huawei Boasts of Remote Data Interception Capabilities

June 19, 2012 Added by:Headlines

“Embedding these capabilities in any network means…(that) they can then intercept and control those networks... I am so worried about Chinese cyber warfare threats, their abilities to monitor and remotely shut down international communications networks, including critical infrastructure networks"...

Comments  (1)

65be44ae7088566069cc3bef454174a7

Big Brother Likes Big Data: Balancing Privacy with Innovation

June 05, 2012 Added by:Rebecca Herold

Big Data and associated analytics can be used to improve business and customer experiences and bring innovation and medical breakthroughs. However, organizations must make sure they don’t cross that line of customization and business improvements into creepiness and full-blown privacy invasion...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Lieberman-Collins Cybersecurity Act Frequently Asked Questions

June 04, 2012 Added by:Electronic Frontier Foundation

Companies already use firewalls to protect their networks. ISPs do filtering as well, for example disallowing end users from hosting certain services, or de-prioritizing certain types of traffic. But this bill makes no effort to restrict the definition of countermeasures to reasonable techniques in use today...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

To Backdoor or Not?

June 03, 2012 Added by:Jayson Wylie

There is speculation of purposeful backdoor implementations for monitoring by the US government in the name of national security. If there is the ability for a government to monitor communications, how can we be assured that another government is not using the same means, but for different purpose?

Comments  (0)

65be44ae7088566069cc3bef454174a7

Is Frictionless Sharing Like Digital Privacy Cancer?

May 25, 2012 Added by:Rebecca Herold

In a nutshell, “frictionless sharing” basically is a passive service that allows apps to automatically share your activity to a very wide number of entities and locations as you visit different websites, view videos and photos, listen to music, read ads and articles, and so on...

Comments  (3)

54a9b7b662bfb0f0445d1661d7ed180b

Segmenting Safe Zones in IPv6

May 24, 2012 Added by:Jayson Wylie

IPv6 has created a vast address space and only portions are taken up by the typical allocations. A paid for, theme based, segmented and constrained IPv6 sub-network would provide users with some feeling of safety in an environment where that is not offered today...

Comments  (2)

94ae16c30d35ee7345f3235dfb11113c

Off Topic: What to do about Conspiracy Theorists?

May 21, 2012 Added by:Joel Harding

I received an alert recently about an article dealing with Electronic Warfare or EW. Since EW has always been one of the components of Information Operations I decided to take a look. Mistake. My very first indicator, before I even had to think, was that the title was in ALL CAPS...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

The FBI, Content Monitoring, Backdoors and Going Dark

May 09, 2012 Added by:Plagiarist Paganini

The FBI is working to obtain a backdoor for major social networks like Facebook and also for some of the most used communications platforms such as Skype and Instant Messaging for government surveillance, and is collaborating with companies like Microsoft, Google and Yahoo...

Comments  (4)

B8db824b8b275afb1f4160f03cd3f733

Wait, What? Someone Has to Look at Those Logs?

April 26, 2012 Added by:Jack Daniel

Monitoring the performance of your MSSP is cheap insurance- the last thing you want to face is a failure of your service and the need to rebuild an in-house program. You thought getting all that data pushed out to the MSSP was a pain- just imagine trying to get it back...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

EFF Opposes CISPA at Hackers and Founders Panel

April 23, 2012 Added by:Electronic Frontier Foundation

The fundamental problems with the bill are numerous. The language of the bill is too broad, and it's hard to know what information will actually be shared by private entities as a result of the bill, or what “cybersecurity systems” will do once they are enabled...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Counter Terrorism Guidelines Give Authorities Vast Access to Info

April 17, 2012 Added by:Electronic Frontier Foundation

Attorney General Holder recently signed expansive guidelines for terrorism analysts, allowing the NCTC to mirror federal databases containing personal information and hold onto the it for an extended period even if the person is not suspected of involvement in terrorism...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Webinar: Reducing Visibility Costs with Unified Security Management

April 17, 2012 Added by:Infosec Island Admin

Webinar: Thursday, April 19, 2012 12:00 PM - 1:00 PM EST - Beyond improving your basic defenses, understand how unifying security management can maintain compliance and provide visibility into your infrastructure at a lower cost than traditional approaches...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »