Feb
8
2009
While no one may have a real reason to spy on you, relying solely on security through obscurity has always been a poor policy to live by. Because of this, encryption is the only real option you can trust. We teach you how to put your emails in a lockbox before sending them off to their destinations.
Comments Off on Protect your Privacy! How to Send Encrypted Emails in Linux | tags: email, emails, encrypted, encryption, linux, privacy, security | posted in technical news
Jan
25
2009
chiguy writes “There’s been another break-in at Monster.com. It’s surprising that there are still unencrypted passwords stored in database despite the previous hack, as is the decision to not email users — presumably so that no one will make a fuss. From PC World: ‘Monster.com user IDs and passwords were stolen, along with names, e-mail addresses, birth dates, gender, ethnicity, and in some cases, users’ states of residence. The information does not include Social Security numbers, which Monster.com said it doesn’t collect, or resumes. Monster.com posted the warning about the breach on Friday morning and does not plan to send e-mails to users about the issue, said Nikki Richardson, a Monster.com spokeswoman. The SANS Internet Storm Center also posted a note about the break-in on Friday.'”
Read more of this story at Slashdot.
Comments Off on Monster.com Data Stolen, Won’t Email Users | tags: database, email, encrypted, google, security | posted in technical news
Jan
21
2009
Comments Off on Elgato updates up EyeTV to 3.1 – NetworkWorld.com | tags: encrypted, google, Mac, network, news, tv | posted in technical news
Jan
21
2009
Comments Off on Elgato updates up EyeTV to 3.1 – NetworkWorld.com | tags: encrypted, google, Mac, network, news, tv | posted in technical news
Jan
13
2009
rye writes in to recommend a Sherri Davidoff interview with Matt Knox, a talented Ruby instructor and coder, who talks about his early days designing and writing adware for Direct Revenue. (Direct Revenue was sued by Eliot Spitzer in 2006 for surreptitiously installing adware on millions of computers.) “So we’ve progressed now from having just a Registry key entry, to having an executable, to having a randomly-named executable, to having an executable which is shuffled around a little bit on each machine, to one that’s encrypted — really more just obfuscated — to an executable that doesn’t even run as an executable. It runs merely as a series of threads. … There was one further step that we were going to take but didn’t end up doing, and that is we were going to get rid of threads entirely, and just use interrupt handlers. It turns out that in Windows, you can get access to the interrupt handler pretty easily. … It amounted to a distributed code war on a 4-10 million-node network.”
Read more of this story at Slashdot.
Comments Off on Interview With an Adware Author | tags: computers, encrypted, google, Mac, network | posted in technical news
Jan
7
2009
snydeq writes “According to the Identity Theft Resource Center, more than 35 million data records were breached in the US in 2008. Tracking media reports and disclosures companies are required to make by law, the ITRC noted a 47 percent increase in breaches last year at a range of well-known US companies and government entities. The majority of the lost data was neither encrypted nor protected by a password. A third of the breaches occurred at business entities. One in six breaches were attributed to insider theft, a figure that more than doubled between 2007 and 2008, ITRC said.”
Read more of this story at Slashdot.
Comments Off on Data Breaches Rose Sharply In 2008 | tags: encrypted, google | posted in technical news