Revelations about the PRISM project involve US tech companies that have been compelled to provide special assistance to US intelligence agencies. Will secret arrangements between tech companies and US intelligence affect how independent security researchers disclose vulnerabilities?
Read more »Has the NSA "poisoned the well" for responsible disclosure?
Category: Philosophy Tags:
- Login to post comments
Skype with care – Microsoft is reading everything you write
Anyone who uses Skype has consented to the company reading everything they write. The H's associates in Germany at heise Security have now discovered that the Microsoft subsidiary does in fact make use of this privilege in practice. Shortly after sending HTTPS URLs over the instant messaging service, those URLs receive an unannounced visit from Microsoft HQ in Redmond.
Read more »Category: Opposition Tags:
- Login to post comments
New Year's Resolution: Full Disk Encryption on Every Computer You Own
It's time all of us made a commitment to this basic data security. With full disk encryption all data is protected by default and prying officials at least have to jump through legal hoops before they can start casually thumbing through all your private data.
Read more »- Login to post comments
Does disk encryption really protect your data from unauthorized access?
Disk encryption is one of several physical security measures that could be used to protect data on your computer from unauthorized physical access. And it is best configured during installation, not after. But once configured, how effective is it?
Read more »Category: Beginner Tags:
- Login to post comments
Stop the Internet Blacklist Legislation
As drafted, the legislation would grant the government and private parties unprecedented power to interfere with the Internet's domain name system (DNS). The government would be able to force ISPs and search engines to redirect or dump users' attempts to reach certain websites' URLs.
Read more »- Login to post comments
PHP-FPM/Nginx Security In Shared Hosting Environments (Debian/Ubuntu)
If you want to use nginx and PHP-FPM for shared hosting environments, you should make up your mind about security. In Apache/PHP environments, you can use suExec and/or suPHP to make PHP execute under individual user accounts instead of a system user like www-data.
Read more »Get Professional Security Testing with BackTrack
Penetration testing involves deliberately attacking your system to determine vulnerabilities. Using a variety of tools designed for specific tasks, you attempt to break into your own system. Exhaustive pen testing helps you assess potential breach points, which you should then plug before anyone attempts to exploit them.
Read more »Category: High End Tags:
- Login to post comments
Critics label cybercrime bill 'invasion of privacy'
Draconian Australian Cybercrime Bill would allow the Attorney General to hand over Australian data to US security services on request, with no subsequent oversight on how long that data might be retained, or how it might be used.
Read more »- Login to post comments
Kaspersky study finds Adobe software is biggest security risk
Before casually clicking on that "Install Adobe Flash Player/Reader" button, think twice. Then don't do it! You'll be inviting every cracker and his dog to invade your network.
Read more »- Login to post comments
Encrypt Early, Encrypt Often!
Even if you have done nothing wrong, the government agencies examining your files have no contractual obligation to you to keep them safe, nor even to get rid of all their copies once they've determined you're not guilty or that they pulled the wrong party's data.
Read more »- Login to post comments
Google also passes on European data to US authorities
More solid reasons for leaving the cloud to the birds. With varying international laws, almost anyone can end up examining your private data. Security and privacy are never guaranteed.
Read more »- Login to post comments
Encrypt the Web with HTTPS Everywhere
The Electronic Frontier Foundation (EFF), in collaboration with the Tor Project, has launched an official 1.0 version of HTTPS Everywhere, a tool for the Firefox web browser that helps secure web browsing by encrypting connections to more than 1,000 websites.
Read more »- Login to post comments
Lightweight Portable Security (LPS)-A Linux distro from the US Department of Defense
Lightweight Portable Security (LPS), created by USA's Department of Defence, is a small Linux live CD focusing on privacy and security, for this reason, it boots from a CD and executes from RAM, providing a web browser, a file manager and some interesing tools. LPS-Public turns an untrusted system into a trusted network client.
Read more »Category: End User Tags:
- Login to post comments
10 Ultimate commands to generate randoms passwords on your terminal
One of the things I love in Linux is that we can do a simple thing 100 different ways in it, like creating random passwords..
Read more »Category: Beginner Tags:
- Login to post comments
Linux for mobile users
The smart mobile user shouldn’t overlook Linux. The question is, which distro should you pick? You’ll get a different answer depending who you ask.
Read more »Category: End User Tags:
- Login to post comments