background preloader

Cryptosecurity Cyberprivacy

Facebook Twitter

Good to know even if you tape over the lens because it's a sign that something else may not be right! - Alexander...

Diminishing Digital Privacy

Computer History Museum. Ubuntu Mate !!! Email Security. Safeum.com. Tor. Persistant surveillance systems. Katherine Albrecht - Spychips RFID & Electronic Surveillance! StartPage Search Engine. Disconnect Search: Search privately using your favorite search engine. Tor Animation. How to Build a (Nearly) Hack-Proof Password System with LastPass and a Thumb Drive.

Software Development and Collaboration Tools. Keep yourself protected online. _Crypto Tools.

Www.unseen.is

Bitcoinz machine. Anonymouse.org. Many Thanx Dean Clifford & ESC For This Intel. Hi-Tech Police Surveillance: The “StingRay” Cell Phone Spying Device. Blocked by a Supreme Court decision from using GPS tracking devices without a warrant, federal investigators and other law enforcement agencies are turning to a new, more powerful and more threatening technology in their bid to spy more freely on those they suspect of drug crimes.

Many Thanx Dean Clifford & ESC For This Intel. Hi-Tech Police Surveillance: The “StingRay” Cell Phone Spying Device

That’s leading civil libertarians, electronic privacy advocates, and even some federal judges to raise the alarm about a new surveillance technology whose use has yet to be taken up definitively by the federal courts. StingRay cell phone spying device (US Patent photo) The new surveillance technology is the StingRay (also marketed as Triggerfish, IMSI Catcher, Cell-site Simulator or Digital Analyzer), a sophisticated, portable spy device able to track cell phone signals inside vehicles, homes and insulated buildings.

When a suspect makes a phone call, the StingRay tricks the cell into sending its signal back to the police, thus preventing the signal from traveling back to the suspect’s wireless carrier. 5 Methods for Sending Anonymous Mails - National Parrot. Ensuring that your mail is secure is a major concern for users who while surfing the internet, leave their emails.

5 Methods for Sending Anonymous Mails - National Parrot

As a result, they may notice an increase the number of mails they receive daily. Nevertheless, if you do not want your inbox to be a dumping ground for spam mails, try sending a mail anonymously to protect yourself online. This platforms are designed to ensure that the receiver stays unaware of your identity. Jovago.com, Lagos Africa’s No 1 hotel booking portal shares ways on how you can send mails anonymously. Guerrilla Mail This is the easiest way to send a mail that cannot be traced to you. Mailinator With Mailinator, you can sign in with Google. TempInbox.com. ITProPortal.com: 24/7 Tech Commentary & Analysis.

KeepCalmAndUseAProxy. #Microsoft caught behaving badly again. Good news for #Linux! - @GordonKelly #privacy. Whonix - Privacy And Anonymity Operating System - #security #infosec #hack #Anonymous. California digital #privacy law VICTORY! - @KimZetter. Prox Me Something Dirty. Did GCHQ illegally spy on you? Now you can find out – from this page. Ever wonder whether the UK's listening post, GCHQ – the Government Communications Headquarters – was tuning in to your life a little too closely?

Did GCHQ illegally spy on you? Now you can find out – from this page

Well, now you may be able to find out, thanks to an online campaign launched by spy-botherers Privacy International (PI). There is a bit of a catch, as you'll see. Just a bit of a catch. The charity has set up a webpage where you can provide personally identifiable information – your name, email address, IP address, MAC address and so on – and then submit a claim to the Investigatory Powers Tribunal (IPT). The IPT oversees the security services, and asks it to confirm whether your details are included in a vast database of information held by the UK security services. According to PI, the IPT is legally obliged to let you know if those details are included. It's also in your interest to file as soon as possible, as the Tribunal will only search records that go back a year. FBI: Deal with your own Internet of Things security. The FBI has a rather interesting opinion on how users should approach IoT devices and their security.

FBI: Deal with your own Internet of Things security

The takeaway? If you want to use it, you'd better know what you're doing -- and keep it off the Internet. Last week, the law enforcement agency issued a public notice on the Internet of Things (IoT) and the opportunities therein for cybercrime. IoT devices, ranging from connected cars to smart fridges and home security systems, have one thing in common: connection to the Internet and data transfer in some way. ⚒ on Twitter: "US librarians defy cops, Feds – and switch on their Tor exit node #security... H4x0rD1r3c70ry on Twitter: " HID Keyboard Attack with Android (Not Kali NetHunter): Hi , Today i wi... #hack #anonymous" ⚒ on Twitter: " For your privacy - #twitter #marketing #fun #anonymous #5T3F4N"... SafeUM Blog - Father of the Internet is terrified of the Internet of Things. Vint Cerf is known as a "father of the Internet," and like any good parent, he worries about his offspring -- most recently, the IoT.

SafeUM Blog - Father of the Internet is terrified of the Internet of Things

"Sometimes I'm terrified by it," he said in a news briefing Monday at the Heidelberg Laureate Forum in Germany. "It's a combination of appliances and software, and I'm always nervous about software -- software has bugs. " The Internet of Things will offer the ability to manage many of the appliances we depend on, acknowledged Cerf, who won the Turing Award in 2004. With its ability to continuously monitor such devices, it also promises new insight into our use of resources, he said. Devices such as Google's Nest thermostat, for instance, can "help me decide how well or poorly I've chosen my lifestyle to minimize cost and my use of resources -- it can be an important tool," he said.

As with so many technological tools, however, there are plenty of potential downsides. Macheadfreemedia How come you are posting on yahoo ??? Just curious :/""... Cassandra Cross on Twitter: "“@Scamwatch_gov: ABA and the ACCC provide fresh warning about scams and information security: #JSB364" Anis sur Twitter : "TIP: Use this Copy/Paste script to remove all your hidden Microsoft's spying updates from Windows 7, 8 & 8.1 #Privacy" El Cid Barett sur Twitter : "This Week in #Security: Data Dumps, IRS Breach Doubles, Spotify Overhauls Privacy Policy #infosec" Andrew James sur Twitter : "@Techworm_in @abhishekmdb SpyShelter is very good."... Techworm sur Twitter : "Top AV's: Avast, McAfee, Norton, Kaspersky, Bitdefender fail miserably in basic security tests. Anonymous Sweden sur Twitter : "Does your mobile carrier track you online? 360 Security sur Twitter : "Extend your battery duration with 360 Security. Maximize Your Android’s Performance Now!

AnonDroidNet sur Twitter : "Search engine on - Search engine DuckDuckGo are...: @Doemela: Search engine @duckduckgo on #Tor - Search eng... AnonDroidNet sur Twitter : "Onion Browser Check - Onion Browser is experimental...: @Doemela: Onion Browser #Tor Check - Onion Browser is... AnonDroidNet sur Twitter : "Security in-a-Box - Security in-a-Box is a guide to digital security... -a-Box: @Doemela: Security in-a-Box -... AnonDroidNet sur Twitter : "Access Tor Usenet4all - What is Usenet? The function of Usenet,...: @Doemela: Access Tor Usenet4all - What is ...

VICE Canada sur Twitter : "Here Are the Mobile Companies Still Tracking You Across the Web: AnonymousUncensored sur Twitter : "Mozilla has added new features in the latest version of Firefox to give users more authority over things they don'… OccuWorld sur Twitter : "Kali Linux 2.0 Released... Leading geoengineer is "terrified" of own #technology … #geoengineering #chemtrails #SRM #NWO #GMO. A leading geoengineer has admitted that he is “terrified” of geoengineering technology.

Leading geoengineer is "terrified" of own #technology … #geoengineering #chemtrails #SRM #NWO #GMO

Dr Matthew Watson, principal investigator for the Spice project, said that humans may have to admit having failed as planetary stewards, commenting on his own and others’ technology–used to reduce the amount of sunlight reaching the earth though manipulation of the atmosphere–science that, experts openly own, is not understood in terms of costs and benefits and which they suspect will be neither “magic bullet or Pandora’s box.” “Personally, this stuff terrifies me,” said Dr Matthew Watson of University of Bristol, principal investigator for the Spice project (Stratospheric Particle Injection for Climate Engineering), one of several teams at the forefront of geoengineering science.

“It’s a watershed for our relationship with the Earth and with nature. Privacy tools - encryption against global mass surveillance □ TechCrunch sur Twitter : "Today’s growing cyber security trend... Canada’s cyber security and the changing threat landscape. My article, Canada’s cyber security and the changing threat landscape has just been published online by Critical Studies on Security.

Canada’s cyber security and the changing threat landscape

Broadly, it grapples with what cyber security has come to mean in the Canadian context. The article deals partly with Canada’s Cyber Security Strategy, the operations of the Canadian Cyber Incident Response Centre (CCIRC) between 2011 and 2013 (a time of great concern over hacktivism [Anonymous] and Advanced Persistent Threats [China]), and what we can say about Canada’s cyber security orientation in the “post-Snowden era”. It is based on publicly-available texts and several years of Access to Information requests (the requests were informal, for documents already released to other people, giving me several thousand pages to work with).

What is cyber security, and why should we care? One of the key effects of cyber security strategies and classifications is that they specify the boundaries of what is to be secured. Operational and Technocratic Discourse. Hacking Team's $175,000 Apple Store And Google Play Surveillance Apps Flirt With Illegality. Anyone browsing Apple’s App Store or Google Play should be careful about what they download.

Hacking Team's $175,000 Apple Store And Google Play Surveillance Apps Flirt With Illegality

It might just be sophisticated, stealthy malware written by coders at “notorious” Italian surveillance company Hacking Team that works with the likes of the FBI, the Drug Enforcement Agency and umpteen other global government agencies, some of which have questionable records on human rights. Such tactics from a government contractor are dangerous, due to the possibility of infecting innocent users, and legal experts have expressed concern about the practice. Amongst 415GB of documents leaked by the Hacking Team hackers this weekend were two pricing lists, which included mobile surveillance offerings delivered via the App Store and Google Play. One appeared to be a general price list, the other one written up exclusively for the New York County District Attorney’s Office. Lionel Gresse sur Twitter : "Wainting for the #SSL patch... Coke & Pizza : check ! What about you? #ITSecurity #CyberProtection #DataBreach.

Emsisoft Anti-Malware and Emsisoft Internet Security 10.0.0.5532. Emsisoft Anti-Malware protects your PC from malware-based hacker attacks.

Emsisoft Anti-Malware and Emsisoft Internet Security 10.0.0.5532

Its special capabilities in dealing with trojans, worms, dialers and spyware make it an indispensable enhancement to any protection system, whether on a private PC or a company network. Emsisoft Anti-Malware is fueled by a dual engine malware scanner for twice the malware cleaning power, with no extra resource requirements. On top of that, Emsisoft Anti-Malware can even remove potentially unwanted programs (PUPs) that overload your computer with resource wasting bloat. Altogether, that guarantees superior detection, efficient removal, and a clean Windows operating system where you’re completely Malware-Free.

China's new cybersecurity law sparks censorship concerns. Beijing (AFP) - China has released a draft cybersecurity law which immediately sparked concerns that it is too vague and could signal Beijing's widespread censorship of the Internet becoming even more far-reaching.

China's new cybersecurity law sparks censorship concerns

The ruling Communist Party oversees a vast censorship system -- dubbed the Great Firewall -- that aggressively blocks sites or snuffs out Internet content and commentary on topics considered sensitive, such as Beijing's human rights record and criticism of the government. The proposed legislation will "ensure network security, (and) safeguard the sovereignty of cyberspace and national security," according to the draft law, which was posted Monday on the website of the National People's Congress (NPC), the rubber-stamp parliament, but reported by state media Wednesday. Netizens could not "disturb the social order, (and) harm the public interest," the proposals said. Digital currency is slowly winning the popularity contest #bitcoin #crypto #cryptocurrency. Password Manager, Auto Form Filler, Random Password Generator & Secure Digital Wallet App. Private group chat, video chat, instant messaging for teams.

FixMeStick review: A one-stop clean up for infected PCs. We all know that virus infections are a pain, not only do they disrupt your work they can also be hard to remove as they often prevent you from downloading or running cleanup tools or even from accessing Windows. SEE ALSO: Steve "the Woz" Wozniak trolls Samsung: Sells "worthless" Galaxy Gear smartwatch on eBay If you don’t have access to a friendly geek with the right tools you can be faced with hours of work or even having to wipe out and reload your machine. Now there’s a solution in the form of FixMeStick. It’s a USB stick that removes viruses and infections from both Windows PCs and Macs. It follows the same process that professionals do by running multiple scanning tools to increase detection rates and operating outside the machine’s normal operating system to prevent interference.

How it works The FixMeStick is a bootable drive so if your BIOS is set to start from USB you can just plug it and switch on the machine. Hushmail – Free Email with Privacy.