Open Source NAC (Network Access Control)
How Dropbox sacrifices user privacy for cost savings Note: This flaw is different than the authentication flaw in Dropbox that Derek Newton recently published.
BlackBerry dominates the North American smartphone market, enjoying almost 40 per cent market share. A 20 per cent worldwide market share isn’t exactly a bad thing, too. Smartphone Forensics: Cracking BlackBerry Backup Passwords « Advanced Password Cracking – Insight
Facebook Places: Your Friends Are Here, But What About Your Privacy? | ACLUNC dotRights
Open Source Center - Login
The Dark Web Project and Forum Portal As part of its Dark Web project, the Artificial Intelligence Lab has for several years collected international jihadist forums. Dark Web Terrorism Research : Research : Artificial Intelligence Laboratory : Eller College of Management : The University of Arizona
Searching the Searchers with SearchAudit Searching the Searchers with SearchAudit
Deep packet inspection Bij deep packet inspection (DPI) wordt elektronisch dataverkeer tussen zender en ontvanger inhoudelijk geanalyseerd. Dit gaat verder dan de inspectie van afzender- en ontvangeradres zoals routers dat voor het verder leiden van de gegevens noodzakelijkerwijs moeten doen. Het internet functioneert doordat gegevens in gestandaardiseerde brokstukken worden verdeeld, verpakt en verstuurd.
Top Secret America
Google Agonizes on Privacy as Advertising World Vaults Ahead
What They Know
Put your pants back on: Chatroulette logging IP addresses, screengrabbing users Pantsless videocreeps (and anyone who puts a premium on privacy), beware: Chatroulette founder Andrey Ternovskiy recently announced on the official Chatroulette company blog that they've been logging data about users: Recently I decided to seriously look into issue again, and I've had a breakthrough. Luckily we all live in a real world, and we can easily apply the laws of a real world even on an internet application.
Report Phishing Sites US-CERT collects phishing email messages and website locations so that we can help people avoid becoming victims of phishing scams. You can report phishing to us by sending email to firstname.lastname@example.org. What Is Phishing? Phishing is an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques. Phishing emails are crafted to appear as if they have been sent from a legitimate organization or known individual. These emails often attempt to entice users to click on a link that will take the user to a fraudulent website that appears legitimate.
Schneier on Security