Open Source NAC (Network Access Control)
SecureDataTransfer. SecureCloud. How Dropbox sacrifices user privacy for cost savings. Note: This flaw is different than the authentication flaw in Dropbox that Derek Newton recently published.
Summary Dropbox, the popular cloud based backup service deduplicates the files that its users have stored online. This means that if two different users store the same file in their respective accounts, Dropbox will only actually store a single copy of the file on its servers. The service tells users that it "uses the same secure methods as banks and the military to send and store your data" and that "[a]ll files stored on Dropbox servers are encrypted (AES-256) and are inaccessible without your account password. " Smartphone Forensics: Cracking BlackBerry Backup Passwords « Advanced Password Cracking – Insight. BlackBerry dominates the North American smartphone market, enjoying almost 40 per cent market share.
A 20 per cent worldwide market share isn’t exactly a bad thing, too. The total subscriber base for the BlackBerry platform is more than 50 million users. Today, we are proud to present world’s first tool to facilitate forensic analysis of BlackBerry devices by enabling access to protected data stored on users’ BlackBerries. One of the reasons of BlackBerry high popularity is its ultimate security. It was the only commercial mobile communication device that was ever allowed to a US president: Barack Obama has won the privilege to keep his prized BlackBerry despite resistance from NSA.
TechDirt. Facebook Places: Your Friends Are Here, But What About Your Privacy? Open Source Center - Login. Dark Web Terrorism Research : Research : Artificial Intelligence Laboratory : Eller College of Management : The University of Arizona. The Dark Web Project and Forum Portal As part of its Dark Web project, the Artificial Intelligence Lab has for several years collected international jihadist forums.
These online discussion sites are dedicated to topics relating primarily to Islamic ideology and theology. The Lab now provides search access to these forums through its Dark Web Forum Portal, and in its beta form, the portal provides access to 28 forums, which together comprise nearly 13,000,000 messages. The Portal also provides statistical analysis, download, translation and social network visualization functions for each selected forum. Here are some important links for the Dark Web project and Portal: Searching the Searchers with SearchAudit. Searching the Searchers with SearchAudit John P.
John, Fang Yu, Yinglian Xie, Martin Abadi, and Arvind Krishnamurthy August 2010 Search engines not only assist normal users, but also provide information that hackers and other malicious entities can exploit in their nefarious activities. With carefully crafted search queries, attackers can gather information such as email addresses and misconfigured or even vulnerable servers. Deep packet inspection. Top Secret America. Google Agonizes on Privacy as Advertising World Vaults Ahead. What They Know. Put your pants back on: Chatroulette logging IP addresses, screengrabbing users. Pantsless videocreeps (and anyone who puts a premium on privacy), beware: Chatroulette founder Andrey Ternovskiy recently announced on the official Chatroulette company blog that they've been logging data about users: Recently I decided to seriously look into issue again, and I've had a breakthrough.
Luckily we all live in a real world, and we can easily apply the laws of a real world even on an internet application. Panopticlick. Report Phishing Sites. US-CERT collects phishing email messages and website locations so that we can help people avoid becoming victims of phishing scams.
You can report phishing to us by sending email to firstname.lastname@example.org. What Is Phishing? Phishing is an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques. Phishing emails are crafted to appear as if they have been sent from a legitimate organization or known individual. These emails often attempt to entice users to click on a link that will take the user to a fraudulent website that appears legitimate. Schneier on Security.