Internet Privacy & Security
Get flash to fully experience Pearltrees
The Information Commissioner's Office (ICO) said that public sector bodies must assess whether they could avoid disclosing some information about employees whilst still ensuring that "the legitimate interests" of those requesting the information are observed. "For example, could the legitimate interests be met by other means that interfere less with the employee’s rights and freedoms?" the ICO said in new guidance . (32-page / 155KB PDF) "Is it necessary to provide all of the information requested?
The current theory is that a nation-state wanted to break into Lockheed-Martin and Northrop-Grumman to steal military secrets. They couldn't do it, since these companies were using RSA SecurID tokens for network authentication. So, the hackers broke into RSA with a targeted e-mail attack.
6 July 2011 Last updated at 11:02 GMT The father of David Foulkes, who was killed in the Edgware Road blast, said police had contacted him Families of 7/7 bombing victims may have had their phones hacked by the News of the World, it has emerged. A solicitor for some of the relatives said one family had been told their phone may have been hacked in 2005.
Jotti's malware scan is a free online service that enables you to scan suspicious files with several anti-virus programs. Scanners used are Linux versions; detection differences with Windows versions of the same scanners may occur due to implementation differences. There is a 25MB limit per file.