background preloader

Offline Privacy & Security

Facebook Twitter

National Do Not Call Registry. Stopping Unsolicited Mail, Phone Calls, and Email. Tired of having your mailbox crammed with unsolicited mail, including preapproved credit card applications? Fed up with getting telemarketing calls just as you're sitting down to dinner? Fuming that your email inbox is chock-full of unsolicited advertising? The good news is that you can cut down on the number of unsolicited mailings, calls, and emails you receive by learning where to go to "just say no. " Consumer Reporting Companies If you decide that you don't want to receive prescreened offers of credit and insurance, you have two choices: You can opt out of receiving them for five years or opt out of receiving them permanently. To opt out for five years: Call toll-free 1-888-5-OPT-OUT (1-888-567-8688) or visit www.optoutprescreen.com.

To opt out permanently: You may begin the permanent Opt-Out process online at www.optoutprescreen.com. If you don't have access to the Internet, you may send a written request to permanently opt out to each of the major consumer reporting companies. Mail. Two new attacks on SSL decrypt authentication cookies. Researchers have devised two new attacks on the Transport Layer Security and Secure Sockets Layer protocols, the widely used encryption schemes used to secure e-commerce transactions and other sensitive traffic on the Internet.

The pair of exploits—one presented at the just-convened 20th International Workshop on Fast Software Encryption and the other scheduled to be unveiled on Thursday at the Black Hat security conference in Amsterdam—don't pose an immediate threat to the millions of people who rely on the Web-encryption standards. Still, they're part of a growing constellation of attacks with names including BEAST, CRIME, and Lucky 13 that allow determined hackers to silently decrypt protected browser cookies used to log in to websites. Together, they underscore the fragility of the aging standards as they face an arsenal of increasingly sophisticated exploits. It’s about TIME TIME works in a similar fashion. Not enough Band-Aids. The Comment Group: The hackers hunting for clues about you. 11 February 2013Last updated at 19:50 ET By Dave Lee Technology reporter, BBC News Clues given out by employees of companies being targeted by hackers are being used to gain access If you had an email that looked like it was from your boss asking how your recent holiday went, would you open it?

Most probably - and hackers know it. One group in particular has used this simple technique to devastating effect, using it to spy on some of the world's biggest corporations. But who are they, and what are they looking for? When security experts looked into some of the highest profile hacks in recent years - one particular criminal group kept on coming to their attention. The Comment Group, which industry insiders say is based in China, offer hacking for hire - be it for individuals, corporations or governments. It got its name from what was once its trademark technique - implanting dodgy links to malicious malware within the comments sections of popular websites. Nuclear attack “Start Quote Soft drinks. U.S. government to fight for warrantless GPS tracking | Security & Privacy.

The Privacy Blog. Knowledge Center - Hot Topics. Gagging recipients of National Security Letters found unconstitutional. A California federal judge has struck down a key provision of the law governing National Security Letters (NSLs), controversial government subpoenas whose use was expanded by the Patriot Act. Under current law, the recipient of an NSL can be legally prohibited from disclosing not only the contents of the request but the fact that he received a request at all. That, ruled Judge Susan Illston on Thursday, was inconsistent with the First Amendment.

The ruling is a setback for the FBI, which issues tens of thousands of NSLs every year. Judge Illston has given the government 90 days to appeal before it takes effect. Re-writing the law to save it Judge Illston is not the first to consider the constitutionality of the gag orders that often accompany NSLs. At the Second Circuit's prodding, the government has promised to notify NSL recipients that they had the option to challenge gag orders in court.

Judge Illston was also troubled by the indiscriminate use of gag orders. Limited time offer. Havenco Coming Soon. The World Has No Room For Cowards. It’s not often that one has the opportunity to be the target of a cyber and kinetic attack at the same time. But that is exactly what’s happened to me and my Web site over the past 24 hours. On Thursday afternoon, my site was the target of a fairly massive denial of service attack. That attack was punctuated by a visit from a heavily armed local police unit that was tricked into responding to a 911 call spoofed to look like it came from my home. Well, as one gamer enthusiast who follows me on Twitter remarked, I guess I’ve now “unlocked that level.” Things began to get interesting early Thursday afternoon, when a technician from Prolexic, a company which protects Web sites (including KrebsOnSecurity.com) from denial-of-service attacks, forwarded a strange letter they’d received earlier in the day that appeared to have been sent from the FBI.

Around the same time, my site came under a series of denial-of-service attacks, briefly knocking it offline. Original story: Security reporter tells Ars about hacked 911 call that sent SWAT team to his house (Updated) Update: Krebs has now written about his experience in some detail. The same people responsible for the DDoS attack carried out yesterday on Krebs' site launched a similar attack on Ars Technica this morning. Original story: Brian Krebs has always been a trailblazer among security reporters. His exposés completely shut down a California hosting service that coddled spammers and child pornographers and severely disrupted an organized crime syndicate known as Russian Business Network. More recently, his investigative journalism has followed the money to the people who sell malware exploit kits, illicitly procured credit reports, and denial-of-service services in underground forums. Now, Krebs has achieved a decidedly more grim distinction. It was around 5pm.

"As soon as I open the front door, I hear this guy yelling at me, behind a squad car, pointing a pistol at me saying: 'Don't move. In all, there were at least a dozen officers with pistols, shotguns, and assault rifles pointed at him. As Senate votes on warrantless wiretapping, opponents offer fixes. With little fanfare, the United States Senate is poised to re-authorize the FISA Amendments Act, the controversial legislation that gives the federal government broad powers to intercept Americans' international communications without a warrant. The House of Representatives approved a five-year extension in September, but without Senate support, some government surveillance powers will expire at the end of the year. The legislation originally passed in 2008. As we reported at the time, it created a new system of "authorizations" that allows senior government officials to sign off on international wiretapping schemes. The government must submit a description of its spying plans to a judge—but the government does not need to "identify the specific facilities, places, premises, or property" at which the eavesdropping will occur, as it would need to in the case of a search warrant.

That could allow the government to engage in dragnet surveillance without meaningful judicial oversight. Court: Hijacking ex-employee’s LinkedIn account violates PA law. Last year we covered the case of Linda Eagle, whose former employer, Edcomm, kept control of her LinkedIn account after firing her. In his October ruling, Judge Ronald Buckwalter of the District Court in Eastern Pennsylvania rejected the theory that taking control of a former employee's LinkedIn account violated the anti-hacking provisions of the Computer Fraud and Abuse Act.

But in a Tuesday ruling, Judge Ronald Buckwalter found that seizing an employee's LinkedIn account can constitute unauthorized use of the employee's name and likeness under Pennsylvania law. Edcomm's takeover of Eagle's LinkedIn account was an awkward affair. Eagle had shared her password with another Edcomm employee so that the employee could help her manage it. When she was terminated, the other employee was instructed to change the password, freezing her out of the account. But Eagle was not able to put a dollar figure on the Edcomm's harms to her. But Judge Buckwalter rejected this math as too speculative. Hack This Site Forum • View topic - MAC RAT - Keylogger. Re: MAC RAT - Keylogger by centip3de on Sat Sep 22, 2012 4:23 pm ([msg=69537]see Re: MAC RAT - Keylogger[/msg]) kittykat07 wrote:Hi,I was wondering if it was possible if someone could remotely deploy/install a RAT and/or key logger on a MAC? I have read about remote install RAT's & Key loggers for PC's but haven't heard of any that could be remotely deployed on a MAC...

Of course there are, Mac OS X isn't anymore secure than Windows is (in fact, because of the idea that it is somehow more innately secure, people do more stupid shit when using OS X making them more susceptible to things such as RAT's). Just look for them, they're out there. Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots.