Articles about Privacy

In Apple vs FBI, it's our freedom at stake

Ever since it was announced that all iPhones would be encrypted by default with no reasonable way for Apple to unlock them, the FBI has been locked in an ever more acrimonious deadlock with the company. In the latest and most explosive development, the FBI has chosen its battle well: could there be a more emotive subject, or seemingly good reason for Apple to comply, than a demand to decrypt a single phone that belonged to a known terrorist?

By drawing its battle-lines in this way, the FBI achieves two things. On a basic level, it makes Apple look unreasonable for refusing, and therefore makes it easy to paint Apple as the "bad guy" who is preventing the "good guys" from protecting the American people against terrorists. This is a powerful argument, and certainly seems to have persuaded all front-running politicians.

Continue reading

Cyber threats could overwhelm the healthcare industry

Medical data risk

Healthcare organizations average about one cyber attack per month and almost half say they have experienced an incident involving the loss or exposure of patient information during the last year, leaving patients at risk of identity theft.

These are among the findings of a survey by security company ESET and the Ponemon Institute into cyber security in the healthcare sector.

Continue reading

Updated Snooper's charter will allow police to remotely hack phones and computers

The UK's controversial Snooper's charter (or draft Investigatory Powers Bill) has been updated to grant the police sweeping new powers. The new legislation will permit authorities to not only access the browsing histories of suspected criminals, but also to remotely hack into computers and phones in certain circumstances.

Previous version of the bill had limited such powers to the investigation of "serious crime", but the updated version expands this dramatically. Home Secretary Theresa May is hoping to push the draft Investigatory Powers Bill through parliament later this year. The bill has already met with strong criticism from not only privacy groups, but also governmental advisers. While there are some concessions to protect unbreakable encryption, the latest changes will do little to assuage concerns with the bill.

Continue reading

Kiddle lets children search the web 'safely', leaves the sex talk to mom and dad

Parents with younger children may well be concerned about the type of content their offspring could stumble across online. While it is possible to enable the Safe Search feature of Google, this is not 100 percent reliable, and more adult content can slip through the net. A new 'visual search engine for kids', Kiddle, launched this week to plug the gap.

Although nothing to do with Google, Kiddle apes the colorful logo of the famous search giant, and also relies on Google Safe Search for some of its results. The bulk of the first ten results returned by any search, however, are handpicked by editors to ensure they are safe for children and easy to read. There are also some automatic filters in place that prevent searches for 'bad words' and the like and, interestingly, treat searched for homosexuality and heterosexuality in completely different ways.

Continue reading

Apple win: New York judge dismisses FBI request in iPhone unlocking case

A New York judge has rejected an FBI demand for Apple to bypass the lock screen of a seized iPhone. Judge James Orenstein ruled that the FBI may not use the All Writs Act to force Apple to "bypass the passcode security" of an iPhone 5S running iOS 7 in a drug case.

This is not the only iPhone the FBI is seeking to have unlocked, and many are looking to the New York case as a precursor to a similar case involving the San Bernadino shooter's iPhone which is set to be heard next month. Talking about the California case, Tim Cook has liken complying with the FBI demands to create a backdoor as the "equivalent of cancer", and Judge Orenstein appears to have recognised that the New York drugs case could be seen to set a precedent.

Continue reading

Most consumers don't like to be tracked, but few are doing something about it

Most users know their online activity is being tracked. They’re not OK with it, yet most of them do nothing about it. Those are the general conclusions of a new quiz entitled Are you cyber savvy?, made by Kaspersky Lab.

The security firm says consumers don’t know how to protect their privacy online.

Continue reading

Documents reveal details of EU-US Privacy Shield data sharing deal

Details of the data sharing arrangements agreed between the US and EU earlier in the month have been revealed in newly published documents. The EU-US Privacy Shield transatlantic data transfer agreement is set to replace the Safe Harbor that had previously been in place.

The European Commission has released the full legal texts that will form the backbone of the data transfer framework. One of the aims is to "restore trust in transatlantic data flows since the 2013 surveillance revelations", and while privacy groups still take issue with the mechanism that will be in place, the agreement is widely expecting to be ratified by members of the EU.

Continue reading

Everything you need to know about Windows 10: product keys, secret tools, essential hacks, and problem fixes

Windows 10 has been with us for a number of months now, and this has given us plenty of time to unearth all manner of secrets about the operating system. Since launch we have experienced love, hate and everything in between, but we've also learned a great deal. We thought it would make sense to pull together all of this info into one place so you have it available in a handy respository. So what will you find here? Everything!

In the days of Windows being a paid-for OS, people would hunt high and low for cracks and serials to bypass activation. Now that Windows is free, this clearly isn't as prevalent as it used to be, but you might still want to look up your Windows 10 product key before you reinstall. But that's just the start; read on to learn tips, tweaks, hacks, and problem fixes.

Continue reading

Tor Project says Google, CloudFlare and others are involved in dark web surveillance and disruption

With privacy concerns and the threat of surveillance from the likes of the NSA, more and more people are turning to the dark web and Tor. The anonymous, encrypted network has become a haven for not just illegal activity, but also for those who simply don’t want what they do online to be tracked and traced.

But now the Tor Project has voiced concerns that CDN and DDoS protection service CloudFlare is monitoring Tor traffic by introducing CAPTCHAs and cookies. CloudFlare is not alone: similar accusations are levelled at Google and Yahoo which are described as 'larger surveillance companies'. Concerns about interference with Tor traffic have been raised by project administrators in a ticket entitled "Issues with corporate censorship and mass surveillance".

Continue reading

Microsoft stands with Apple against the FBI

Microsoft will join Apple against the FBI and U.S. Justice Department, filing a friend-of-court—or amicus—brief in a case going to court tomorrow. The government wants Apple to create a special version of iOS, referred to by critics as FBIOS, to break into an iPhone 5c security feature. The device manufacturer argues that compliance would set a precedent that would give law enforcement carte blanche with other mobile devices.

Brad Smith, Microsoft's chief legal counsel, says the company "wholeheartedly supports Apple"—a statement that eradicates any potential confusion caused by cofounder Bill Gates. In an interview with Financial Times two days ago, Gates supported the government's demands. I responded, calling his position a "catastrophic occurrence that demands current chief executive Satya Nadella's official response. There needs to be clear policy about government backdoors and the position with respect to the San Bernardino shooting iPhone". The company's position is now unequivocally clear—presuming the legal filing fits with "wholeheartedly".

Continue reading

Pawn shop phones contain left over personal data

If you buy a used mobile phone you could be getting more than you bargained for according to security software company Avast. It seems that some phone owners are inadvertently pawning their porn.

Avast purchased 20 used smartphones from pawn shops in 4 cities -- New York, Paris, Barcelona and Berlin. The goal being to see if used phones are regularly being sold with previous owners’ personal information still retrievable on them.

Continue reading

I'm going to let you into a little secret about Windows 10

Wait for it... wait for it... For all of the criticism I have levelled at Microsoft, I actually rather like Windows 10. It is, of course, not without its faults, but in the main it's a solid operating system and a reasonable upgrade from Windows 8.1. I have a (well-earned) reputation for negativity, cynicism, and pessimism, so what's with the sudden burst of positivity?

In reality, nothing has changed, but I've settled into my stride. Rather than battling the bits I hate (and there are still plenty), I've learned to turn a blind eye. I've realized that I was trying to fit Windows 10, rather than making Windows 10 fit me. There's still plenty I don't like, but by simply learning not to focus on them, I've come to like the operating system much more. As with so many things in life, it's all about how you use it.

Continue reading

Identifying users with behavioral biometrics

Password

As we're regularly being told, passwords on their own are no longer sufficient to ensure our security. Businesses are therefore on the lookout for new ways to identify users without making the sign in process overly complicated.

Adaptive authentication specialist SecureAuth is launching the latest version of its product that includes behavioral biometrics, a new risk analysis technology that performs keystroke analysis and mouse movement analysis to determine a user's legitimacy and build a completely unique behavior-based profile on each user device.

Continue reading

85 percent of enterprises keep sensitive data in the cloud

cloud padlock

According to a new report by enterprise security specialist Vormetric, 85 percent of senior IT security executives worldwide say they are using sensitive data in the cloud, up from 54 percent last year.

But even as they move to adopt cloud services, and in some cases believe that cloud environments are more secure than their local IT infrastructure, enterprises remain concerned about the security of their information.

Continue reading

Big Brother ist vatching you: Germany poised to use Trojans to spy on internet users

German intelligence agencies are set to gain greater NSA-style surveillance powers after the German Interior Ministry announced plans to use Trojans to spy on the internet activities of suspects. Known as Bundestrojaner, the Trojan would give the government the ability to not only track which sites a target visits, but also record conversations, make use of webcams, access data and log keystrokes.

The Trojan has been in testing since late last year, and having received governmental approval could now be widely dispatched. Widely described as malware and spyware, the tool cannot be used without a court order, but this will do little to assuage the fears of privacy groups.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.