08/10/19 Unrelated linkage
08/10/18 Unrelated linkage
08/10/17 Unrelated linkage
08/10/04 Unrelated linkage
US election debates. Cory Doctorow's 'Content'. Government surveillance. Anti-terrorism and privacy. Piracy statistics. Chip and pin scam. New RFID developments with some privacy-threatening potential. Everything else.
US election debates.
Concurring opinions: Biden's impressive evening
Concurring opinions: Debate as debate, part 2 (or 3) - What is the point of the exercise?
Cory Doctorow's 'Content'.
Cory Doctorow: Content - selected essays on technology, creativity, copyright and the future of the future (full PDF version)
Craphound: Content
Government surveillance.
BBC News: Police may get more data powers
The privacy, identity and consent blog: Concern over a giant database? You bet!
Anti-terrorism and privacy.
National Academies Press: Protecting individual privacy in the struggle against terrorists - a framework for program assessment
Blogzilla: Protecting individual privacy in the struggle against terrorists
Schneier on security: Data mining for terrorists doesn't work
Piracy statistics.
Ars technica: 750,000 lost jobs? The dodgy digits behind the war on piracy
Freedom to Tinker: Piracy statistics and the importance of journalistic skepticism
Chip and pin scam.
WSJ: Fraud ring funnels data from cards to Pakistan
Telegraph: Chip and pin scam 'has netted millions from British shoppers'
Telegraph: Credit card scam - how it works
Schneier on security: New chip-and-pin scam in the UK
New RFID developments (with the potential to track and trace people, or to treat them differently depending on the RFID tags that they have in their possession).
RFID Journal: Yes bank uses RFID to personalize service
The RFID weblog: RFID being used to give preferential treatment to rich clients in Indian banks
The RFID weblog: RFID jewelry tag - the world's smallest tag for jewelry
Everything else.
European commission: Electronic money - Commission proposes clear legal framework for innovative payment solutions
Dark reading: World bank hacked, sensitive data exposed
Dark reading: Users, enterprises pay for poor privacy policies, study says
The financial crisis. European legislation. Internet surveillance. Data breaches. Security breach stats. Risk management. RFID security. Behind the scenes of cybercrime. Everything else.
The financial crisis.
Concurring opinions; The craziest claims yet about the credit crisis
European legislation.
Europe's information society: New legal requirements for the electronic communications sector - security breach notification, content filtering and data retention
Internet surveillance.
Blogzilla: Wiretap nation
Blogcritics magazine: TOM-Skype Communications - a privacy nightmare come true
Data breaches.
ComputerWeekly.com: Companies don't look after personal data, say 90% of people
The privacy, identity and consent blog: STBO - we don't trust organisations with our personal data
Security breach stats.
Dark reading: Targeted attacks, DNS issues hit home in new CSI report
APACS: APACS announces latest fraud figures
David Lacey's IT security blog: Card fraud up - it's no surprise
Risk management.
Dark reading: Why risk management doesn't work
Stuart King's risk management blog: Flawed approach to risk assessments - are we all turkeys?
Schneier on security: Taleb on the limitations of risk management
RFID security.
Wired threat level: RFID anti-skimming laws approved
Behind the scenes of cybercrime.
ComputerWeekly.com: Security researcher discovers massive criminal database
David Lacey's security blog: The case for strong authentication
Everything else.
Jerry Fishenden's technology policy blog: Beyond the internet
Digital identity forum: Unscientific
Catching up.
Catching up.
Washington Post: AT&T, Verizon to refrain from tracking users online
Wired threat level: Bill proposes privacy for Americans' laptops at border
The privacy, identity and consent blog: Phorm kicks off its next trial
Kim Cameron's identity weblog: Are Countrywide's systems designed around need to know?
Freedom to tinker; How Yahoo could have protected Palin's email
European legislation. Government surveillance. ISP surveillance. Security breaches. Biometrics. Gartner IT Security summit (with some rather good rants). Everything else.
European legislation
European Parliament: Telecoms - better services for consumers and a safer internet
Government surveillance
Wired Threat level: The heat is on for details of anti-counterfeiting trade agreement
Wired Threat level: Rights group suing AT&T for spying sues NSA and Cheney, too
Wired Threat level: Attorney general pulls immunity trigger, denies 'dragnet' surveillance
Wired Threat level: If NSA spying not a 'dragnet', what were they doing?
ISP surveillance
Wired Threat level: Comcast discloses throttling practices - Bittorrent targeted
Security breaches
BBC News: Lost data official to be charged
Robin Wilton's esoterica: Bits, paper, plastic...
SF Chronicle: Brokerage firm to pay fine for security breach
BBC News: '60,000' devices are left in cabs
David Lacey's security blog: Laptop and PDA losses still a major problem
PwC: DTI Information security breaches survey 2006 - full results
Biometrics
Silicon.com: ID card 'will drown in a billion mismatches'
Biometrics catalog: Biometrics privacy
Gartner IT Security summit (with some rather good rants)
Stuart King's Risk management blog: Chips and custard
Stuart King's Risk management blog: Is IT security dead?
David Lacey's Security blog: Sex, death and Gartner IT security summits
Everything else
Future of identity in the information society (FIDIS)
Digital identity forum: Stoking up the debate on data sharing
National Center for Justice and the Rule of Law: The Cyber Crime Newsletter
Liberty and security: International action day - freedom, not fear - stop the surveillance mania! - on 11 October 2008
Hands off the Internet
Dark reading; Attackers mix online, offline exploits to mask financial fraud
Dark reading: 'Profiler' hacks global hacker culture
Dark reading: New ID theft service crawls the web on consumers' behalf
Tech Republic: Fun with Word's RAND function
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.