09/01/26 Unrelated linkage
09/01/18 Unrelated linkage
09/01/17 Unrelated linkage
09/01/16 Unrelated linkage
It's still that time of the year. Software (in)security. Storing sensitive information in 'hidden' fields still considered harmful. Children's safety on-line. Google. Security breaches. US politics. Why blog? Everything else.
It's still that time of the year.
AICPA: Top technology initiatives
Software (in)security.
InformIT: Software [in]security - top 11 reasons why top 10 (or top 25) lists don't work
Schneier on security: Top eleven reasons why lists of top ten bugs don't work
Storing sensitive information in 'hidden' fields still considered harmful.
Risktical ramblings: Risk scenario - hidden field / sensitive information (part 4 of 4) The summary
Children's safety on-line.
Internet safety technical task force: Enhancing child safety and online technologies
Wired threat level: Bullies worse than predators on social networks
EFF: After 10 years, an infamous internet-censorship act is finally dead
Techdirt: Ding dong, COPA is dead
The technology liberation front: Closing the book on COPA?
Google.
Concurring opinions: The picture and the paint
The technology liberation front: Microsoft, Google, the innovator's dilemma and the future of search & web ads
Techdirt: Google searches used to convict hit-and-run driver
Wired Magazine: The plot to kill Google
Techdirt: Behind nearly every Google complaint? A lobbyist and a flailing competitor
Security breaches.
Washington Post: Payment processor breach may be largest ever
The breach blog: Heartland Payment Systems breach could be massive
Techdirt: May have a new winner in the largest security breach ever department
Wired threat level blog: Card processor admits to large data breach
Stuart King's Risk management blog: Heartland payment system - biggest ever data breach?
Schneier on security: Breach notification laws
US politics.
Concurring opinions: Is accountability part of the change agenda
Why blog?
Andrew Sullivan: Why I blog
Concurring opinions: Why I blog - the story
Everything else.
The technology liberation front: The "GPS tax", e-Health & the privacy implications of tech upgrades for government monopolies
The privacy, identity and consent blog: Government proposes abandoning data sharing controls.
Concurring opinions: Privacy's inegalitarian path - immigrants in a post-9/11 world
SANS: How to suck at information security
The Yale law journal: Escape into the panopticon - virtual worlds and the surveillance society
The Yale law journal: Virtual world feudalism
The Yale law journal: Reputation as property in virtual economies
Racingsnake: 'Achieving privacy' paper
Techdirt: UK government to force ISPs to become copyright cops
HIDE - Homeland security, biometric identification & personal detection ethics
The personal information promise. Logging of viewing habits by cable companies. The most dangerous programming errors. Storing sensitive information in 'hidden' fields considered harmful. Pretexting. Camera surveillance. Identity management. European legislation.
The personal information promise.
ICO: Personal information promise
The privacy, identity and consent blog: The personal information promise
Logging of viewing habits by cable companies.
The technology liberation front: Cable companies to log viewing habits - is privacy at risk?
Techdirt: Is there a privacy issue in cable companies' plan to track viewing habits?
The most dangerous programming errors.
MITRE: 2009 CWE/SANS Top 25 most dangerous programming errors
SANS: CWE/SANS Top 25 most dangerous programming errors
BBC News: Dangerous coding errors revealed
Stuart King's Risk management blog: don't lay all the blame for insecure systems on the developers
Storing sensitive information in 'hidden' fields considered harmful.
Risktical ramblings: Risk scenario - hidden field / sensitive information (part 1 of 4) - The scenario
Risktical ramblings: Risk scenario - hidden field / sensitive information (part 2 of 4) - The assessment (threat community A)
Risktical ramblings: Risk scenario - hidden field / sensitive information (part 3 of 4) - The assessment (threat community B)
Pretexting: unlawfully gaining access to someone's phone records.
Wired Threat level: First 'pretexting' charges filed under law passed after HP spy scandal.
Techdirt: First pretexting charges filed, but what about the companies giving out the info?
Camera surveillance.
You are being watched
Wired Threat level blog: Report - U.S. surveillance society running rampant
Identity management.
Digital identity forum: A good solution, but only if you don't understand the problem
European legislation.
EDPS second Opinion on ePrivacy Directive review and security breach: privacy safeguards need to be strengthened
Second opinion of the European Data Protection Supervisor on the review of Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) (PDF)
Everything else.
Mailinator - "let them eat spam"
Forging site certificates; that time of the year again; and everything else.
Forging site certificates.
Freedom to tinker: Researchers show how to forge site certificates
Securiteam blogs: So you can fake your SSL certificate. That don't impress me much
It's that time of the year again.
Freedom to tinker: 2008 predictions scorecard
David Lacey's security blog: Security forecasts for 2009
Freedom to tinker: Predictions for 2009
Everything else.
Concurring opinions: Data breach nation
Freedom to tinker: More privacy, bit by bit
Concurring opinions: Privacy expectations - being seen vs. being recorded
The privacy, identity and consent blog: BS10012 is available for comment
Techdirt: Phorm, apparently deaf to consumer hatred of being spied on, plans expansion
The Guardian: Tigers use scent, birds use calls - biometrics are just animal instinct
Some interesting stuff from the end of last year.
The next step after 'smart meters'?
NYT: California seeks thermostat control
Schneier on security: Remote-controlled thermostats
Everything else.
David Lacey's security blog: Everything you wanted to know about Web 2.0 security and privacy
Blogzilla: cybercrime report bonanza
Blogzilla: UK surveillance powers to be reviewed
Robin Wilton's esoterica: Home Secretary skates around question of DNA retention
Blogzilla: Home Secretary doing best to attack our rights
Wired Threat level: Virgin Media denies BitTorrent throttling report
Concurring Opinions: Intersystemic governance as the new governance
The Register: Snipers - Cowardly assassins, or surgical soldiers?
Schneier on Security: Snipers
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.