Language Selection

English French German Italian Portuguese Spanish

Security

Companies Should Give Online Consumers More Privacy

Filed under
Security

"To quell the privacy-invasion fears that are stunting the growth of e-commerce, Web marketers need to give consumers more control of the personal information collected about them, according to research by Naresh Malhotra, Regents' professor of marketing at Georgia Tech College of Management."

Big Brother is Watching your Toyota Sienna

Filed under
Security

"The 2005 Toyota Sienna (I'm not sure about earlier models) has an Event Data Recorder (EDR) which is a black box of sorts (sans the audio recording). In the event of a crash, near crash, or airbag deployment, it records various data such as vehicle speed, engine speed, driver seat position, gear selector position, etc."

One in four 'touched' by ID fraud

Filed under
Security

"A quarter of UK adults have had their identity stolen or know someone who has fallen victim to ID fraud, a Which? magazine survey has suggested."

Hacker taps into business school files"

Filed under
Security

"A computer hacker gained access to internal admissions records at Harvard, Stanford and other top business schools, then helped applicants log on and learn their fate weeks ahead of schedule, officials said Thursday."

ChoicePoint was victim of ID theft in '02

Filed under
Security

Despite recent denials, it has been revealed that ChoicePoint was indeed victim to identity thieves earlier than had been previously reported.

Media Player Flaw Speaks Volumes on M$ Security

Filed under
Microsoft
Security

I'm sure everyone's read of M$ latest security blunder relating to it's media player, but I particularly like David Coursey's stance. He says, "By focusing not on the largest number of potential victims but on patching its most current software, Microsoft reveals its tendency to "encourage" customers to buy new software by letting them sway in the breeze for a while."

ID Thieves Robbing the Cradle

Filed under
Security

The Seattle Times is running an interesting piece on a new trend of targetting children and young adults by identity thieves. They contend it's because so many years may pass before it's discovered.

Newest Vulnerabilities in php apps

Filed under
Security

"Multiple vulnerabilities in two popular open-source projects-phpMyAdmin and phpBB-could put users at risk of cross-site scripting and information disclosure attacks, security researchers warned Thursday."

FBI Being Spoofed in Email

Filed under
Security

"The FBI warned Tuesday that a computer virus is being spread through unsolicited e-mails that purport to come from the FBI."

security breach affects every state

Filed under
Security

"ChoicePoint, under fire for being duped into allowing criminals to access its massive database of personal information, said yesterday that consumers in all 50 states, the District of Columbia and three U.S. territories may have been affected by the breach of the company's credentialing process."

Syndicate content

More in Tux Machines

Open Hardware: Good for Your Brand, Good for Your Bottom Line

Chip makers are starting to catch on to the advantages of open, however. SiFive has released an entirely open RISC-V development board. Its campaign on the Crowd Supply crowd-funding website very quickly raised more than $140,000 USD. The board itself is hailed as a game-changer in the world of hardware. Developments like these will ensure that it won't be long before the hardware equivalent of LEGO's bricks will soon be as open as the designs built using them. Read more

elementary OS – A Beautiful OS for Open Source Lovers

elementary OS is an open source Ubuntu-based distro and one of the most awesome GNU/Linux distros ever. It has gained a lot of traction over years, coming in at #5 on Distro Watch’s popularity scale with 1,324 hits per day. elementary OS is usually mentioned only in light of macOS and sometimes Windows, given that it features a beautiful and consistent UI which makes it an ideal replacement; it deserves to stand out more because its active community of developers has not only successfully delivered a unique distro, all of its apps are custom built and they are lovely! It’s excellent for both Linux beginners and pros which is evident in how artistically comprehensive their online documentation. The team succeeded it keeping to the 3 core rules of their design philosophy which are: “concision”, “avoid configuration” and “minimal documentation”. Read more

Red Hat News and Upcoming Results

Android Leftovers