Skip to main content

Privacy

Why you need to enable two-step verification on your Apple ID right now

posted onApril 2, 2013
by l33tdawg

If you're an iPhone or iPad user (and who isn't?) you probably use iCloud. If you use iCloud, you probably (and should!) use Find My iPhone. If you use iCloud, you probably also use it to sync your email, calendars, contacts and photos between devices. Maybe even Documents and Data too.

Thousands of paroled CA sex offenders, felons easily disable GPS monitors

posted onApril 1, 2013
by l33tdawg

A February 2013 investigation by the Los Angeles Times showed that “thousands” of high-risk sex offenders and parolees were routinely removing or disabling their GPS tracking devices. And these individuals have little risk of being caught because California's jails are apparently too full to hold them.

FBI on trial for warrantless Stingray mobile spying

posted onMarch 29, 2013
by l33tdawg

In an Arizona court case, the FBI has been forced to defend its use of a phony cellphone tower dubbed Stingray that it's using to analyse mobile phone traffic and identify suspects.

The Stingray system came to light in the case of Daniel David Rigmaiden, who stands accused of reaping millions of dollars from filing phony tax returns on the basis of identity theft. The FBI were able to catch Rigmaiden in 2008 by tracking down the 3G card he was using as a modem, but it didn't disclose that the Stingray had been used in this process without a warrant.

New e-mails reveal Feds not "forthright" about fake cell tower devices

posted onMarch 28, 2013
by l33tdawg

According to new Justice Department e-mails obtained by the American Civil Liberties Union (ACLU) of Northern California, and published on Wednesday, federal investigators have been routinely using “stingrays" to catch bad guys. A stingray is a device that can create a false cellphone tower, and allows authorities to determine a particular mobile phone’s precise location. Stingrays aren't new—law enforcement agencies nationwide are believed to have been using them for years.

No Skype traffic released to cops or spooks, insists Microsoft

posted onMarch 26, 2013
by l33tdawg

Microsoft's Skype subsidiary didn't hand over any user content to law enforcement, according to the software giant's first ever report on how it deals with official requests for data.

As previously reported), Microsoft's transparency report revealed that Redmond received 75,378 requests from law enforcement agencies worldwide last year, involving 137,424 user accounts.

Blunder exposes 83,000 Kiwi quake claimants' details

posted onMarch 25, 2013
by l33tdawg

Details of every claimant in the New Zealand Government's Canterbury home repair programme have been disclosed by accident, the country's Earthquake Commission (EQC) said.

A spreadsheet emailed by the commission containing claim numbers and addresses of properties could be set to reveal details of from all 83,000 people who have filed 98,000 claims in the wake of the devastating Christchurch earthquake, the commission's chief executive Ian Simpson told New Zealand media this afternoon.

If There's a RAT in Your Laptop, You Won't Know Who's Watching You

posted onMarch 25, 2013
by l33tdawg

It sounds like a virtual haunting, and it happens on your computer. File folders go missing. The mouse curser starts roaming around on its own. Pop up messages appear for no particular reason. The laptop shuts down without a command. After it restarts, the webcam light is on. But if you’re not using the computer in genreal, and the camera in particular, who is?

If you’re lucky, your computer has viruses; if you’re not so lucky, your PC may have a RAT problem. A RAT infestation can lead to a whole new level of privacy violation.

Hacker leaks emails from venture capitalists

posted onMarch 25, 2013
by l33tdawg

Hacking has become a very big problem lately, for software and consumer electronic companies, government agencies, news corporations, defense organizations, car manufacturers, and even candy companies. But according to a new report, even venture capitalists are at the risk of being hacked.  And once they are hacked, all their personal and business matters will be made public. This is what has happened to venture capitalist, John Doerr. John Doerr has been one of the early investors for many successful companies, including Amazon and Google.

US law enforcement biggest recipient of Microsoft customer data

posted onMarch 22, 2013
by l33tdawg

Following the lead set by Google and Twitter, Microsoft has published its first transparency report, tabulating the number of requests for customer data made by law enforcement around the world, the number of responses given, and what kind of information was included in those responses.