Skip to main content

Privacy

Researcher says Australian parliaments have failed to protect privacy for 14 years

posted onAugust 25, 2015
by l33tdawg

Long-time – and by now somewhat despondent – privacy advocate Roger Clarke says successive Australian governments have ignored the privacy impacts of nearly every national security measure passed by parliament since 2001.

In this analysis of 72 items of legislation, Clarke finds only around 10 per cent received the normal parliamentary privacy scrutiny.

ICO orders Google to forget stories about right-to-be-forgotten stories

posted onAugust 25, 2015
by l33tdawg

The UK's Information Censorship Office (okay, it’s not called that. It’s really called the Information Commissioner's Office), anyway, the ICO has ordered Google to remove links to stories about right-to-be-forgotten stories linking back to stories that Google has agreed to remove links to because of right-to-be-forgotten requests.

Got it? Okay, let’s try again.

Phone and laptop encryption guide: Protect your stuff and yourself

posted onAugust 25, 2015
by l33tdawg
Credit:

The worst thing about having a phone or laptop stolen isn’t necessarily the loss of the physical object itself, though there’s no question that that part sucks. It’s the amount of damage control you have to do afterward. Calling your phone company to get SIMs deactivated, changing all of your account passwords, and maybe even canceling credit cards are all good ideas, and they’re just the tip of the iceberg.

Ashley Madison hack is not only real, it’s worse than we thought

posted onAugust 19, 2015
by l33tdawg

The massive leak attributed to the hackers who rooted to the Ashley Madison dating website for cheaters has been confirmed to be genuine. As if that wasn't bad enough, the 10 gigabytes of data—compressed, no less—is far more wide-ranging than almost anyone could have imagined.

Phone network security flaw lets anyone bug your calls

posted onAugust 19, 2015
by l33tdawg

Mobile phone users are at risk from a signalling flaw that allows hackers to intercept all voice calls and track locations.

Australian TV programme 60 minutes is claiming the scoop, showing in a special report how hackers were able to record the mobile phone conversations of a prominent politician and track his movements from a base thousands of miles away in Germany.

Australia to capture biometrics at the border under new law

posted onAugust 19, 2015
by l33tdawg

Australia's Parliament has passed a law that will make it possible to collect biometric data, from citizens and visitors alike, at the nation's borders.

The Migration Amendment (Strengthening Biometrics Integrity) Bill 2015, an amendment to the Migration Act of 1958, is explained as an effort to “streamline seven existing personal identifier collection powers into a broad, discretionary power to collect one or more personal identifiers from non-citizens, and citizens at the border.”

Hackers might have stolen IRS data on more than 300,000 households

posted onAugust 18, 2015
by l33tdawg
Credit:

Many people rely on security questions like "What's your mother's maiden name?" to protect their personal information online, but hackers are getting better at finding the answers.

Case in point: the hackers who raided US Government's Internal Revenue Service data systems. Those attackers were much more successful at answering security questions than previously known, the government agency announced Monday, underscoring the dangers of using simple security to protect valuable data.

Cyber attack on Carphone Warehouse results in breach of customer data

posted onAugust 10, 2015
by l33tdawg
Credit:

Carphone Warehouse has revealed that a recent cyber attack on its servers might have led to the breach of customer details including credit card information.

Dixons Carphone is heading to the US soon, but its business in the UK has just been rocked by a cyber attack affecting millions. The company has apologized for the security lapse and has started notifying customers who might have been affected by the attack, which is said to have took place on the 5th of August.

Researchers Unveiled a New, Serious Vulnerability In Tor

posted onJuly 30, 2015
by l33tdawg

Journalists and citizens living under repressive regimes alike depend on the encrypted Tor browser to surf the web anonymously. But in certain cases, an attacker can figure out which dark web site a user is trying to access by passively monitoring Tor traffic, and even reveal the identity of servers hosting sites on the Tor network.

Under 18s should get the right to remove themselves from the internet

posted onJuly 29, 2015
by l33tdawg

Teenagers might be llowed to rid the internet of images and content shared during their formative years if a privacy group and its advice gets picked up and embraced in the right quarters.

A group called iRights has proposed that 18-year-olds be given the right to edit their online history and remove things that they no longer like.