Tracks on Flipboard

By Valdis Krebs | Who is mining, mapping and measuring the tracks you leave behind on the Internet.

App allows stalkers to track someone's activities closely

Right now, someone is stalking Maggie McKethan. As she strolls around Rice Village, someone is monitoring her calls, reading her texts, tracking her …

Tracking

TEDxRiga 2012 Valdis Krebs rediģēts

The law was being broken for years. If it’s now being upheld, that’s only thanks to Snowden

Intelligence swapping with the Americans had been breaking the law for years. Without Edward Snowden, it still would be

Libertarians and hawks will disagree about what intelligence agencies should be licensed to do, but both should surely agree that they shouldn’t break the law. A court ruled on …

National Security Agency

The Moral Hazard of Big Data

If you are a person in America, then there are equations trying to learn more about you. Some of these equations work for private companies and some …

Algorithms

Anyone who makes you choose between privacy and security wants you to have neither

An excellent op-ed from the Open Rights Group: "When ORG defends privacy, we are fighting to protect people from abuses of power that leave them vulnerable."

Yet for many people surveillance makes them less safe: it's not the security blanket politicians are holding it up to be. Job-seekers under …

Security

Scareware found hidden in Google Play apps downloaded by millions

Google has done a good job at keeping data-stealing Trojan apps out of Google Play, but attackers still find ways to monetize rogue apps through the …

Google

Fightback against internet giants’ stranglehold on personal data starts here

With the Databox concept, scientists at British universities have begun an attempt to win back control of information about us

Whenever regulators gather to discuss market failures, the cliche “level playing field” eventually surfaces. When regulators finally get around to thinking about what …

Jaron Lanier

Science/AAAS | Special Issue: The end of privacy

30 January 2015 | News

Scientists can no longer guarantee patients' privacy. they're looking for new ways to build trust.

30 January 2015 | …

With a Few Bits of Data, Researchers Identify ‘Anonymous’ People

Even when real names and other personal information are stripped from big data sets, it is often possible to use just a few pieces of the information to identify a specific person, according to a study to be published Friday in the journal Science.

In the study, titled “Unique in the Shopping Mall: …

Anonymous

N.S.A. Breached North Korean Networks Before Sony Attack, Officials Say

WASHINGTON — The trail that led American officials to blame North Korea for the destructive cyberattack on Sony Pictures Entertainment in November winds back to 2010, when the National Security Agency scrambled to break into the computer systems of a country considered one of the most impenetrable …

Terrorists Made Their Emails Seem Like Spam to Hide From Intelligence Agencies

Maybe there's something meaningful hidden in my spam folder.Image from Gmail
During David Petraeus and Paula Broadwell's affair, the two would …

Email

Symposium

Privacy in a Networked World
Symposium Registration

This one-day annual event brings leaders in industry, government, and academia, as well as students …

In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted Puzzle

In the fall of 2008, a 30-year-old computer expert named Zarrar Shah roamed from outposts in the northern mountains of Pakistan to safe houses near the Arabian Sea, plotting mayhem in Mumbai, India’s commercial gem.

Mr. Shah, the technology chief of Lashkar-e-Taiba, the Pakistani terror group, and …

Spying

Meet The New Twitter Analytics Tools (From Twitter!)

Twitter opened up its analytics platform to all users in mid-2014, but is it any good? Contributor Larry Kim explores this question.

The future of wearable technology is not wearables – it's analysing the data

Wearable technology’s evolution is not about the gadget on the wrist but what is done with the data they collect, says computational biologist

The future of wearable technology in fitness and health isn’t about the fitness bands and health monitors – it’s about what can be done with the data they …

Wearable Tech

Expert: Sony Hackers Sound Russian

The FBI has attributed the Sony hack to North Korea, in part by analyzing the messages left by the "G.O.P." attackers. But linguistics expert Shlomo

In the Beginning There was Full Disclosure

Two of the largest companies in the world are bickering with each other about how best to protect users. I won’t get into just how historically …

Vendor

How My Mom Got Hacked

MY mother received the ransomnote on the Tuesday before Thanksgiving. It popped up on her computer screen soon after she’d discovered that all of her files had been locked. “Your files are encrypted,” it announced. “To get the key to decrypt files you have to pay 500 USD.” If my mother failed to …

Security

The New Sanctions Noone is Talking About: The Industrial Espionage in Cyberspace Sanctions

Will the U.S. Government seek to designate Anonymous under its new authority? Based on Anonymous’ previous work, that might not be the best idea.On …

Cyberspace

Harassed by Algorithms

A user recommended as “similar to you” might be dangerous.

Several years ago, long before Spotify, I regularly listened to music through Last.fm. I …

Algorithms

Theory emerges in Sony hacking suggesting Russian hackers

Alexander Zemlianichenko/AP Linguists identified foreign phrasing in about 2,000 words from hacker emails and posts that may have been penned by a …

Sony

Follow These 4 Easy Steps to Toughen Up Your Passwords

1. GET A GOOD PASSWORD MANAGER

The best passwords are long strings of letters, numbers, and symbols that you can't remember. So you'll need a tool to …

Amazon Reveals Our Bonkers Holiday Buying Habits

The gift-giving season was very good to Amazon, judging by the e-commerce giant's holiday tallies. It boasted some eye-opening wins, and a revealing look at what and how we shopped during the holidays.

While the company can't resist bragging about how its own devices ruled some categories, the real …

Amazon

What If North Korea Wasn’t Behind the Sony Hack?

From the moment the Federal Bureau of Investigation identified North Korea as the culprit behind the devastating cyber attack on Sony Pictures Entertainment, private security experts not employed by the studio have sprung into action, spinning alternative narratives about what might have …

Prosecute Torturers and Their Bosses

Since the day President Obama took office, he has failed to bring to justice anyone responsible for the torture of terrorism suspects — an official government program conceived and carried out in the years after the attacks of Sept. 11, 2001.

He did allow his Justice Department to investigate the …

Torture

Sony Pictures hack - a PR car crash from which company may never recover

Business leader: the hacking of Sony Pictures and its embarrassing revelations are a lesson for all companies given that hacking can only get worse

The hack of Sony Pictures gets worse and worse, in publicity terms. One day it’s the revelation of gender pay gaps; another it’s the awful internal …

Sony

Secret surveillance of Norway’s leaders detected

Members of parliament and the prime minister of Norway are being monitored by means of secret espionage equipment.

Norway

Spotify Just Made It Easier Than Ever To See What All Your Friends Are Listening To

Spotify is rolling out a new way to show you what music your friends are listening to, the company announced on Thursday.

"Because we think music is inherently social, we think that what your friends are listening to could be a really, really compelling path to [music] discovery," Spotify product …

Spotify