Blog Posts Tagged with "Tracking"

03b2ceb73723f8b53cd533e4fba898ee

Stylometric analysis to track anonymous users in the underground

January 15, 2013 Added by:Plagiarist Paganini

The researchers adopted technique for authorship attribution such the stylometric analysis also used in forensic linguistics verifying the capability of method of tracking also against automated framework like Jstylo used to protect user’s privacy and anonymity...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

New technologies raise serious doubts on privacy and security

November 12, 2012 Added by:Plagiarist Paganini

The major concerns are related to the use of cameras of video devices such as PC, mobile devices and TVs to identify the user and verify its rights for vision and of course to determine his habits with the purpose to pack it for the best offer in terms of contents...

Comments  (2)

68b48711426f3b082ab24e5746a66b36

Discover Who’s Tracking You Online with Collusion

October 22, 2012 Added by:Fergal Glynn

There are increasing concerns over tracking done by advertisers and website owners and recent legislation has shone a spotlight on the topic. Collusion is a great add-on for Firefox made by Mozilla that shows, in real time, how the data you share creates a spider-web of interaction between companies and other trackers...

Comments  (2)

7ddc1f3000a13e4dfec28074e9e7b658

Stop the Next SOPA and CISPA: Register to Vote for Internet Freedom

September 30, 2012 Added by:Electronic Frontier Foundation

Congress needs to know that the Internet is watching and that users won’t sit on the sidelines as technology intended to connect us and bring knowledge to people worldwide is turned against us for the purposes of censorship and surveillance...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

What Exactly is Internet Safety Anyhow?

September 23, 2012 Added by:Theresa Payton

What does Internet safety mean to the average person? It may vary depending upon age, how you use the internet, and the type of work that you do that involves the digital world. Here are some sobering statistics that might give you a perspective...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

The Fine Print of Smartphone Privacy

September 14, 2012 Added by:Allan Pratt, MBA

How often do you think about your cell phone or smartphone privacy? Sure, you think about its physical security, but how often do you think about the security of your data? Your contacts, your email addresses, your location data, your apps, etc. You probably don’t think about this enough...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

You Down with UDID? Yeah, You Know Me...

September 13, 2012 Added by:Tripwire Inc

The Internet is chock full of databases that map UDIDs to usernames, activities, location data, game scores, ad clicks as well as Facebook and other social media profiles. Even if you deleted an application from your phone the data can still persist in the Cloud...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Great UDID Hacker Cache: What's the Big Deal?

September 07, 2012 Added by:Rafal Los

Why am I calling this a psychological operation? From talking to people who would know - the UDID is just a tracking mechanism to link a device to a person. The fact that this has stirred such a sentiment against the federal government at a time when distrust of is already high is suspect...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Countermeasures, Weather Forecasts, and Security Metrics

July 25, 2012 Added by:Tripwire Inc

Take a look at the things you measure. In particular, take a look at the things that become part of your bonus calculations or your performance reviews. If you are being measured against things that feel more like Tracking Indicators (like a weather forecast), then it’s time to renegotiate your Metrics...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Network Forensics: Tracking Hackers through Cyberspace

July 11, 2012 Added by:Ben Rothke

With a title like Network Forensics: Tracking Hackers through Cyberspace, the book at first sounds like a cheesy novel. But by page twenty-five, you will quickly see this is the real thing. By the time you hit the last page, you will have read the collective wisdom of two of the smartest minds in the business...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Right to Internet Anonymity and Legal Implications

June 28, 2012 Added by:Plagiarist Paganini

Anonymizing services are based on the concept of distribution of routing information during a transmission. It is not known prior the path between a source and destination, and every node of the network manages minimal information to route the packets to the next hop without preserving history of the path...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Big Brother Likes Big Data: Balancing Privacy with Innovation

June 05, 2012 Added by:Rebecca Herold

Big Data and associated analytics can be used to improve business and customer experiences and bring innovation and medical breakthroughs. However, organizations must make sure they don’t cross that line of customization and business improvements into creepiness and full-blown privacy invasion...

Comments  (0)

C64d6029dda7a794e966cb3f6f6b5534

Cookies: Should We Really Like Them?

June 01, 2012 Added by:Ahmed Saleh

You should acknowledge that Cookies are widely used and can't really be avoided. If you wish to enjoy your internet surfing experience by navigating to “cookie creating websites” you should have a clear understanding of how cookies operate, and how to protect them from being abused...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Is Frictionless Sharing Like Digital Privacy Cancer?

May 25, 2012 Added by:Rebecca Herold

In a nutshell, “frictionless sharing” basically is a passive service that allows apps to automatically share your activity to a very wide number of entities and locations as you visit different websites, view videos and photos, listen to music, read ads and articles, and so on...

Comments  (3)

C4363f41d25c216c53c8d71a1ac44a90

Facebook "Like" Button = Privacy Violation + Security Risk

May 21, 2012 Added by:Matthijs R. Koot

If you walk into a store, would you appreciate it if the owner phoned a random stranger to tell them? Probably not. Yet every time I visit a website that has a Facebook `Like'-button, my browser discloses that visit to Facebook, despite the fact that I do not have a Facebook profile...

Comments  (3)

7ddc1f3000a13e4dfec28074e9e7b658

Twitter Commits to Respecting Do Not Track with New Policy

May 21, 2012 Added by:Electronic Frontier Foundation

This doesn’t mean Twitter will stop collecting all data on you. They’ll still be able to collect aggregate data about your browsing habits for analytics and security, but they won’t set a cookie and they won’t use data to suggest users to you or for tailoring your Twitter experience...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »