Here’s what Facebook sends the cops in response to a subpoena – 62 pages
In the EU-vs-Facebook cases, Facebook has sent european citizens 800 PAGES of documents. In the US, a subpeona merits 62 pages. So, either the Craigslist killer didn’t use […]
In the EU-vs-Facebook cases, Facebook has sent european citizens 800 PAGES of documents. In the US, a subpeona merits 62 pages. So, either the Craigslist killer didn’t use […]
WOW! Even the Wall Street Journal thinks Facebook’s data collection, data profiling and app-sharing is out of control. From the 4/9/12 WSJ column: A Wall Street Journal examination of […]
France-based VUPEN is one of the highest-profile firms trafficking in zero-day exploits. Earlier this month at the CanSecWest information security conference, VUPEN declined to participate in the Google-sponsored Pwnium hacking […]
Twenty thousand students in 25 of the of Vitoria da Conquista’s 213 public schools started using T-shirts with chips earlier this week, secretary Coriolano Moraes said by telephone. By 2013, […]
Could governments and private corporations recognise ANYONE instantly via CCTV? Remember that London is the most densely surveilled city in the world The Occupy Wallstreet protesters were heavily surveillanced – […]
Data Privacy Day: Social media ‘private’ data is fair game for e-discovery in court Microsoft Trustworthy Computing released data about how posting on social networking sites can impact more than […]
So let’s get this straight: 1) Symantec failed to stop the SONY Rootkit because Sony is a well-known multinational 2) Symantec released source code to the Indian Government without adequate […]
Too much social media networking: Paranoia of Big Brother surveillance may destroy ya The biggest cybersecurity agency in Europe peeked at the future, 2014, to predict the effects of online […]
Fourth Amendment’s Future if Gov’t Uses Virtual Force and Trojan Horse Warrants? An interesting paper discussed the future of the Fourth Amendment in the cyber world. Can the government legally […]
4th Amendment vs Virtual Force by Feds, Trojan Horse Warrants for Remote Searches? Can the government legally deploy malware for eavesdropping and remote searches, in order to investigate and control […]