Human rights and wrongs online
2006-03-13 A government's position on censorship used to protect its citizenry is dictated by who they are. The well-popularized censorship of Internet content in China by Google and other big players, and criticism of this by the U.S. government, is really just the tip of the iceburg. http://www.securityfocus.com/columnists/392 The value of vulnerabilities 2006-03-07 There is value in finding vulnerabilities. Yet many people believe that a vulnerability doesn't exist until it is disclosed to the public. We know that vulnerabilities need to be disclosed, but what role do vendors have to make these issues public? http://www.securityfocus.com/columnists/391 The big DRM mistake 2006-03-01 Digital Rights Managements hurts paying customers, destroys Fair Use rights, renders customers' investments worthless, and can always be defeated. Why are consumers and publishers being forced to use DRM? http://www.securityfocus.com/columnists/390 Spreading security awareness for OS X 2006-02-27 Robert Lemos interviews Kevin Finisterre, founder of security startup Digital Munition, who created the three recent versions of the InqTana worm to raise awareness of security in Apple's OS X. Finisterre discusses his reasons for creating the worms, the problems with Mac OS X security, and why he does not fear prosecution. http://www.securityfocus.com/columnists/389 John the Ripper 1.7, by Solar Designer 2006-02-22 Federico Biancuzzi interviews Solar Designer, creator of the popular John the Ripper password cracker. Solar Designer discusses what's new in version 1.7, the advantages of popular cryptographic hashes, the relative speed at which many passwords can now be cracked, and how one can choose strong passphrases (forget passwords) that are harder to break. http://www.securityfocus.com/columnists/388 Strict liability for data breaches? 2006-02-20 A recent case involving a stolen laptop containing 550,000 people's full credit information sheds new night on what "reasonable" protections a company must make to secure its customer data - and what customers need to prove in order to sue for damages. http://www.securityfocus.com/columnists/387 Privacy and anonymity 2006-02-14 Privacy and anonymity on the Internet are as important as they are difficult to achieve. Here are some of the current issues we face, along with a few suggestions on how we can become a little more anonymous on the Web. http://www.securityfocus.com/columnists/386 Coffee shop WiFi for dummies 2006-02-09 The average user has no idea of the risks associated with public WiFi hotspots. Here are some very simple tips for them to keep their network access secure. http://www.securityfocus.com/columnists/385 Nmap 4.00 with Fyodor 2006-01-31 After more than eight years since its first release in Phrack magazine, Fyodor has announced Nmap 4.00. Curious as usual, Federico Biancuzzi interviewed Fyodor on behalf of SecurityFocus to discuss the new port scanning engine, version detection improvements, and the new stack fingerprinting algorithm under work by the community. http://www.securityfocus.com/columnists/384 Google's data minefield 2006-01-30 The U.S. government's broad subpoena to search engines effectively seeks to mine the data of the Internet. While Google has resisted the subpoena, there may be little they can do to protect our privacy from many prying eyes. http://www.securityfocus.com/columnists/383 |
|
Privacy Statement |