Marketing & privacy: Marketers.png (Image PNG, 426 × 301 pixels)
Marketers.png (Image PNG, 426 × 301 pixels).
View ArticleCupid Media “breached Privacy act” after storing users’ passwords in plain...
Cupid Media “breached Privacy act” after storing users’ passwords in plain text | Naked Security.
View ArticlePrivacy Badger | Electronic Frontier Foundation
A project of the Electronic Frontier Foundation Privacy Badger blocks spying ads and invisible trackers via Privacy Badger | Electronic Frontier Foundation.
View Article50. Android (DRD) – java – CERT Secure Coding Standards
The following rules and guidelines are specific only to the Android platform. These do not apply to the development of Java or C programs for non-Android platforms. (The full set of Android -relevant...
View ArticleQuand on touche à la vie privée, c’est la démocratie qui est menacée (1/3) –...
Quand on touche à la vie privée, c’est la démocratie qui est menacée (1/3) – Framablog.
View ArticleIt’s Not a Game – It’s a Violation of Human Dignity – F-Secure Weblog : News...
The California Highway Patrol officer accused of stealing nude photos from a DUI suspect’s phone told investigators that he and his fellow officers have been trading such images for years via It’s Not...
View ArticleTravailler chez Google ? — Non merci… – Framablog
Travailler chez Google ? — Non merci… – Framablog.
View ArticleAu Canada les policiers pourront fouiller le contenu des smartphones
Au Canada les policiers pourront fouiller le contenu des smartphones.
View ArticleSecrypt 2015
CALL FOR PAPERS International Conference on Security and Cryptography SECRYPT website: http://www.secrypt.icete.org/ July 20 – 22, 2015 Colmar, Alsace, France Sponsored by: INSTICC INSTICC is Member...
View ArticleFlicage-brouillon – Partie 1 chapitre 2 – Les risques personnels – Standblog
Flicage-brouillon – Partie 1 chapitre 2 – Les risques personnels – Standblog.
View ArticleSérie – flicage-brouillon – Standblog
Ce livre a pour vocation d’expliquer et de démystifier ce qui est fait de nos données sur Internet. Il va expliquer pourquoi il est important que nous retenions un certain contrôle sur nos données. Il...
View ArticlePrivacy is non-negotiable: We have the right to cover our arse — or expose it...
Privacy is non-negotiable: We have the right to cover our arse — or expose it | Safe and Savvy Blog by F-Secure.
View ArticleIt’s Data Privacy Day, and Companies Know More About You Than Ever | Safe and...
It’s Data Privacy Day, and Companies Know More About You Than Ever | Safe and Savvy Blog by F-Secure.
View ArticlePrivacy is no game! | Safe and Savvy Blog by F-Secure
Privacy is no game! | Safe and Savvy Blog by F-Secure.
View ArticleERCIM White Paper: Cyber-Security and Privacy
ERCIM White Paper: Cyber-Security and Privacy.
View ArticleDNS leak test
What is a DNS leak and why should I care? When using an anonymity or privacy service, it is extremely important that all traffic originating from your computer is routed through the anonymity network....
View ArticleCALL FOR PAPERS | eDemocracy
CALL FOR PAPERS | eDemocracy. e-Democracy 2015: Citizen rights in the world of the new computing paradigms 6th International Conference on e-DemocracyCALL FOR PAPERS December 10-11, 2015, Athens,...
View ArticleGoogle eavesdropping tool installed on computers without permission |...
Privacy advocates claim always-listening component was involuntarily activated within Chromium, potentially exposing private conversations Source: Google eavesdropping tool installed on computers...
View ArticleUn tracker caché dans Ghostery !
Alors que la description de leur extension est justement “Protect your privacy. See who’s tracking your web browsing and block them with Ghostery.” Source: Un tracker caché dans Ghostery !
View ArticleAnti-privacy unkillable super-cookies spreading around the world – study •...
And there’s nothing you can do about it Source: Anti-privacy unkillable super-cookies spreading around the world – study • The Register
View Article
More Pages to Explore .....