Press "Enter" to skip to content

Posts tagged as “security”

Phishing Scam Masquerades As LinkedIn Connection Request

We’ve noticed in the last week there’s a new email phishing campaign that uses emails masquerading as LinkedIn connection requests.

Although most tech savvy users long ago learned email best security practices (don’t click on links in emails unless you’re absolutely sure you know the source of the email), sometimes we get lulled into complacency and automatically click on links from trusted sources.

TOR Case Appears to Be Infringement of Rights

I shouldn’t have to say this, but child pornographers and users of child porn are scum and deserve just about any sentence meted out to them. This absolutely doesn’t mean, however, that we willy-nilly throw their rights out the window in order to catch them. Remember, in the United States we still claim to believe in the concept of “innocent until proven guilty.” If they forgot to teach you that in school, Google it. Try “Bill of Rights” as your search term.

With that out of the way, let’s get into our story…

Tor LogoIt appears more and more that the malware caper discovered this weekend on the TOR network was all about harvesting MAC (media access control) addresses. We’ll probably never know the whole story of who’s behind this, but we’re getting enough pieces so that we can hobble together a broad picture of what happened.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Is the NSA Targeting TOR?

I like the expression, “Just when you thought it was safe to get back in the water.” I almost used it to open this article, but I didn’t. It would be inaccurate. Nobody in his right mind would consider the Internet waters safe at this junction in time.

Today while surfing tech sites looking for items for our news feed, I ran across an item on the Beeb titled Users of hidden net advised to ditch Windows, with the “hidden net” being TOR. Since it always brightens my day to discover some security geek has found yet more vulnerabilities in Redmond’s finest, I checked out the news item.

It wasn’t what I thought. TOR was singling-out Windows not because of any newfound security issues with Redmond’s operating system, but because TOR had been compromised with malware that was specifically designed to infect Windows machines.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

NSA/PRISM Mess–Yahoo Wins & Microsoft Loses

I’m beginning to rethink Yahoo, just as I reappraised my feelings on the old Novel after they went to bat against SCO for the benefit of IBM and Linux.

On Monday, the Sunnyvale, California company pulled a honest-to-goodness rabbit out of the hat when they managed to persuade a FISA court to order the Obama administration to declassify as much as possible of a 2008 court decision justifying Prism before releasing it to the public.

Yahoo’s victory came one day before Microsoft went into damage control mode by denying allegations revealed by the publication last Thursday of documents leaked to the Guardian newspaper and website.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Welcome to Microsoft Trustworthy Computing

It used to be you only had to worry about the accidental insecurities in Windows. Now Redmond’s giving away the keys to everything they sell. Microsoft is beginning to surprise even me and I thought I was beyond surprise.

I get it. I understand patriotism. I also understand legal obligation. The guys and gals in Redmond would want you to believe that their cooperation with the feds is based mostly on the later. Their story is they were forced to give access to their customer’s data by a loaded court order being held to their collective head.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

WWPL: The World Wide Party Line

I don’t think there are very many people my age who’ve ever expected much in the way of privacy online.

Oh, maybe in the very early days some might’ve naively figured that if they didn’t actually interact with a site, like if they just went to the New York Times to read an article or something, they were pretty private, but they soon learned about tracking cookies and hackers with keystroke logging tools and right away understood that everything done online might possibly be being observed.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Microsoft Nemesis Dies, SCO Lives & More…

Friday FOSS Week in Review

We may be paranoid but they are out to get us

In week three (or is it week four?) of the Spy vs. Spy scandal, the Obama folks keep saying things like “what’s the big deal?” while trying to convince us that the secret oversight court called FISA (we prefer “the Star Chamber”) has nothing but our constitutional rights in mind when it rubber stamps requests to secretly steal our privacy. Obama likes to talk about transparency. Indeed, he becomes more transparent by the moment; we’re beginning to see right through him. The 22nd amendment should now be seen as a face saver for Mr. Obama–as we would think no self respecting liberal or progressive would vote again for this man who once represented our best hope. Pity.

Windows Blue Blues, Symantec’s Kernel Confusion & More…

Friday FOSS Week in Review

Looking at life through the prism of the NSA

We thought last week was the week for leaked government secrets on government spying. Nope. Last week was just the tip of the iceberg coming over the horizon, with the helmsman going into full reverse attempting to avoid a collision. This week the slow motion ship of state made contact with the iceberg. Damage assessment is being done now as we write these words.

Seeking Surveillance Safe Search Engines

While helping our colleague Dave Bean as he worked to get his essay on Google and the NSA ready for publication, I found myself wondering if any of this latest news on the government’s forcing their nose into everybody-in-the-world’s business would have any lasting effect. Sadly, I figured not–if there was any change, it’d only be temporary. I’ve spent too many years on this planet to expect too much in the way of permanent change for the better.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Internet: Basket In Which We Put All Our Eggs

Every school kid knows not to put all your eggs in one basket.

Up until about 1999 or so, I thought we were being cautious and smart about this newfangled Internet thing that had us under its spell. Then there was a now forgotten news story that told me exactly how completely we were being seduced by this new technology.

Microsoft was working on a new version of Windows, Whistler I think, and it got hacked. Somebody broke into the computer they had it on and downloaded it, which was big news in the tech press but hardly anywhere else. Microsoft audited the code, attempting to make sure it hadn’t been tampered with, and found it clean. There were no trojans or back doors installed. None they found anyway.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Essential WordPress Security Plugins

WordPress logoA few weeks ago I told you about some security precautions to take when using the open source web platform WordPress to protect your site against brute force attacks. However, those precautions are just the beginning. A website administrator has to be forever vigilant to keep the bad guys away.

Luckily, there are many plugins available to help keep your WordPress site safe and secure. Today we’re going to discuss three security plugins that I think are essential.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Latest Articles