Concealed-carry permits skyrocket, especially for women | Seattle Times Mob
CyberTechTips
N.S.A. Collecting Millions of Faces From Web Images
The National Security Agency’s reliance on facial recognition technology has grown as it has used new software to exploit images in emails, text messages, social media, videoconferences and other communications.
New Federal Database Will Track Americans' Credit Ratings, Other Financial
PirateBox Delivers Brand New Anonymous Sharing Release
In 2012 a device called PirateBox excited users with the prospect of anonymous wireless file-sharing anywhere, no Internet required, and at a cost of just a few dollars. Now the project has released PirateBox 1.0 and a brand new website. TorrentFreak caught up with PirateBox founder David Darts for the lowdown.
http://www.speedofcreativity.org/2014/05/30/why-edward-snowdens-disclosures-are-terrifying/?utm_content=buffer25ca0&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer
5 Common Server Setups For Your Web Application
When deciding which server architecture to use for your environment, there are many factors to consider, such as performance, scalability, availability, reliability, cost, and ease of management. Here is a list of commonly used server setups, with a short description of each, including pros and cons. Keep in mind that all of the concepts covered here can be used in various combinations with one another, and there is no single, correct configuration.
EFF to Court: There's No Doubt the Government Destroyed NSA Spying Evidence
San Francisco - The Electronic Frontier Foundation (EFF) told a federal court today that there was no doubt that the government has destroyed years of evidence of NSA spying – the government itself has admitted to it in recent court filings. In a brief filed today in response to this illegal...
openwrt:diy [ PIRATEBOX]
FullDiskEncryptionHowto - Community Help Wiki
Don't trust TrueCrypt anymore. Take a look at a few of the options available to you.
Daniel Ellsberg: Snowden would not get a fair trial – and Kerry is wrong
Daniel Ellsberg: Until the Espionage Act gets reformed, the greatest patriot whistleblower of our time can never come home safe and receive justice
Outlook’s Encryption Issues – Who is Responsible for Your Data?
NowSecure automated software & professional services make mobile app security testing easier to scale than ever before. Ready to scale growth in a mobile-first world?
GRC's | TrueCrypt, the final release, archive
TrueCrypt, the final release, archive
Excerpt: Glenn Greenwald's 'No Place to Hide'
Get breaking national and world news, broadcast video coverage, and exclusive interviews. Find the top news online at ABC news.
Back up your iPhone's data right now: Huge iOS ransomware scam hits the U.S
Now is a good time to make sure all the data on your iPhone is backed up in the cloud. CBS Los Angeles reports that …
Privacy under attack, part II: the solution is in the hands of the people
Tyler Morning Telegraph - Is the latest tool for bullying on your child's s
eBay Hacked, Change Your Passwords Now
If you have an eBay account, it's time to change your password. The company released a statement today saying their internal and customer databases we
LifeLock pulls its apps and deletes user data after security scare
LifeLock, a firm which is supposed to help you protect yourself from identity thieves, has announced that it is yanking its iPhone and Android apps.
Everyone should know just how much the government lied to defend the NSA
Trevor Timm: A web of deception has finally been untangled: the Justice Department got the US supreme court to dismiss a case that could have curtailed the NSA's dragnet. Why?
How I bypassed 2-Factor-Authentication on Google, Facebook, Yahoo, LinkedIn
I remember fondly two years ago, when 2-Factor-Authentication (2FA) became popular and well used across major web applications (Google, Facebook, Yahoo and others). I found, my naive sixteen year old self unable to come to terms for why the genius idea had not been thought of before. At the time, I felt that 2FA was that golden shield you could cover yourself with and defend against some of the most sophisticated phishing attacks calmly.
Whilst 2FA can still be that golden shield to the critica
Emory Accidentally Sends Reformat Request to All Windows PCs
Have you ever reformatted a computer and then immediately realized you shouldn't have? Well, an "accident" at Emory University this week will make your mistake look like a ...
Judge denies Gmail search warrant, notes "Technorati are ... everywhere"
Glenn Greenwald: how the NSA tampers with US-made internet routers
The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide
Chrome Web Store
Add new features to your browser and personalize your browsing experience.
Not all ad blockers are the same. Here's why the EFF's Privacy Badger is di
Hey, does your Smart TV have a mic? Enjoy your surveillance, bro
Little reminder: Your shiny new telly is a computer, it can run malware
How to Securely Erase Data
Dairy Queen Will Trade Your Privacy and Safety for Free Ice-cream Cake!
This morning I heard that in honor of Mother’s Day, Dairy Queen would give you a free cake if you would just send them an email with your baby’s birth certificate attached. What!? Did I hear correctly? So, I did a search, and sure enough, there it was; on a list on the ABC News …
Google hints at remote wipe, lock and locate features for Chromebooks
There'd be nothing much to wipe from a browser-based operating system, but that's the point.
The Most Important Security Settings to Change on Your Router
Your router is the first line of defense against hackers trying to access all the internet-connected devices in your home. Sadly, many of the top Wi-