Information Secur...
Follow
Find
654 views | +0 today
Information Security once more
How to protect your information and how others can get it
Your new post is loading...
Your new post is loading...
Scooped by Theodor S Klemming
Scoop.it!

Patientjournaler på Karolinska: Spionprogram fanns i systemet

Patientjournaler på Karolinska: Spionprogram fanns i systemet | Information Security once more | Scoop.it
Karolinska universitetssjukhusets egen säkerhetsanalys slår fast att det ”är stor risk att obehöriga har tillgång till patientinformation”. Det tidigare opublicerade dokumentet visar att spionprogr...
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

”Journalsystemet låg öppet under åtta månader”

”Journalsystemet låg öppet under åtta månader” | Information Security once more | Scoop.it
I juni upptäckte Stockholms läns landsting och Karolinska universitetssjukhuset spår av intrång och en mycket allvarlig säkerhetslucka i servern som förvarar miljoner svenskars sjukjournaler. Deras...
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

NSA reveals how Snowden accessed secret Prism files

NSA reveals how Snowden accessed secret Prism files | Information Security once more | Scoop.it
Prism whistleblower Edward Snowden accessed secret documents through a file-share, the NSA has revealed
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows 7/Vista/XP, Mac OS X and Linux

TrueCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, TrueCrypt provides plausible deniability.
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

The GNU Privacy Guard - GnuPG.org

The GNU Privacy Guard - GnuPG.org | Information Security once more | Scoop.it

GnuPG is the GNU project's complete and free implementation of the OpenPGP standard as defined by RFC4880 . GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. 

 

more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

Silent Circle | Global Encrypted Communications Service

The world’s first 3G, 4G, WiFi encrypted mobile, video and voice service. A custom-built network for security, simplicity and service. Get in the Circle.
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

NSA and GCHQ unlock privacy and security on the internet

NSA and GCHQ unlock privacy and security on the internet | Information Security once more | Scoop.it
• NSA and GCHQ unlock encryption used to protect emails, banking and medical records • $250m-a-year US program works covertly with tech companies to insert weaknesses into products • Security experts say programs 'undermine the fabric of the internet'...
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

Guide for Anonymous Blogging contains bad advice adding security risk

Since two years, Global Voices Online publish a guide titled "Anonymous Blogging with WordPress & Tor": http://advocacy.globalvoicesonline.org/projects/guide/ The guide was recently (2011-11-15...
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

Does encryption really shield you from government's prying eyes? | PCWorld

Does encryption really shield you from government's prying eyes? | PCWorld | Information Security once more | Scoop.it
Encrypting data may not guard against surveillance, some experts say, while others argue in favor of taking steps to protect privacy.
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

NSA Leak Highlights Key Role Of Private Contractors - U.S. Relies On 500,000 People Like Edward Snowden To Monitor National Security Threats

NSA Leak Highlights Key Role Of Private Contractors - U.S. Relies On 500,000 People Like Edward Snowden To Monitor National Security Threats | Information Security once more | Scoop.it
NEW YORK — The U.S. government monitors threats to national security with the help of nearly 500,000 people like Edward Snowden – employees of private firms who have access to the government's most sensitive secrets.
Theodor S Klemming's insight:

The idea of National Government is that it should be National Government, not private business. 

more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

Industrial Espionage in Hotels: Fobbing Off Prying Eyes. - Tuesday, 28th May 2013 at 4Hoteliers

Industrial Espionage in Hotels: Fobbing Off Prying Eyes. - Tuesday, 28th May 2013 at 4Hoteliers | Information Security once more | Scoop.it
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

Why Cross-Site Scripting Always Matters

Why Cross-Site Scripting Always Matters | Information Security once more | Scoop.it
Recently, I identified and disclosed several cross-site scripting (XSS) vulnerabilities within a website I’ve recently started using. In case you don’t know, an XSS vulnerability basically means that an attacker can provide new scripts to execute...
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

Smart Phone Safety Tips From a Professional Hacker-Kiplinger

Smart Phone Safety Tips From a Professional Hacker-Kiplinger | Information Security once more | Scoop.it
Smart phones make it so easy to do many daily tasks -- from checking e-mail to shopping to banking. But they also make you easy prey for scammers and identity thieves.
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

Spåren från attackerna leder till flera länder

Spåren från attackerna leder till flera länder | Information Security once more | Scoop.it
Spåren från det misstänkta dataintrånget i landstingets journalsystem leder till USA, Kina, Ryssland, Tyskland och Danmark. När säkerhetsluckan täpptes igen dokumenterades 4,5 miljoner försök att...
more...
No comment yet.
Rescooped by Theodor S Klemming from Open Source Intelligence
Scoop.it!

FBStalker and GeoStalker data mining tools can dig into your life

With the release of new OSINT data-mining tools FBStalker and GeoStalker, Facebook stalkers and social engineers might rejoice...privacy advocates, not so much.

more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

Clean Your System and Free Disk Space | BleachBit

Clean Your System and Free Disk Space | BleachBit | Information Security once more | Scoop.it

BleachBit quickly frees disk space and tirelessly guards your privacy. Free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there. Designed for Linux and Windows systems, it wipes clean a thousand applications including Firefox, Internet Explorer, Adobe Flash, Google Chrome, Opera, Safari,and more. Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster. Better than free, BleachBit is open source.

more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

Off-the-Record Messaging - Wikipedia, the free encyclopedia

Off-the-Record Messaging, commonly referred to as OTR, is a cryptographic protocol that provides strong encryption for instant messaging conversations. OTR uses a combination of the AES symmetric-key algorithm, the Diffie–Hellman key exchange, and the SHA-1 hash function. In addition to authentication and encryption, OTR provides perfect forward secrecy and malleable encryption.

The primary motivation behind the protocol was providing deniability for the conversation participants while keeping conversations confidential, like a private conversation in real life, or off the record in journalism sourcing. This is in contrast with other cryptography tools that produce output which can be later used as a verifiable record of the communication event and the identities of the participants. In most cases, people using such cryptography software are not aware of this and might be better served by OTR tools instead[citation needed]. The initial introductory paper was named "Off-the-Record Communication, or, Why Not To Use PGP".[1]

The OTR protocol was designed by cryptographers Ian Goldberg and Nikita Borisov. They provide a client library to facilitate support for instant messaging client developers who want to implement the protocol and a special OTR-proxy for AIM, ICQ, and Mac clients which support proxies. A Pidgin and Kopete plugin exists that allows OTR to be used over any IM protocol supported by Pidgin or Kopete, offering an auto-detection feature that starts the OTR session with the buddies that have it enabled, without interfering with regular, unencrypted conversations.

more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

Tails - The Amnesic Incognito Live System

Tails - The Amnesic Incognito Live System | Information Security once more | Scoop.it

Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly.

It is a complete operating system designed to be used from a DVD or a USB stick independently of the computer's original operating system. It is Free Software and based on Debian GNU/Linux.

more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

Microsoft handed the NSA access to encrypted messages

Microsoft handed the NSA access to encrypted messages | Information Security once more | Scoop.it
Documents show company collaborated closely with NSA and FBI to help agencies intercept data
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

US a high-risk place for data theft, second only to China, say German companies (Wired UK)

US a high-risk place for data theft, second only to China, say German companies (Wired UK) | Information Security once more | Scoop.it
German companies believe that the US is a high-risk place for industrial espionage and data theft, second only to China
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

[Conversation] | Snoop Snoop Song: A Conversation with Glenn Greenwald | Harper's Magazine

[Conversation] | Snoop Snoop Song: A Conversation with Glenn Greenwald | Harper's Magazine | Information Security once more | Scoop.it
Glenn Greenwald on the importance of privacy, the hypocrisy of Democrats, and how he almost lost the NSA leak
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

Investigators looking into how Snowden gained access at NSA

Edward Snowden leaked documents on distinctly different operations.
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

If the NSA Trusted Edward Snowden With Our Data, Why Should We Trust the NSA?

If the NSA Trusted Edward Snowden With Our Data, Why Should We Trust the NSA? | Information Security once more | Scoop.it
Edward Snowden sounds like a thoughtful, patriotic young man, and I’m sure glad he blew the whistle on the NSA’s surveillance programs. But the more I learned about him this afternoon, the angrier I became.
Theodor S Klemming's insight:

Handing over the authority to shoot at the enemy in foreign territories to private contractors was not a good idea in Irak. And handing over the authority to access and manage sensitive SIGINT material back home to private contractors was an equally bad one...

more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

FT lists anti-espionage tips for the business traveller

FT lists anti-espionage tips for the business traveller | Information Security once more | Scoop.it
Top tips from the Financial Times on how to avoid espionage while travelling overseas on business include...
more...
No comment yet.
Scooped by Theodor S Klemming
Scoop.it!

Congressional Report: US Power Grid Highly Vulnerable To Cyberattack - Slashdot

Congressional Report: US Power Grid Highly Vulnerable To Cyberattack - Slashdot | Information Security once more | Scoop.it
An anonymous reader writes "Despite warnings that a cyberattack could cripple the nation's power supply, a U.S. Congressional report (PDF) finds that power companies' efforts to protect the power grid are insufficient.
more...
No comment yet.