Saturday, March 8th, 2008
The tracer software that Hewlett-Packard investigators used to try to sniff out boardroom leaks sounded like it had been ripped from the pages of a bad science-fiction novel. That is, until the company began talking about it in detail at a congressional probe into the spying scandal.The technology tool the ...
Posted in Internet, Privacy | No Comments
Saturday, March 8th, 2008
A new entrant to the crowded Internet browser market is attempting to put privacy issues centre stage by stressing it will not retain details of the websites it has visited.
The Browzar software has been specifically designed to protect users' privacy, the company said, implying that the other main browser do ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
There's a new free tool to help PC users root out rootkits. Called Sophos Anti-Rootkit, the software from Sophos will detect and remove both known and unknown rootkits, and it will also warn system administrators if removing the software might harm operating system integrity.
Rootkits are a collection of tools used ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
Researchers say that small devices called "JitterBugs" could piggyback onto network connections to discreetly send passwords and other sensitive data over the Internet.
Like the current keylogger hardware used by the FBI and criminals alike to record passwords and other data, JitterBugs are small devices that attach to a keyboard and ...
Posted in Hardware, Internet, Privacy | No Comments
Saturday, March 8th, 2008
If it looks like spyware, acts like spyware, and transmits information like spyware--it's practically spyware, say some antispyware makers of the antipiracy features in Microsoft's controversial Windows Genuine Advantage (WGA) program.
Other antispyware firms aren't so concerned. "Microsoft has every right to protect itself from piracy," says J.J. Schoch, director of ...
Posted in Privacy, Windows | No Comments