Access your Pro+ Content below.
Internet privacy tools only go so far
This article is part of the September 2010 issue of Information Security magazine
Earlier this decade, public criticism halted the Big Brother-esque initiative from the U.S. government to create a massive database of personal information collected from a wide range of sources, everything from emails to credit card purchases. And we've certainly come a long way from the infamous and long-ago abandoned government plan to embed surveillance chips in consumer electronics. Or have we? Moxie Marlinspike, a noted independent security researcher, says the private sector has taken up the cause. Websites like Google, Facebook and others offer free services that are designed to help people take part in society, but at a hefty cost: You volunteer your personal information to companies and that valuable data accumulates. "If there's one thing Google has excelled at doing, it's making sense of large repositories of data," says Marlinspike. "Make no mistake about it, they are in the surveillance business and the effect is the same." Managing online privacy was one of the themes that surfaced at Black Hat 2010, with a ...
Access this Pro+ Content for Free!
Features in this issue
For the fifth consecutive year, Information Security readers voted to determine the best security products. Nearly 1,500 voters participated this year, rating products in 14 different categories.
The collaborative nature of Web 2.0 introduces myriad threats to data that must be proactively countered.
What you can expect from this fall's update to the Payment Card Industry Data Security Standard.
Tools help protect privacy but safeguarding personal data in the age of Google and Facebook is getting harder.
Columns in this issue
Embedding security in hardware isn't new, but is it worth an $8 billion investment? Time will tell on the Intel-McAfee acquisition.
Targeted attacks on corporations and their crown jewels have become routine. Companies need to be prepared.
Bruce Schneier and Marcus Ranum debate the risks associated with employees using personal computing devices.