[An empirical study of privacy-violating information flows in JavaScript web applications | Attacks by "anonymous" WikiLeaks proponents not anonymous | The billion dollar lost laptop problem | Location-based services - time for a privacy check-in | Principles for government data mining | Protecting consumer privacy in an era of rapid change - A proposed framework for businesses and policymakers | A new era of compliance - Raising the bar for organizations worldwide | Facebook tracks and traces everyone: Like this! | Stealing reality | Verizon 2010 payment card industry compliance report]
An article by Dongseok Jang, Ranjit Jhala, Sorin Lerner and Hovav Shacham.
Dongseok Jang, Ranjit Jhala, Sorin Lerner and Hovav Shacham: An empirical study of privacy-violating information flows in JavaScript web applications (PDF)
[Open link in this window | Open link in new window]
PrivacyLives: EWeek - Popular websites sniff browser history, researchers find
[Open link in this window | Open link in new window]
A report by Aiko Pras, Anna Sperotto, Giovane C.M. Moura, Idilio Drago, Rafael Barbosa, Ramin Sadre, Ricardo Schmidt and Rick Hofstede.
Aiko Pras, Anna Sperotto, Giovane C.M. Moura, Idilio Drago, Rafael Barbosa, Ramin Sadre, Ricardo Schmidt and Rick Hofstede: Attacks by "anonymous" WikiLeaks proponents not anonymous (PDF)
[Open link in this window | Open link in new window]
WebWereld: Politie arresteert DDoS'er Justitie-sites - UPDATE
[Open link in this window | Open link in new window]
A benchmark study of U.S. organizations sponsored by Intel, independently conducted by Ponemon Institute.
Ponemon Institute: The billion dollar lost laptop problem (PDF)
[Open link in this window | Open link in new window]
Intel Newsroom: Missing a laptop? Join the billion-dollar club
[Open link in this window | Open link in new window]
The Register: Intel reveals 'the billion dollar lost laptop problem'
[Open link in this window | Open link in new window]
A guide by the ACLU.
ACLU: Location-based services - time for a privacy check-in
[Open link in this window | Open link in new window]
TLF: Location-based services - a privacy check-in
[Open link in this window | Open link in new window]
A report by the Constitution Project.
The Constitution Project: Principles for government data mining (PDF)
[Open link in this window | Open link in new window]
NextGov: Advocacy group urges a broader view of data mining
[Open link in this window | Open link in new window]
PrivacyLives: NextGov - Advocacy group urges a broader view of data mining
[Open link in this window | Open link in new window]
More at... [10/12/22 (NL/01)]
More at... [10/12/22 (NL/02)]
A preliminary Federal Trade Commission (FTC) staff report.
FTC: Protecting consumer privacy in an era of rapid change - A proposed framework for businesses and policymakers (PDF)
[Open link in this window | Open link in new window]
HL: FTC releases long-awaited privacy report - "Protecting consumer privacy in an era of rapid change"
[Open link in this window | Open link in new window]
MediaPost: FTC criticizes self-regulatory efforts, proposes blanket do-not-track
[Open link in this window | Open link in new window]
Wired Epicenter: FTC backs 'do not track' browser setting
[Open link in this window | Open link in new window]
An industry initiatve sponsored by RSA.
RSA: A new era of compliance - Raising the bar for organizations worldwide (PDF)
[Open link in this window | Open link in new window]
DarkReading: Tougher data protection laws could force businesses to rethink compliance
[Open link in this window | Open link in new window]
A paper by Arnold Roosendaal.
Arnold Roosendaal: Facebook tracks and traces everyone - Like this! (SSRN)
[Open link in this window | Open link in new window]
Weblog Law and Technology: Facebook tracks and traces everyone - Like this!
[Open link in this window | Open link in new window]
An article by Yaniv Altshuler, Nadav Aharony, Yuval Elovici, Aled Pentland and Manuel Cebrian.
Yaniv Altshuler, Nadav Aharony, Yuval Elovici, Aled Pentland and Manuel Cebrian: Stealing reality (PDF)
[Open link in this window | Open link in new window]
DarkReading: University study offers recipe for stealth malware attacks via social networks
[Open link in this window | Open link in new window]
A study by the Verizon PCI and RISK Intelligence teams.
Verizon: Verizon 2010 payment card industry compliance report (PDF)
[Open link in this window | Open link in new window]
DarkReading: New Verizon report - Non-PCI compliant organizations suffer more breaches
[Open link in this window | Open link in new window]
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.