Tag Archives: cybersecurity

Moving the Encryption Policy Conversation Forward

INTRODUCTION The encryption of data and communications has long been understood as essential. Strong encryption thwarts criminals and preserves privacy for myriad beneficiaries, from vulnerable populations to businesses to governments. At the same time, encryption has complicated law enforcement investigations, … Continue reading

Posted in Computers and Internet | Tagged , , , , | Leave a comment

ELECTRONIC PRIVACY INFORMATION CENTER (B)

(being continued from 9/07/16) A)EPIC to FTC: Google’s Location Tracking Violates Consent Order 17/08/18 Following a report that Google tracks user location even when users opt-out, EPIC wrote to the FTC that Google violated the 2011 consent order. EPIC said … Continue reading

Posted in Computers and Internet | Tagged , , , , , | Leave a comment

ELECTRONIC PRIVACY INFORMATION CENTER (A)

The Electronic Privacy Information Center (EPIC) focuses public attention on emerging civil liberties, privacy, First Amendment issues and works to promote the Public Voice in decisions concerning the future of the Internet. Below is a comprehensive list of our work. … Continue reading

Posted in Computers and Internet | Tagged , , , | Leave a comment

MALWARE AND WORMS

  Milestones in Malware 1971 Creeper, an experimental self-replicating viral program, is written by Bob Thomas at Bolt, Beranek and Newman. It infected DEC PDP-10 computers running the Tenex operating system. Creeper gained access via the ARPANET, the predecessor of … Continue reading

Posted in Computers and Internet | Tagged , , , , , , | 1 Comment