Language Selection

English French German Italian Portuguese Spanish

Regulating phone companies' security standards

Filed under
Security

A new age crime for new age technology, is about thieves trying to steal identities and the phone companies doing little to protect subscribers' personal data from being revealed. Now according to a privacy watchdog Electronic Privacy Information Center (EPIC), it is getting worse as agents of deception are getting access to even personal phone records from the phone companies, which are actively traded over the Internet, believably by over 40 internet sites.

The EPIC has filed a petition with the Federal Communications Commission (FCC) that states that these identity thieves are "data brokers and private investigators" who are knowledgeable about the "inadequate security" and make the most of it "through pretexting", pretending to have authority to access protected records. The petition also goes forth to suggest the rot within the telephone companies, of staff who use the knowledge of personal information to decipher a subscriber's online telephone account code to access or misuse the account. Precedent to the petition was an EPIC complaint filed against Intelligent e-Commerce Inc. last year, over its illegal trade in telephone subscriber's personal information.

Full Story.

More in Tux Machines

​Red Hat buys into Docker containers with Atomic Host

Not much over a year ago, few people knew about containers, and fewer still knew about Docker. Since then, the idea of building server and applications out of container-based micro-servers, has exploded in popularity. Red Hat has been watching this and now with Red Hat Enterprise Linux 7 Atomic Host (RHELAH) the company has its own operating system/container pairing to offer the business world. Read more

VMware heads to court over GPL violations

The Software Freedom Conservancy alleges that VMware is using GPL-licensed code in its proprietary products Read more

5 awesome security features to expect in PC-BSD 10.1.2

Five of those security and security-related features were announced today and are on track to be included in the next edition, which should be PC-BSD 10.1.2. They are PersonaCrypt – a command line utility to backup a user’s home directory to an encrypted external media Tor Mode in System Updater Tray Stealth Mode in PersonaCrypt Ports now use LibreSSL by default instead of OpenSSL Support for encrypted backups in Life-Preserver utility Read more

COM Express module runs Linux on a 2.3GHz Tegra K1

Seco is prepping a Linux-friendly COM Express Type 6 Compact module with a quad-core, 2.3GHz Tegra K1 SoC and optional extended temperature support. When we covered the Nvidia Jetson TK1 single board computer last March, we didn’t realize the manufacturer was Seco. In addition to the Jetson TK1 (Seco product page here), Seco is now adding a COM Express Type 6 Compact computer-on-module called the SECOMExp-TK1, which similarly runs Linux on an Nvidia Tegra K1 SoC. Read more