Posts by Tag

Privacy

Retroshare

less than 1 minute read

I had a lot of positive feedback from the recent post on Diaspora with client-side encryption. For those of you who are somewhat technically inclined, and li...

Free cloud storage

1 minute read

The cloud is a current buzzword in technology, referring to remote storage space on the internet. The big challenge with using free cloud storage, as a priva...

The browser tracker test

1 minute read

I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:

What info does Facebook have on me?

less than 1 minute read

After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...

A must have hosts file

1 minute read

My friend Dan Pollock has been compiling the must have hosts file for some time. According to Wikipedia, the hosts file is a computer file used in an operati...

Apple’s updated privacy policy

less than 1 minute read

“To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the ...

Social networking, what’s next?

1 minute read

In 2008, I was in Ottawa, talking with one of our clients, CIPPIC. Specifically the executive director at the time, about Facebook. There was discussion that...

Back to top ↑

facebook

Opening your social network profile

less than 1 minute read

There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...

Facebook post F8

1 minute read

Right after the Facebook F8 keynote, a 15 year old noted he didn’t understand this new model Facebook was about to roll out. What might not be obvious, is th...

Had your Twitter or Facebook hacked?

less than 1 minute read

If your friends ever tell you that they’ve received spam from your account, but you didn’t send it, likely your account was compromised. The following steps ...

Tech Tip: Secure connection to Facebook

less than 1 minute read

This tip is to create a permanent secure connection to Facebook. You can tell you’re using SSL if the URL starts with https:// instead of http://. When you’r...

Why would Facebook turn your actions into an ad?

less than 1 minute read

Because they can. On Monday, Facebook released a [ video](https://www.facebook.com/video/video.php?v=10100328087082670) that shows how their new *sponsored s...

Social networking, what’s next?

1 minute read

In 2008, I was in Ottawa, talking with one of our clients, CIPPIC. Specifically the executive director at the time, about Facebook. There was discussion that...

Web server logs

2 minute read

If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...

Back to top ↑

SSL

Secure websites

1 minute read

I’m often asked about secure websites. For example, should you trust the connection with your computer and your bank’s website? The article is going to get a...

Google now offering secure search

less than 1 minute read

It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...

Upgrade your browser before you check your gmail

less than 1 minute read

There is a wildcard *google.com SSL certificate in the wild, which means malicious people can sit between you and anything at Google (including gmail) and pr...

Using a secure connection where possible

less than 1 minute read

I received a lot of feedback after my post yesterday about creating a permanent SSL (https://) connection to Facebook. It’s most important to use SSL anywher...

Tech Tip: Secure connection to Facebook

less than 1 minute read

This tip is to create a permanent secure connection to Facebook. You can tell you’re using SSL if the URL starts with https:// instead of http://. When you’r...

Why is there so much fear about …?

1 minute read

This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...

Back to top ↑

Google

Change your default search engine

1 minute read

Most of us use a search engine such as Google or Yahoo daily without taking much time to consider the inherent privacy implications. If you have some time, ...

Google now offering secure search

less than 1 minute read

It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...

Duck Duck Go

1 minute read

You’re likelty using Google as your default search engine; and they’re undoubtably good at search. The challenge to me is what are they doing with the inform...

Where does Google’s censorship end?

1 minute read

It’s been well reported on Google’s kowtowing to the Chinese government in regards to censorship. This was based on the requests of a foreign government. How...

Web server logs

2 minute read

If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...

Back to top ↑

PIPEDA

Canadian Patriot Act back as bill C-12

1 minute read

If you’ve followed this blog for some time, I first wrote about the introduction of the bill in May 2010, and then a follow up redux in August 2010 (a summar...

What info does Facebook have on me?

less than 1 minute read

After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...

LinkedIn to approve the closing of your account?

less than 1 minute read

After writing an article yesterday on how LinkedIn opts your name and photo into social advertising by default, it was brought to my attention today that if ...

Canadian Patriot Act redux

2 minute read

The article posted in May on the Canadian Patriot Act being introduced to the House of Commons didn’t seem to go much further than “preaching to the choir”. ...

Canadian Patriot Act introduced

1 minute read

Today a couple of changes to Canada’s privacy landscape were introduced under the infamous banner of “safety and security”. This will create significant chan...

Back to top ↑

Canada

What info does Facebook have on me?

less than 1 minute read

After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...

Stop online spying in Canada

less than 1 minute read

You may remember a year ago I broke the story on the introduction of the minority government’s Canadian version of the patriot act (see articles one and two)...

Update on usage based billing (UBB)

less than 1 minute read

This image is getting a lot of attention. Today Michael Geist has released an article on Unpacking The Policy Issues Behind Bandwidth Caps & Usage Based ...

Canadian petition against usage based billing

1 minute read

As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...

Back to top ↑

https://

Google now offering secure search

less than 1 minute read

It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...

Using a secure connection where possible

less than 1 minute read

I received a lot of feedback after my post yesterday about creating a permanent SSL (https://) connection to Facebook. It’s most important to use SSL anywher...

Tech Tip: Secure connection to Facebook

less than 1 minute read

This tip is to create a permanent secure connection to Facebook. You can tell you’re using SSL if the URL starts with https:// instead of http://. When you’r...

Why is there so much fear about …?

1 minute read

This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...

Back to top ↑

internet

Stop online spying in Canada

less than 1 minute read

You may remember a year ago I broke the story on the introduction of the minority government’s Canadian version of the patriot act (see articles one and two)...

Canadian petition against usage based billing

1 minute read

As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...

Back to top ↑

twitter

Opening your social network profile

less than 1 minute read

There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...

Had your Twitter or Facebook hacked?

less than 1 minute read

If your friends ever tell you that they’ve received spam from your account, but you didn’t send it, likely your account was compromised. The following steps ...

Using a secure connection where possible

less than 1 minute read

I received a lot of feedback after my post yesterday about creating a permanent SSL (https://) connection to Facebook. It’s most important to use SSL anywher...

Update on usage based billing (UBB)

less than 1 minute read

This image is getting a lot of attention. Today Michael Geist has released an article on Unpacking The Policy Issues Behind Bandwidth Caps & Usage Based ...

Back to top ↑

BC

Back to top ↑

British Columbia

What info does Facebook have on me?

less than 1 minute read

After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...

Back to top ↑

passwords

Is this password manager any good?

2 minute read

I’ve been asked this question countless times over the last couple decades, perhaps because I used to be responsible for cracking weak passwords for a compan...

Portable Password Manager

less than 1 minute read

Today’s question comes from a former student, asking what I use for a portable password manager:

Password protect your cellphone

1 minute read

For most things privacy related in Canadian law, it comes down to what a judge feels Canadians think is reasonable. A couple of days ago the Ontario court of...

How strong is your password?

2 minute read

While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...

Back to top ↑

GnuPG

Happy Data Privacy Day 2013!

2 minute read

According to Wikipedia, the purpose of Data Privacy Day is to raise awareness and promote data privacy education. It is currently ‘celebrated’ in the United ...

GNU Privacy Guard

1 minute read

Ever since PGP removed their open source client, GnuPG has been the standard in open source PKI. If you want to encrypt your emails and/or files on your comp...

Email Encryption

less than 1 minute read

On our contact us page we mention OpenPGP standard encryption (RFC 4880). What is this? Most people think email only goes to the intended recipient, but inst...

Back to top ↑

free

Anti-Virus for Macosx

less than 1 minute read

Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...

Ethical Hacking class

less than 1 minute read

If you are in the Suwon/Seoul area of Korea tomorrow, I will be teaching an Ethical Hacking class at no cost. Contact me at @PrivaSecTech on twitter for di...

Free Email

1 minute read

“My email provider shut down my account, gave me a support ticket number, but I have no way to look it up” “Have you paid for your account?” “No, it’s a free...

Back to top ↑

PATRIOT ACT

Stop online spying in Canada

less than 1 minute read

You may remember a year ago I broke the story on the introduction of the minority government’s Canadian version of the patriot act (see articles one and two)...

Canadian Patriot Act redux

2 minute read

The article posted in May on the Canadian Patriot Act being introduced to the House of Commons didn’t seem to go much further than “preaching to the choir”. ...

Canadian Patriot Act introduced

1 minute read

Today a couple of changes to Canada’s privacy landscape were introduced under the infamous banner of “safety and security”. This will create significant chan...

Back to top ↑

Apple

Anti-Virus for Macosx

less than 1 minute read

Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...

Apple’s updated privacy policy

less than 1 minute read

“To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the ...

Apple iphone vs Nokia E71

1 minute read

Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...

Back to top ↑

PII

Identity theft at UVic

1 minute read

Over the week-end, the University of Victoria’s new administrative building was broken into. A payroll server with the personally identifiable information (P...

What info does Facebook have on me?

less than 1 minute read

After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...

Back to top ↑

encryption

Borrow your neighbours identity

1 minute read

If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...

Back to top ↑

web

Change your default search engine

1 minute read

Most of us use a search engine such as Google or Yahoo daily without taking much time to consider the inherent privacy implications. If you have some time, ...

A must have hosts file

1 minute read

My friend Dan Pollock has been compiling the must have hosts file for some time. According to Wikipedia, the hosts file is a computer file used in an operati...

Borrow your neighbours identity

1 minute read

If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...

Back to top ↑

tracking

Duck Duck Go

1 minute read

You’re likelty using Google as your default search engine; and they’re undoubtably good at search. The challenge to me is what are they doing with the inform...

Detect and block website trackers with Ghostery

less than 1 minute read

For anyone that attended the Privacy and Security talk tonight at Social Media Club – Victoria, I mentioned a browser plugin that allows you to see who is tr...

Your printer is giving you up!

less than 1 minute read

Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...

Back to top ↑

communications

Back to top ↑

PIPA

What info does Facebook have on me?

less than 1 minute read

After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...

LinkedIn to approve the closing of your account?

less than 1 minute read

After writing an article yesterday on how LinkedIn opts your name and photo into social advertising by default, it was brought to my attention today that if ...

Back to top ↑

compromise

Anti-virus, are you doing it right?

1 minute read

Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...

Had your Twitter or Facebook hacked?

less than 1 minute read

If your friends ever tell you that they’ve received spam from your account, but you didn’t send it, likely your account was compromised. The following steps ...

I smell a RAT

1 minute read

Yesterday, Vanity Fair published an exclusive on operation Shady RAT (remote access tool), which was a high-level hacking campaign that lasted over 5 years, ...

Back to top ↑

hack

Had your Twitter or Facebook hacked?

less than 1 minute read

If your friends ever tell you that they’ve received spam from your account, but you didn’t send it, likely your account was compromised. The following steps ...

I smell a RAT

1 minute read

Yesterday, Vanity Fair published an exclusive on operation Shady RAT (remote access tool), which was a high-level hacking campaign that lasted over 5 years, ...

Back to top ↑

surveillance

Back to top ↑

Email

Retroshare

less than 1 minute read

I had a lot of positive feedback from the recent post on Diaspora with client-side encryption. For those of you who are somewhat technically inclined, and li...

Email Encryption

less than 1 minute read

On our contact us page we mention OpenPGP standard encryption (RFC 4880). What is this? Most people think email only goes to the intended recipient, but inst...

Back to top ↑

OpenPGP

GNU Privacy Guard

1 minute read

Ever since PGP removed their open source client, GnuPG has been the standard in open source PKI. If you want to encrypt your emails and/or files on your comp...

Email Encryption

less than 1 minute read

On our contact us page we mention OpenPGP standard encryption (RFC 4880). What is this? Most people think email only goes to the intended recipient, but inst...

Back to top ↑

PGP

GNU Privacy Guard

1 minute read

Ever since PGP removed their open source client, GnuPG has been the standard in open source PKI. If you want to encrypt your emails and/or files on your comp...

Email Encryption

less than 1 minute read

On our contact us page we mention OpenPGP standard encryption (RFC 4880). What is this? Most people think email only goes to the intended recipient, but inst...

Back to top ↑

hijacking

Shaw’s decided to hijack their customer’s DNS

less than 1 minute read

When you go to a website that doesn’t exist, instead of your search engine of choice offering you other solutions, Shaw has decided to do this themselves, an...

Back to top ↑

iphone

Apple’s updated privacy policy

less than 1 minute read

“To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the ...

Apple iphone vs Nokia E71

1 minute read

Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...

Back to top ↑

stalking

Opening your social network profile

less than 1 minute read

There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...

Apple’s updated privacy policy

less than 1 minute read

“To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the ...

Back to top ↑

Identity Theft

Identity theft at UVic

1 minute read

Over the week-end, the University of Victoria’s new administrative building was broken into. A payroll server with the personally identifiable information (P...

Your credit report

1 minute read

There are two credit bureaus in Canada, Equifax and Transunion (there was a 3rd, American company, but it appears to be defunct). Contrary to the prices list...

Back to top ↑

packet sniffing

Borrow your neighbours identity

1 minute read

If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...

Back to top ↑

sidejacking

Borrow your neighbours identity

1 minute read

If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...

Back to top ↑

wireshark

Borrow your neighbours identity

1 minute read

If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...

Back to top ↑

Media

Opening your social network profile

less than 1 minute read

There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...

Back to top ↑

protection

Anti-virus, are you doing it right?

1 minute read

Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...

Back to top ↑

Vancouver Sun

Postmedia formatting hack

1 minute read

If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...

Back to top ↑

digital

Your printer is giving you up!

less than 1 minute read

Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...

Why is there so much fear about …?

1 minute read

This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...

Back to top ↑

online

Change your default search engine

1 minute read

Most of us use a search engine such as Google or Yahoo daily without taking much time to consider the inherent privacy implications. If you have some time, ...

Why is there so much fear about …?

1 minute read

This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...

Back to top ↑

tracker

Using a non-tracker analytics service

less than 1 minute read

You’ve probably heard of Google analytics, which takes logs of your website visitors, and all of their activities, and provides you some very pretty, and use...

A must have hosts file

1 minute read

My friend Dan Pollock has been compiling the must have hosts file for some time. According to Wikipedia, the hosts file is a computer file used in an operati...

Back to top ↑

torrent

Retroshare

less than 1 minute read

I had a lot of positive feedback from the recent post on Diaspora with client-side encryption. For those of you who are somewhat technically inclined, and li...

Where does Google’s censorship end?

1 minute read

It’s been well reported on Google’s kowtowing to the Chinese government in regards to censorship. This was based on the requests of a foreign government. How...

Back to top ↑

CRTC

Update on usage based billing (UBB)

less than 1 minute read

This image is getting a lot of attention. Today Michael Geist has released an article on Unpacking The Policy Issues Behind Bandwidth Caps & Usage Based ...

Canadian petition against usage based billing

1 minute read

As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...

Back to top ↑

UBB

Update on usage based billing (UBB)

less than 1 minute read

This image is getting a lot of attention. Today Michael Geist has released an article on Unpacking The Policy Issues Behind Bandwidth Caps & Usage Based ...

Canadian petition against usage based billing

1 minute read

As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...

Back to top ↑

Usage Based Billing

Update on usage based billing (UBB)

less than 1 minute read

This image is getting a lot of attention. Today Michael Geist has released an article on Unpacking The Policy Issues Behind Bandwidth Caps & Usage Based ...

Canadian petition against usage based billing

1 minute read

As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...

Back to top ↑

browser

No scripts!

1 minute read

One of the most common ways your computer gets compromised, is by malicious scripts opened by your web browser. This means you go to a website that might loo...

Detect and block website trackers with Ghostery

less than 1 minute read

For anyone that attended the Privacy and Security talk tonight at Social Media Club – Victoria, I mentioned a browser plugin that allows you to see who is tr...

Back to top ↑

ghostery

Using a non-tracker analytics service

less than 1 minute read

You’ve probably heard of Google analytics, which takes logs of your website visitors, and all of their activities, and provides you some very pretty, and use...

Detect and block website trackers with Ghostery

less than 1 minute read

For anyone that attended the Privacy and Security talk tonight at Social Media Club – Victoria, I mentioned a browser plugin that allows you to see who is tr...

Back to top ↑

trackers

The browser tracker test

1 minute read

I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:

Detect and block website trackers with Ghostery

less than 1 minute read

For anyone that attended the Privacy and Security talk tonight at Social Media Club – Victoria, I mentioned a browser plugin that allows you to see who is tr...

Back to top ↑

always on

Using a secure connection where possible

less than 1 minute read

I received a lot of feedback after my post yesterday about creating a permanent SSL (https://) connection to Facebook. It’s most important to use SSL anywher...

Tech Tip: Secure connection to Facebook

less than 1 minute read

This tip is to create a permanent secure connection to Facebook. You can tell you’re using SSL if the URL starts with https:// instead of http://. When you’r...

Back to top ↑

IP

The Stop Online Piracy Act

1 minute read

If you’ve not heard of #SOPA yet, you likely will today. As of right now, it’s only something that techies and internet crusaders seem to be aware of. Like m...

I smell a RAT

1 minute read

Yesterday, Vanity Fair published an exclusive on operation Shady RAT (remote access tool), which was a high-level hacking campaign that lasted over 5 years, ...

Back to top ↑

crack

How strong is your password?

2 minute read

While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...

Had your Twitter or Facebook hacked?

less than 1 minute read

If your friends ever tell you that they’ve received spam from your account, but you didn’t send it, likely your account was compromised. The following steps ...

Back to top ↑

spam

Had your Twitter or Facebook hacked?

less than 1 minute read

If your friends ever tell you that they’ve received spam from your account, but you didn’t send it, likely your account was compromised. The following steps ...

Back to top ↑

CA

Upgrade your browser before you check your gmail

less than 1 minute read

There is a wildcard *google.com SSL certificate in the wild, which means malicious people can sit between you and anything at Google (including gmail) and pr...

Back to top ↑

law

Password protect your cellphone

1 minute read

For most things privacy related in Canadian law, it comes down to what a judge feels Canadians think is reasonable. A couple of days ago the Ontario court of...

Back to top ↑

CBC

The browser tracker test

1 minute read

I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:

Identity theft at UVic

1 minute read

Over the week-end, the University of Victoria’s new administrative building was broken into. A payroll server with the personally identifiable information (P...

Back to top ↑

java

No scripts!

1 minute read

One of the most common ways your computer gets compromised, is by malicious scripts opened by your web browser. This means you go to a website that might loo...

Back to top ↑

ixquick

Change your default search engine

1 minute read

Most of us use a search engine such as Google or Yahoo daily without taking much time to consider the inherent privacy implications. If you have some time, ...

Back to top ↑

anti virus

Anti-Virus for Macosx

less than 1 minute read

Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...

Anti-virus, are you doing it right?

1 minute read

Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...

Back to top ↑

norton

Anti-virus, are you doing it right?

1 minute read

Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...

Back to top ↑

GNU Privacy Guard

Happy Data Privacy Day 2013!

2 minute read

According to Wikipedia, the purpose of Data Privacy Day is to raise awareness and promote data privacy education. It is currently ‘celebrated’ in the United ...

GNU Privacy Guard

1 minute read

Ever since PGP removed their open source client, GnuPG has been the standard in open source PKI. If you want to encrypt your emails and/or files on your comp...

Back to top ↑

gpg

Happy Data Privacy Day 2013!

2 minute read

According to Wikipedia, the purpose of Data Privacy Day is to raise awareness and promote data privacy education. It is currently ‘celebrated’ in the United ...

GNU Privacy Guard

1 minute read

Ever since PGP removed their open source client, GnuPG has been the standard in open source PKI. If you want to encrypt your emails and/or files on your comp...

Back to top ↑

comms

Back to top ↑

chrome

Browser plugins for device protection

less than 1 minute read

These are the three browser plugins for device protection I recommend you install. The first one is arguably more important than anti-virus, and takes a whil...

Back to top ↑

firefox

Browser plugins for device protection

less than 1 minute read

These are the three browser plugins for device protection I recommend you install. The first one is arguably more important than anti-virus, and takes a whil...

Back to top ↑

internet explorer

Browser plugins for device protection

less than 1 minute read

These are the three browser plugins for device protection I recommend you install. The first one is arguably more important than anti-virus, and takes a whil...

Back to top ↑

opera

Browser plugins for device protection

less than 1 minute read

These are the three browser plugins for device protection I recommend you install. The first one is arguably more important than anti-virus, and takes a whil...

Back to top ↑

Email encryption

Email Encryption

less than 1 minute read

On our contact us page we mention OpenPGP standard encryption (RFC 4880). What is this? Most people think email only goes to the intended recipient, but inst...

Back to top ↑

open source

Email Encryption

less than 1 minute read

On our contact us page we mention OpenPGP standard encryption (RFC 4880). What is this? Most people think email only goes to the intended recipient, but inst...

Back to top ↑

Adwords

Web server logs

2 minute read

If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...

Back to top ↑

Apache

Web server logs

2 minute read

If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...

Back to top ↑

logs

Web server logs

2 minute read

If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...

Back to top ↑

netcraft

Web server logs

2 minute read

If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...

Back to top ↑

proxy

Web server logs

2 minute read

If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...

Back to top ↑

pseudoanonymity

Web server logs

2 minute read

If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...

Back to top ↑

tor

Web server logs

2 minute read

If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...

Back to top ↑

User agent

Web server logs

2 minute read

If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...

Back to top ↑

free email

Free Email

1 minute read

“My email provider shut down my account, gave me a support ticket number, but I have no way to look it up” “Have you paid for your account?” “No, it’s a free...

Back to top ↑

Gmail

Free Email

1 minute read

“My email provider shut down my account, gave me a support ticket number, but I have no way to look it up” “Have you paid for your account?” “No, it’s a free...

Back to top ↑

Hotmail

Free Email

1 minute read

“My email provider shut down my account, gave me a support ticket number, but I have no way to look it up” “Have you paid for your account?” “No, it’s a free...

Back to top ↑

SLA

Free Email

1 minute read

“My email provider shut down my account, gave me a support ticket number, but I have no way to look it up” “Have you paid for your account?” “No, it’s a free...

Back to top ↑

Yahoo! Mail

Free Email

1 minute read

“My email provider shut down my account, gave me a support ticket number, but I have no way to look it up” “Have you paid for your account?” “No, it’s a free...

Back to top ↑

cippic

Social networking, what’s next?

1 minute read

In 2008, I was in Ottawa, talking with one of our clients, CIPPIC. Specifically the executive director at the time, about Facebook. There was discussion that...

Back to top ↑

FISA

Canadian Patriot Act introduced

1 minute read

Today a couple of changes to Canada’s privacy landscape were introduced under the infamous banner of “safety and security”. This will create significant chan...

Back to top ↑

Copy and Paste

Back to top ↑

Tynt

Back to top ↑

comparison

Apple iphone vs Nokia E71

1 minute read

Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...

Back to top ↑

E71

Apple iphone vs Nokia E71

1 minute read

Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...

Back to top ↑

MMS

Apple iphone vs Nokia E71

1 minute read

Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...

Back to top ↑

Nokia

Apple iphone vs Nokia E71

1 minute read

Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...

Back to top ↑

recommendations

Apple iphone vs Nokia E71

1 minute read

Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...

Back to top ↑

SIP

Apple iphone vs Nokia E71

1 minute read

Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...

Back to top ↑

smartphone

Apple iphone vs Nokia E71

1 minute read

Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...

Back to top ↑

SMS

Apple iphone vs Nokia E71

1 minute read

Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...

Back to top ↑

GPS

Apple’s updated privacy policy

less than 1 minute read

“To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the ...

Back to top ↑

GPSr

Apple’s updated privacy policy

less than 1 minute read

“To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the ...

Back to top ↑

metadata

Apple’s updated privacy policy

less than 1 minute read

“To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the ...

Back to top ↑

10 Principles of Privacy

Back to top ↑

collection of data

Back to top ↑

collection of personal information

Back to top ↑

small business

Back to top ↑

Law enforcement

Canadian Patriot Act redux

2 minute read

The article posted in May on the Canadian Patriot Act being introduced to the House of Commons didn’t seem to go much further than “preaching to the choir”. ...

Back to top ↑

ebay

Technology Tip: Shopping

less than 1 minute read

This is a technology hint for those wanting to know if they’re getting a good deal. You can use this hint no matter what you’re buying. You could be looking ...

Back to top ↑

frugal

Technology Tip: Shopping

less than 1 minute read

This is a technology hint for those wanting to know if they’re getting a good deal. You can use this hint no matter what you’re buying. You could be looking ...

Back to top ↑

product

Technology Tip: Shopping

less than 1 minute read

This is a technology hint for those wanting to know if they’re getting a good deal. You can use this hint no matter what you’re buying. You could be looking ...

Back to top ↑

shopping

Technology Tip: Shopping

less than 1 minute read

This is a technology hint for those wanting to know if they’re getting a good deal. You can use this hint no matter what you’re buying. You could be looking ...

Back to top ↑

tech

Technology Tip: Shopping

less than 1 minute read

This is a technology hint for those wanting to know if they’re getting a good deal. You can use this hint no matter what you’re buying. You could be looking ...

Back to top ↑

tip

Technology Tip: Shopping

less than 1 minute read

This is a technology hint for those wanting to know if they’re getting a good deal. You can use this hint no matter what you’re buying. You could be looking ...

Back to top ↑

privacy breach

Back to top ↑

Streetview

Back to top ↑

Credit Report

Your credit report

1 minute read

There are two credit bureaus in Canada, Equifax and Transunion (there was a 3rd, American company, but it appears to be defunct). Contrary to the prices list...

Back to top ↑

Equifax

Your credit report

1 minute read

There are two credit bureaus in Canada, Equifax and Transunion (there was a 3rd, American company, but it appears to be defunct). Contrary to the prices list...

Back to top ↑

Transunion

Your credit report

1 minute read

There are two credit bureaus in Canada, Equifax and Transunion (there was a 3rd, American company, but it appears to be defunct). Contrary to the prices list...

Back to top ↑

ethereal

Borrow your neighbours identity

1 minute read

If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...

Back to top ↑

ferret

Borrow your neighbours identity

1 minute read

If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...

Back to top ↑

hamster

Borrow your neighbours identity

1 minute read

If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...

Back to top ↑

http

Borrow your neighbours identity

1 minute read

If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...

Back to top ↑

session highjacking

Borrow your neighbours identity

1 minute read

If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...

Back to top ↑

Canadian Press

Back to top ↑

CP

Back to top ↑

FreePress

Back to top ↑

Winnipeg

Back to top ↑

Digital Life

Back to top ↑

firesheep

Back to top ↑

Gillian Shaw

Back to top ↑

Common Criteria

Back to top ↑

FIPS 140-2

Back to top ↑

security standards

Back to top ↑

@PrivaSecTech

Why is there so much fear about …?

1 minute read

This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...

Back to top ↑

banking

Why is there so much fear about …?

1 minute read

This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...

Back to top ↑

change

Why is there so much fear about …?

1 minute read

This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...

Back to top ↑

currency

Why is there so much fear about …?

1 minute read

This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...

Back to top ↑

fear

Why is there so much fear about …?

1 minute read

This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...

Back to top ↑

paypal

Why is there so much fear about …?

1 minute read

This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...

Back to top ↑

shopping online

Why is there so much fear about …?

1 minute read

This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...

Back to top ↑

class

Ethical Hacking class

less than 1 minute read

If you are in the Suwon/Seoul area of Korea tomorrow, I will be teaching an Ethical Hacking class at no cost. Contact me at @PrivaSecTech on twitter for di...

Back to top ↑

Ethical hacking

Ethical Hacking class

less than 1 minute read

If you are in the Suwon/Seoul area of Korea tomorrow, I will be teaching an Ethical Hacking class at no cost. Contact me at @PrivaSecTech on twitter for di...

Back to top ↑

Korea

Ethical Hacking class

less than 1 minute read

If you are in the Suwon/Seoul area of Korea tomorrow, I will be teaching an Ethical Hacking class at no cost. Contact me at @PrivaSecTech on twitter for di...

Back to top ↑

Seoul

Ethical Hacking class

less than 1 minute read

If you are in the Suwon/Seoul area of Korea tomorrow, I will be teaching an Ethical Hacking class at no cost. Contact me at @PrivaSecTech on twitter for di...

Back to top ↑

Suwon

Ethical Hacking class

less than 1 minute read

If you are in the Suwon/Seoul area of Korea tomorrow, I will be teaching an Ethical Hacking class at no cost. Contact me at @PrivaSecTech on twitter for di...

Back to top ↑

backups

Ready to test your BCP?

1 minute read

Most large organization make sure to do Business Continuity Planning (BCP), also known as Disaster Recovery Planning (DRP), because they understand the impor...

Back to top ↑

BCP

Ready to test your BCP?

1 minute read

Most large organization make sure to do Business Continuity Planning (BCP), also known as Disaster Recovery Planning (DRP), because they understand the impor...

Back to top ↑

Business Continuity Planning

Ready to test your BCP?

1 minute read

Most large organization make sure to do Business Continuity Planning (BCP), also known as Disaster Recovery Planning (DRP), because they understand the impor...

Back to top ↑

Disaster Recovery Planning

Ready to test your BCP?

1 minute read

Most large organization make sure to do Business Continuity Planning (BCP), also known as Disaster Recovery Planning (DRP), because they understand the impor...

Back to top ↑

DRP

Ready to test your BCP?

1 minute read

Most large organization make sure to do Business Continuity Planning (BCP), also known as Disaster Recovery Planning (DRP), because they understand the impor...

Back to top ↑

EFF

Your printer is giving you up!

less than 1 minute read

Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...

Back to top ↑

forensic

Your printer is giving you up!

less than 1 minute read

Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...

Back to top ↑

forensic marking

Your printer is giving you up!

less than 1 minute read

Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...

Back to top ↑

printer

Your printer is giving you up!

less than 1 minute read

Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...

Back to top ↑

printing

Your printer is giving you up!

less than 1 minute read

Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...

Back to top ↑

watermark

Your printer is giving you up!

less than 1 minute read

Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...

Back to top ↑

breach

Back to top ↑

fail

Back to top ↑

file

A must have hosts file

1 minute read

My friend Dan Pollock has been compiling the must have hosts file for some time. According to Wikipedia, the hosts file is a computer file used in an operati...

Back to top ↑

hosts

A must have hosts file

1 minute read

My friend Dan Pollock has been compiling the must have hosts file for some time. According to Wikipedia, the hosts file is a computer file used in an operati...

Back to top ↑

safety

A must have hosts file

1 minute read

My friend Dan Pollock has been compiling the must have hosts file for some time. According to Wikipedia, the hosts file is a computer file used in an operati...

Back to top ↑

surfing

A must have hosts file

1 minute read

My friend Dan Pollock has been compiling the must have hosts file for some time. According to Wikipedia, the hosts file is a computer file used in an operati...

Back to top ↑

censorship

Where does Google’s censorship end?

1 minute read

It’s been well reported on Google’s kowtowing to the Chinese government in regards to censorship. This was based on the requests of a foreign government. How...

Back to top ↑

filter

Where does Google’s censorship end?

1 minute read

It’s been well reported on Google’s kowtowing to the Chinese government in regards to censorship. This was based on the requests of a foreign government. How...

Back to top ↑

filtering

Where does Google’s censorship end?

1 minute read

It’s been well reported on Google’s kowtowing to the Chinese government in regards to censorship. This was based on the requests of a foreign government. How...

Back to top ↑

advertising

Why would Facebook turn your actions into an ad?

less than 1 minute read

Because they can. On Monday, Facebook released a [ video](https://www.facebook.com/video/video.php?v=10100328087082670) that shows how their new *sponsored s...

Back to top ↑

airport security

Back to top ↑

conference

Back to top ↑

reboot

Back to top ↑

security theatre

Back to top ↑

TSA

Back to top ↑

bandwidth

Canadian petition against usage based billing

1 minute read

As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...

Back to top ↑

caps

Canadian petition against usage based billing

1 minute read

As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...

Back to top ↑

internet service provider

Canadian petition against usage based billing

1 minute read

As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...

Back to top ↑

ISP

Canadian petition against usage based billing

1 minute read

As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...

Back to top ↑

limits

Canadian petition against usage based billing

1 minute read

As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...

Back to top ↑

oligarchy

Canadian petition against usage based billing

1 minute read

As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...

Back to top ↑

#cdnpoli

Update on usage based billing (UBB)

less than 1 minute read

This image is getting a lot of attention. Today Michael Geist has released an article on Unpacking The Policy Issues Behind Bandwidth Caps & Usage Based ...

Back to top ↑

politicians

Update on usage based billing (UBB)

less than 1 minute read

This image is getting a lot of attention. Today Michael Geist has released an article on Unpacking The Policy Issues Behind Bandwidth Caps & Usage Based ...

Back to top ↑

@caparsons

Back to top ↑

Chris Parsons

Back to top ↑

presentation

Back to top ↑

Social Media Club

Back to top ↑

UVic

Back to top ↑

Victoria

Back to top ↑

ads

Detect and block website trackers with Ghostery

less than 1 minute read

For anyone that attended the Privacy and Security talk tonight at Social Media Club – Victoria, I mentioned a browser plugin that allows you to see who is tr...

Back to top ↑

plugin

Detect and block website trackers with Ghostery

less than 1 minute read

For anyone that attended the Privacy and Security talk tonight at Social Media Club – Victoria, I mentioned a browser plugin that allows you to see who is tr...

Back to top ↑

account

Tech Tip: Secure connection to Facebook

less than 1 minute read

This tip is to create a permanent secure connection to Facebook. You can tell you’re using SSL if the URL starts with https:// instead of http://. When you’r...

Back to top ↑

settings

Tech Tip: Secure connection to Facebook

less than 1 minute read

This tip is to create a permanent secure connection to Facebook. You can tell you’re using SSL if the URL starts with https:// instead of http://. When you’r...

Back to top ↑

pen testing

Who’s pentesting your organization?

less than 1 minute read

Penetration testing, also known as pentesting, is a way of evaluating the security of your organization from the perspective of a malicious black hat hacker....

Back to top ↑

penetration testing

Who’s pentesting your organization?

less than 1 minute read

Penetration testing, also known as pentesting, is a way of evaluating the security of your organization from the perspective of a malicious black hat hacker....

Back to top ↑

pentest

Who’s pentesting your organization?

less than 1 minute read

Penetration testing, also known as pentesting, is a way of evaluating the security of your organization from the perspective of a malicious black hat hacker....

Back to top ↑

pentesting

Who’s pentesting your organization?

less than 1 minute read

Penetration testing, also known as pentesting, is a way of evaluating the security of your organization from the perspective of a malicious black hat hacker....

Back to top ↑

care card

Back to top ↑

chip and pin

Back to top ↑

health care

Back to top ↑

@shawhelp

Shaw’s decided to hijack their customer’s DNS

less than 1 minute read

When you go to a website that doesn’t exist, instead of your search engine of choice offering you other solutions, Shaw has decided to do this themselves, an...

Back to top ↑

@shawinfo

Shaw’s decided to hijack their customer’s DNS

less than 1 minute read

When you go to a website that doesn’t exist, instead of your search engine of choice offering you other solutions, Shaw has decided to do this themselves, an...

Back to top ↑

DNS

Shaw’s decided to hijack their customer’s DNS

less than 1 minute read

When you go to a website that doesn’t exist, instead of your search engine of choice offering you other solutions, Shaw has decided to do this themselves, an...

Back to top ↑

nxr

Shaw’s decided to hijack their customer’s DNS

less than 1 minute read

When you go to a website that doesn’t exist, instead of your search engine of choice offering you other solutions, Shaw has decided to do this themselves, an...

Back to top ↑

Shaw

Shaw’s decided to hijack their customer’s DNS

less than 1 minute read

When you go to a website that doesn’t exist, instead of your search engine of choice offering you other solutions, Shaw has decided to do this themselves, an...

Back to top ↑

Harper Government

Stop online spying in Canada

less than 1 minute read

You may remember a year ago I broke the story on the introduction of the minority government’s Canadian version of the patriot act (see articles one and two)...

Back to top ↑

spying

Stop online spying in Canada

less than 1 minute read

You may remember a year ago I broke the story on the introduction of the minority government’s Canadian version of the patriot act (see articles one and two)...

Back to top ↑

PIPPA

Back to top ↑

US Patriot Act

Back to top ↑

Bing

Duck Duck Go

1 minute read

You’re likelty using Google as your default search engine; and they’re undoubtably good at search. The challenge to me is what are they doing with the inform...

Back to top ↑

Search engine

Duck Duck Go

1 minute read

You’re likelty using Google as your default search engine; and they’re undoubtably good at search. The challenge to me is what are they doing with the inform...

Back to top ↑

anonymity

Back to top ↑

blogging

Back to top ↑

pseudoanon

Back to top ↑

Operation Shady RAT

I smell a RAT

1 minute read

Yesterday, Vanity Fair published an exclusive on operation Shady RAT (remote access tool), which was a high-level hacking campaign that lasted over 5 years, ...

Back to top ↑

state actor

I smell a RAT

1 minute read

Yesterday, Vanity Fair published an exclusive on operation Shady RAT (remote access tool), which was a high-level hacking campaign that lasted over 5 years, ...

Back to top ↑

@snookca

LinkedIn to approve the closing of your account?

less than 1 minute read

After writing an article yesterday on how LinkedIn opts your name and photo into social advertising by default, it was brought to my attention today that if ...

Back to top ↑

LinkedIn

LinkedIn to approve the closing of your account?

less than 1 minute read

After writing an article yesterday on how LinkedIn opts your name and photo into social advertising by default, it was brought to my attention today that if ...

Back to top ↑

CanWest

Postmedia formatting hack

1 minute read

If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...

Back to top ↑

compliance

Postmedia formatting hack

1 minute read

If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...

Back to top ↑

Edmonton Journal

Postmedia formatting hack

1 minute read

If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...

Back to top ↑

HTML

Postmedia formatting hack

1 minute read

If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...

Back to top ↑

Ottawa Citizen

Postmedia formatting hack

1 minute read

If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...

Back to top ↑

PostMedia

Postmedia formatting hack

1 minute read

If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...

Back to top ↑

Victoria Times-Colonist

Postmedia formatting hack

1 minute read

If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...

Back to top ↑

W3

Postmedia formatting hack

1 minute read

If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...

Back to top ↑

DigiNotar

Upgrade your browser before you check your gmail

less than 1 minute read

There is a wildcard *google.com SSL certificate in the wild, which means malicious people can sit between you and anything at Google (including gmail) and pr...

Back to top ↑

exploit

Upgrade your browser before you check your gmail

less than 1 minute read

There is a wildcard *google.com SSL certificate in the wild, which means malicious people can sit between you and anything at Google (including gmail) and pr...

Back to top ↑

Iran

Upgrade your browser before you check your gmail

less than 1 minute read

There is a wildcard *google.com SSL certificate in the wild, which means malicious people can sit between you and anything at Google (including gmail) and pr...

Back to top ↑

MITM

Upgrade your browser before you check your gmail

less than 1 minute read

There is a wildcard *google.com SSL certificate in the wild, which means malicious people can sit between you and anything at Google (including gmail) and pr...

Back to top ↑

vuln

Upgrade your browser before you check your gmail

less than 1 minute read

There is a wildcard *google.com SSL certificate in the wild, which means malicious people can sit between you and anything at Google (including gmail) and pr...

Back to top ↑

civil liberties

Back to top ↑

riot

Back to top ↑

Vancouver

Back to top ↑

0day

Back to top ↑

certificate

Back to top ↑

comodo

Back to top ↑

DigitNotar

Back to top ↑

Ich Sun

Back to top ↑

windows update

Back to top ↑

#F8

Facebook post F8

1 minute read

Right after the Facebook F8 keynote, a 15 year old noted he didn’t understand this new model Facebook was about to roll out. What might not be obvious, is th...

Back to top ↑

data retention act

What info does Facebook have on me?

less than 1 minute read

After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...

Back to top ↑

personally identifiable information

What info does Facebook have on me?

less than 1 minute read

After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...

Back to top ↑

adword

Google now offering secure search

less than 1 minute read

It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...

Back to top ↑

keyword

Google now offering secure search

less than 1 minute read

It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...

Back to top ↑

secure

Google now offering secure search

less than 1 minute read

It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...

Back to top ↑

SEM

Google now offering secure search

less than 1 minute read

It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...

Back to top ↑

SEO

Google now offering secure search

less than 1 minute read

It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...

Back to top ↑

FIPPA

Back to top ↑

legislation

Back to top ↑

legislature

Back to top ↑

affiliate marketing

Using a non-tracker analytics service

less than 1 minute read

You’ve probably heard of Google analytics, which takes logs of your website visitors, and all of their activities, and provides you some very pretty, and use...

Back to top ↑

authentication

How strong is your password?

2 minute read

While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...

Back to top ↑

hash

How strong is your password?

2 minute read

While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...

Back to top ↑

john the ripper

How strong is your password?

2 minute read

While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...

Back to top ↑

l0phtcrack

How strong is your password?

2 minute read

While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...

Back to top ↑

rainbow tables

How strong is your password?

2 minute read

While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...

Back to top ↑

THC Hydra

How strong is your password?

2 minute read

While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...

Back to top ↑

connections

Back to top ↑

lsof

Back to top ↑

netstat

Back to top ↑

network

Back to top ↑

tcp

Back to top ↑

udp

Back to top ↑

Administrative services

Identity theft at UVic

1 minute read

Over the week-end, the University of Victoria’s new administrative building was broken into. A payroll server with the personally identifiable information (P...

Back to top ↑

identity

Identity theft at UVic

1 minute read

Over the week-end, the University of Victoria’s new administrative building was broken into. A payroll server with the personally identifiable information (P...

Back to top ↑

SIN

Identity theft at UVic

1 minute read

Over the week-end, the University of Victoria’s new administrative building was broken into. A payroll server with the personally identifiable information (P...

Back to top ↑

social insurance number

Identity theft at UVic

1 minute read

Over the week-end, the University of Victoria’s new administrative building was broken into. A payroll server with the personally identifiable information (P...

Back to top ↑

theft

Identity theft at UVic

1 minute read

Over the week-end, the University of Victoria’s new administrative building was broken into. A payroll server with the personally identifiable information (P...

Back to top ↑

SOPA

The Stop Online Piracy Act

1 minute read

If you’ve not heard of #SOPA yet, you likely will today. As of right now, it’s only something that techies and internet crusaders seem to be aware of. Like m...

Back to top ↑

stop online piracy act

The Stop Online Piracy Act

1 minute read

If you’ve not heard of #SOPA yet, you likely will today. As of right now, it’s only something that techies and internet crusaders seem to be aware of. Like m...

Back to top ↑

cross site scripting

No scripts!

1 minute read

One of the most common ways your computer gets compromised, is by malicious scripts opened by your web browser. This means you go to a website that might loo...

Back to top ↑

javascript

No scripts!

1 minute read

One of the most common ways your computer gets compromised, is by malicious scripts opened by your web browser. This means you go to a website that might loo...

Back to top ↑

malicious

No scripts!

1 minute read

One of the most common ways your computer gets compromised, is by malicious scripts opened by your web browser. This means you go to a website that might loo...

Back to top ↑

scripts

No scripts!

1 minute read

One of the most common ways your computer gets compromised, is by malicious scripts opened by your web browser. This means you go to a website that might loo...

Back to top ↑

XSS

No scripts!

1 minute read

One of the most common ways your computer gets compromised, is by malicious scripts opened by your web browser. This means you go to a website that might loo...

Back to top ↑

@vicpdcanada

Back to top ↑

accountability

Back to top ↑

ALPR

Back to top ↑

AOI

Back to top ↑

audit

Back to top ↑

FOI

Back to top ↑

RCMP

Back to top ↑

surveiilance

Back to top ↑

transparancy

Back to top ↑

Victoria Police

Back to top ↑

authority

Back to top ↑

customs

Back to top ↑

digitalpolicy

Back to top ↑

domain

Back to top ↑

enforcement

Back to top ↑

ICANN

Back to top ↑

ICE

Back to top ↑

regulator

Back to top ↑

DuckDuckGo

Back to top ↑

Engine

Back to top ↑

avast

Anti-virus, are you doing it right?

1 minute read

Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...

Back to top ↑

AVG

Anti-virus, are you doing it right?

1 minute read

Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...

Back to top ↑

hacker

Anti-virus, are you doing it right?

1 minute read

Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...

Back to top ↑

pwn

Anti-virus, are you doing it right?

1 minute read

Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...

Back to top ↑

pwned

Anti-virus, are you doing it right?

1 minute read

Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...

Back to top ↑

rooted

Anti-virus, are you doing it right?

1 minute read

Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...

Back to top ↑

scan

Anti-virus, are you doing it right?

1 minute read

Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...

Back to top ↑

symantec

Anti-virus, are you doing it right?

1 minute read

Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...

Back to top ↑

creeping

Opening your social network profile

less than 1 minute read

There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...

Back to top ↑

foursquare

Opening your social network profile

less than 1 minute read

There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...

Back to top ↑

geo-loc

Opening your social network profile

less than 1 minute read

There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...

Back to top ↑

latitude

Opening your social network profile

less than 1 minute read

There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...

Back to top ↑

linked in

Opening your social network profile

less than 1 minute read

There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...

Back to top ↑

longtitude

Opening your social network profile

less than 1 minute read

There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...

Back to top ↑

social

Opening your social network profile

less than 1 minute read

There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...

Back to top ↑

@DanPollock

The browser tracker test

1 minute read

I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:

Back to top ↑

Canadian Broadcasting Corporation

The browser tracker test

1 minute read

I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:

Back to top ↑

dangerous

The browser tracker test

1 minute read

I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:

Back to top ↑

motorcycle

The browser tracker test

1 minute read

I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:

Back to top ↑

Steven Smart

The browser tracker test

1 minute read

I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:

Back to top ↑

viral

The browser tracker test

1 minute read

I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:

Back to top ↑

based

Free cloud storage

1 minute read

The cloud is a current buzzword in technology, referring to remote storage space on the internet. The big challenge with using free cloud storage, as a priva...

Back to top ↑

cloud

Free cloud storage

1 minute read

The cloud is a current buzzword in technology, referring to remote storage space on the internet. The big challenge with using free cloud storage, as a priva...

Back to top ↑

storage

Free cloud storage

1 minute read

The cloud is a current buzzword in technology, referring to remote storage space on the internet. The big challenge with using free cloud storage, as a priva...

Back to top ↑

IPO

Back to top ↑

publicly traded

Back to top ↑

Diaspora

Diaspora with client side encryption

less than 1 minute read

I’ve written about Diaspora before, a social network (Facebook replacement?) that is decentralized, and cares (more) about privacy. If you’re interested to l...

Back to top ↑

PKI

Diaspora with client side encryption

less than 1 minute read

I’ve written about Diaspora before, a social network (Facebook replacement?) that is decentralized, and cares (more) about privacy. If you’re interested to l...

Back to top ↑

social network

Diaspora with client side encryption

less than 1 minute read

I’ve written about Diaspora before, a social network (Facebook replacement?) that is decentralized, and cares (more) about privacy. If you’re interested to l...

Back to top ↑

clickjacking

Are you vulnerable to the DNSChanger?

1 minute read

Wired is reporting that several hundred thousand people may be affected on Monday when the FBI turns off the domains used in the DNSChanger malware. Over 1/...

Back to top ↑

DNSChanger

Are you vulnerable to the DNSChanger?

1 minute read

Wired is reporting that several hundred thousand people may be affected on Monday when the FBI turns off the domains used in the DNSChanger malware. Over 1/...

Back to top ↑

Eastern Europe

Are you vulnerable to the DNSChanger?

1 minute read

Wired is reporting that several hundred thousand people may be affected on Monday when the FBI turns off the domains used in the DNSChanger malware. Over 1/...

Back to top ↑

FBI

Are you vulnerable to the DNSChanger?

1 minute read

Wired is reporting that several hundred thousand people may be affected on Monday when the FBI turns off the domains used in the DNSChanger malware. Over 1/...

Back to top ↑

scam

Are you vulnerable to the DNSChanger?

1 minute read

Wired is reporting that several hundred thousand people may be affected on Monday when the FBI turns off the domains used in the DNSChanger malware. Over 1/...

Back to top ↑

client

Retroshare

less than 1 minute read

I had a lot of positive feedback from the recent post on Diaspora with client-side encryption. For those of you who are somewhat technically inclined, and li...

Back to top ↑

file transfer

Retroshare

less than 1 minute read

I had a lot of positive feedback from the recent post on Diaspora with client-side encryption. For those of you who are somewhat technically inclined, and li...

Back to top ↑

IM

Retroshare

less than 1 minute read

I had a lot of positive feedback from the recent post on Diaspora with client-side encryption. For those of you who are somewhat technically inclined, and li...

Back to top ↑

instant messenger

Retroshare

less than 1 minute read

I had a lot of positive feedback from the recent post on Diaspora with client-side encryption. For those of you who are somewhat technically inclined, and li...

Back to top ↑

retroshare

Retroshare

less than 1 minute read

I had a lot of positive feedback from the recent post on Diaspora with client-side encryption. For those of you who are somewhat technically inclined, and li...

Back to top ↑

anti

Anti-Virus for Macosx

less than 1 minute read

Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...

Back to top ↑

AV

Anti-Virus for Macosx

less than 1 minute read

Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...

Back to top ↑

macosx

Anti-Virus for Macosx

less than 1 minute read

Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...

Back to top ↑

OSX

Anti-Virus for Macosx

less than 1 minute read

Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...

Back to top ↑

virus

Anti-Virus for Macosx

less than 1 minute read

Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...

Back to top ↑

Ann Cavoukian

Back to top ↑

biometrics

Back to top ↑

Daily Dashboard

Back to top ↑

friendly

Back to top ↑

IAPP

Back to top ↑

scanning

Back to top ↑

C-12

Canadian Patriot Act back as bill C-12

1 minute read

If you’ve followed this blog for some time, I first wrote about the introduction of the bill in May 2010, and then a follow up redux in August 2010 (a summar...

Back to top ↑

C-29

Canadian Patriot Act back as bill C-12

1 minute read

If you’ve followed this blog for some time, I first wrote about the introduction of the bill in May 2010, and then a follow up redux in August 2010 (a summar...

Back to top ↑

security

Back to top ↑

telephone

Back to top ↑

voice

Back to top ↑

SIGINT

Back to top ↑

trust

Back to top ↑

duck duck go

Change your default search engine

1 minute read

Most of us use a search engine such as Google or Yahoo daily without taking much time to consider the inherent privacy implications. If you have some time, ...

Back to top ↑

start page

Change your default search engine

1 minute read

Most of us use a search engine such as Google or Yahoo daily without taking much time to consider the inherent privacy implications. If you have some time, ...

Back to top ↑

camera

Back to top ↑

public

Back to top ↑

recording

Back to top ↑

video

Back to top ↑

Data Privacy Day

Happy Data Privacy Day 2013!

2 minute read

According to Wikipedia, the purpose of Data Privacy Day is to raise awareness and promote data privacy education. It is currently ‘celebrated’ in the United ...

Back to top ↑

disk encryption

Happy Data Privacy Day 2013!

2 minute read

According to Wikipedia, the purpose of Data Privacy Day is to raise awareness and promote data privacy education. It is currently ‘celebrated’ in the United ...

Back to top ↑

FDE

Happy Data Privacy Day 2013!

2 minute read

According to Wikipedia, the purpose of Data Privacy Day is to raise awareness and promote data privacy education. It is currently ‘celebrated’ in the United ...

Back to top ↑

full disk encryption

Happy Data Privacy Day 2013!

2 minute read

According to Wikipedia, the purpose of Data Privacy Day is to raise awareness and promote data privacy education. It is currently ‘celebrated’ in the United ...

Back to top ↑

cellular phone

Password protect your cellphone

1 minute read

For most things privacy related in Canadian law, it comes down to what a judge feels Canadians think is reasonable. A couple of days ago the Ontario court of...

Back to top ↑

court

Password protect your cellphone

1 minute read

For most things privacy related in Canadian law, it comes down to what a judge feels Canadians think is reasonable. A couple of days ago the Ontario court of...

Back to top ↑

Ontario

Password protect your cellphone

1 minute read

For most things privacy related in Canadian law, it comes down to what a judge feels Canadians think is reasonable. A couple of days ago the Ontario court of...

Back to top ↑

smart phone

Password protect your cellphone

1 minute read

For most things privacy related in Canadian law, it comes down to what a judge feels Canadians think is reasonable. A couple of days ago the Ontario court of...

Back to top ↑

@kevinsmcarthur

Back to top ↑

CBA

Back to top ↑

CCIRC

Back to top ↑

cURL

Back to top ↑

Kevin McArthur

Back to top ↑

OpenSSL

Back to top ↑

peerjacking

Back to top ↑

php

Back to top ↑

responsible disclosure

Back to top ↑

cops

Back to top ↑

police

Back to top ↑

R. vs Telus

Back to top ↑

SCC

Back to top ↑

search warrant

Back to top ↑

wiretap

Back to top ↑

2013

Back to top ↑

blackberry

Back to top ↑

safari

Back to top ↑

symantac

Back to top ↑

symantic

Back to top ↑

top 3 steps

Back to top ↑

authorization

Back to top ↑

business

Back to top ↑

corporation

Back to top ↑

opt-in

Back to top ↑

opt-out

Back to top ↑

privacy commission

Back to top ↑

chomium

Browser plugins for device protection

less than 1 minute read

These are the three browser plugins for device protection I recommend you install. The first one is arguably more important than anti-virus, and takes a whil...

Back to top ↑

IE

Browser plugins for device protection

less than 1 minute read

These are the three browser plugins for device protection I recommend you install. The first one is arguably more important than anti-virus, and takes a whil...

Back to top ↑

TLS

Secure websites

1 minute read

I’m often asked about secure websites. For example, should you trust the connection with your computer and your bank’s website? The article is going to get a...

Back to top ↑

FOIPPA

Back to top ↑

NDP

Back to top ↑

cookies

Charging Users Who Dont Accept Cookies

less than 1 minute read

A couple of years ago we wrote about how you should Re-evaluate your cookie and consent management platform, and it’s been interesting to watch how some webs...

Back to top ↑