B.C. NDP quietly dismantling privacy protections for British Columbians
On November 25, 2021, amendments to B.C.’s Freedom of Information and Protection of Privacy Act, R.S.B.C. 1996, c. 165 (“FOIPPA”) came into force through Bil...
On November 25, 2021, amendments to B.C.’s Freedom of Information and Protection of Privacy Act, R.S.B.C. 1996, c. 165 (“FOIPPA”) came into force through Bil...
What likely started out as a school prank has turned into a popular video series called Surveillance Camera Man
I read a post today on the IAPP‘s Daily Dashboard talking about a “privacy-friendly” “positive side of facial recognition”. It suggests that Ontario’s Inform...
I had a lot of positive feedback from the recent post on Diaspora with client-side encryption. For those of you who are somewhat technically inclined, and li...
The cloud is a current buzzword in technology, referring to remote storage space on the internet. The big challenge with using free cloud storage, as a priva...
I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:
I mentioned a few months ago for those wanting to leave Google search to give DuckDuckGo a try. There’s another alternative as well, called ixquick. Give it ...
After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...
My friend Dan Pollock has been compiling the must have hosts file for some time. According to Wikipedia, the hosts file is a computer file used in an operati...
Because now they can. Last Friday, after work, Facebook announced they will be providing your home address and telephone number to software developers.
“To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the ...
In 2008, I was in Ottawa, talking with one of our clients, CIPPIC. Specifically the executive director at the time, about Facebook. There was discussion that...
There’s currently a Facebook status going around that states the following:
There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...
Right after the Facebook F8 keynote, a 15 year old noted he didn’t understand this new model Facebook was about to roll out. What might not be obvious, is th...
If your friends ever tell you that they’ve received spam from your account, but you didn’t send it, likely your account was compromised. The following steps ...
This tip is to create a permanent secure connection to Facebook. You can tell you’re using SSL if the URL starts with https:// instead of http://. When you’r...
Because they can. On Monday, Facebook released a [ video](https://www.facebook.com/video/video.php?v=10100328087082670) that shows how their new *sponsored s...
Because now they can. Last Friday, after work, Facebook announced they will be providing your home address and telephone number to software developers.
In 2008, I was in Ottawa, talking with one of our clients, CIPPIC. Specifically the executive director at the time, about Facebook. There was discussion that...
If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...
I’m often asked about secure websites. For example, should you trust the connection with your computer and your bank’s website? The article is going to get a...
Reader level: Techy/Sysadmin
It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...
You may have read my comodogate article back in March where I reported that the comodogate hacker, going by the name Ich Sun told me “…there is a lot of vu...
There is a wildcard *google.com SSL certificate in the wild, which means malicious people can sit between you and anything at Google (including gmail) and pr...
I received a lot of feedback after my post yesterday about creating a permanent SSL (https://) connection to Facebook. It’s most important to use SSL anywher...
This tip is to create a permanent secure connection to Facebook. You can tell you’re using SSL if the URL starts with https:// instead of http://. When you’r...
This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...
Most of us use a search engine such as Google or Yahoo daily without taking much time to consider the inherent privacy implications. If you have some time, ...
I mentioned a few months ago for those wanting to leave Google search to give DuckDuckGo a try. There’s another alternative as well, called ixquick. Give it ...
It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...
You’re likelty using Google as your default search engine; and they’re undoubtably good at search. The challenge to me is what are they doing with the inform...
It’s been well reported on Google’s kowtowing to the Chinese government in regards to censorship. This was based on the requests of a foreign government. How...
There is a lot of attention on Google right now due to the fact that Google had cars driving around the world, collecting photographic data so that it could ...
If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...
If you’ve followed this blog for some time, I first wrote about the introduction of the bill in May 2010, and then a follow up redux in August 2010 (a summar...
After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...
After writing an article yesterday on how LinkedIn opts your name and photo into social advertising by default, it was brought to my attention today that if ...
There’s an article in the register today highlighting that American organizations are all bound by the US Patriot act, which essentially allows the US govern...
The article posted in May on the Canadian Patriot Act being introduced to the House of Commons didn’t seem to go much further than “preaching to the choir”. ...
Recently, I was in a local brewery buying a keg, and they asked for a copy of my driver’s licence to write down the number on the deposit form. And then a fe...
Today a couple of changes to Canada’s privacy landscape were introduced under the infamous banner of “safety and security”. This will create significant chan...
This is the basis of the follow up letter from Digital Policy Canada drafted to the CIRA sponsored Canadian Internet Forum this week. The fundamental questio...
After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...
You may remember a year ago I broke the story on the introduction of the minority government’s Canadian version of the patriot act (see articles one and two)...
This image is getting a lot of attention. Today Michael Geist has released an article on Unpacking The Policy Issues Behind Bandwidth Caps & Usage Based ...
As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...
Recently, I was in a local brewery buying a keg, and they asked for a copy of my driver’s licence to write down the number on the deposit form. And then a fe...
It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...
You may have read my comodogate article back in March where I reported that the comodogate hacker, going by the name Ich Sun told me “…there is a lot of vu...
I received a lot of feedback after my post yesterday about creating a permanent SSL (https://) connection to Facebook. It’s most important to use SSL anywher...
This tip is to create a permanent secure connection to Facebook. You can tell you’re using SSL if the URL starts with https:// instead of http://. When you’r...
This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...
This is the basis of the follow up letter from Digital Policy Canada drafted to the CIRA sponsored Canadian Internet Forum this week. The fundamental questio...
What is your computer doing on the internet without your knowledge?
You may remember a year ago I broke the story on the introduction of the minority government’s Canadian version of the patriot act (see articles one and two)...
As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...
There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...
If your friends ever tell you that they’ve received spam from your account, but you didn’t send it, likely your account was compromised. The following steps ...
I received a lot of feedback after my post yesterday about creating a permanent SSL (https://) connection to Facebook. It’s most important to use SSL anywher...
This image is getting a lot of attention. Today Michael Geist has released an article on Unpacking The Policy Issues Behind Bandwidth Caps & Usage Based ...
On November 25, 2021, amendments to B.C.’s Freedom of Information and Protection of Privacy Act, R.S.B.C. 1996, c. 165 (“FOIPPA”) came into force through Bil...
If you’ve ever wondered, “What information can my organization collect from a person according to British Columbia’s Personal Information and Protection Act ...
In an overwhelming scary move, the Vancouver Police Department and the Integrated Riot Squad have just launched a Vancouver riot tell-on-your-friends website...
It was [announced a few minutes ago](https://www.timescolonist.com/residents+secure+CareCards+must+renew+every+five+years/4812099/story.html) that British Co...
If you’ve ever wondered, “What information can my organization collect from a person according to British Columbia’s Personal Information and Protection Act ...
If you’re a citizen of British Columbia and concerned about the government’s handling of your personal information, you probably want to read Bill-3 (full te...
After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...
It was [announced a few minutes ago](https://www.timescolonist.com/residents+secure+CareCards+must+renew+every+five+years/4812099/story.html) that British Co...
I’ve been asked this question countless times over the last couple decades, perhaps because I used to be responsible for cracking weak passwords for a compan...
Today’s question comes from a former student, asking what I use for a portable password manager:
For most things privacy related in Canadian law, it comes down to what a judge feels Canadians think is reasonable. A couple of days ago the Ontario court of...
While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...
According to Wikipedia, the purpose of Data Privacy Day is to raise awareness and promote data privacy education. It is currently ‘celebrated’ in the United ...
Ever since PGP removed their open source client, GnuPG has been the standard in open source PKI. If you want to encrypt your emails and/or files on your comp...
On our contact us page we mention OpenPGP standard encryption (RFC 4880). What is this? Most people think email only goes to the intended recipient, but inst...
Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...
If you are in the Suwon/Seoul area of Korea tomorrow, I will be teaching an Ethical Hacking class at no cost. Contact me at @PrivaSecTech on twitter for di...
“My email provider shut down my account, gave me a support ticket number, but I have no way to look it up” “Have you paid for your account?” “No, it’s a free...
You may remember a year ago I broke the story on the introduction of the minority government’s Canadian version of the patriot act (see articles one and two)...
The article posted in May on the Canadian Patriot Act being introduced to the House of Commons didn’t seem to go much further than “preaching to the choir”. ...
Today a couple of changes to Canada’s privacy landscape were introduced under the infamous banner of “safety and security”. This will create significant chan...
Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...
“To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the ...
Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...
Over the week-end, the University of Victoria’s new administrative building was broken into. A payroll server with the personally identifiable information (P...
After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...
Recently, I was in a local brewery buying a keg, and they asked for a copy of my driver’s licence to write down the number on the deposit form. And then a fe...
Ever since the early days of 2600, people have been learning what it takes to compromise voice conversations.
I read a post today on the IAPP‘s Daily Dashboard talking about a “privacy-friendly” “positive side of facial recognition”. It suggests that Ontario’s Inform...
If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...
Most of us use a search engine such as Google or Yahoo daily without taking much time to consider the inherent privacy implications. If you have some time, ...
My friend Dan Pollock has been compiling the must have hosts file for some time. According to Wikipedia, the hosts file is a computer file used in an operati...
If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...
You’re likelty using Google as your default search engine; and they’re undoubtably good at search. The challenge to me is what are they doing with the inform...
For anyone that attended the Privacy and Security talk tonight at Social Media Club – Victoria, I mentioned a browser plugin that allows you to see who is tr...
Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...
After reading my Everything you say is likely compromised post, my friend Ross Henton asked,
Ever since the early days of 2600, people have been learning what it takes to compromise voice conversations.
I will be speaking at the 12th Annual Privacy and Security Conference with the theme “Security and Privacy – Is there an app for that?”
After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...
After writing an article yesterday on how LinkedIn opts your name and photo into social advertising by default, it was brought to my attention today that if ...
There’s an article in the register today highlighting that American organizations are all bound by the US Patriot act, which essentially allows the US govern...
Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...
If your friends ever tell you that they’ve received spam from your account, but you didn’t send it, likely your account was compromised. The following steps ...
Yesterday, Vanity Fair published an exclusive on operation Shady RAT (remote access tool), which was a high-level hacking campaign that lasted over 5 years, ...
You may have read my comodogate article back in March where I reported that the comodogate hacker, going by the name Ich Sun told me “…there is a lot of vu...
If your friends ever tell you that they’ve received spam from your account, but you didn’t send it, likely your account was compromised. The following steps ...
Yesterday, Vanity Fair published an exclusive on operation Shady RAT (remote access tool), which was a high-level hacking campaign that lasted over 5 years, ...
In the Supreme Court of Canada’s case of R v. Telus, a 5-2 decision was made that law enforcement need wiretap authorization to intercept text (SMS) messages...
I read a post today on the IAPP‘s Daily Dashboard talking about a “privacy-friendly” “positive side of facial recognition”. It suggests that Ontario’s Inform...
Do you think such a thing could be implemented without any public consultation or corporate media attention? It exists. About 6 months ago at an Ideas Victor...
I had a lot of positive feedback from the recent post on Diaspora with client-side encryption. For those of you who are somewhat technically inclined, and li...
On our contact us page we mention OpenPGP standard encryption (RFC 4880). What is this? Most people think email only goes to the intended recipient, but inst...
Ever since PGP removed their open source client, GnuPG has been the standard in open source PKI. If you want to encrypt your emails and/or files on your comp...
On our contact us page we mention OpenPGP standard encryption (RFC 4880). What is this? Most people think email only goes to the intended recipient, but inst...
Ever since PGP removed their open source client, GnuPG has been the standard in open source PKI. If you want to encrypt your emails and/or files on your comp...
On our contact us page we mention OpenPGP standard encryption (RFC 4880). What is this? Most people think email only goes to the intended recipient, but inst...
When you go to a website that doesn’t exist, instead of your search engine of choice offering you other solutions, Shaw has decided to do this themselves, an...
If you cut and paste from websites fairly often, especially on media websites, you may have noticed when you did so that some extra text was added. This is m...
“To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the ...
Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...
There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...
“To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the ...
Over the week-end, the University of Victoria’s new administrative building was broken into. A payroll server with the personally identifiable information (P...
There are two credit bureaus in Canada, Equifax and Transunion (there was a 3rd, American company, but it appears to be defunct). Contrary to the prices list...
I was quoted in this Vancouver Sun article today which highlights several ways you can protect yourself from sidejacking attacks.
If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...
I was quoted in this Vancouver Sun article today which highlights several ways you can protect yourself from sidejacking attacks.
If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...
I was quoted in this Vancouver Sun article today which highlights several ways you can protect yourself from sidejacking attacks.
If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...
There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...
Today I was quoted in the Winniped FreePress about Firesheep:
Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...
I was quoted in this Vancouver Sun article today which highlights several ways you can protect yourself from sidejacking attacks.
If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...
I was quoted in this Vancouver Sun article today which highlights several ways you can protect yourself from sidejacking attacks.
Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...
This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...
Most of us use a search engine such as Google or Yahoo daily without taking much time to consider the inherent privacy implications. If you have some time, ...
This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...
You’ve probably heard of Google analytics, which takes logs of your website visitors, and all of their activities, and provides you some very pretty, and use...
My friend Dan Pollock has been compiling the must have hosts file for some time. According to Wikipedia, the hosts file is a computer file used in an operati...
I had a lot of positive feedback from the recent post on Diaspora with client-side encryption. For those of you who are somewhat technically inclined, and li...
It’s been well reported on Google’s kowtowing to the Chinese government in regards to censorship. This was based on the requests of a foreign government. How...
This image is getting a lot of attention. Today Michael Geist has released an article on Unpacking The Policy Issues Behind Bandwidth Caps & Usage Based ...
As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...
This image is getting a lot of attention. Today Michael Geist has released an article on Unpacking The Policy Issues Behind Bandwidth Caps & Usage Based ...
As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...
This image is getting a lot of attention. Today Michael Geist has released an article on Unpacking The Policy Issues Behind Bandwidth Caps & Usage Based ...
As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...
One of the most common ways your computer gets compromised, is by malicious scripts opened by your web browser. This means you go to a website that might loo...
For anyone that attended the Privacy and Security talk tonight at Social Media Club – Victoria, I mentioned a browser plugin that allows you to see who is tr...
You’ve probably heard of Google analytics, which takes logs of your website visitors, and all of their activities, and provides you some very pretty, and use...
For anyone that attended the Privacy and Security talk tonight at Social Media Club – Victoria, I mentioned a browser plugin that allows you to see who is tr...
I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:
For anyone that attended the Privacy and Security talk tonight at Social Media Club – Victoria, I mentioned a browser plugin that allows you to see who is tr...
I received a lot of feedback after my post yesterday about creating a permanent SSL (https://) connection to Facebook. It’s most important to use SSL anywher...
This tip is to create a permanent secure connection to Facebook. You can tell you’re using SSL if the URL starts with https:// instead of http://. When you’r...
If you’ve not heard of #SOPA yet, you likely will today. As of right now, it’s only something that techies and internet crusaders seem to be aware of. Like m...
Yesterday, Vanity Fair published an exclusive on operation Shady RAT (remote access tool), which was a high-level hacking campaign that lasted over 5 years, ...
While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...
If your friends ever tell you that they’ve received spam from your account, but you didn’t send it, likely your account was compromised. The following steps ...
If you’ve ever wondered, “What information can my organization collect from a person according to British Columbia’s Personal Information and Protection Act ...
If your friends ever tell you that they’ve received spam from your account, but you didn’t send it, likely your account was compromised. The following steps ...
You may have read my comodogate article back in March where I reported that the comodogate hacker, going by the name Ich Sun told me “…there is a lot of vu...
There is a wildcard *google.com SSL certificate in the wild, which means malicious people can sit between you and anything at Google (including gmail) and pr...
For most things privacy related in Canadian law, it comes down to what a judge feels Canadians think is reasonable. A couple of days ago the Ontario court of...
If you’re a citizen of British Columbia and concerned about the government’s handling of your personal information, you probably want to read Bill-3 (full te...
I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:
Over the week-end, the University of Victoria’s new administrative building was broken into. A payroll server with the personally identifiable information (P...
If you’re wondering what the top 3 steps to protect your computing device, this post is for you. It’s important to note I said device and not computer, as th...
One of the most common ways your computer gets compromised, is by malicious scripts opened by your web browser. This means you go to a website that might loo...
Most of us use a search engine such as Google or Yahoo daily without taking much time to consider the inherent privacy implications. If you have some time, ...
I mentioned a few months ago for those wanting to leave Google search to give DuckDuckGo a try. There’s another alternative as well, called ixquick. Give it ...
Most of us use a search engine such as Google or Yahoo daily without taking much time to consider the inherent privacy implications. If you have some time, ...
I mentioned a few months ago for those wanting to leave Google search to give DuckDuckGo a try. There’s another alternative as well, called ixquick. Give it ...
Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...
Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...
If you’re wondering what the top 3 steps to protect your computing device, this post is for you. It’s important to note I said device and not computer, as th...
Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...
According to Wikipedia, the purpose of Data Privacy Day is to raise awareness and promote data privacy education. It is currently ‘celebrated’ in the United ...
Ever since PGP removed their open source client, GnuPG has been the standard in open source PKI. If you want to encrypt your emails and/or files on your comp...
According to Wikipedia, the purpose of Data Privacy Day is to raise awareness and promote data privacy education. It is currently ‘celebrated’ in the United ...
Ever since PGP removed their open source client, GnuPG has been the standard in open source PKI. If you want to encrypt your emails and/or files on your comp...
After reading my Everything you say is likely compromised post, my friend Ross Henton asked,
Ever since the early days of 2600, people have been learning what it takes to compromise voice conversations.
These are the three browser plugins for device protection I recommend you install. The first one is arguably more important than anti-virus, and takes a whil...
If you’re wondering what the top 3 steps to protect your computing device, this post is for you. It’s important to note I said device and not computer, as th...
These are the three browser plugins for device protection I recommend you install. The first one is arguably more important than anti-virus, and takes a whil...
If you’re wondering what the top 3 steps to protect your computing device, this post is for you. It’s important to note I said device and not computer, as th...
These are the three browser plugins for device protection I recommend you install. The first one is arguably more important than anti-virus, and takes a whil...
If you’re wondering what the top 3 steps to protect your computing device, this post is for you. It’s important to note I said device and not computer, as th...
These are the three browser plugins for device protection I recommend you install. The first one is arguably more important than anti-virus, and takes a whil...
If you’re wondering what the top 3 steps to protect your computing device, this post is for you. It’s important to note I said device and not computer, as th...
On our contact us page we mention OpenPGP standard encryption (RFC 4880). What is this? Most people think email only goes to the intended recipient, but inst...
On our contact us page we mention OpenPGP standard encryption (RFC 4880). What is this? Most people think email only goes to the intended recipient, but inst...
If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...
If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...
If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...
If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...
If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...
If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...
If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...
If you’re looking at a web site in your web browser (Firefox, Internet Explorer etc), it is being served by a web server. According to Netcraft over 50% of w...
“My email provider shut down my account, gave me a support ticket number, but I have no way to look it up” “Have you paid for your account?” “No, it’s a free...
“My email provider shut down my account, gave me a support ticket number, but I have no way to look it up” “Have you paid for your account?” “No, it’s a free...
“My email provider shut down my account, gave me a support ticket number, but I have no way to look it up” “Have you paid for your account?” “No, it’s a free...
“My email provider shut down my account, gave me a support ticket number, but I have no way to look it up” “Have you paid for your account?” “No, it’s a free...
“My email provider shut down my account, gave me a support ticket number, but I have no way to look it up” “Have you paid for your account?” “No, it’s a free...
In 2008, I was in Ottawa, talking with one of our clients, CIPPIC. Specifically the executive director at the time, about Facebook. There was discussion that...
Today a couple of changes to Canada’s privacy landscape were introduced under the infamous banner of “safety and security”. This will create significant chan...
If you cut and paste from websites fairly often, especially on media websites, you may have noticed when you did so that some extra text was added. This is m...
If you cut and paste from websites fairly often, especially on media websites, you may have noticed when you did so that some extra text was added. This is m...
Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...
Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...
Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...
Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...
Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...
Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...
Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...
Traditional cellular phones are now known as feature phones, deprecated by the advanced “smart phone”, which allows one to install feature rich, operating sy...
“To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the ...
“To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the ...
“To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the ...
Recently, I was in a local brewery buying a keg, and they asked for a copy of my driver’s licence to write down the number on the deposit form. And then a fe...
Recently, I was in a local brewery buying a keg, and they asked for a copy of my driver’s licence to write down the number on the deposit form. And then a fe...
Recently, I was in a local brewery buying a keg, and they asked for a copy of my driver’s licence to write down the number on the deposit form. And then a fe...
Recently, I was in a local brewery buying a keg, and they asked for a copy of my driver’s licence to write down the number on the deposit form. And then a fe...
The article posted in May on the Canadian Patriot Act being introduced to the House of Commons didn’t seem to go much further than “preaching to the choir”. ...
This is a technology hint for those wanting to know if they’re getting a good deal. You can use this hint no matter what you’re buying. You could be looking ...
This is a technology hint for those wanting to know if they’re getting a good deal. You can use this hint no matter what you’re buying. You could be looking ...
This is a technology hint for those wanting to know if they’re getting a good deal. You can use this hint no matter what you’re buying. You could be looking ...
This is a technology hint for those wanting to know if they’re getting a good deal. You can use this hint no matter what you’re buying. You could be looking ...
This is a technology hint for those wanting to know if they’re getting a good deal. You can use this hint no matter what you’re buying. You could be looking ...
This is a technology hint for those wanting to know if they’re getting a good deal. You can use this hint no matter what you’re buying. You could be looking ...
There is a lot of attention on Google right now due to the fact that Google had cars driving around the world, collecting photographic data so that it could ...
There is a lot of attention on Google right now due to the fact that Google had cars driving around the world, collecting photographic data so that it could ...
There are two credit bureaus in Canada, Equifax and Transunion (there was a 3rd, American company, but it appears to be defunct). Contrary to the prices list...
There are two credit bureaus in Canada, Equifax and Transunion (there was a 3rd, American company, but it appears to be defunct). Contrary to the prices list...
There are two credit bureaus in Canada, Equifax and Transunion (there was a 3rd, American company, but it appears to be defunct). Contrary to the prices list...
If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...
If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...
If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...
If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...
If you have a wireless card in your laptop or netbook, you should see if it can be put into monitor mode/promiscuous mode. If so, this means you can “sniff p...
Today I was quoted in the Winniped FreePress about Firesheep:
Today I was quoted in the Winniped FreePress about Firesheep:
Today I was quoted in the Winniped FreePress about Firesheep:
Today I was quoted in the Winniped FreePress about Firesheep:
I was quoted in this Vancouver Sun article today which highlights several ways you can protect yourself from sidejacking attacks.
I was quoted in this Vancouver Sun article today which highlights several ways you can protect yourself from sidejacking attacks.
I was quoted in this Vancouver Sun article today which highlights several ways you can protect yourself from sidejacking attacks.
Last week I attended PacSec in Tokyo, Japan. This is one of the three SecWest conferences every year, the largest being CanSecWest in Vancouver. One of t...
Last week I attended PacSec in Tokyo, Japan. This is one of the three SecWest conferences every year, the largest being CanSecWest in Vancouver. One of t...
Last week I attended PacSec in Tokyo, Japan. This is one of the three SecWest conferences every year, the largest being CanSecWest in Vancouver. One of t...
This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...
This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...
This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...
This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...
This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...
This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...
This is my first Q&A post. If you have a question about anything Privacy, Security or Technology related, contact us on our website or ask as on twitt...
If you are in the Suwon/Seoul area of Korea tomorrow, I will be teaching an Ethical Hacking class at no cost. Contact me at @PrivaSecTech on twitter for di...
If you are in the Suwon/Seoul area of Korea tomorrow, I will be teaching an Ethical Hacking class at no cost. Contact me at @PrivaSecTech on twitter for di...
If you are in the Suwon/Seoul area of Korea tomorrow, I will be teaching an Ethical Hacking class at no cost. Contact me at @PrivaSecTech on twitter for di...
If you are in the Suwon/Seoul area of Korea tomorrow, I will be teaching an Ethical Hacking class at no cost. Contact me at @PrivaSecTech on twitter for di...
If you are in the Suwon/Seoul area of Korea tomorrow, I will be teaching an Ethical Hacking class at no cost. Contact me at @PrivaSecTech on twitter for di...
Most large organization make sure to do Business Continuity Planning (BCP), also known as Disaster Recovery Planning (DRP), because they understand the impor...
Most large organization make sure to do Business Continuity Planning (BCP), also known as Disaster Recovery Planning (DRP), because they understand the impor...
Most large organization make sure to do Business Continuity Planning (BCP), also known as Disaster Recovery Planning (DRP), because they understand the impor...
Most large organization make sure to do Business Continuity Planning (BCP), also known as Disaster Recovery Planning (DRP), because they understand the impor...
Most large organization make sure to do Business Continuity Planning (BCP), also known as Disaster Recovery Planning (DRP), because they understand the impor...
Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...
Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...
Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...
Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...
Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...
Did you know that most printer manufacturers have secretly ensured there are watermarks on everything you print? These are tiny tracking dots barely visible ...
Because now they can. Last Friday, after work, Facebook announced they will be providing your home address and telephone number to software developers.
Because now they can. Last Friday, after work, Facebook announced they will be providing your home address and telephone number to software developers.
My friend Dan Pollock has been compiling the must have hosts file for some time. According to Wikipedia, the hosts file is a computer file used in an operati...
My friend Dan Pollock has been compiling the must have hosts file for some time. According to Wikipedia, the hosts file is a computer file used in an operati...
My friend Dan Pollock has been compiling the must have hosts file for some time. According to Wikipedia, the hosts file is a computer file used in an operati...
My friend Dan Pollock has been compiling the must have hosts file for some time. According to Wikipedia, the hosts file is a computer file used in an operati...
It’s been well reported on Google’s kowtowing to the Chinese government in regards to censorship. This was based on the requests of a foreign government. How...
It’s been well reported on Google’s kowtowing to the Chinese government in regards to censorship. This was based on the requests of a foreign government. How...
It’s been well reported on Google’s kowtowing to the Chinese government in regards to censorship. This was based on the requests of a foreign government. How...
Because they can. On Monday, Facebook released a [ video](https://www.facebook.com/video/video.php?v=10100328087082670) that shows how their new *sponsored s...
I will be speaking at the 12th Annual Privacy and Security Conference with the theme “Security and Privacy – Is there an app for that?”
I will be speaking at the 12th Annual Privacy and Security Conference with the theme “Security and Privacy – Is there an app for that?”
I will be speaking at the 12th Annual Privacy and Security Conference with the theme “Security and Privacy – Is there an app for that?”
I will be speaking at the 12th Annual Privacy and Security Conference with the theme “Security and Privacy – Is there an app for that?”
I will be speaking at the 12th Annual Privacy and Security Conference with the theme “Security and Privacy – Is there an app for that?”
As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...
As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...
As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...
As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...
As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...
As of writing this, I am one of over 180,000 Canadians that have signed the stop the meter campaign against usage based billing. There are several challenges...
This image is getting a lot of attention. Today Michael Geist has released an article on Unpacking The Policy Issues Behind Bandwidth Caps & Usage Based ...
This image is getting a lot of attention. Today Michael Geist has released an article on Unpacking The Policy Issues Behind Bandwidth Caps & Usage Based ...
If you’re in Victoria on April 18, 2011, I will be speaking with my good friend Chris Parsons at Social Media Club – Victoria. My talk’s current title is “T...
If you’re in Victoria on April 18, 2011, I will be speaking with my good friend Chris Parsons at Social Media Club – Victoria. My talk’s current title is “T...
If you’re in Victoria on April 18, 2011, I will be speaking with my good friend Chris Parsons at Social Media Club – Victoria. My talk’s current title is “T...
If you’re in Victoria on April 18, 2011, I will be speaking with my good friend Chris Parsons at Social Media Club – Victoria. My talk’s current title is “T...
If you’re in Victoria on April 18, 2011, I will be speaking with my good friend Chris Parsons at Social Media Club – Victoria. My talk’s current title is “T...
For anyone that attended the Privacy and Security talk tonight at Social Media Club – Victoria, I mentioned a browser plugin that allows you to see who is tr...
For anyone that attended the Privacy and Security talk tonight at Social Media Club – Victoria, I mentioned a browser plugin that allows you to see who is tr...
This tip is to create a permanent secure connection to Facebook. You can tell you’re using SSL if the URL starts with https:// instead of http://. When you’r...
This tip is to create a permanent secure connection to Facebook. You can tell you’re using SSL if the URL starts with https:// instead of http://. When you’r...
Penetration testing, also known as pentesting, is a way of evaluating the security of your organization from the perspective of a malicious black hat hacker....
Penetration testing, also known as pentesting, is a way of evaluating the security of your organization from the perspective of a malicious black hat hacker....
Penetration testing, also known as pentesting, is a way of evaluating the security of your organization from the perspective of a malicious black hat hacker....
Penetration testing, also known as pentesting, is a way of evaluating the security of your organization from the perspective of a malicious black hat hacker....
It was [announced a few minutes ago](https://www.timescolonist.com/residents+secure+CareCards+must+renew+every+five+years/4812099/story.html) that British Co...
It was [announced a few minutes ago](https://www.timescolonist.com/residents+secure+CareCards+must+renew+every+five+years/4812099/story.html) that British Co...
It was [announced a few minutes ago](https://www.timescolonist.com/residents+secure+CareCards+must+renew+every+five+years/4812099/story.html) that British Co...
When you go to a website that doesn’t exist, instead of your search engine of choice offering you other solutions, Shaw has decided to do this themselves, an...
When you go to a website that doesn’t exist, instead of your search engine of choice offering you other solutions, Shaw has decided to do this themselves, an...
When you go to a website that doesn’t exist, instead of your search engine of choice offering you other solutions, Shaw has decided to do this themselves, an...
When you go to a website that doesn’t exist, instead of your search engine of choice offering you other solutions, Shaw has decided to do this themselves, an...
When you go to a website that doesn’t exist, instead of your search engine of choice offering you other solutions, Shaw has decided to do this themselves, an...
You may remember a year ago I broke the story on the introduction of the minority government’s Canadian version of the patriot act (see articles one and two)...
You may remember a year ago I broke the story on the introduction of the minority government’s Canadian version of the patriot act (see articles one and two)...
There’s an article in the register today highlighting that American organizations are all bound by the US Patriot act, which essentially allows the US govern...
There’s an article in the register today highlighting that American organizations are all bound by the US Patriot act, which essentially allows the US govern...
You’re likelty using Google as your default search engine; and they’re undoubtably good at search. The challenge to me is what are they doing with the inform...
You’re likelty using Google as your default search engine; and they’re undoubtably good at search. The challenge to me is what are they doing with the inform...
An article came out today on canada.com.details how some good precedence for freedom of speech and anonymity online was just made in Ontario:
An article came out today on canada.com.details how some good precedence for freedom of speech and anonymity online was just made in Ontario:
An article came out today on canada.com.details how some good precedence for freedom of speech and anonymity online was just made in Ontario:
Yesterday, Vanity Fair published an exclusive on operation Shady RAT (remote access tool), which was a high-level hacking campaign that lasted over 5 years, ...
Yesterday, Vanity Fair published an exclusive on operation Shady RAT (remote access tool), which was a high-level hacking campaign that lasted over 5 years, ...
After writing an article yesterday on how LinkedIn opts your name and photo into social advertising by default, it was brought to my attention today that if ...
After writing an article yesterday on how LinkedIn opts your name and photo into social advertising by default, it was brought to my attention today that if ...
If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...
If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...
If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...
If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...
If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...
If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...
If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...
If you read any of the PostMedia (formerely CanWest) newspapers online, you know that their technical abilities are lacking, to say the least. One of the big...
There is a wildcard *google.com SSL certificate in the wild, which means malicious people can sit between you and anything at Google (including gmail) and pr...
There is a wildcard *google.com SSL certificate in the wild, which means malicious people can sit between you and anything at Google (including gmail) and pr...
There is a wildcard *google.com SSL certificate in the wild, which means malicious people can sit between you and anything at Google (including gmail) and pr...
There is a wildcard *google.com SSL certificate in the wild, which means malicious people can sit between you and anything at Google (including gmail) and pr...
There is a wildcard *google.com SSL certificate in the wild, which means malicious people can sit between you and anything at Google (including gmail) and pr...
In an overwhelming scary move, the Vancouver Police Department and the Integrated Riot Squad have just launched a Vancouver riot tell-on-your-friends website...
In an overwhelming scary move, the Vancouver Police Department and the Integrated Riot Squad have just launched a Vancouver riot tell-on-your-friends website...
In an overwhelming scary move, the Vancouver Police Department and the Integrated Riot Squad have just launched a Vancouver riot tell-on-your-friends website...
You may have read my comodogate article back in March where I reported that the comodogate hacker, going by the name Ich Sun told me “…there is a lot of vu...
You may have read my comodogate article back in March where I reported that the comodogate hacker, going by the name Ich Sun told me “…there is a lot of vu...
You may have read my comodogate article back in March where I reported that the comodogate hacker, going by the name Ich Sun told me “…there is a lot of vu...
You may have read my comodogate article back in March where I reported that the comodogate hacker, going by the name Ich Sun told me “…there is a lot of vu...
You may have read my comodogate article back in March where I reported that the comodogate hacker, going by the name Ich Sun told me “…there is a lot of vu...
You may have read my comodogate article back in March where I reported that the comodogate hacker, going by the name Ich Sun told me “…there is a lot of vu...
Right after the Facebook F8 keynote, a 15 year old noted he didn’t understand this new model Facebook was about to roll out. What might not be obvious, is th...
After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...
After the F8 conference, there is even more concern than before about what personal information Facebook has on an individual. I was sent Facebook’s personal...
It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...
It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...
It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...
It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...
It’s not often we’ve given Google credit for privacy or security steps, but this week is one of them. Following the steps by Facebook and Twitter we announce...
If you’re a citizen of British Columbia and concerned about the government’s handling of your personal information, you probably want to read Bill-3 (full te...
If you’re a citizen of British Columbia and concerned about the government’s handling of your personal information, you probably want to read Bill-3 (full te...
If you’re a citizen of British Columbia and concerned about the government’s handling of your personal information, you probably want to read Bill-3 (full te...
You’ve probably heard of Google analytics, which takes logs of your website visitors, and all of their activities, and provides you some very pretty, and use...
While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...
While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...
While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...
While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...
While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...
While working in information security for the largest company in Canada, I realized there was no one internally, actively attacking the password database to ...
What is your computer doing on the internet without your knowledge?
What is your computer doing on the internet without your knowledge?
What is your computer doing on the internet without your knowledge?
What is your computer doing on the internet without your knowledge?
What is your computer doing on the internet without your knowledge?
What is your computer doing on the internet without your knowledge?
Over the week-end, the University of Victoria’s new administrative building was broken into. A payroll server with the personally identifiable information (P...
Over the week-end, the University of Victoria’s new administrative building was broken into. A payroll server with the personally identifiable information (P...
Over the week-end, the University of Victoria’s new administrative building was broken into. A payroll server with the personally identifiable information (P...
Over the week-end, the University of Victoria’s new administrative building was broken into. A payroll server with the personally identifiable information (P...
If you’ve not heard of #SOPA yet, you likely will today. As of right now, it’s only something that techies and internet crusaders seem to be aware of. Like m...
If you’ve not heard of #SOPA yet, you likely will today. As of right now, it’s only something that techies and internet crusaders seem to be aware of. Like m...
If you’ve not heard of #SOPA yet, you likely will today. As of right now, it’s only something that techies and internet crusaders seem to be aware of. Like m...
One of the most common ways your computer gets compromised, is by malicious scripts opened by your web browser. This means you go to a website that might loo...
One of the most common ways your computer gets compromised, is by malicious scripts opened by your web browser. This means you go to a website that might loo...
One of the most common ways your computer gets compromised, is by malicious scripts opened by your web browser. This means you go to a website that might loo...
One of the most common ways your computer gets compromised, is by malicious scripts opened by your web browser. This means you go to a website that might loo...
One of the most common ways your computer gets compromised, is by malicious scripts opened by your web browser. This means you go to a website that might loo...
Do you think such a thing could be implemented without any public consultation or corporate media attention? It exists. About 6 months ago at an Ideas Victor...
Do you think such a thing could be implemented without any public consultation or corporate media attention? It exists. About 6 months ago at an Ideas Victor...
Do you think such a thing could be implemented without any public consultation or corporate media attention? It exists. About 6 months ago at an Ideas Victor...
Do you think such a thing could be implemented without any public consultation or corporate media attention? It exists. About 6 months ago at an Ideas Victor...
Do you think such a thing could be implemented without any public consultation or corporate media attention? It exists. About 6 months ago at an Ideas Victor...
Do you think such a thing could be implemented without any public consultation or corporate media attention? It exists. About 6 months ago at an Ideas Victor...
Do you think such a thing could be implemented without any public consultation or corporate media attention? It exists. About 6 months ago at an Ideas Victor...
Do you think such a thing could be implemented without any public consultation or corporate media attention? It exists. About 6 months ago at an Ideas Victor...
Do you think such a thing could be implemented without any public consultation or corporate media attention? It exists. About 6 months ago at an Ideas Victor...
Do you think such a thing could be implemented without any public consultation or corporate media attention? It exists. About 6 months ago at an Ideas Victor...
This is the basis of the follow up letter from Digital Policy Canada drafted to the CIRA sponsored Canadian Internet Forum this week. The fundamental questio...
This is the basis of the follow up letter from Digital Policy Canada drafted to the CIRA sponsored Canadian Internet Forum this week. The fundamental questio...
This is the basis of the follow up letter from Digital Policy Canada drafted to the CIRA sponsored Canadian Internet Forum this week. The fundamental questio...
This is the basis of the follow up letter from Digital Policy Canada drafted to the CIRA sponsored Canadian Internet Forum this week. The fundamental questio...
This is the basis of the follow up letter from Digital Policy Canada drafted to the CIRA sponsored Canadian Internet Forum this week. The fundamental questio...
This is the basis of the follow up letter from Digital Policy Canada drafted to the CIRA sponsored Canadian Internet Forum this week. The fundamental questio...
This is the basis of the follow up letter from Digital Policy Canada drafted to the CIRA sponsored Canadian Internet Forum this week. The fundamental questio...
I mentioned a few months ago for those wanting to leave Google search to give DuckDuckGo a try. There’s another alternative as well, called ixquick. Give it ...
I mentioned a few months ago for those wanting to leave Google search to give DuckDuckGo a try. There’s another alternative as well, called ixquick. Give it ...
Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...
Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...
Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...
Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...
Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...
Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...
Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...
Most of my clients are running anti-virus on their home and work computers, but are they using it right? There are 3 key steps to running anti-Virus software...
There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...
There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...
There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...
There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...
There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...
There have been a lot of stories about what happens when you reveal your social network profile, especially your geo-location information. Probably made famo...
I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:
I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:
I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:
I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:
I’ve spoken about trackers before and recommended four steps/solutions for protecting your browsing privacy:
The cloud is a current buzzword in technology, referring to remote storage space on the internet. The big challenge with using free cloud storage, as a priva...
The cloud is a current buzzword in technology, referring to remote storage space on the internet. The big challenge with using free cloud storage, as a priva...
The cloud is a current buzzword in technology, referring to remote storage space on the internet. The big challenge with using free cloud storage, as a priva...
There’s currently a Facebook status going around that states the following:
There’s currently a Facebook status going around that states the following:
I’ve written about Diaspora before, a social network (Facebook replacement?) that is decentralized, and cares (more) about privacy. If you’re interested to l...
I’ve written about Diaspora before, a social network (Facebook replacement?) that is decentralized, and cares (more) about privacy. If you’re interested to l...
Wired is reporting that several hundred thousand people may be affected on Monday when the FBI turns off the domains used in the DNSChanger malware. Over 1/...
Wired is reporting that several hundred thousand people may be affected on Monday when the FBI turns off the domains used in the DNSChanger malware. Over 1/...
Wired is reporting that several hundred thousand people may be affected on Monday when the FBI turns off the domains used in the DNSChanger malware. Over 1/...
Wired is reporting that several hundred thousand people may be affected on Monday when the FBI turns off the domains used in the DNSChanger malware. Over 1/...
Wired is reporting that several hundred thousand people may be affected on Monday when the FBI turns off the domains used in the DNSChanger malware. Over 1/...
I had a lot of positive feedback from the recent post on Diaspora with client-side encryption. For those of you who are somewhat technically inclined, and li...
I had a lot of positive feedback from the recent post on Diaspora with client-side encryption. For those of you who are somewhat technically inclined, and li...
I had a lot of positive feedback from the recent post on Diaspora with client-side encryption. For those of you who are somewhat technically inclined, and li...
I had a lot of positive feedback from the recent post on Diaspora with client-side encryption. For those of you who are somewhat technically inclined, and li...
Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...
Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...
Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...
Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...
Because of Apple’s advertising, Mac users often (wrongly) believe that they don’t need anti-virus software. The problem that these users have is that when th...
I read a post today on the IAPP‘s Daily Dashboard talking about a “privacy-friendly” “positive side of facial recognition”. It suggests that Ontario’s Inform...
I read a post today on the IAPP‘s Daily Dashboard talking about a “privacy-friendly” “positive side of facial recognition”. It suggests that Ontario’s Inform...
I read a post today on the IAPP‘s Daily Dashboard talking about a “privacy-friendly” “positive side of facial recognition”. It suggests that Ontario’s Inform...
I read a post today on the IAPP‘s Daily Dashboard talking about a “privacy-friendly” “positive side of facial recognition”. It suggests that Ontario’s Inform...
I read a post today on the IAPP‘s Daily Dashboard talking about a “privacy-friendly” “positive side of facial recognition”. It suggests that Ontario’s Inform...
I read a post today on the IAPP‘s Daily Dashboard talking about a “privacy-friendly” “positive side of facial recognition”. It suggests that Ontario’s Inform...
If you’ve followed this blog for some time, I first wrote about the introduction of the bill in May 2010, and then a follow up redux in August 2010 (a summar...
If you’ve followed this blog for some time, I first wrote about the introduction of the bill in May 2010, and then a follow up redux in August 2010 (a summar...
Ever since the early days of 2600, people have been learning what it takes to compromise voice conversations.
Ever since the early days of 2600, people have been learning what it takes to compromise voice conversations.
Ever since the early days of 2600, people have been learning what it takes to compromise voice conversations.
After reading my Everything you say is likely compromised post, my friend Ross Henton asked,
After reading my Everything you say is likely compromised post, my friend Ross Henton asked,
Most of us use a search engine such as Google or Yahoo daily without taking much time to consider the inherent privacy implications. If you have some time, ...
Most of us use a search engine such as Google or Yahoo daily without taking much time to consider the inherent privacy implications. If you have some time, ...
What likely started out as a school prank has turned into a popular video series called Surveillance Camera Man
What likely started out as a school prank has turned into a popular video series called Surveillance Camera Man
What likely started out as a school prank has turned into a popular video series called Surveillance Camera Man
What likely started out as a school prank has turned into a popular video series called Surveillance Camera Man
According to Wikipedia, the purpose of Data Privacy Day is to raise awareness and promote data privacy education. It is currently ‘celebrated’ in the United ...
According to Wikipedia, the purpose of Data Privacy Day is to raise awareness and promote data privacy education. It is currently ‘celebrated’ in the United ...
According to Wikipedia, the purpose of Data Privacy Day is to raise awareness and promote data privacy education. It is currently ‘celebrated’ in the United ...
According to Wikipedia, the purpose of Data Privacy Day is to raise awareness and promote data privacy education. It is currently ‘celebrated’ in the United ...
For most things privacy related in Canadian law, it comes down to what a judge feels Canadians think is reasonable. A couple of days ago the Ontario court of...
For most things privacy related in Canadian law, it comes down to what a judge feels Canadians think is reasonable. A couple of days ago the Ontario court of...
For most things privacy related in Canadian law, it comes down to what a judge feels Canadians think is reasonable. A couple of days ago the Ontario court of...
For most things privacy related in Canadian law, it comes down to what a judge feels Canadians think is reasonable. A couple of days ago the Ontario court of...
Reader level: Techy/Sysadmin
Reader level: Techy/Sysadmin
Reader level: Techy/Sysadmin
Reader level: Techy/Sysadmin
Reader level: Techy/Sysadmin
Reader level: Techy/Sysadmin
Reader level: Techy/Sysadmin
Reader level: Techy/Sysadmin
Reader level: Techy/Sysadmin
In the Supreme Court of Canada’s case of R v. Telus, a 5-2 decision was made that law enforcement need wiretap authorization to intercept text (SMS) messages...
In the Supreme Court of Canada’s case of R v. Telus, a 5-2 decision was made that law enforcement need wiretap authorization to intercept text (SMS) messages...
In the Supreme Court of Canada’s case of R v. Telus, a 5-2 decision was made that law enforcement need wiretap authorization to intercept text (SMS) messages...
In the Supreme Court of Canada’s case of R v. Telus, a 5-2 decision was made that law enforcement need wiretap authorization to intercept text (SMS) messages...
In the Supreme Court of Canada’s case of R v. Telus, a 5-2 decision was made that law enforcement need wiretap authorization to intercept text (SMS) messages...
In the Supreme Court of Canada’s case of R v. Telus, a 5-2 decision was made that law enforcement need wiretap authorization to intercept text (SMS) messages...
If you’re wondering what the top 3 steps to protect your computing device, this post is for you. It’s important to note I said device and not computer, as th...
If you’re wondering what the top 3 steps to protect your computing device, this post is for you. It’s important to note I said device and not computer, as th...
If you’re wondering what the top 3 steps to protect your computing device, this post is for you. It’s important to note I said device and not computer, as th...
If you’re wondering what the top 3 steps to protect your computing device, this post is for you. It’s important to note I said device and not computer, as th...
If you’re wondering what the top 3 steps to protect your computing device, this post is for you. It’s important to note I said device and not computer, as th...
If you’re wondering what the top 3 steps to protect your computing device, this post is for you. It’s important to note I said device and not computer, as th...
If you’ve ever wondered, “What information can my organization collect from a person according to British Columbia’s Personal Information and Protection Act ...
If you’ve ever wondered, “What information can my organization collect from a person according to British Columbia’s Personal Information and Protection Act ...
If you’ve ever wondered, “What information can my organization collect from a person according to British Columbia’s Personal Information and Protection Act ...
If you’ve ever wondered, “What information can my organization collect from a person according to British Columbia’s Personal Information and Protection Act ...
If you’ve ever wondered, “What information can my organization collect from a person according to British Columbia’s Personal Information and Protection Act ...
If you’ve ever wondered, “What information can my organization collect from a person according to British Columbia’s Personal Information and Protection Act ...
These are the three browser plugins for device protection I recommend you install. The first one is arguably more important than anti-virus, and takes a whil...
These are the three browser plugins for device protection I recommend you install. The first one is arguably more important than anti-virus, and takes a whil...
I’m often asked about secure websites. For example, should you trust the connection with your computer and your bank’s website? The article is going to get a...
On November 25, 2021, amendments to B.C.’s Freedom of Information and Protection of Privacy Act, R.S.B.C. 1996, c. 165 (“FOIPPA”) came into force through Bil...
On November 25, 2021, amendments to B.C.’s Freedom of Information and Protection of Privacy Act, R.S.B.C. 1996, c. 165 (“FOIPPA”) came into force through Bil...
Social Media Club
Privacy and Security talk at Social Media Club – Victoria
less than 1 minute read
If you’re in Victoria on April 18, 2011, I will be speaking with my good friend Chris Parsons at Social Media Club – Victoria. My talk’s current title is “T...