background preloader

Heml.is - The Beautiful & Secure Messenger

Heml.is - The Beautiful & Secure Messenger
Related:  Online Privacy

Mailpile: Let’s take email back! Who are the world's 10 most dangerous terrorists? Ayman al-Zawahiri is the leader of al Qaeda. A reward up to $25 million has been offered by the U.S. government. Click through to see men allegedly plotting, directing and, in some cases, carrying out acts of terror around the world. Nasir al Wuhayshi is leader of al Qaeda in the Arabian Peninsula, known as AQAP. Ibrahim al Asiri is thought to be the chief bomb-maker for AQAP. Ahmed Abdi Godane, also known as Mukhtar Abu Zubayr, is the leader of Al-Shabaab. Moktar Belmoktar was the leading figure of al Qaeda in the Islamic Maghreb. Abu Muhammad al Julani is the leader of al-Nusra Front in Syria. Abu Bakr al-Baghdadi is the leader of Islamic State in Iraq. Sirajudin Haqqani is the leader of the Haqqani Network in Afghanistan. Most-wanted terrorists Al Qaeda's leader, Ayman al-Zawahiri, tops the listOther names include figures from Yemen, Somalia and IraqMany groups pledge allegiance to al Qaeda If you live in Moscow, Chechen Islamist leader Doku Umarov would feature prominently. 1. 2. 3. 4.

Facebook privacy and kids: Don’t post photos of your kids online Photo by Hemera/Thinkstock I vividly remember the Facebook post. It was my friend’s 5-year-old daughter “Kate,” (a pseudonym) standing outside of her house in a bright yellow bikini, the street address clearly visible behind her on the front door. The picture had been uploaded to a Facebook album, and there were 114 shots just of Kate: freshly cleaned and swaddled on the day of her birth … giving her Labradoodle a kiss … playing on a swing set. I completely understood her parents’ desire to capture Kate’s everyday moments, because early childhood is so ephemeral. Last week, Facebook updated its privacy policy again. Six thousand respondents to Slate’s survey show a clear trend. The problem is that Facebook is only one site. That poses some obvious challenges for Kate’s future self. There’s a more insidious problem, though, which will haunt Kate well into the adulthood. The easiest way to opt-out is to not create that digital content in the first place, especially for kids.

Social network analysis and object attribution with Maltego 3 | The Security Diaries Social Network Analysis (SNA) is getting more and more widespread now that online social networks like LinkedIn and Facebook are getting more popular12. This kind of analysis has traditionally been a manual task where investigators are connecting individuals and events more or less by hand. However, the wast amount of data available calls for tools that automate detection, recognizion and visualization of these connections on a large scale. In this work we are using the community edition of Maltego 3.0. A. There has only been publish a few scientific articles specifically about Maltego. Background A. The term digital evidence has by Carrier and Spafford been defined as any digital data that contain reliable information that supports or refutes a hypothesis about the incident. 7They define electronic evidence as probative information stored or transmitted in digital form. How these types of evidence is handled, it is often referred to as the chain of custody. B. C. Figure 3: Group graph

How to foil NSA sabotage: use a dead man's switch | Technology The more we learn about the breadth and depth of the NSA and GCHQ's programmes of spying on the general public, the more alarming it all becomes. The most recent stories about the deliberate sabotage of security technology are the full stop at the end of a sentence that started on 8 August, when the founder of Lavabit (the privacy oriented email provider used by whistleblower Edward Snowden) abruptly shut down, with its founder, Ladar Levison, obliquely implying that he'd been ordered to secretly subvert his own system to compromise his users' privacy. It doesn't really matter if you trust the "good" spies of America and the UK not to abuse their powers (though even the NSA now admits to routine abuse), you should still be wary of deliberately weakened security. It is laughable to suppose that the back doors that the NSA has secretly inserted into common technologies will only be exploited by the NSA. One important check against the NSA's war on security is transparency.

My Fav Free Forensic Analysis Tools I was talking about colleges with my son the other day to see what he is interested in for a possible major. I was hoping and praying he wouldn't say English since my guidance there would be like trying to divide by zero or philosophy because that meant he'd be living here until his late 30s. He told me he was interested in being a detective. Well! I must say my ears perked right up! But that got me thinking about forensics itself and some of the tools I use. However, if you just want to mess around and practice on a few machines to see if this is a career path for you, here are a few of the freebie tools I use and have had a ton of success with. Are your pants on fire yet? Email Fun Email is more difficult to find a freeware tool on the forensics side of the house. Lookin' for a file in a haystack There are so many attributes to look at with files. But, isn't there a ISO we can use like BackTrack instead of messin' round and piece mailing all of these tools? Websites baby!

Hushmail – Free Email with Privacy 5 ways to easily increase your internet security - Seattle Political Buzz In this age of technology nothing is private. In fact, NSA whistleblower William Binney recently stated that literally every email sent in the US is recorded by the FBI. For those living in reality, it has been know that since the 90's under President Clinton, programs such as Echelon monitored nearly every phone call, fax, and email in the United States. Sites like Facebook have been known to record users web history even when they are logged out. Google has had to pay out millions for its privacy violations such as disabling privacy settings on Internet browsers to allow them to track you. Good Internet security is not about "having something to hide." Use Startpage! Most people are familiar with cookies, small pieces of data sent from a website and stored in a user's web browser while a user is browsing a website. Two preferable browsers for everyday use would be Mozilla Firefox and Opera. Encourage you friends to add Cryptocat to their browser.

Related: