“Utan kontanter går vi rakt in i en digital diktatur” – tidigare rikspolischef varnar för naivitet

Kontanterna spelar fortfarande en stor roll inom den gråa och naturligtvis också svarta ekonomin, men de elektroniska betalningssystemen föder nya former av brottslighet som belastar polisen. Nätbedrägerierna växer lavinartat och drivs ofta av internationella ligor.

– Det blir både lättare och svårare att tackla den här typen av ekonomisk brottslighet, berättar kriminalkommissarie Hannu Kortelainen vid Helsingforspolisen. Läs mer

3 Things You Need to be Doing Before You Recycle Your Electronics

For any business today computer data protection solutions are a concern. Therefore, it is common to hesitate when choosing what to do with your electronics once they become obsolete. Here are smart tips for recycling your e-waste in a manner that will protect your data as well as the environment.

http://blog.simsrecycling.com/2017/08/08/3-things-you-need-to-be-doing-before-you-recycle-your-electronics/

https://www.schneier.com/blog/archives/2007/12/anonymity_and_t_2.html

Like everything else in security, anonymity systems shouldn’t be fielded before being subjected to adversarial attacks. We all know that it’s folly to implement a cryptographic system before it’s rigorously attacked; why should we expect anonymity systems to be any different? And, like everything else in security, anonymity is a trade-off. There are benefits, and there are corresponding risks. -/-

What the University of Texas researchers demonstrate is that this process (de-anonymization) isn’t hard, and doesn’t require a lot of data. <..>

With only eight movie ratings (of which two may be completely wrong), and dates that may be up to two weeks in error, they can uniquely identify 99 percent of the records in the dataset. After that, all they need is a little bit of identifiable data: from the IMDb (Internet Movie Database), from your blog, from anywhere. The moral is that it takes only a small named database for someone to pry the anonymity off a much larger anonymous database. Läs mer

Expertgrupp varnar: Stora risker med känsliga data i molntjänster

<…> – Vi anser att det i juridisk mening måste (ses) som ett röjande om en molntjänst används för behandling av uppgifter som är sekretessreglerade, och om molntjänsten ägs av ett utländskt företag där detta lands rättsordning ålägger företaget att under vissa förhållanden överlämna viss information till det landets myndigheter, säger Johan Bålman.

https://computersweden.idg.se/2.2683/1.710293/

Nya larmet: Microsoft samlar in mängder av användardata från Office 365 – i hemlighet

https://computersweden.idg.se/2.2683/1.710433/microsoft-spionerar-office-365

’Grand theft internet’; Googles web traffic hijacked and routed through Russia and China

People’s connections in the US to Google – including its cloud, YouTube, and other websites – were suddenly rerouted through Russia and into China in a textbook Border Gateway Protocol (BGP) hijack.

That means folks in Texas, California, Ohio, and so on, firing up their browsers and software to connect to Google and its services were instead meandering through systems in Russia and China, and not reaching servers belonging to the Silicon Valley giant. Netizens outside of America may also have been affected.

https://www.theregister.co.uk/2018/11/13/google_russia_routing/