Tag Archives: DefCon18

Data Leaks: Location Based Services and Why You Should be Concerned

This entry is part 4 of 4 in the series Data Leaks

This week we wrap up the Data Leaks series, explaining the ideas, and risks, of location- based services (LBS). Imagine… View Article

Posted in Privacy | Tagged , , , , , , , , , , | 3 Comments

Data Leaks: What you Should Know about Rootkits

This entry is part 3 of 4 in the series Data Leaks

This week the Data Leaks series explores another troubling piece of hackery, the rootkit. Today we are going to investigate… View Article

Posted in Privacy | Tagged , , , , , , | 9 Comments