Does more surveillance offer more protection?

The trend towards greater state surveillance has become even more obvious since Edward Snowden’s revelations. Governments frequently justify such invasions of their citizens’ privacy as counterterrorism or anti-pedophile measures. In recent weeks, two unmissable examples of state interference have been hurried through including an amendment to Rule 41 of the Federal Rules of Criminal Procedure in America and the Investigatory Powers Bill by Theresa May. Both laws permit or legalize massive invasions of privacy. Nobody is questioning the presence of a criminal threat – whatever it may be motivated by. However changes to legislation will weaken the security of many IT products which is already under heavy fire as demonstrated by current events such as the Google hack or attack on Telekom routers in Germany.

BSI drafts Internet of Things security recommendations

At last, influential policymakers are slowly becoming aware of the damages unsecured IoT devices can cause. Recent attacks on high profile targets, exploiting cameras and routers, have attracted a lot of attention. Some of the issues will not likely be solved until manufacturers improve the security of their systems. However, many attack vectors could be eliminated easily with appropriate precautionary measures. Currently, the Federal Office for Information Security (BSI) is drafting a new module to address IoT device security. Although it does not refer to specific manufacturers or technologies, the proposal includes concepts for securing IoT devices so that they cannot be manipulated or accessed without authorization to compromise data and IT security within an organization or to target other organizations.

Internet Security Programs for Students

The Internet is a wondrous place. The most convenient and massive source of information. You have the luxury of accessing any web-site with a simple mouse click. Particularly useful for students. It allows everyone to find and compile all the relevant information quickly; explore popular tourist destinations; find recipes for tasty meals or maybe even get some professional help from Australian assignment writers.

Control over our data

Anybody who uses the Internet uses, creates and leaves data behind. While in the past site visits were recorded in the depths of server log files rarely to surface again, these and related data are now the currency of the 21st century. Services are exchanged for data, this is the business model shared by Google, Amazon and many others. But people are becoming more aware that the uninhibited acquisition of their personal data may have negative consequences and no longer trust that their data is protected on the Internet.