You probably pay your cell phone, cable TV, Internet, and several other bills online, and even so, you probably also receive a stack of mail in your mailbox every day. Enter the Swiss postal service which, starting in June, will offer subscribers a digital delivery option.
The service, called Swiss Post Box, will send subscribers scanned images of their unopened envelopes to their email address. Subscribers can then decide which ones they want opened and have the contents scanned so that it can be read online. In addition, the Swiss Post Box will offer to archive contents, send unopened letters to another address, or shred and recycle unwanted mail, The New York Times reports.
"There are very few things you get that you actually have to have in your hand," said Michael Laprade, a two year subscriber to Earth Class Mail, a Seattle-based company licensing its technology to the Swiss postal service.
The new service will start at about $18.35 per month. In the U.S., Earth Class Mail subscribers pay anywhere from $10 to $60 per month depending on how much mail is scanned.
The National Security Agency is facing renewed scrutiny over its domestic surveillance program, and Congress is now claiming that their powers may go too far. A review of recent telephone and email intercepts seems to suggest that the agency may be monitoring the conversations of everyday Americans far more than they let on. Longstanding legal issues aside, the N.S.A, as of last year, is expected to only monitor the private communications of US citizens if it can be demonstrated that it was done so as an incidental byproduct of investigating individuals abroad.
Even more troubling, in April, it was disclosed that intercepts of private American communications were far beyond the legal limits for both late 2008 and early 2009, and the extent of the problem is still being investigated. Further supporting evidence was provided by a former N.S.A analyst who claims he was trained in 2005 to use specialized email monitoring software, an application which intelligence officials confirms is still in operation. New Jersey Democratic representative Rush Holt admitted that “Some actions are so flagrant that they can’t be accidental”, but still admits, few lawmakers can deal with the issues because of the technical complexities of the operation. “The people making the policy,” he said, “don’t understand the technicalities.”
It’s easy to see that trying to distinguish between domestic and foreign email correspondence can be difficult, but is the privacy trade off worth the added security benefit? Let us know what you think.
Potentially bad news for G1 owners and anyone else signed up with T-Mobile (we're looking at you Dwayne Wade and Charles Barkley). According to ChannelInsider, hackers have dug their way into the wireless telcom's network and stolen everything they could get their greedy little hands on, including proprietary operating data, customer databases, and financial records.
T-Mobile initially said it was unaware of the reported incident, but has since released a statement to ChannelInsider.
"The protection of our customers' information, and the safety and security of our systems, is absolutely paramount at T-Mobile. Regarding the recent claim, we are fully investigating the matter. As is our standard practice, if there is any evidence that customer information has been compromised, we would inform those affected as soon as possible."
As proof of the alleged breach, hackers fired off an email to insecure.org providing an extensive list of T-Mobile servers. According to ChannelInsider, several former T-Mobile network admins came forward saying the list and server names look authentic.
Google recently announced that they have planned to retake all of their photographs for the Japanese version of Street View thanks to their cameras being too high for most resident’s fences.
The new images will be taken from 16 inches lower than before, and will blur out license plates to protect the privacy of those potentially in the camera’s view. Japan Probe argues that the height difference will make little to no difference, because many images that have been deemed inappropriate weren’t behind fences. Examples include a high school girl’s chest being touched, a man who has passed out in his own sick, and a couple entering a “love hotel.”
Given what passes for a game show over there, I’m surprised that this is what people are having issues with.
A Google Street View vehicle came up against a tempestuous, unyielding mob in the British village of Broughton. The Street View car had gone there to collect photographs to be used by the Google Street View service. Google’s ingenious camouflage tactic of leaving the car unmarked failed miserably as its peculiar rooftop camera betrayed the vehicle’s identity and purpose of visit.
Earlier this month, Google blamed a bug for causing an "isolated incident" which resulted in some users of Google Docs having their word-processing and presentation documents inadvertently shared. According to Google, the mishap only affected 0.05 percent of documents stored at the site, but that's enough to have privacy advocates turning to the Federal Trade Commission (FTC) to shut down all of Google's online services until government-approved "safeguards are verifiably established."
"If we were talking about a child safety seat that could not be securely attached to a car passenger seat, the commission in that instance would say to the company, 'Look, you've got to fix that problem,'" Marc Rotenberg, a lawyer and adjunct law professor, said in a telephone interview with CNet on Tuesday. "Consumers are at risk when that product is in the marketplace. We have a similar view of cloud computing at this point: people are at risk."
Leading the charge is the Electronic Privacy Information Center (EPIC), who submitted a letter to the FTC asking that all Google cloud-computing services be halted, including Gmail. In addition to shutting everything down, EPIC also wants Google to pay $5 million into a "public fund" to benefit advocacy groups.
Is EPIC asking for too much? And equally important, can you manage without Gmail? Hit the jump and sound off.
Today, we live in a world of rapidly diminishing privacy. If you use your employer's email system, it is possible that every message you send or receive is logged and intercepted without your knowledge. This may have unintended or even disastrous consequences if an intercepted email message contains sensitive personal information. Unless your email goes through Secure Socket Layer (SSL) protected connections, your email is vulnerable to what is known in the IT security field as man-in-the-middle attacks, where an attacker can intercept your message as it flies to its intended recipient.
Email is sent in a format that is easily readable if an attacker can grab and reconstruct enough pieces (packets) from the data transmission with packet sniffing software. Technologies like deep packet inspection make it theoretically possible that any given message that goes over the internet can be sniffed and read by third parties who have the right software and know-how. (the feds, your ISP, etc.) While no one may have a real reason to spy on you, relying solely on security through obscurity has always been a poor policy to live by. Because of this, encryption is the only real option you can trust. We teach you how to put your emails in a lockbox before sending them off to their destinations.
"In our world of customized online services, responsible use of data is critical to establishing and maintaining user trust," said Anne Toth, Yahoo!'s Vice President of Policy and Head of Privacy. "We know that our users expect relevant and compelling content and advertising when they visit Yahoo!, but they also want assurances that we are focused on protecting their privacy."
The new limit puts Yahoo well ahead of its competition. Earlier this year, Google reduced its data retention time frame from 18 months to nine months, and Microsoft vowed to cut its data retention policy to six months if its rivals did the same.
Yahoo will begin implementing the new policy next month and says it will be effective across all of the company's services by the middle of 2010.
Sony BMG has agreed to pay $1 million to the Federal Trade Commission to settle charges claiming Sony violated the Children's Online Privacy Protection Act (COPPA). While $1 million might seem a drop in the bucket to a company like Sony, the FTC points out the $1 million penalty matches the largest ever paid in a COPPA case.
The suit, which was filed just yesterday, alleged that Sony managed to collect personal information on roughly 30,000 users under the age of 13, including full names, gender, birth date, email addresses, mobile phone numbers, and in some cases, full mailing addresses. According to the FTC, the information was obtained through various Sony-owned websites designed to promote and advertise the company's music offerings, but didn't restrict visitors under the age of 13 from registering.
"Sites with social networking features, like any Web sites, need to get parental consent before collecting kids' personal information," FTC Chairman William Kovacic said in a statement. "Sony Music is paying the penalty for falling down on its COPPA obligations."
In addition to the $1 million penalty, Sony must also delete all personal information it had collected from those under 13 years old, and must also distribute the FTC's "How to Comply with the Children's Online Privacy Protection Rule" to all of its employees. In addition, Sony's also required to link to the children's privacy section of the FTC's website for five years.
In the end, it might be easier keeping a problematic IT administrator on board than to let him go. Top level execs take note - according to a new survey, which pinged 300 IT administrators still with a job, a staggering 88 percent admitted they would steal company secrets if they were laid off.
The information IT professionals not-yet-scorned said they'd take include the CEO's passwords, the customer database, R&D plans, financial reports, M&A plans, and the company's list of privileged passwords. And when it comes to that last one, administrators don't even need to be laid off in order to start poking around. More than a third of those surveyed claimed to have used privileged passwords to snoop on the network, look up salaries, and peek at other personnel details assumed to be private.
"Our advice is secure the most privileged data, and routinely change and manage them, so that if an employee's contract is terminated, whether sacked or made redundant, they can't maliciously play havoc inside the network or vindictively steal data for competitive or financial gain," said Udi Mokady, chief executive of security firm Cyber-Ark.