Security Blog Related Content by Tag What should I do about illegal activity in an email? Sometimes you might receive a fraudulent email asking you for personal information that could be used for illegal activities. A lot of people just delete the email and move on. But, what if you want to notify someone? What if the scam is very... Read More Is Anonymized Data Safe? http://arstechnica.com/tech-policy/news/2009/09/your-secrets-live-online-in-databases-of-ruin.ars http://privacy.cs.cmu.edu/dataprivacy/papers/LIDAP-WP4abstract.html http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006We all know that... Read More PaginationFirst page« FirstPrevious page‹ Previous Page 1 Page 2 Page 3 Current page 4
What should I do about illegal activity in an email? Sometimes you might receive a fraudulent email asking you for personal information that could be used for illegal activities. A lot of people just delete the email and move on. But, what if you want to notify someone? What if the scam is very... Read More
Is Anonymized Data Safe? http://arstechnica.com/tech-policy/news/2009/09/your-secrets-live-online-in-databases-of-ruin.ars http://privacy.cs.cmu.edu/dataprivacy/papers/LIDAP-WP4abstract.html http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006We all know that... Read More