security

Priv3 on LifeHacker

Firefox: It's not just Facebook that's actively tracking your movements on the Web without your consent: Google, LinkedIn, and others do the same, although most other services make it easier to opt out. If you want to use those services when you want without trading your privacy for the privilege, Priv3 is a Firefox extension that gives you back the ability to choose.

Priv3 on Geek.com

"Priv3 Firefox Extension Stops Social Networks Tracking You"
October 6, 2011  |  Will Shanklin, Geek.com

We all know that the internet has become saturated with social networking. If you can read it on the web, chances are you can also “Like” it. It’s only natural that, if you share something, Facebook or Google will know that you visited that page. It’s also likely that they’ll use that data to sell advertising. What most of us don’t know, however, is that those same networks can track your visits to many pages even if you don’t click on any sharing buttons. Enter Priv3, a new extension for Firefox that only allows your visits to be tracked when you want them to.

Vern Paxson - New Director of Networking and Security

Monday, January 28, 2013

Networking and Security Director Vern PaxsonICSI is pleased to announce that, as of January 1, 2013, Professor Vern Paxson is the director of Networking and Security research. Paxson was previously a senior researcher in Networking. He takes the role of director over from Professor Scott Shenker, who directs the recently established Research Initiatives area and serves as chief scientist. Networking and Security research scientists will conduct research on Internet security issues, including investigating the underground economy.

New Research: Studying Twitter Spam’s Use in Political Censorship

Wednesday, May 9, 2012

spam tweets per minuteSpammers who posted almost half a million Twitter messages in order to silence debate over Russia’s election in December likely purchased fraudulent accounts in bulk and posted the tweets from botnets, groups of malware-infected computers under the command of a single person. According to Networking Group researchers, the campaign took advantage of an underground economy based on spam, a phenomenon that researchers are studying in an attempt to improve methods of eliminating spam.