• iPhone 15 Rumors: Everything We're Hearing About Apple's Next Phone - CNET

    Updated: 2022-12-31 13:00:00
    Our unofficial curtain-raiser on Apple's iPhone 15 series based on the most credible rumors circulating so far.

  • Google Settles Washington DC, Indiana Lawsuits Totaling $29.5 Million - CNET

    Updated: 2022-12-30 21:45:00
    It'll be easier for people to opt out of Google's location tracking.

  • Where to find me ...

    Updated: 2022-12-18 20:02:00
    : Canadian Privacy Law Blog The Canadian Privacy Law Blog : Developments in privacy law and writings of a Canadian privacy lawyer , containing information related to the Personal Information Protection and Electronic Documents Act aka PIPEDA and other Canadian and international . laws Sunday , December 18, 2022 Where to find me Given the current dumpster fire at Twitter and the recent ban on outbound links to other social platforms , I thought I'd do a post of where to find me : Twitter : https : twitter.com privacylawyer Mastodon : https : twit.social privacylawyer YouTube : https : youtube.com privacylawyer My firm , McInnes : Cooper https : www.mcinnescooper.com people david-fraser My blog , the Canadian Privacy Law Blog : https : blog.privacylawyer.ca Posted by privacylawyer at 12 18

  • About The Privacy Blog

    Updated: 2022-12-14 02:31:26
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Lance Cottrell In August of 2015 I decided to start blogging about privacy and security . issues I created this blog to support Anonymizer.com†s consumer privacy service . From 2015 through 2018 the blog was owned and supported by Anonymizer†s parent company , . Ntrepid When Anonymizer discontinued its consumer anonymity VPN service , we transferred the domain and blog to me personally because it was not longer relevant to the business . It is likely to be quiet here . This is mostly serving as an archive of my writings and thoughts over the . years To see my more recent thoughts , please read my Musings at Obscura.com or my blogs at Ntrepidcorp.com Privacy Policy

  • Contact The Privacy Blog

    Updated: 2022-12-14 02:31:25
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Contact Us The Privacy Blog welcomes your feedback . Please note , we are not accepting any guest blogs or contributed . content Please complete the form below Name First Name Last Name Email Address Subject Message Thank you Privacy Policy

  • The Privacy Blog

    Updated: 2022-12-14 02:31:24
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search See more Privacy Policy

  • Privacy focused art show in Plano Texas The Privacy Blog

    Updated: 2022-12-14 02:31:23
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Privacy focused art show in Plano Texas January 03, 2020 by Lance Cottrell I recently received a press release that intrigued me and though might interest you . There is going to be a multi-media art installation focused on modern privacy risks that looks like it could be fun . Here is the : release “Intelligence : An Art Show About Data Collection” by Sue Anne Rische opens in . February PLANO , TX – January 2, 2020, Multimedia artist Sue Anne Rische announces the art exhibition “Intelligence : An Art Show About Data Collection” at The Arts Gallery in Plano , TX . The show will be on view from Wednesday , February 19 – Wednesday , March 18, 2020. An “Art Café” lecture will take place Thursday ,

  • The Privacy Blog

    Updated: 2022-12-14 02:31:23
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Privacy focused art show in Plano Texas January 03, 2020 by Lance Cottrell I recently received a press release that intrigued me and though might interest you . There is going to be a multi-media art installation focused on modern privacy risks that looks like it could be fun . Here is the : release “Intelligence : An Art Show About Data Collection” by Sue Anne Rische opens in . February PLANO , TX – January 2, 2020, Multimedia artist Sue Anne Rische announces the art exhibition “Intelligence : An Art Show About Data Collection” at The Arts Gallery in Plano , TX . The show will be on view from Wednesday , February 19 – Wednesday , March 18, 2020. An “Art Café” lecture will take place Thursday ,

  • Privacy focused art show in Plano Texas The Privacy Blog

    Updated: 2022-12-14 02:31:20
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Privacy focused art show in Plano Texas January 03, 2020 by Lance Cottrell I recently received a press release that intrigued me and though might interest you . There is going to be a multi-media art installation focused on modern privacy risks that looks like it could be fun . Here is the : release “Intelligence : An Art Show About Data Collection” by Sue Anne Rische opens in . February PLANO , TX – January 2, 2020, Multimedia artist Sue Anne Rische announces the art exhibition “Intelligence : An Art Show About Data Collection” at The Arts Gallery in Plano , TX . The show will be on view from Wednesday , February 19 – Wednesday , March 18, 2020. An “Art Café” lecture will take place Thursday ,

  • I may be quiet here but I am making a lot of noise elsewhere The Privacy Blog

    Updated: 2022-12-14 02:31:19
    , The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search I may be quiet here , but I am making a lot of noise elsewhere July 31, 2019 by Lance Cottrell ThePrivacyBlog has gotten quiet recently because all my writing has been focused on some other . topics At Feel the Boot I am blogging about startups , entrepreneurship , and angel investing . I am passionate about helping founders realize their entrepreneurial . dreams Over at the Ntrepid blog I am writing about managed attribution and online operations . There I focus on my passion for privacy , anonymity , managed attribution , and online . operations July 31, 2019 Lance Cottrell Newer Older Privacy Policy

  • I may be quiet here but I am making a lot of noise elsewhere The Privacy Blog

    Updated: 2022-12-14 02:31:18
    , The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search I may be quiet here , but I am making a lot of noise elsewhere July 31, 2019 by Lance Cottrell ThePrivacyBlog has gotten quiet recently because all my writing has been focused on some other . topics At Feel the Boot I am blogging about startups , entrepreneurship , and angel investing . I am passionate about helping founders realize their entrepreneurial . dreams Over at the Ntrepid blog I am writing about managed attribution and online operations . There I focus on my passion for privacy , anonymity , managed attribution , and online . operations July 31, 2019 Lance Cottrell Newer Older Privacy Policy

  • What is OSINT The Privacy Blog

    Updated: 2022-12-14 02:31:18
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search What is OSINT March 19, 2019 by Lance Cottrell Over on the Ntrepid blog and YouTube channel I recently created a piece on open source intelligence gathering . Much of what we need to know about threat actors is available if you take the time to look . People often get very worked up about the privacy implications of OSINT , but it is only about collecting public data , not digging into secrets . I also talk about some of the complexities and risks of OSINT . gathering The blog is here The video is here March 19, 2019 Lance Cottrell Newer Older Privacy Policy

  • What Is Open Source Intelligence OSINT Ntrepid

    Updated: 2022-12-14 02:31:17
    Missions OSINT Law Enforcement OIG Advanced Missions Products Nfusion Mapper Advanced Solutions Academy Training Courses Blog Resources Events Careers Job Listings About You Benefits Life at Ntrepid About Leadership Locations Research Development Engineering Contact Contact Search What Is Open Source Intelligence OSINT Share this post Facebook Twitter LinkedIn Email 12 Feb February 12, 2019 What Is Open Source Intelligence OSINT d1webb 2021-03-17T08:34:51-05:00 Nfusion Open Source Intelligence , or OSINT is intelligence developed from sources that are free , public , and legal to access . This should not be confused with Open Source Software . OSINT is the opposite of many other forms of intelligence . Unlike sources of intelligence like spies , satellites , sensors , and hackers , OSINT

  • What is OSINT The Privacy Blog

    Updated: 2022-12-14 02:31:16
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search What is OSINT March 19, 2019 by Lance Cottrell Over on the Ntrepid blog and YouTube channel I recently created a piece on open source intelligence gathering . Much of what we need to know about threat actors is available if you take the time to look . People often get very worked up about the privacy implications of OSINT , but it is only about collecting public data , not digging into secrets . I also talk about some of the complexities and risks of OSINT . gathering The blog is here The video is here March 19, 2019 Lance Cottrell Newer Older Privacy Policy

  • The GrinchBot who Stole Christmas The Privacy Blog

    Updated: 2022-12-14 02:31:15
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The GrinchBot who Stole Christmas November 29, 2018 by Lance Cottrell A new online scam is picking up speed and is particularly active during the holidays : GrinchBots . There are many limited edition products , from special sneakers to collectable toys . They can be in very high demand compared to the available supply . That is where the Grinch comes in . The attackers use automated tools to buy up almost all of the inventory of the items , then re-sell them at a huge markup on sites like . eBay Unfortunately there is not much you can do to protect yourself , but retailers can make it much harder to launch this kind of attack . If you think a site has been hit by the GrinchBots , let them know that you are not

  • The GrinchBot who Stole Christmas The Privacy Blog

    Updated: 2022-12-14 02:31:13
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The GrinchBot who Stole Christmas November 29, 2018 by Lance Cottrell A new online scam is picking up speed and is particularly active during the holidays : GrinchBots . There are many limited edition products , from special sneakers to collectable toys . They can be in very high demand compared to the available supply . That is where the Grinch comes in . The attackers use automated tools to buy up almost all of the inventory of the items , then re-sell them at a huge markup on sites like . eBay Unfortunately there is not much you can do to protect yourself , but retailers can make it much harder to launch this kind of attack . If you think a site has been hit by the GrinchBots , let them know that you are not

  • Where To Go From Here The Privacy Blog

    Updated: 2022-12-14 02:31:13
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Where To Go From Here November 26, 2018 by Lance Cottrell I am not posting to The Privacy Blog as often as I did in the past . That does not mean I have stopped writing Please check out my blogs at Obscura.com and at Ntrepid Those will also include links to articles I have written , recorded webinars , conference talks , and . more November 26, 2018 Lance Cottrell Newer Older Privacy Policy

  • Where To Go From Here The Privacy Blog

    Updated: 2022-12-14 02:31:11
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Where To Go From Here November 26, 2018 by Lance Cottrell I am not posting to The Privacy Blog as often as I did in the past . That does not mean I have stopped writing Please check out my blogs at Obscura.com and at Ntrepid Those will also include links to articles I have written , recorded webinars , conference talks , and . more November 26, 2018 Lance Cottrell Newer Older Privacy Policy

  • The End of an Era The Privacy Blog

    Updated: 2022-12-14 02:31:09
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The End of an Era October 25, 2018 by lance in Announcements Anonymizer I founded Anonymizer Inc . in 1995, almost 23 years ago . It was born of my passion and commitment to privacy , security , and anonymity . I deeply appreciate the support , encouragement , and loyalty from the millions of people who have used the service over the years . I am profoundly proud of what this company has accomplished . We were the first commercial internet privacy service in the world . We created the Kosovo Privacy Project , provided censorship circumvention services to hundreds of thousands of people in China and Iran , and worked with numerous human rights groups to provide protected communications and safe access to

  • The Privacy Blog

    Updated: 2022-12-14 02:31:08
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The End of an Era October 25, 2018 by lance in Announcements Anonymizer I founded Anonymizer Inc . in 1995, almost 23 years ago . It was born of my passion and commitment to privacy , security , and anonymity . I deeply appreciate the support , encouragement , and loyalty from the millions of people who have used the service over the years . I am profoundly proud of what this company has accomplished . We were the first commercial internet privacy service in the world . We created the Kosovo Privacy Project , provided censorship circumvention services to hundreds of thousands of people in China and Iran , and worked with numerous human rights groups to provide protected communications and safe access to

  • The Privacy Blog

    Updated: 2022-12-14 02:31:07
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The End of an Era October 25, 2018 by lance in Announcements Anonymizer I founded Anonymizer Inc . in 1995, almost 23 years ago . It was born of my passion and commitment to privacy , security , and anonymity . I deeply appreciate the support , encouragement , and loyalty from the millions of people who have used the service over the years . I am profoundly proud of what this company has accomplished . We were the first commercial internet privacy service in the world . We created the Kosovo Privacy Project , provided censorship circumvention services to hundreds of thousands of people in China and Iran , and worked with numerous human rights groups to provide protected communications and safe access to

  • The End of an Era The Privacy Blog

    Updated: 2022-12-14 02:31:07
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The End of an Era October 25, 2018 by lance in Announcements Anonymizer I founded Anonymizer Inc . in 1995, almost 23 years ago . It was born of my passion and commitment to privacy , security , and anonymity . I deeply appreciate the support , encouragement , and loyalty from the millions of people who have used the service over the years . I am profoundly proud of what this company has accomplished . We were the first commercial internet privacy service in the world . We created the Kosovo Privacy Project , provided censorship circumvention services to hundreds of thousands of people in China and Iran , and worked with numerous human rights groups to provide protected communications and safe access to

  • Seriously Tinder cleartext in 2018 The Privacy Blog

    Updated: 2022-12-14 02:31:06
    , The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Seriously Tinder , cleartext in 2018 January 24, 2018 by lance in Stupidity When I think about security and privacy , I often focus on sophisticated attacks and exotic exploits , or on user error and social engineering . A recent report about the security design of Tinder reminds me that we need to also keep an eye out for someone just leaving the door unlocked and wide . open Tinder does not encrypt the connection between your phone and its servers when sending photos back and forth . Anyone in a position to see your network traffic , like on a public WiFi , could see and potentially modify those photos . Additionally , even the encrypted communications leave patterns that an attacker can recognize . The

  • The Privacy Blog

    Updated: 2022-12-14 02:31:05
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Seriously Tinder , cleartext in 2018 January 24, 2018 by lance in Stupidity When I think about security and privacy , I often focus on sophisticated attacks and exotic exploits , or on user error and social engineering . A recent report about the security design of Tinder reminds me that we need to also keep an eye out for someone just leaving the door unlocked and wide . open Tinder does not encrypt the connection between your phone and its servers when sending photos back and forth . Anyone in a position to see your network traffic , like on a public WiFi , could see and potentially modify those photos . Additionally , even the encrypted communications leave patterns that an attacker can recognize . The

  • Tinder 27 s Lack of Encryption Lets Strangers Spy on Your Swipes WIRED Menu Story Saved Close Chevro

    Updated: 2022-12-14 02:31:04
    Skip to main content Open Navigation Menu Menu Story Saved To revist this article , visit My Profile , then View saved stories Close Alert Close Tinder 27 s Lack of Encryption Lets Strangers Spy on Your Swipes Backchannel Business Culture Gear Ideas Science Security More Chevron Story Saved To revist this article , visit My Profile , then View saved stories Close Alert Close Sign In Search Search Backchannel Business Culture Gear Ideas Science Security Podcasts Video Artificial Intelligence Climate Games Newsletters Magazine Events Wired Insider Jobs Coupons Andy Greenberg Security Jan 23, 2018 9:00 AM Tinder's Lack of Encryption Lets Strangers Spy on Your Swipes Thanks to Tinder's patchwork use of HTTPS , researchers found they could reconstruct someone's entire experience in the . app

  • Seriously Tinder cleartext in 2018 The Privacy Blog

    Updated: 2022-12-14 02:31:00
    , The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Seriously Tinder , cleartext in 2018 January 24, 2018 by lance in Stupidity When I think about security and privacy , I often focus on sophisticated attacks and exotic exploits , or on user error and social engineering . A recent report about the security design of Tinder reminds me that we need to also keep an eye out for someone just leaving the door unlocked and wide . open Tinder does not encrypt the connection between your phone and its servers when sending photos back and forth . Anyone in a position to see your network traffic , like on a public WiFi , could see and potentially modify those photos . Additionally , even the encrypted communications leave patterns that an attacker can recognize . The

  • The Looming End of Network Neutrality and How to Protect Yourself The Privacy Blog

    Updated: 2022-12-14 02:31:00
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The Looming End of Network Neutrality and How to Protect Yourself December 13, 2017 by lance in Uncategorized Let†s get this out right up front . I am a strong advocate for network . neutrality ISPs like Comcast say that these regulations strangle innovation , and that all the concerns about how they might abuse their position are just . paranoia First a quick review . Network Neutrality is the principle that ISPs should not discriminate between the different sources of traffic on their network . My YouTube , your Facebook , his BitTorrent , her porn site , all should have the same access to , and performance on , the internet . In effect , the internet is like water or electricity , a utility delivered to

  • The Privacy Blog

    Updated: 2022-12-14 02:30:59
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The Looming End of Network Neutrality and How to Protect Yourself December 13, 2017 by lance in Uncategorized Let†s get this out right up front . I am a strong advocate for network . neutrality ISPs like Comcast say that these regulations strangle innovation , and that all the concerns about how they might abuse their position are just . paranoia First a quick review . Network Neutrality is the principle that ISPs should not discriminate between the different sources of traffic on their network . My YouTube , your Facebook , his BitTorrent , her porn site , all should have the same access to , and performance on , the internet . In effect , the internet is like water or electricity , a utility delivered to

  • Comcast really does block BitTorrent traffic after all The Iconoclast politics law and technology CN

    Updated: 2022-12-14 02:30:58
    , , The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Comcast really does block BitTorrent traffic after all The Iconoclast politics , law , and technology CNET News.com October 27, 2007 by lance in Internet Comcast really does block BitTorrent traffic after all The Iconoclast politics , law , and technology CNET News.com Here is another example of the fallacy of The Internet as a single entity . In many ways the Internet is like a hologram . What you see depends on where you are . Many web sites will charge higher prices to you if you are coming from certain countries or certain zip codes . In this case , certain kinds of communications simply don't work if you are a Comcast . customer The problem here is really informed consent , or false advertising . Users

  • Comcast caught hijacking web traffic Ryan Kearney

    Updated: 2022-12-14 02:30:58
    hello Home Blog 2 minutes Comcast caught hijacking web traffic On November 20th , 2012 Comcast hijacked my HTTP traffic and re-routed it through their own servers , injecting a notice on the page before completing the request . What this means is instead of my web request being routed to the website I wanted to visit , Comcast took it upon themselves to hijack my web traffic , forcing it to go through their servers instead . This poses a massive security risk for users since there's no telling what type of logging Comcast uses on their end . Why did they do all this To force a courtesy notice on every webpage I visit until I logged into my Comcast account because I was within 90 of my new 300GB limit In my testing I discovered that this only affects HTTP traffic and not HTTPS traffic .

  • The Privacy Blog

    Updated: 2022-12-14 02:30:53
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The Looming End of Network Neutrality and How to Protect Yourself December 13, 2017 by lance in Uncategorized Let†s get this out right up front . I am a strong advocate for network . neutrality ISPs like Comcast say that these regulations strangle innovation , and that all the concerns about how they might abuse their position are just . paranoia First a quick review . Network Neutrality is the principle that ISPs should not discriminate between the different sources of traffic on their network . My YouTube , your Facebook , his BitTorrent , her porn site , all should have the same access to , and performance on , the internet . In effect , the internet is like water or electricity , a utility delivered to

  • The Privacy Blog

    Updated: 2022-12-14 02:30:52
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The Looming End of Network Neutrality and How to Protect Yourself December 13, 2017 by lance in Uncategorized Let†s get this out right up front . I am a strong advocate for network . neutrality ISPs like Comcast say that these regulations strangle innovation , and that all the concerns about how they might abuse their position are just . paranoia First a quick review . Network Neutrality is the principle that ISPs should not discriminate between the different sources of traffic on their network . My YouTube , your Facebook , his BitTorrent , her porn site , all should have the same access to , and performance on , the internet . In effect , the internet is like water or electricity , a utility delivered to

  • The Privacy Blog

    Updated: 2022-12-14 02:30:51
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The Looming End of Network Neutrality and How to Protect Yourself December 13, 2017 by lance in Uncategorized Let†s get this out right up front . I am a strong advocate for network . neutrality ISPs like Comcast say that these regulations strangle innovation , and that all the concerns about how they might abuse their position are just . paranoia First a quick review . Network Neutrality is the principle that ISPs should not discriminate between the different sources of traffic on their network . My YouTube , your Facebook , his BitTorrent , her porn site , all should have the same access to , and performance on , the internet . In effect , the internet is like water or electricity , a utility delivered to

  • The Looming End of Network Neutrality and How to Protect Yourself The Privacy Blog

    Updated: 2022-12-14 02:30:50
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search The Looming End of Network Neutrality and How to Protect Yourself December 13, 2017 by lance in Uncategorized Let†s get this out right up front . I am a strong advocate for network . neutrality ISPs like Comcast say that these regulations strangle innovation , and that all the concerns about how they might abuse their position are just . paranoia First a quick review . Network Neutrality is the principle that ISPs should not discriminate between the different sources of traffic on their network . My YouTube , your Facebook , his BitTorrent , her porn site , all should have the same access to , and performance on , the internet . In effect , the internet is like water or electricity , a utility delivered to

  • Fighting cybercrime vs protecting citizens The Privacy Blog

    Updated: 2022-12-14 02:30:49
    . The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Fighting cybercrime vs . protecting citizens May 09, 2017 by lance in Musings David Shedd , former director of the Defense Intelligence Agency , recently published an OpEd on the damage that unrestricted focus on catching criminals can do to our general cyber security . It is great to see people with that kind of background speaking on on this critical . issue Americans want their cyber data to be safe from prying eyes . They also want the government to be able to catch criminals . Can they have both It's an especially pertinent question to ask at a time when concerns over Russian hacking are prevalent . Can we expose lawbreakers without also putting law-abiders at greater risk After all , the same iPhone

  • The Privacy Blog

    Updated: 2022-12-14 02:30:49
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Fighting cybercrime vs . protecting citizens May 09, 2017 by lance in Musings David Shedd , former director of the Defense Intelligence Agency , recently published an OpEd on the damage that unrestricted focus on catching criminals can do to our general cyber security . It is great to see people with that kind of background speaking on on this critical . issue Americans want their cyber data to be safe from prying eyes . They also want the government to be able to catch criminals . Can they have both It's an especially pertinent question to ask at a time when concerns over Russian hacking are prevalent . Can we expose lawbreakers without also putting law-abiders at greater risk After all , the same iPhone that

  • Fighting cybercrime vs protecting citizens The Privacy Blog

    Updated: 2022-12-14 02:30:47
    . The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Fighting cybercrime vs . protecting citizens May 09, 2017 by lance in Musings David Shedd , former director of the Defense Intelligence Agency , recently published an OpEd on the damage that unrestricted focus on catching criminals can do to our general cyber security . It is great to see people with that kind of background speaking on on this critical . issue Americans want their cyber data to be safe from prying eyes . They also want the government to be able to catch criminals . Can they have both It's an especially pertinent question to ask at a time when concerns over Russian hacking are prevalent . Can we expose lawbreakers without also putting law-abiders at greater risk After all , the same iPhone

  • Do you use any of the worst passwords of 2016 The Privacy Blog

    Updated: 2022-12-14 02:30:46
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Do you use any of the worst passwords of 2016 January 25, 2017 by lance in Passwords It is time to talk about passwords again . They are like the seatbelts of the security world . There are many more exciting security tools but few are as important to keeping you safe from the risks you encounter day to . day Splash Data recently released their list of the most common passwords from 2016 based on over five million stolen and leaked . credentials Clearly things have improved and password requirements and gotten more stringent because the winner is no longer 1234, which has dropped to 11. It is now 123456 Second place goes to that perennial favorite “password” and we see12345 in third . place Rather than

  • The Privacy Blog

    Updated: 2022-12-14 02:30:46
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Do you use any of the worst passwords of 2016 January 25, 2017 by lance in Passwords It is time to talk about passwords again . They are like the seatbelts of the security world . There are many more exciting security tools but few are as important to keeping you safe from the risks you encounter day to . day Splash Data recently released their list of the most common passwords from 2016 based on over five million stolen and leaked . credentials Clearly things have improved and password requirements and gotten more stringent because the winner is no longer 1234, which has dropped to 11. It is now 123456 Second place goes to that perennial favorite “password” and we see12345 in third . place Rather than

  • Cookies Jisc

    Updated: 2022-12-14 02:30:45
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Website information Cookies : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Cookies amp amp amp amp amp lt section class= article-full__cookie-box article-full__cookie-box--no-js jsCookieBox amp amp amp amp amp gt amp amp amp amp amp lt h2 class= article-full__cookie-box-title amp amp amp amp amp gt Your settings : amp amp amp amp amp amp lt h2 amp amp amp amp amp gt amp amp amp amp amp lt p

  • Intute Jisc

    Updated: 2022-12-14 02:30:45
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Website information Legacy content Intute : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Intute The Intute site closed in July 2011. Archive Details of the project behind Intute can be found on the UK web : archive Intute repository search project Intute Jisc digitisation dissemination project You may also like Generic Jisc strategies archive Generic Archived events You are : in Website

  • Intute Jisc

    Updated: 2022-12-14 02:30:44
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Website information Legacy content Intute : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Intute The Intute site closed in July 2011. Archive Details of the project behind Intute can be found on the UK web : archive Intute repository search project Intute Jisc digitisation dissemination project You may also like Generic Jisc strategies archive Generic Archived events You are : in Website

  • Jisc

    Updated: 2022-12-14 02:30:44
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content Jisc banner Improving lives through digital transformation Find out about Jisc Popular tasks Search Clear search results How we can help Cloud Consultancy , support and reseller of services Connectivity Connection services and infrastructure Cyber security Protecting the network and your organisation Data analytics Address strategic challenges through data Libraries , learning resources and research Shared services , infrastructure and advice Student experience Tools to enrich learning and employability Trust and identity Manage access efficiently and effectively Frameworks Approved agreements to

  • Website information Jisc

    Updated: 2022-12-14 02:30:44
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Website information : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Website information Popular questions I've spotted a mistake who do I talk to Can I use your content Where can I find old content Explore this section Accessibility statement See the standards we're trying to reach with this website , and how to let us know if you spot a problem Privacy notice How and why Jisc may process your

  • Legacy content Jisc

    Updated: 2022-12-14 02:30:44
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Website information Legacy content : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Legacy content Information about former Jisc service sites as well as services , which have merged with Jisc . Archived services and content You can  visit the UK Web Archive to view old versions of our . site We have also listed some of our archived services and content . below Jisc Advance Jisc Content Jisc

  • Cookies Jisc

    Updated: 2022-12-14 02:30:44
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Website information Cookies : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Cookies amp amp amp amp amp lt section class= article-full__cookie-box article-full__cookie-box--no-js jsCookieBox amp amp amp amp amp gt amp amp amp amp amp lt h2 class= article-full__cookie-box-title amp amp amp amp amp gt Your settings : amp amp amp amp amp amp lt h2 amp amp amp amp amp gt amp amp amp amp amp lt p

  • Privacy notice Jisc

    Updated: 2022-12-14 02:30:44
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Website information Privacy notice : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Privacy notice Introduction We are Jisc , a not-for-profit company limited by guarantee , registered in . England Company number : 05747339 Charity number : 1149740 ICO registration number : Z9546606 Registered office : 4 Portwall Lane , Bristol , BS1 6NB Jisc is committed to protecting your privacy . We are the

  • Feedback errors and broken pages Jisc

    Updated: 2022-12-14 02:30:44
    , We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Website information Feedback , errors and broken pages : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Feedback , errors and broken pages If you'd like to send us feedback about the site , or if you've found something wrong then please email the web : team at web jisc.ac.uk Thank you for taking the time to let us know . We will try to get back to you as soon as . possible You may also like

  • Jisc strategies archive Jisc

    Updated: 2022-12-14 02:30:43
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Website information Legacy content Jisc strategies archive : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Cookies Privacy notice Using our content Feedback Accessibility statement Jisc strategies archive Archive Visit web archives to view : Jisc strategy for 2013-2016 via Internet Archive Wayback Machine Jisc strategy for 2010-2012 via UK Web Archive All Jisc strategies from 1996 to 2009 via UK Web Archive Up to date Jisc vision , mission and strategy Alternatively

  • Archived events Jisc

    Updated: 2022-12-14 02:30:43
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Archived events : Utilities Search this website Disabled site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Archived events Archive Visit the UK Web Archive to view our archived events Up to date Alternatively view upcoming events , and recordings and resources from many of our past events You may also like Generic Annual reports archive Generic Jisc strategies archive You are : in Archived events Areas Connectivity Cyber security Cloud Data analytics Libraries , learning resources and research Student

  • Connectivity Jisc

    Updated: 2022-12-14 02:30:43
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Connectivity : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Janet IP connection Intersite connection Cloud connect Netpath Managed router service Microsoft Azure ExpressRoute Govroam Network equipment framework Global education access framework eduroam eduroam Visitor Access Session border controller Connectivity Meeting your connectivity needs with our world-class Janet Network and special purpose connections . We can support access and roaming by all your users staff

  • Cyber security Jisc

    Updated: 2022-12-14 02:30:43
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Cyber security : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Allow and deny lists Foundation DDoS mitigation Critical services protection Cyber Essentials Cyber security assessment Cyber security financial X-ray CSIRT Cyber threat intelligence Security operations centre Email advice and testing Janet Network resolver Network time service NTP Managed firewall Cyber security threat monitoring Penetration testing Primary nameserver service Simulated phishing and

  • Data analytics Jisc

    Updated: 2022-12-14 02:30:43
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Data analytics : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Tailored datasets Heidi Plus Heidi Plus extended access Data consultancy Degree programme accreditation report Digital elevation tool Online surveys Discovery and consultancy Learning analytics Checkin+ Data analytics Trusted higher and further education data and analysis helping you to make data-driven decisions and gain valuable insights . nbsp Analytics for teaching and learning Empower your tutors to

  • Libraries learning resources and research Jisc

    Updated: 2022-12-14 02:30:42
    , We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Libraries , learning resources and research : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Library support Open research Learning and research resources Libraries , learning resources and research Providing shared services , infrastructure and advice to help you manage your library resources , research publication lifecycle and research . outputs Library support Providing you with centrally-maintained library services to save you time and money across the information

  • Student experience Jisc

    Updated: 2022-12-14 02:30:42
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Student experience : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Building digital capability Digital experience insights Prospects Prospects Hedd Prospects Luminate Student experience Supporting you with digital tools and mechanisms to enrich the learning and teaching experience for your students on campus and in the work place . nbsp Student and graduate services Help with developing the digital skills of your staff and students , plus support and opportunities for

  • Trust and identity Jisc

    Updated: 2022-12-14 02:30:42
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Trust and identity : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Certificate service Domain registry OpenAthens Student voter registration Trust and identity consultancy UK Access Management Federation Trust and identity These world-leading services help you manage access efficiently and . effectively Supporting you with verification If you need a way to verify data , or the status of staff and students you're responsible for , nbsp we can help you choose a service

  • Guides Jisc

    Updated: 2022-12-14 02:30:42
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Advice and guidance Guides Guides : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Consultancy Training Guides Guides Showing 65 current guides Include archived guides Refine : Sort Sort by Last updated Most viewed Relevance A-Z Z-A Refine Cancel Refined by Search Search guides Close search results Topic Accessibility 10 Assessment 5 Cloud 2 Collaboration 1 Content 4 Course data 2 Data and analytics 5 Digital leadership 2 Digital literacy 6 Infrastructure 7 Learning and

  • Training Jisc Jisc

    Updated: 2022-12-14 02:30:42
    Skip to main content Search Jisc Consultancy Training Guides Beta We 27 re making improvements — you 27 re viewing a page on our new . site Training Developed and delivered by our experts , our high-quality training is designed to help you develop in-house expertise and make the most of our services and . solutions Featured training Cyber Essentials Plus preparing for verification The next step after achieving Cyber Essentials . certification 13 January 2023 more sessions Digital leaders programme Work together with like-minded peers to become a digitally-informed and empowered . leader 17 January – 09 February 2023 Developing learners†employability skills Prepare your learners to thrive in their future . careers 26 January 2023 more sessions Explore 37 training courses Refine : by

  • Consultancy Jisc

    Updated: 2022-12-14 02:30:42
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Advice and guidance Consultancy : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Consultancy Training Guides Consultancy Additional expert support to help you transform your organisation and practice through digital technologies . nbsp Supporting your ambitions , however large or small Jisc consultancy services offer additional , impartial support to members who want a partner to help drive transformation with clear . impact Including leading technical and sector-wide

  • Events Jisc Jisc

    Updated: 2022-12-14 02:30:41
    Skip to main content Search Jisc Beta We 27 re making improvements — you 27 re viewing a page on our new . site Events Book upcoming events and catch up on recordings and . resources Featured events Discovering graduate outcomes demo : session fourteen Find out more about the new discover graduate outcomes service and see a . demonstration No upcoming sessions How artificial intelligence has the potential to disrupt student assessment Join us as we examine recent advancements in content generating AI tools and consider how they may impact the future of . assessment No upcoming sessions Tech 2 Tech What 27 s new from the IETF Shaping the future of the Janet . Network 08 February 2023 Explore 124 events Refine : by Event Type Upcoming events Past events Category Accessibility Cloud

  • Innovation Jisc

    Updated: 2022-12-14 02:30:41
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Innovation : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Projects How we innovate National centre for AI Innovation Working with you to identify emerging technologies and develop them into the services you . need Find a project Take a look at what we're working on and find out more about services that are currently in . development See all R D projects How do we innovate Our co-design approach to R D is driven by the priorities of our members . Explore how we develop

  • About us Jisc

    Updated: 2022-12-14 02:30:41
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in About us : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Our strategy Corporate information Savings and value Equality , diversity and inclusion Public affairs About us Jisc and HESA have officially joined forces find out about the merger Our purpose We’re on a mission to improve lives through the digital transformation of education and . research That’s why we . exist It’s what drives us . everyday Who we are Jisc is the UK digital , data and technology agency focused

  • Membership Jisc

    Updated: 2022-12-14 02:30:41
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Take our short survey to help us improve the site start the survey Skip to main content You are : in Membership : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation FE catalogue FE subscription HE catalogue HE subscription Independent HE providers Research catalogue Cost sharing group Member stories Membership What's included Further education Higher education Find out about changes to our further education funding England only Your subscription is funded by the HE funding bodies and your contribution

  • Get involved Jisc

    Updated: 2022-12-14 02:30:41
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in Get involved : Utilities Search this website Disabled site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Get involved Engage with your peers to share experiences and make an impact Join a community group Learn from each other by sharing experiences and solutions Find out how we can help with support for your community Creative Commons attribution information Jisc and Matt Lincoln CC BY-NC-ND Community champions for Digifest 2023 Celebrating extraordinary people supporting . communities Creative Commons

  • News Jisc

    Updated: 2022-12-14 02:30:41
    We use cookies to give you the best experience and to help improve our website Find out more about how we use cookies Choose whether to use : cookies No thanks Yes , I accept Skip to main content You are : in News : Utilities Search this website Site navigation Search the Jisc website Search Clear search results Search the Jisc website Search Clear search results : Navigation Blog Podcasts All news News Sign up for updates Librarians and publishers register now for free online event 13 December 2022 Registration is now open for OpenAthens’ Access Lab 2023, a free annual conference for librarians and publishers taking place online , 20-23 March 2023. Librarians and publishers register now for free online event 13 December 2022 Higher education teaching staff report lower satisfaction with

  • No title

    Updated: 2022-12-14 02:30:40
    JavaScript is not . available We†ve detected that JavaScript is disabled in this browser . Please enable JavaScript or switch to a supported browser to continue using twitter.com . You can see a list of supported browsers in our Help . Center Help Center Terms of Service Privacy Policy Cookie Policy Imprint Ads info © 2022 Twitter , Inc . Something went wrong , but don†t fret — let†s give it another . shot

Current Feed Items | Previous Months Items

Nov 2022