Skip to main content

Home/ Humanities Computing/ Group items tagged security

Rss Feed Group items tagged

Bonnie Thibodeau

Multiple Usernames & Passwords No More: OneID Unveils Its Next-Gen Identity Service | T... - 0 views

  • our online identities are fragmented across an array of usernames, email addresses, screen names, social media accounts, passwords
  • can cause cracks in our security armor,
  • San Jose-based startup launching in beta today
  • ...2 more annotations...
  • made possible by a combination of asymmetric cryptography, the maturity of mobile hardware/software (and their ubiquity), as well as a distributed architecture
  • won’t be exposed in the event of a central security breach.
  •  
    Keeping track of passwords is definitely a hassle for most of us, so a service that groups all of them didn't seem far off. It will be interesting to see how this develops, and if it will catch on and be secure.
Jessica Murphy

Google Offers $1 Million in Exploit Rewards for Chrome Hacks - 0 views

  •  
    Google is offering a Chromebook and cash prizes totaling $1 million for anyone who can hack its Chrome browser at the CanSecWest security conference next week: $40,000 for "partial Chrome exploit" and $60,000 for "full Chrome exploit." This event illustrates a concept from this week's readings: community collaboration can increase a service's effectiveness and bolster a company's success. The Google Chrome Security Team even stated that the contest provides "a big learning opportunity" and ultimately enables them to better protect users by revealing bugs and providing information about hacking techniques.
  •  
    It is like at the start of Sneakers when they are paid to break into banks and show the various security issues. Also, it would be pretty sweet to log $40,000-$60,000 in that short a period of time. I suspect there would also be a job offer that came along with it.
Ben Bishop

Google plugs 14 holes, hands out $47k to security researchers -- Engadget - 0 views

  •  
    Well, they didn't have anyone nag the $1 million prize for a full compromise, but security analysts did find a few things to patch up anyways.
Benjamin Myers

Secure Your Browser: Add-Ons to Stop Web Tracking - 0 views

  •  
    There have been a lot of posts about web tracking in light of the recent changes in Google. This is an interesting article, but one of the things I like the best is the Collusion display of who's tracking your data.
Rachel Henderson

Why Digital Citizenship Must Be Taught in Schools - Scott Steinberg - Voices - AllThingsD - 0 views

  • Based on recent surveys, parents, kids and teachers largely agree that the Internet and technology should be better integrated into modern schools, college curriculums and university classrooms. According to the non-profit National Cyber Security Alliance (NCSA), however, schools are ill-prepared to teach online safety, security and digital citizenship. Case
  •  
    An interesting article on educating parents, teachers, and kids on digital citizenship and safety - and integrating better digital practices and training in schools.
Kwabena Opoku-Agyemang

FBI director: Cyber-threats will become top worry - 1 views

  •  
    As the parameters of cultural capital changes and cyber-literacy assumes central stage, security agencies such as the FBI also take note and understand that they have to re-adjust to cater to the threat that hackers pose.
Jillian Swisher

Careless Social Media Use May Raise Risk of Identity Fraud - NYTimes.com - 0 views

  •  
    This article goes along with Lovink's idea in "MyBrain.net" that we "constantly login, create profiles in order to present our 'selves' on the global market place of employment, friendship and love. . . Trust is the oil of global capitalism and the security state, required by both sides in any transaction or exchange" (4-5). It looks like identity fraud is what happens when we trust too easily on social media sites.
Kwabena Opoku-Agyemang

Maryland To Ban Employers From Asking For Facebook, Twitter Passwords - 0 views

  •  
    Lawmakers are finally putting a stop to this practice. Since we broached the topic of rhetorical strategies in making arguments in class, the argument one law expert makes is interesting: ""It lays down boundaries on what you can and can't do. It takes a gray area and makes a bright line ... The bill is a win for employees who want to protect their data security and their personal content passwords. But it's also a win for employers. ... Employers don't want to have access to this content. With access comes responsibility."
Kwabena Opoku-Agyemang

Nye: Cyber war and peace - Global Public Square - CNN.com Blogs - 0 views

  •  
    Nye, who argues that "the diffusion of power away from governments is one of this century's great political shifts", looks at the implications of cyber wars on the security budget as well as international relations within the political context.
anonymous

Rogers' "Cybersecurity" Bill Is Broad Enough to Use Against WikiLeaks and The Pirate Ba... - 0 views

  •  
    CISPA could be used to go after WikiLeaks and other sites.
dibyadyuti roy

Gender, Security, Human Rights - 0 views

  •  
    For those like me interested in the ramifications of gender, human rights and social policy this is an excellent place to look into. Carol Cohn, one of the foremost gender and warfare scholars is associated with this consortium.
Rachel Henderson

WikiLeaks founder accuses media of libel | TG Daily - 0 views

  • 28Julian Assange, the founder of the whistle-blowing WikiLeaks website, recently told a UK-based inquiry that he is the victim of "extensive press libels." 28 28
  • According to Assange, his work with WikiLeaks - both as an activist and journalist - was geared towards "helping everyone spread the truth" about the world we live in.
Jessica Murphy

Over 90% of Facebook Users Hate Having Photos of Them Posted Without Approval - 0 views

  •  
    This title made me think, "Duh," but apparently 8% of survey participants thought that posting photos or videos of other people without consent should be illegal. One person said the issue "should be regarded the same as it is for printed materials." Another person pointed out that it's actually illegal to record people without their permission, but that photos/video taken in a public setting tend to fall under public domain. I usually create a private folder and then let the people in the photos review them and consent to my publishing them first. What do you think?
1 - 13 of 13
Showing 20 items per page