Skip to main content

Home/ 91.113 Exploring the Internet/ Group items tagged Security

Rss Feed Group items tagged

Beibei Yang

New Facebook Trusted/HTTPS Settings Allow You To Browse Securely - 0 views

  • New Facebook Trusted/HTTPS Settings Allow You To Browse Securelyby Meghan Stabler on Thursday, January 27, 2011 at 2:40pmRecently there have been a number of simple hacks that allow your Facebook to be compromised. Today, Facebook announced a new feature that will help solve many of your security issues. You can now easily prevent that with this awesome (and long overdue) new feature from Facebook that allows you to browse the website securely. Spread the word! Why?  Because it’s optional and you have to enable it yourself ! To enable it simply go to the Account Security section of the Account Settings page and enable it. Note that I have tested this feature and should you use Facebook over a Corporate Network (VPN) and other similar secure access systems, not all images and photos will display due to the security layer in place.  Essentially it works by adding secure encryption to your browser, similar to when you’re checking out on an e-commerce website. This should become a DEFAULT setting for anyone who uses Facebook. Until it becomes the default setting make sure to protect yourself and change it today, it only takes a second… “Starting today we’ll provide you with the ability to experience Facebook entirely over HTTPS. You should consider enabling this option if you frequently use Facebook from public Internet access points found at coffee shops, airports, libraries, or schools,” the post says. “The option will exist as part of our advanced security features, which you can find in the Account Security section of the Account Settings page.” Using HTTPS may mean that some pages will take a little bit longer to load, and some third-party applications aren’t currently supported, the company said. The option is rolling out over the next few weeks. “We hope to offer HTTPS as a default whenever you are using Facebook sometime in the future,” the post says. “Every user’s Facebook page is unique and it’s been complex pulling together all the different parts,” said Facebook Chief Security Officer Joe Sullivan when asked what the time frame is to making HTTPS the default setting. “It’s an interesting technical challenge for the company.” Click here for more information on HTTPS After you modify that account setting you will notice that whenever you browse Facebook your browser bar will show “https://www.Facebook.com/“  and you should notice the LOCK graphic denoting that you are now browsing on a secure encrypted protection.  It will look something like this:  typically appearing in your browsers bottom right corner,this will vary by browser.  If you don’t see a lock, then you’re not protected.
    • Beibei Yang
       
      In Facebook, go to Account -> Account Settings -> Account Security, and check "Browse Facebook on a secure connection (https) whenever possible".
P Krolak

Foundations of security: what every programmer needs to know (Google eBook) - 0 views

  •  
    Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems. Once youre enabled with the techniques covered in this book, you can start to alleviate some of the inherent vulnerabilities that make today's software so susceptible to attack. The book uses web servers and web applications as running examples throughout the book. For the past few years, the Internet has had a "wild, wild west" flavor to it. Credit card numbers are stolen in massive numbers. Commercial web sites have been shut down by Internet worms. Poor privacy practices come to light and cause great embarrassment to the corporations behind them. All these security-related issues contribute at least to a lack of trust and loss of goodwill. Often there is a monetary cost as well, as companies scramble to clean up the mess when they get spotlighted by poor security practices. It takes time to build trust with users, and trust is hard to win back. Security vulnerabilities get in the way of that trust. Foundations of Security: What Every Programmer Needs To Know helps you manage risk due to insecure code and build trust with users by showing how to write code to prevent, detect, and contain attacks. The lead author cofounded the Stanford Center for Professional Development Computer Security Certification. This book teaches you how to be more vigilant and develop a sixth sense for identifying and eliminating potential security vulnerabilities. Youll receive hands-on code examples for a deep and practical understanding of security. Youll learn enough about security to get the job done.
P Krolak

Surveillence Society -- security and privacy in the Internet Age - 0 views

  •  
    The advance of wireless technology, smart sensors, and cloud computing have changed the government's approach to security in the face of 9-11 and global terrorism. The Internet is being used in ways we could not have imaged a decade ago. This powerpoint explores issues of surveillence, privacy, and evovling law in the context of world events.
P Krolak

Computer Virus Hits U.S. Drone Fleet - 0 views

  •  
    A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over Afghanistan and other warzones. The virus, first detected nearly two weeks ago by the military's Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech's computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military's most important weapons system.
P Krolak

Feds concerned about hackers opening prison doors - 0 views

  •  
    This almost reads like something out of a made for TV movie but is real.;-( Federal authorities are concerned about new research showing U.S. prisons are vulnerable to computer hackers, who could remotely open cell doors to aid jailbreaks. The Federal Bureau of Prisons is "aware of this research and taking it very seriously," spokesman Chris Burke told The Washington Times. Mr. Burke was reacting to research by private experts who found that the security systems in most American prisons are run by computer software vulnerable to hackers. "You could open every cell door, and the system would be telling the control room they are all closed," said John J. Strauchs, a former CIA operations officer who helped develop a cyber-attack on a simulated prison computer system and described it at a hackers' convention in Miami last week. The security systems in most American prisons are run by special computer equipment called industrial control systems, or ICS. They are also used to control power plants, water treatment facilities and other critical national infrastructure. ICS has increasingly been targeted by hackers because an attack on one such system successfully sabotaged Iran's nuclear program in 2009.
P Krolak

Facebook U-turns on data sharing - 0 views

  •  
    Facebook appears to have U-turned on plans to allow external websites to see users' addresses and mobile phone numbers. Security experts pointed out that such a system would be ripe for exploitation from rogue app developers. The feature has been put on "temporary hold", the social networking firm said in its developers blog.
P Krolak

Emotion sensor catches out liars - 0 views

  •  
    A sophisticated new camera system can detect lies just by watching our faces as we talk, experts say. The computerised system uses a simple video camera, a high-resolution thermal imaging sensor and a suite of algorithms. Researchers say the system could be a powerful aid to security services.
P Krolak

When Gadgets Betray Us by Robert Vamosi - 0 views

  •  
    When Gadgets Betray Us gives us a glimpse into the secret lives of our gadgets and helps us to better understand-and manage-these very real risks. Technology is evolving faster than we are. As our mobile phones, mp3 players, cars, and digital cameras become more and more complex, we understand less and less about how they actually work and what personal details these gadgets might reveal about us. Robert Vamosi, an award-winning journalist and analyst who has been covering digital security issues for more than a decade, shows us the dark side of all that digital capability and convenience. Hotel-room TV remotes can be used to steal our account information and spy on what we've been watching, toll-booth transponders receive unencrypted EZ Pass or FasTrak info that can be stolen and cloned, and our cars monitor and store data about our driving habits that can be used in court against us.
P Krolak

Foreign hackers targeted U.S. water plant in apparent malicious cyber attack, expert says - 0 views

  •  
    And so it begins in the real world and not in a movie, or lab demo. This is a real attack on US infrastructure via the internet. Foreign hackers broke into a water plant control system in Illinois last week and damaged a water pump in what appears to be the first reported case of a malicious cyber attack damaging a critical computer system in the United States, according to an industry expert. On Nov. 8, a municipal water district employee in Illinois noticed problems with the city's water pump control system, and a technician determined the system had been remotely hacked into from a computer located in Russia, said Joe Weiss, an industry security expert who obtained a copy of an Illinois state fusion center report describing the incident. "This is a big deal," said Weiss. The report stated it is unknown how many other systems might be affected.
Beibei Yang

91.113.207 Exploring the Internet, Spring 2011 - 0 views

  •  
    Class Website of 91.113.207 Exploring the Internet, Spring 2011, by Beibei Yang
P Krolak

Facebook sorry over tags launch - 0 views

  •  
    Facebook has apologised for the way it rolled-out a new system that recognises users' faces. The social network said that it should have done more to notify members about the global launch. Its Tag Suggestions feature scans photos and automatically picks out existing friends.
P Krolak

BBC NEWS | UK | New face scanners at airport - 0 views

  •  
    Ideas for 91 113 apps
P Krolak

Online photos can expose identity - 0 views

  •  
    Face recognition technology can be used to gain access to a person's private data, according to a new study. Researchers at Carnegie Mellon University combined image scanning, cloud computing and public profiles from social network sites to identify individuals in the offline world. Data captured even included a user's social security number.
P Krolak

Google hacking exposes large caches of personal data - 0 views

  •  
    Google hacking, which has been on the rise this summer, is a bit of a misnomer. Also known as Google dorking, Google hacking refers to cybercriminals' enterprising use of Google's advanced search functions to find caches of valuable data ripe for the taking.
1 - 20 of 26 Next ›
Showing 20 items per page