Skip to main content

Home/ 91.113 Exploring the Internet/ Group items tagged data

Rss Feed Group items tagged

P Krolak

Google hacking exposes large caches of personal data - 0 views

  •  
    Google hacking, which has been on the rise this summer, is a bit of a misnomer. Also known as Google dorking, Google hacking refers to cybercriminals' enterprising use of Google's advanced search functions to find caches of valuable data ripe for the taking.
P Krolak

Online photos can expose identity - 0 views

  •  
    Face recognition technology can be used to gain access to a person's private data, according to a new study. Researchers at Carnegie Mellon University combined image scanning, cloud computing and public profiles from social network sites to identify individuals in the offline world. Data captured even included a user's social security number.
P Krolak

Exploring The Internet: 91- 113 Week 3 The Electronic Library and Advanced Searching th... - 1 views

  •  
    Week3  Using the Electronic Library and Finding Information on the Web The First Step, Readings: Read the 3rd Week of 91-113 Using the Electronic Library Searching for Material on the Web Hacking Google Searchs The Second Step Advanced Google Hacking Readings: The concept of Google hacking is to use Google's advanced search tools and data to find data in the "deep web".
P Krolak

Social Media and Law Enforcement: Who Gets What Data and When? - 0 views

  •  
    We have been investigating how the government seeks information from social networking sites such as Twitter and how the sites respond to these requests in our ongoing social networking Freedom of Information Act (FOIA) request, filed with the help of UC Berkeley's Samuelson Law, Technology & Public Policy Clinic. As part of our request to the Department of Justice and other federal agencies, we asked for copies of the guides the sites themselves send out to law enforcement explaining how agents can obtain information about a site's users and what kinds of information are available. The information we got back enabled us to make an unprecedented comparison of these critical documents, as most of the information was not available publicly before now.
P Krolak

Facebook U-turns on data sharing - 0 views

  •  
    Facebook appears to have U-turned on plans to allow external websites to see users' addresses and mobile phone numbers. Security experts pointed out that such a system would be ripe for exploitation from rogue app developers. The feature has been put on "temporary hold", the social networking firm said in its developers blog.
P Krolak

What is the future of the Internet - 0 views

  •  
    What is the future of the Internet? Where will the bandwidth be in 5 -10 years be and how will it effect the convergence of mobile devices? What apps will it allow not possible at today's communication networks? With the advent of cloud computing and storage capability rapidly expanding what information and or data bases become possible.
P Krolak

Transparency Report - 0 views

  •  
    Like other technology and communications companies, Google regularly receives requests from government agencies and federal courts around the world to remove content from our services and hand over user data. Our Government Requests tool discloses the number of requests we receive from each government in six-month periods with certain limitations.
P Krolak

Google releases tool to show government censorship requests - 0 views

  •  
    Google has hit out at state attempts to clamp down on the internet by revealing governments' requests to remove data from the web and get information about users. Tonight it released a web page with a map showing country by country where it has had government requests or court orders to remove content from the YouTube video service or its search results, or to provide details about users of its services.
P Krolak

When Gadgets Betray Us by Robert Vamosi - 0 views

  •  
    When Gadgets Betray Us gives us a glimpse into the secret lives of our gadgets and helps us to better understand-and manage-these very real risks. Technology is evolving faster than we are. As our mobile phones, mp3 players, cars, and digital cameras become more and more complex, we understand less and less about how they actually work and what personal details these gadgets might reveal about us. Robert Vamosi, an award-winning journalist and analyst who has been covering digital security issues for more than a decade, shows us the dark side of all that digital capability and convenience. Hotel-room TV remotes can be used to steal our account information and spy on what we've been watching, toll-booth transponders receive unencrypted EZ Pass or FasTrak info that can be stolen and cloned, and our cars monitor and store data about our driving habits that can be used in court against us.
1 - 10 of 10
Showing 20 items per page