Skip to main content

Home/ Fabroa ICS2O/ Group items tagged Security

Rss Feed Group items tagged

Jason Strassler

6 Tips for Better Mobile Security - eSecurity Planet - 0 views

  •  
    I learned from this article how to secure your information on your mobile device using 6 simple tips. Setting a solid password, installing antivirus or security apps, and using encryption, a hardware security system, are just a few various methods of how to help and improve the security on the everyday use of your phone. Mobile security is important especially if you have a lot of important and valuable data and information, such as passwords or your email is accessible, you want to know that this information is stored and saved safely on your mobile device for no one but yourself to be able to use. With technology evolving and more and more people are being familiar and learning about hacking and breaking into systems, it is more important and necessary than ever in our society for everyone to have their information secured. Taking your mobile device's security seriously and keeping it at high maintenance is crucial so nobody can hack or see what information is important to you but also so that you aren't giving people the opportunity to rearrange or change this data that you trust that you are the only person to see and alter your personal data at your leisure. 
Nicole Trezzi

Heartbleed: Why the Internet's Gaping Security Hole Is So Scary - 0 views

  •  
    For the longest time we have all felt very safe while on the internet. Even with feeling this security, we should be more cautious with what we put out on the internet because there has been a bug lurking around in the most important security measures for years. Transport Layer Security (TLS) and Secure Sockets Layer (SSL) has been keeping your browing page secure and safe for numerous years and is a huge part of the internet and thankfully it is still working as it should. The problem that we have been experiencing is a software library called OpenSSL has a hole in it that has been there for years called "HeartBleed". OpenSSL allows people to get the protection from TLS/SSL easy and fast and has worked fine just like TLS/SSL but because there has been a minor coding error, malicious people can abuse different versions of OpenSSL and grab information that should originally be secured by TLS/SSL. The main problem that everyone can understand is that all of your personal information is being opened up and placed into the hands of someone who should not have the information. The other problem that this "HeartBleed" has is that the attackers will also get to see how the site that is taking your data indentifies. Not only can they see recent transactions but they can look back at old transactions that have already happened. The worst part about all of this is that none of the attackers leave a trace.Since they leave no trace, it is hard to tell how many websites and people have already been effected by the "HeartBleed". While sites try to fix up the problems it is recommended to change all of your passwords and to keep a close eye on your credit card statement. This bug is a huge problem for our society because absolutely no one is safe because there is no way to know if you've been attacked. The article says that Google, Amazon, and Microsoft hasn't been infected yet so that is at least good. I think that everyone should always be careful with their personal information
Walter White

IBM's new services zero in on fraud, financial crime | Business Tech - CNET News - 0 views

  •  
    The article that I have chosen to share for week 4 is about IBM and their new services to help eliminate fraud and financial crime. The article interested be because around 3.5 trillion dollars are lost per year to financial crime and fraud through technology. While the software is being marketed to big companies it also directly involves us, the consumers. For example when Sony's PSN was down thousands of peoples accounts were hacked and had money taken from their accounts. This new software interested me because now people can feel a little more secure using online programs knowing that their information can be safer. It is a new time where many things are bought through the internet and with better security people won't feel as worried about their security
  •  
    The article that I have chosen to share for week 4 is about IBM and their new services to help eliminate fraud and financial crime. The article interested be because around 3.5 trillion dollars are lost per year to financial crime and fraud through technology. While the software is being marketed to big companies it also directly involves us, the consumers. For example when Sony's PSN was down thousands of peoples accounts were hacked and had money taken from their accounts. This new software interested me because now people can feel a little more secure using online programs knowing that their information can be safer. It is a new time where many things are bought through the internet and with better security people won't feel as worried about their security
Anthony Mirabile

Universal Video Chat? Polycom Is Getting Close - 0 views

  •  
    For a service that had such an artificially high demand, the tech industry has not really capitalized on Video Chat. When Apple unveiled their video chat service 'FaceTime' in June of 2010, many thought that this would become the primary standardized service used by all. In practice, FaceTime is a clunky system that is evidently less productive and convenient than just vocal or text communication. So why hasn't video conferencing taken off as the industry had hoped? The answer is most likely because there is no standardized system and the market is too saturated; Polycom Inc. hopes to adress this issue by introducing a Universal Video Chat in early 2013. The product (called RealPresence CloudAxis) monetizes all of your contacts from Skype, Facebook, Google Talk and other apps into one place - all hosted on a web browser. This is a very ambitious task and if it delivers on what Polycom says (with the "same security and reliability as enterprise systems"), then there may be some validity to the video conference service. This relates to Privacy and Security because when monetizing a group of services, there is a chance for data leak and possible identity theft; Polycom promises to adress all security issues in order to make a safe and immersive experience for its users. This relates to eLifestyle because companies and their consumers have been trying for the past years to create a universal video chat service that actually worked in order to establish a multi-faceted social network: it might be too early to tell if Polycom has something that will fulfill the needs of consumers. This relates to ICS20 because as a class, we are no stranger to multiple accounts that often times serve the same purpose. As consumers, we hope for a streamlined service that can connect all of our multiple accounts into one place, preferably on a browser. It will be hard for Polycom, both legally and economically, to convince all of these pre-existing video chat developers to allow Polycom to
James Harris

iPhone App Contains Secret Game Boy Advance Emulator, Get It Before It's Gone [Update: ... - 0 views

  •  
    Early in the afternoon today, a clever developer managed to sneak a Game Boy Advance emulator into an innocent looking app named "Awesome Baby Names". The secret emulator is activated by a series of taps on the touchscreen inside of the app. Once it is activated you can play your classic gba games just like you did in 2005. Apple was quick to catch this security breach as it was only in the App Store for twenty something minutes, but in that time many people including myself managed to download the app. This kind of sneaky activity from developers happens very seldom, but when something is smuggled into the App Store, it is usually very important. As stated in the article, it is a very easy process to unlock the emulator from the app, but getting the games and the BIOS onto the iPhone is the hard part. You must first download a program that lets you access the phone's file directory, then you must find the app's directory and drop the relevant BIOS and game files there. I chose the portable computing tag for this article because it deals with mobile technology and exploiting it to run handheld gaming software. This idea is not knew and has been around for a long time, but the idea of hiding the identity of apps and smuggling them into the App Store is a new idea. Apple is updating their security daily, but clearly couldn't spot this "child naming app" and make it out for the emulator that it was. I chose the privacy and security tag because Apple has a high priority for the security of their ecosystem and operating system, but clever people can still find ways to bypass this and get unidentified files into the operating system. I believe that Apple must keep a close eye on how they approve future apps into the app store because one day we may see cydia disguised as a senseless app make its way into the app store. If this happens, Apple with really have some explaining to do!    
ecaterina smirnov

South Carolina - State Computer System Is Hacked - NYTimes.com - 0 views

  •  
    This article is about South Carolina which had a hacker break into the state's computer system. It was said that a hacker from another country staged several attacks on the State Department of Revenue since August. This exposed 3.6 million social security numbers and 387,000 credit and debit card numbers and all but 16,000 of the credit card numbers are protected by encryption, but hackers can decrypt them. People that filed tax returns since 1998 are to contact state law enforcement officials to prevent identity theft. They still haven't found the hacker. This article relates to Privacy and Security as well as legal issues because it deals with hacking important information profiles of people such as their credit card numbers and social security numbers. As well as creating a possibility for identity theft.  This could create lots of problems for people and the government because of a hacker. It is times like these where we think how we can tighten security for these things stored on the computer? We also think is it just best to stay away from technology for these matters, because of moments like these where mass information that was stored is now exposed.
Dragos Penelea

How to Crack a Wi-Fi Network's WPA Password with Reaver - 1 views

  •  
    This post is on cracking Wi-Fi WPA passwords with "Reaver." Many people know that cracking a WEP password is fairly easy, so they use the more bulletproof WPA security protocol. Reaver is a program that exploits a security hole in wireless routers and can crack most routers' passwords with relative ease. First off, you will need the BackTrack 5 Live DVD. Download the Live DVD from BackTrack's download page and burn it to a DVD. Next, you need a computer with Wi-Fi and a DVD drive. Lastly, you need a nearby WPA-secured Wi-Fi Network. Using four steps you can hack into a WPA Wi-Fi Network. Step 1: Boot into BackTrack, Step 2: Install Reaver, Step 3: Gather the Router's information, and Step 4: Crack the WPA password to the Wi-Fi Network. Now I will explain how you can protect against Reaver attacks. Since the vulnerability lies in the implementation of WPS, your network should be safe if you can simply turn off WPS (or, even better, if your router doesn't support it in the first place), however Reaver may still be able to crack your password, even with WPS manually turned off. You could also set up MAC address filtering on your router (which only allows specifically whitelisted devices to connect to your network), but a sufficiently savvy hacker could detect the MAC address of a whitelisted device and use MAC address spoofing to imitate that computer. The good news is that there is a way to surely protect against Reaver. You can get the open-source router firmware DD-WRT installed on your router. Reaver has been tested on routers with this firmware and it was not able to crack the password. As it turns out, DD-WRT does not support WPS, so there's yet another reason to love the free router-booster.
ecaterina smirnov

A Facebook App That Aims to Keep Private Photos Private - NYTimes.com - 0 views

  •  
    This post is about a new app made by McAfee which is meant to be an extra security for people's photos on Facebook. We know that even if we put our privacy settings on "only friends" there are ways through comments, likes and mutual friends that people you do not know can come across your pictures and download, print or upload them on a different site. This app helps protect by asking users to list who will get to view their photos. Only those people on the list will get to see the photo no matter who is friends with who, or who likes or comments on it. People not on the exact list will only see the photo blurry and barely visible. In addition to that nobody will be able to grab, print or download the photos even if they are on the list of people who can see the photos. This app is only in its development or "beta" phase, but it is already free to download and use on Internet Explorer and Firefox. The company is still working on versions for Chrome and mobile devices. Before concluding they did mention that there are still ways to photograph the photo with your phone, if you have a clear picture. I believe this app is a big step to having online security. This app can help stop the spread of your photos before it starts. People may not think about their internet security very often but it is important to know that once it's on the internet it's on there forever. With internet popularity growing and growing we must also know the dangers of posting photos and protect ourselves. Facebook allows so much public information to be revealed this app can ensure you have a more private account. In my opinion this is a great app and considering that it is free while it is being developed I think people should try it out. Although it's only available on Firefox and Internet Explorer it is already a leap in the right direction. However, as it was mentioned earlier you can still have people take photos from their phones. Nevertheless, if you chose the correct people on your list
Nikita Varabei

Are Your Future Passwords Hidden In the Jiggling of Your Eyeballs? - 0 views

  •  
    This article describes how scientists are working to create new top off the line security. As we've seen in many sci-fi movies ; there is such a thing as eye scanners. they have existed for sometime now, but they have been primitive and worked just by using the iris of your eye. This could be faked easily by someone just taking a picture of your eye and simply holding it to the screen. This new technology however is a lot more sophisticated. It uses your eyes "fixations" and "saccades" to determine if it is really you. Fixations is how your eye behaves when it is still and saccades is how your eye behaves when it is moving from point to point. This new technology is a breakthrough in security, as it is virtually impossible to fake. no more stolen passwords, or hacked systems. Now unless its really you, the system wont let the person in. THis is extremely important as it prevents theft, hacking, and many other problems. To conclude, this technology is extremely important to our security and will greatly contribute to our future
Daniel Le

The 12 Online Scams of Christmas [INFOGRAPHIC] - 0 views

  •  
    With Christmas slowly approaching, many of us will be shopping for presents online. For scammers, this means there will be more unsuspecting victims to scam. McAfee knows the risk of being scammed is present and has set up a list of 12 scams seen during the holiday season. These include fake charities, malicious mobile apps, too-good-to-be-true offers, and fake gift cards. As online shopping gets more popular, the threat from scammers increases as well so we have to know how to protect ourselves and keep our information secure. While shopping online is more convenient and cheaper in some cases, it isn't as secure as shopping in person at a store. Despite the lesser security in shopping online, people still would prefer it because of its convenience. I think it is good that McAfee released this list of scams to look out for because it will make sure more consumers during the Christmas season and everyday will have knowledge of what to look out for when shopping online. Though I doubt many people will see the list, McAfee has possibly saved many people from having to deal with being scammed, besides even if you can't help everyone you should help anyway.
Boris Smirnov

Evernote Hack Exposes User Data, Forces Extensive Password Resets | Threat Level | Wire... - 0 views

  •  
    Previously, Twitter, Apple, and Facebook have been on the list of tech companies hacked within the last couple of weeks. As of March 2nd, 2013, Evernote also joins this list when their network is breached by an attempt to access secure areas of the Evernote Service. Evernote has notified users via  e-mail, blogs, and social media to change passwords so that users personal information can remain safe on the Evernote network. The hackers had successfully accessed usernames, e-mail adresses and encrypted passwords, however, they were stopped before any damage could be done. This relates to the "Privacy & Security" category because users data and personal information is being accessed without authorization. Obviously, this can cause many problems for users especially because their work and information can be stolen or deleted. Evernote encourages creating a strong password to ensure that an account remains secure, however, this is a questionable matter because the website should also consider upgrading their system in order to keep users safe. As part of the eLifestyle, many users rely on cloud storage to store information, especially on Evernote. The recent hacking just proves how reliable cloud storage really is. When saving data, it is important to consider the possibility of it being stolen or deleted. With this in mind, one shouldn't depend on cloud storage for saving all of their work or important material as it hasn't proven to be very reliable. And if you are using cloud storage, it would be smart to backup important files on a USB or Computer.
anthony garisto

Cyberwar Imperative: We Need A Next-Generation Internet - ReadWrite - 0 views

  •  
    With people becoming more tech savvy, the security and firewalls of major websites and servers are becoming just obstacles to hackers looking for valuable information these websites contain.  Michael Tchong suggests that we need a new internet, one built from the ground up. He says that China is far more advanced with technology and internet security than that of the United States and Canada. Some suggestions that Michael Tchong has made for this new internet is making the internet so secure that to hack it, you will need to be a genius with alot of time on your hands. He proposes that there should be a next-generation eye-recognition technology using a computer or mobile camera. This will help sites like Facebook and LinkedIn in their endless battle against identity fraud. Also he thinks that it should only be accessed by Americans for obvious reasons that the Chinese and other known hacking countries would try and destroy the new internet.  
jrdotimas

Weekend App: viaProtect will give you some strong hints about your iPhone's security st... - 0 views

  •  
    This app viaProtect is an app for your iphone that monitors where your data is going and where its coming from. This app makes sure that your data for your phone is secure and you are aware of it. When you use this app, it will analyse your phone and will provide a risk score. this app will not solve all your security problems with your iphone, but it will increase your awareness about where your data is going. I would be interested in using this app but it is only available for iphone. i think that this app is very useful, so you know that your data maybe going somewhere else or coming from somewhere else.
Lynn Bui

Exclusive: Apple, Macs hit by hackers who targeted Facebook | Reuters - 0 views

  •  
    This article is about how Apple was hacked on Tuesday February the 19th, 2013. Basically, unknown hackers infected some Apple workers computers when they visited a website for software developers This website had been infected with malicious software that was designed to target Mac computers. Some people are saying that the malware could have originated from China, but there is no proof. Some of the malware was distributed through a site aimed at iPhone developers. It might still be infecting visitors who haven't disabled Java in their browser. F-Secure a security firm wrote that the hackers might have been trying to get access to codes for apps on smartphones which would allow them to infect millions of app users. Hackers recently found out a sophisticated way to attack Macs by exploiting a flaw in Adobe Systems Inc's Flash software. What I find very interesting is that the breaches described by Apple mark the highest-profile cyber-attacks to date on businesses running Mac computers. This shows that we should make an effort to protect our information especially since one of the largest technology companies has been breached. With cyber security attacks on the rise, we should all be aware and careful of the sites that we are visiting. Apple workers simply visited a website for software developers and became infected with the virus. The hackers are breaking many laws by hacking Apple, Apple intents to find the hackers with the help of the police.
codrin gherghel

Look at this SCAM EMAILL!!!!!!! - 0 views

  •  
    Dear, Good day to you and your family today. I am sure this mail would be coming to you as a surprise since we have never met before and you would also be asking why I have decided to chose you amongst the numerous internet users in the world, precisely I cannot say why I have chosen you but do not be worried for I come in peace and something very positive is about to happen to your life right now and to the lives of others through you if only you can carefully read and digest the message below. The internet has made the world global villages where you can reach anybody you have not met before. Before I move further, permit me to give you a little of my biography, I am Mother Mrs. Maria Scoular Norman, 87 Years old woman and the wife of Late Sir Milne Robert who died in a Plane crash on Monday the 7th of September 1998 GMT 14:22 UK while they were flying from New York to Geneva. Please see site below for more information. http://www.cnn.com/WORLD/9809/swissair.victims.list/index.html After the death of my husband I became the Head of his investment and now that I am old and weak I have decided to spend the rest of my life with my family and loved ones whom I never had time for during the course of my business life, but before the death of my husband we had a plan to use the last days of our lives to donate half of what we have worked for to the less privilege and charity homes and the other half for ourselves, family members and close friends, and it is so unfortunate that my husband is not alive today to do this with me and I am very weak and old now, hence I have decided to do this philanthropic work on behalf of my late husband and I. Presently, I have willed out almost half of our assets to several charity homes and to some of the less privilege in different countries. Despite the agreement between my late husband and I to give aid to the deprived, we also agreed to render support to an individual we have not meet before in life due to the fact when
  •  
    continuation........ we were still young in life we receive an anonymous help from an individual we did not know and which we have not being able to know till date, the impact we got from such gesture made us to do same. I am sorry to inform you that you will never have the chance to know me because I have just concluded the assignment which my husband and I have agreed upon before his sudden death and you happened to be the beneficiary of our last WILL, irrespective of your previous financial status, hence I need you to do me a favor by accepting our offer that will cost you nothing. I have presently deposited a Cheque in the sum of 5,800,000.00 British Pound with DHL Express to deliver to you, what you have to do now is to contact the My Attorney as soon as possible so that he can go the delivery company to know when they will deliver your package to you because of the expiring date. For your information, I have paid for the delivering Charge, Insurance Premium and Clearance Certificate Fee of the Cheque showing that it is not a Drug Money or meant to sponsor Terrorist attack in your Country. You have to contact the DHL COURIER SERVICE now for the delivery of your cheque with this information bellow; Contact Person: Mr. Ronald Gates Email: dhlparcelsdelivery@gmail.com Tel: +44 703 199 2133 Again, you are not to pay for the delivering Charge, the Insurance premium and the Clearance Certificate Fee of the Cheque because I have already paid for them, the only money you are expected to pay is 160 Great British Pounds for the security keeping of the cheque so far. I would have paid the fee but the company insisted that I should not because they don't know when you will be contacting them and to avoid demurrage or further cost. You are to reconfirm the below information to them to avoid any mistake on the Delivery. Postal address; Full Names: Direct telephone number; Below is the security keeping code: (FED/0433/SKC) of you draft, you are to also pr
Alexandra Fank

Did Target Ignore Security Warning? - GovInfoSecurity - 0 views

  •  
    On March 13 Target experienced a massive breach that compromised 40 million credit and debit cards as well as personal information about approximately 70 million customers. There has arrose allegations of the Target security team dismissing the warnings as nothing and allowing it to happen. Although Target has come back saying that like any large company there are many technical events that come to the attention of the team. The team noticed the criminal had entered their system but the situation was evaluated and acted upon although at Target they are investigating whether if different judgements had been made there would have been a different outcome and the entire situation would have been avoided.
saintmichaeld

As Facial Regulation Technology is Poised to Enter Everyday Life, Regulators Express Co... - 0 views

  •  
    Computers are starting to recognize our faces. what does this mean? Let's find out. New and upcoming facial recognition technology like google glass will heavily integrate the face. it will be able to link someone's face out in the public, to an image of them on the web. In the future we would need to reformat exisiting legislation on privacy. Right now, by law, this potential action is not prohibited. This topic is already being discussed by people in positions of power who see the negative consequences to come. While people focus on the negatives, the positives don't get any real limelight! most of these include much quicker operating procedures for business, who can recognize potential customers. Security also becomes more efficient, which is a good thing when talking about the protection of people and business. It also seriously inflicts on an individuals right to privacy, though... for security in protecting people I believe this should be a mandatory, though. This might be something people will have to endure, whether they like it or not. But, it is better to embrace the future rather than reject it, so here's to computer tracking devices! One thing to point out is the younger generation will not be influenced by this at all. If we don't start to connect with newer technologies early, we'll end up like our grandparents!
grajnam0540

New Infrared Tech Will Let Firemen See Through Flames - 0 views

  •  
    This article is about a new infrared technology that will let firemen see through flames. This was a new study in Italy and researchers have created a system that cuts through smoke with infrared lasers. The lasers bounce off of anything such as people and go back through an imager to show the firefighters a 3D view of everything around them. The current infrared camera monitors that firefighters use can easily be blinded by thick smoke and flames because they have a lens that must zoom in on light. The new system will let firefighters see them in holograph form. This product still has to be refined but once it is it can help save many lives. This is an example of security because many more people will be more secure and safe when this product comes out.
Cindy Huang

How Secure Is the Passcode on My Phone? - 0 views

  •  
    Recently, there have been a lot of passcode exploits, especially on the iPhone and Samsun Galaxy. On the iPhone, it can allow the attacker to access their way into the Phone app, letting them place calls, see/edit contacts, and access photos via the "assign new picture" option. On the Samsung Galaxy, the attacker can flash whatever was open before the phone was locked for a second. This is enough time to launch an app, which can be repeatedly downloaded and completely unlock your phone. The article suggests the user of the phone should download the Apple's Find my iPhone app or Prey, which can track the location of your smartphone if it is ever lost or stolen. This, they say is the best protection for your personal information stored on your phone. These passcode exploits can let one worry and doubt how much protection the lock screen actually provides. The truth is they are no more secure than any other password or PIN, which means they can eventually be cracked. However, it is still suggested to always lock your screen, just in case it is robbed by someone who does not know anything about getting around locked screens. Many companies are aware of the issues and is releasing new techniques, like the iOS 6.1.3. Hopefully, with time, these password problems will not be an issue anymore.
grajnam0540

Black Hornet: The $195,000 Spy Plane That Fits in the Palm of Your Hand - 0 views

  •  
    This article is about a new spy plane that costs $195,000 and fits in the palm of your hand. Now the British soldiers will be a bit safer thanks to this little plane and it flies nearly silently. Prox Dynamics of Norway designed this little plane and it is only 4 inches long and 1 inch tall. This plane can provide videos to the soldiers hand from up to 1000 meters away. It has been used in Afghanistan since August of 2012 and has impressed so far. It is also very hard so see or hear. This article relates to the selected tag because it impacts the lives of both the locals and the military. It affects the locals because they do not have much privacy and security anymore due to this new spy plane. This is unethical and illegal because people want their privacy and if people are spying on them daily they are not secure. Even though it is unethical to do this I think that it would be much safer for most people to use this new plane. The only thing I do not understand is why the plane costs so much and if they will be able to reduce the price.  
1 - 20 of 137 Next › Last »
Showing 20 items per page