Skip to main content

Home/ Fabroa ICS2O/ Group items tagged breach

Rss Feed Group items tagged

Joshua Soosaithasan

Facebook's Never Had A Big User Data Breach, But May Never Recover When It Does | TechC... - 0 views

  •  
    This article talks about the problems Facebook could have if it were to be breached by a hacker. Facebook is one of the biggest social networking websites to date and is the biggest holder of personal information, and yet they have been able to keep this information safe from hackers. Comparing to Twitter who had 250,000 accounts accessed by hackers, Facebook has done a remarkable job to keep our information safe, and although they have been able to do so for now, eventually they will have to face the problems of hackers. When you look at Facebook over other social networking sites like Twitter and Tumblr, there is a big difference when it comes to privacy and security. Twitter, for instance, is a more public social networking site with the odd soul that locks their account from the public. Facebook has privacy by default, which means Facebook has a lot more to lose if they were to get hacked. The physical damage that would pertain to us would include some of our photos and messages might be stolen, and the worst that could happen would pertain to credit card information, but Facebook would jump on and respond to these problems with password changes and other stuff. The real damage that would hit Facebook hard would be the psychological damage, and it would nearly destroy them. When something big happens in our society, the media jumps on this and will twist the truth in the story to give us, the viewers, the best story that will manipulate us into thinking an entire wrong. Facebook would be all over the media, whether it be on the radio, on the internet, on the news or in newsprint. The world would know about what happened, and fear would sweep across the globe.  People would start asking questions about what is safe on Facebook and if it is safe at all. Facebook already has a problem with people not being sure if everything is safe on Facebook, and this would just ruin everything for Facebook. No matter how much Facebook tries to keep its network safe, i
  •  
    TL;DR
  •  
    TL;DR
Lynn Bui

Exclusive: Apple, Macs hit by hackers who targeted Facebook | Reuters - 0 views

  •  
    This article is about how Apple was hacked on Tuesday February the 19th, 2013. Basically, unknown hackers infected some Apple workers computers when they visited a website for software developers This website had been infected with malicious software that was designed to target Mac computers. Some people are saying that the malware could have originated from China, but there is no proof. Some of the malware was distributed through a site aimed at iPhone developers. It might still be infecting visitors who haven't disabled Java in their browser. F-Secure a security firm wrote that the hackers might have been trying to get access to codes for apps on smartphones which would allow them to infect millions of app users. Hackers recently found out a sophisticated way to attack Macs by exploiting a flaw in Adobe Systems Inc's Flash software. What I find very interesting is that the breaches described by Apple mark the highest-profile cyber-attacks to date on businesses running Mac computers. This shows that we should make an effort to protect our information especially since one of the largest technology companies has been breached. With cyber security attacks on the rise, we should all be aware and careful of the sites that we are visiting. Apple workers simply visited a website for software developers and became infected with the virus. The hackers are breaking many laws by hacking Apple, Apple intents to find the hackers with the help of the police.
Boris Smirnov

Evernote Hack Exposes User Data, Forces Extensive Password Resets | Threat Level | Wire... - 0 views

  •  
    Previously, Twitter, Apple, and Facebook have been on the list of tech companies hacked within the last couple of weeks. As of March 2nd, 2013, Evernote also joins this list when their network is breached by an attempt to access secure areas of the Evernote Service. Evernote has notified users via  e-mail, blogs, and social media to change passwords so that users personal information can remain safe on the Evernote network. The hackers had successfully accessed usernames, e-mail adresses and encrypted passwords, however, they were stopped before any damage could be done. This relates to the "Privacy & Security" category because users data and personal information is being accessed without authorization. Obviously, this can cause many problems for users especially because their work and information can be stolen or deleted. Evernote encourages creating a strong password to ensure that an account remains secure, however, this is a questionable matter because the website should also consider upgrading their system in order to keep users safe. As part of the eLifestyle, many users rely on cloud storage to store information, especially on Evernote. The recent hacking just proves how reliable cloud storage really is. When saving data, it is important to consider the possibility of it being stolen or deleted. With this in mind, one shouldn't depend on cloud storage for saving all of their work or important material as it hasn't proven to be very reliable. And if you are using cloud storage, it would be smart to backup important files on a USB or Computer.
James Harris

iPhone App Contains Secret Game Boy Advance Emulator, Get It Before It's Gone [Update: ... - 0 views

  •  
    Early in the afternoon today, a clever developer managed to sneak a Game Boy Advance emulator into an innocent looking app named "Awesome Baby Names". The secret emulator is activated by a series of taps on the touchscreen inside of the app. Once it is activated you can play your classic gba games just like you did in 2005. Apple was quick to catch this security breach as it was only in the App Store for twenty something minutes, but in that time many people including myself managed to download the app. This kind of sneaky activity from developers happens very seldom, but when something is smuggled into the App Store, it is usually very important. As stated in the article, it is a very easy process to unlock the emulator from the app, but getting the games and the BIOS onto the iPhone is the hard part. You must first download a program that lets you access the phone's file directory, then you must find the app's directory and drop the relevant BIOS and game files there. I chose the portable computing tag for this article because it deals with mobile technology and exploiting it to run handheld gaming software. This idea is not knew and has been around for a long time, but the idea of hiding the identity of apps and smuggling them into the App Store is a new idea. Apple is updating their security daily, but clearly couldn't spot this "child naming app" and make it out for the emulator that it was. I chose the privacy and security tag because Apple has a high priority for the security of their ecosystem and operating system, but clever people can still find ways to bypass this and get unidentified files into the operating system. I believe that Apple must keep a close eye on how they approve future apps into the app store because one day we may see cydia disguised as a senseless app make its way into the app store. If this happens, Apple with really have some explaining to do!    
Lynn Bui

Man arrested over bizarre hacking campaign involving cat - 0 views

  •  
    This article is about a man in Tokyo who sent many mass killing threats to a comic book event and many schools. Each threat would be followed by a riddle. The man hacked computers and sent messages to newspapers and broadcasters saying that details of a computer virus used to send the threats were strapped to a cat living on an island near Tokyo. Police found the cat and with it found a message that said that no more messages will be sent. Police analyzed the memory card and footage taken by security cameras and suspect that Katayama -a resident of Tokyo- was responsible for the hacking campaign. This article is a prime example of the dangers of computing and shows that the security of our computers is still not perfect and can be breached. I see this man's act as a childish call for attention and believe that this man should grow up and "get a life" as some would say. I don't understand how a grown man could have the heart to threaten the lives of many innocent children; I hope that there is retribution for such an offense.
Ryan D'Cruz

You Can't Delete Your Way Out Of Social Media - 0 views

  •  
    The main idea of this article is that a great amount of social networking websites can view everything on your account, deleted or not. This is a major breach of privacy because when a user hits 'Delete' they expect it to erase it entirely. This is not entirely true. This also applies to private chat conversations. As a major breach of privacy, this information is easily available no matter how hard you tried to get rid of it. This is an important article because it applies to everyone, including employees. This means that your employer can view any unsavory pictures or posts that you have posted. But is this a bad thing? This technology can be used to catch any criminal activity. Does this mean you should stop using private conversations? No, this means that if you are dealing with anything of a sensitive nature, use a phone.
  •  
    Good Luck
Roman Mitjaev

Some Guy Bought the Data of 1.1 Million Facebook Users for Just 5 Bucks - 0 views

  •  
    Bogomil Shopov, a Bulgarian blogger and digital rights activist, bought 1.1 million Facebook names, user IDs and e-mails for the ridiculously low price of 5 dollars. Luckly for us, he was not trying to spam people, or use this info in a negative way. Instead he wanted to see how bad the facebook security really is. And it turns out to be really bad. According to the seller of the information, a Gigbucks user with the handle "mertem," the data was collected from Facebook applications."The information in this list has been collected through our Facebook apps and consists only of active Facebook users, mostly from the US, Canada, UK and Europe," reads the Gigbucks post. This can affect us a lot because there are a lot of teenager (our age) facebook users. If instead of person who was trying to prove a point was a spammer, the information that we have on facebook can be in danger.  Facebook is currently looking into the breach of user data but they haven't yet come to a resolution.
Alexandra Fank

Did Target Ignore Security Warning? - GovInfoSecurity - 0 views

  •  
    On March 13 Target experienced a massive breach that compromised 40 million credit and debit cards as well as personal information about approximately 70 million customers. There has arrose allegations of the Target security team dismissing the warnings as nothing and allowing it to happen. Although Target has come back saying that like any large company there are many technical events that come to the attention of the team. The team noticed the criminal had entered their system but the situation was evaluated and acted upon although at Target they are investigating whether if different judgements had been made there would have been a different outcome and the entire situation would have been avoided.
robford-jlm

Privacy report finds NSA spying illegal | MSNBC - 0 views

  •  
    By now, everyone who is the slightest bit technologically inclined - or just interested in the news - has heard of the 'questionable' activities of the NSA. The National Security Agency, for the uninitiated, is a United States government agency that deals with national security and recently became the object of scrutiny after leaked information showed the massive data collection effort of the agency. This included: recording phone calls, ingoing and outgoing call identities, computer browsing, emails, key-logging and much much more. Needless to say, this was perceived as a tad scandalous and independent panels were brought in to assess the agencies spying program. Recently, the Privacy and Civil Liberties Oversight Board concluded that the metadata collected by the NSA was obtained through illegal means. Before you cheer, however, this sort of conclusion has been reached before and has only resulted in a promise to limit spying. This is bad because its merely a promise; a promise from a government who lied repeatedly, committed perjury, knowingly covered its tracks, and chased a citizen away with the threat of life in prison. Unfortunately, many people have since stopped caring because its no longer new news, but we need to stand up for our right to privacy and demand legal action to prevent such breaches of trust in the future.
Marquise Swaby

Hackers attempt to access AT&T customer records, prompts millions to Rethink Passwords - 1 views

  •  
    A bunch of hackers got close to busting down AT&T's virtual equivalent. The hackers were hard at work, trying to access account information. The carrier discovered the attack and shut it down before they could breach.
1 - 12 of 12
Showing 20 items per page