Skip to main content

Home/ Fabroa ICS2O/ Group items tagged privacy

Rss Feed Group items tagged

ecaterina smirnov

A Facebook App That Aims to Keep Private Photos Private - NYTimes.com - 0 views

  •  
    This post is about a new app made by McAfee which is meant to be an extra security for people's photos on Facebook. We know that even if we put our privacy settings on "only friends" there are ways through comments, likes and mutual friends that people you do not know can come across your pictures and download, print or upload them on a different site. This app helps protect by asking users to list who will get to view their photos. Only those people on the list will get to see the photo no matter who is friends with who, or who likes or comments on it. People not on the exact list will only see the photo blurry and barely visible. In addition to that nobody will be able to grab, print or download the photos even if they are on the list of people who can see the photos. This app is only in its development or "beta" phase, but it is already free to download and use on Internet Explorer and Firefox. The company is still working on versions for Chrome and mobile devices. Before concluding they did mention that there are still ways to photograph the photo with your phone, if you have a clear picture. I believe this app is a big step to having online security. This app can help stop the spread of your photos before it starts. People may not think about their internet security very often but it is important to know that once it's on the internet it's on there forever. With internet popularity growing and growing we must also know the dangers of posting photos and protect ourselves. Facebook allows so much public information to be revealed this app can ensure you have a more private account. In my opinion this is a great app and considering that it is free while it is being developed I think people should try it out. Although it's only available on Firefox and Internet Explorer it is already a leap in the right direction. However, as it was mentioned earlier you can still have people take photos from their phones. Nevertheless, if you chose the correct people on your list
Anthony Mirabile

Where America's Racist Tweets Come From - 0 views

  •  
    *Disclaimer: Article above contains profane/vulgar language This article details the findings of the blog 'Jezebel', who compiled a series of racist, anti-Obama tweets following the U.S election, and 'Floating Sheep' who trended those tweets and imposed them over a map of the United States. Using the knowledge of geo-coded tweets and the Twitter search bar, Floating Sheep was able to trend racist anti-Obama tweets from November 1-7. They used an 'LQ' algorithm which compared a state's ratio of racist to normal tweets to the entire country's ratio of racist to normal tweets. States with an LQ score of 1 were on par with the country, while those 1 had more racist tweets on average. After trending the reassuringly low 395 tweets, the study found (unsurprisingly) that higher LQ scores came from South-Eastern states, with Alabama at 8.1 and Mississipi at 7.4. This relates to Privacy and Security because Floating Sheep used geo-coding to find out where the cruel tweets originated from. This relates to eLifestyle because the internet harbours some of the most ignorant/hateful people who make callous remarks without realizing everything that you do can be and often is tracked. This relates to ICS20 because we promote a positive online environment and we frown upon things like racism and vulgar language; the very opposite of what these people mentioned in the article are portraying. If there is a silver lining to this study, it is that in this technological era, we are able to publicize ignorance and judge/analyze those who advocate awful messages.
Joey Ma

Is Google Voice Sending Your Text Messages from Random Numbers? - 0 views

  •  
    Some people have experienced an issue with Google Voice. They have claimed that when they send SMS messages through the service, their messages are sent from random numbers. Some have received other people's personal messages and this can threaten privacy. Although many have been warned that they should never send personal text messages for security reasons, many ignore it. This issue with Google Voice can cause confusion for the people sending and receiving the texts since the sender does not have the option to send their messages to someone they know and the receiver receives a mysterious texts from a number that they cannot identify. Others might also receive multiple texts from random numbers which may irritate the person rather than confuse. Since texting is a very popular form of communication. those who use Google Voice may have to use other methods to communicate if the problem if affecting them too much and will have to wait until the issue is solved. Though this affects only a fraction of those who use Google Voice, this is bothersome. 
Boris Smirnov

Evernote Hack Exposes User Data, Forces Extensive Password Resets | Threat Level | Wire... - 0 views

  •  
    Previously, Twitter, Apple, and Facebook have been on the list of tech companies hacked within the last couple of weeks. As of March 2nd, 2013, Evernote also joins this list when their network is breached by an attempt to access secure areas of the Evernote Service. Evernote has notified users via  e-mail, blogs, and social media to change passwords so that users personal information can remain safe on the Evernote network. The hackers had successfully accessed usernames, e-mail adresses and encrypted passwords, however, they were stopped before any damage could be done. This relates to the "Privacy & Security" category because users data and personal information is being accessed without authorization. Obviously, this can cause many problems for users especially because their work and information can be stolen or deleted. Evernote encourages creating a strong password to ensure that an account remains secure, however, this is a questionable matter because the website should also consider upgrading their system in order to keep users safe. As part of the eLifestyle, many users rely on cloud storage to store information, especially on Evernote. The recent hacking just proves how reliable cloud storage really is. When saving data, it is important to consider the possibility of it being stolen or deleted. With this in mind, one shouldn't depend on cloud storage for saving all of their work or important material as it hasn't proven to be very reliable. And if you are using cloud storage, it would be smart to backup important files on a USB or Computer.
James Harris

iPhone App Contains Secret Game Boy Advance Emulator, Get It Before It's Gone [Update: ... - 0 views

  •  
    Early in the afternoon today, a clever developer managed to sneak a Game Boy Advance emulator into an innocent looking app named "Awesome Baby Names". The secret emulator is activated by a series of taps on the touchscreen inside of the app. Once it is activated you can play your classic gba games just like you did in 2005. Apple was quick to catch this security breach as it was only in the App Store for twenty something minutes, but in that time many people including myself managed to download the app. This kind of sneaky activity from developers happens very seldom, but when something is smuggled into the App Store, it is usually very important. As stated in the article, it is a very easy process to unlock the emulator from the app, but getting the games and the BIOS onto the iPhone is the hard part. You must first download a program that lets you access the phone's file directory, then you must find the app's directory and drop the relevant BIOS and game files there. I chose the portable computing tag for this article because it deals with mobile technology and exploiting it to run handheld gaming software. This idea is not knew and has been around for a long time, but the idea of hiding the identity of apps and smuggling them into the App Store is a new idea. Apple is updating their security daily, but clearly couldn't spot this "child naming app" and make it out for the emulator that it was. I chose the privacy and security tag because Apple has a high priority for the security of their ecosystem and operating system, but clever people can still find ways to bypass this and get unidentified files into the operating system. I believe that Apple must keep a close eye on how they approve future apps into the app store because one day we may see cydia disguised as a senseless app make its way into the app store. If this happens, Apple with really have some explaining to do!    
grajnam0540

You Could Control Google Glass With a Wink - 0 views

  •  
    This article is about the new Google Glass and how you now may be able to take a picture just by winking. The code for this function was dug up by Redditor Fodawim who found some variables with variations on the name EYE_GESTURE_WINK. The wink function can be turned off but if if is not than the user can take a picture just by winking. Google Glass already has a sensor on the inside but can possibly be used to watch your eye. The only other problem is that the sensor will be able to tell the difference from a blink and a wink. This new function on Google Glass will violate a lot of peoples privacy since the user can take a picture of anyone at anytime without that person even knowing.  I think that  this possible function on Google Glass is very creative.
Joshua Soosaithasan

Google Chrome Is Blocking a Bunch of Major Sites for Malware, Even YouTube - 0 views

  •  
    This article is about Google Chrome blocking major websites, such as YouTube, for having malware. This could have been a problem with Google Chrome, but this brings up something that we take for granted. We go on to websites not knowing what kind of virus' and malware could be on it. Even the biggest websites could have malware, and they could be found on the ads you find on all big websites. To prevent yourself from get malware on your computer, you could download Ad Block on Google Chrome so no ads are shown on webpages. Privacy and Security is something to be concerned about because anyone can access your computer with virus', and you want to protect not only yourself, but everyone in your household.
Daniel Dmitrievich Prilipko

I used Google Glass: the future, but with monthly updates | The Verge - 0 views

  •  
    This article talks chiefly about Google Glass, a new type of device that Google aims at putting out on the consumer market by the end of this year. First, it discusses how even though our technology satisfies all our wants and needs, we are often severely distracted by it. We are looking at everything through a screen that we hold in a way that acts as a barrier between us and the world. What Google is trying to do with Glass is make doing simple things like using GPS and replying to texts a lot more easier. With Glass, you don't have to walk around looking down on your phone oblivious to all that goes around you to find your way to the place you need to get to. Some problems with Glass are that it needs data through Wi-Fi on its own and that if it has no connection it's functionality is greatly limited. Since Glass can record video and it's almost unnoticeable, there is a privacy concern because many people may get filmed on video without them knowing. Also, because most of the interaction is through voice commands, it may become hectic to use the device if it does not understand you when you speak. Right now Google Glass may seem like a gimmick but the longer people are exposed to it the more they will understand its value and potential uses. Basically the question is not if people will use Google Glass, but when.
Maurizio Pellegrino

4 Tips to Avoid Work-From-Home Email Scams - 0 views

  •  
    This article states that you have to be careful when you are looking for a job that lets you work from home because scammers make fake websites to get valuable information from you. For example the company CNBC website has been copied to http://cnbc.com-index.in. The URL is .in and not .com that is one way to know that the website is a fraught it should be .com. People who have gone to this copied websites to apply for a job have been asked very personal questions such as are you married, bank information, and to pay a fee for a company laptop. You should be suspicious if your contact for the job has an email of @gmail.com or @hotmail.com usually companies have their specific email. To avoid this scam always Google the company and your contacts email. Always have an opened eye to URL's and what the job application is asking for. I choose privacy and security as my tag because these scammers can get a lot of information from and start maxing out your credit cards and take money out of your bank account. In my opinion the government should step in and start watching out for theses fake websites and take them down of the internet or block them.  
Shirin Naghizadeh

Chrome Offers Tabs to Go With New Tab-Syncing Features | Webmonkey | Wired.com - 0 views

  •  
    This new tab syncing feature that google provides, allows the user coordinate the tabs between their mobile device and home laptop/desktop. This relates to Portable Computing because you are able to access tabs on your home computer through a mobile device while outside. This could also connect to the Privacy and Security tag because if someone has access your devices they are able to change your info or documents. This is extremely helpful during your day to day lifestyle since a large portion of the population uses mobile devices. The positive aspect would be that you're able to  continue work. The negative aspect could be that an outside source could access your info. With an Android phone with the new Chrome beta installed, you have the power of  being able to access any open tab any on your desktop from any location.
Nikita Varabei

Internet providers to begin warning customers who pirate content - CNN.com - 0 views

  •  
    Many of use know about pirating, and some even do it. So far we thought that it was an easy way to get things with little ways of getting caught; this however is going to change. A knew security system is in development and bound to be out within the next 2 months that will catch those who pirate, and if numerous warnings are ignored; they will be prosecuted. This program watches popular sites such as bittorent and tracks the ip address of those who download illegal content. Then it sends warnings and if those are ignored, you will be tracked and investigated. Overall I believe this software will help stop pirating, but it will be met with huge opposition because most people wont be willing to give up their access to free movies, music, software, etc. Also this raises a privacy issue, but as this security system only tracks your IP, its not much of a problem compared to other tracking systems out there. To conclude, I believe the future of this system is filled with huge debates and maybe even battles.
Daniel Carriere

Silent Circle: Mike Janke's iPhone app makes encryption easy, governments nervous. - Sl... - 0 views

  •  
    New "surveillance--proof" app, Silent Circle has been released providing an easy way for people to text and call people without anyone else ever knowing what has been said, including ISPs and governments. This app makes sure no one can eave drop on your personal business by using what's called encryption. Encryption is the process of changing data into a secret code, the secret code can then only be read by the device you are trying to communicate with. The encryption codes are randomly generated each time the app is used so it is almost impossible to crack the code. This app is can be used on iOS and is currently in development for other devices and platforms as well. Some feel that free communication should be a right, but governments must be feeling a little bit nervous about this app. I chose the tag "privacy and security" because this article is about how Silent Circle has given people an easy way to speak in a secure and private environment without any intervention from anyone else other than the communicators. In my opinion I feel that free communication is important, but people will abuse this through using this app to possibly deal drugs, plan terrorist attacks, or other illegal activities. Who knows, maybe even the government controls this network to monitor people who use it, but that is just a theory.
Justin Hernandez

Cross-site Scripting Attacks Up 69% - 0 views

  •  
    This articles talks about how a computer security attacking program called Cross-site Scripting (XSS) is being more popular among hackers. As we know, ISC2O which is us, spend our classes on the computers each day. This scripting partially relates to what we do since we have already learned basics of HTML and CSS programming languages. Not to mention, we're leading up to learning about Java Script which is one example of a scripting language such as XSS. There are probably a few of us that have had our own computers attacked(hacked) or put our own secretive information has been put onto the web. Many of us use social networks and sometimes, we display some personal information which can be retrieved by others through using this program. In addition, when we buy different products online, we put out some credit card details that can also be stolen and potentially be used. In addition, the number of cyber attacks can still rise as the holidays come by and eCommerce will increase and can cause more attacks. This relates to Privacy and Security this has to do with social networking as information that's displayed can be stolen and any other personal information can be taken.
Justin Hernandez

3 Habits For Managing Your Social Media Footprint - 0 views

  •  
    Many of us people keep social networking as a daily part in our lives. Apparently, we can end up putting a social media footprint. This article shows us three habits to manage this footprint; to make sure that we don't put our too much of our thoughts and private lives out to the world. We know that a huge social media footprint can end up getting us judged by others. This has to do with privacy and security because we can go off on what we post on facebook and twitter and share many private things, but we need to remember that the internet has a lot of memory and can keep those posts and private things for a long time. This also relates with eLifestyle because as we have access to these different social networks we share a lot of thoughts and other things out on the internet and it can have a negative or positive effect on us.
ecaterina smirnov

South Carolina - State Computer System Is Hacked - NYTimes.com - 0 views

  •  
    This article is about South Carolina which had a hacker break into the state's computer system. It was said that a hacker from another country staged several attacks on the State Department of Revenue since August. This exposed 3.6 million social security numbers and 387,000 credit and debit card numbers and all but 16,000 of the credit card numbers are protected by encryption, but hackers can decrypt them. People that filed tax returns since 1998 are to contact state law enforcement officials to prevent identity theft. They still haven't found the hacker. This article relates to Privacy and Security as well as legal issues because it deals with hacking important information profiles of people such as their credit card numbers and social security numbers. As well as creating a possibility for identity theft.  This could create lots of problems for people and the government because of a hacker. It is times like these where we think how we can tighten security for these things stored on the computer? We also think is it just best to stay away from technology for these matters, because of moments like these where mass information that was stored is now exposed.
Mr. Fabroa

Snapchat hack spams users with smoothie photos | Security & Privacy - CNET News - 0 views

  •  
    this is where your 125 (min) words summary and thoughts/opinion go
  •  
    this is where your 125 (min) words summary and thoughts/opinion go
Winnie Huang

Kidnap victim spreads message of Internet safety | UTSanDiego.com - 0 views

  •  
    As some people are so immature to share every single moment of their daily lives on the internet, they are unaware that all of that information is open to the eyes of predators all around the world. It does not matter if you are only confiding in a pen pal who you think is reliable and honest or if you are just trying to be viral with your statuses. Not everyone you meet online is safe and can eventually come to harm you using the knowledge you have willingly and ignorantly gave up to them. For example, the lady in this article retells her experience of being kidnapped, brought to a completely different state and continuously raped by a "friend" she met in a chat room and blindly trusted who then targeted and made a victim out of her. Instead of going through an event like this first hand, people, especially children need to wake up and realize that the Internet is not as secure as it may seem and the people you may have the chance to talk to can be potential monsters. From the way I see it, just because you are hidden behind a screen does not mean that there is not a way for predators to find you. Why would you share the secrets of your privacy which you would normally never tell in person, but online where there is always a chance for it being violated?
Spider Man

CISPA is back. - 0 views

  •  
    CISPA (cyber intelligence sharing and protection act) is back into congress and threatens to internet privacy if passed. The bill allows the government, private security agencies, and private companies to access about a "cyber threat". These cyber threats are defined by any attack on government systems and networks, and the "Theft or misappropriation of private or government information, intellectual property, or personally identifiable information." This can mean things such as music, programs, games, etc. With this bill, the government and companies can anonymously take your information without any legal consequences. Your information can then be shared or sold. This is a direct violation of the 4th amendment, as it is similar to a search without a warrant. In summary, this bill grants the government and companies access to your information without any cost or legal risk.
‹ Previous 21 - 40 of 113 Next › Last »
Showing 20 items per page