Skip to main content

Home/ Fabroa ICS2O/ Group items tagged theft

Rss Feed Group items tagged

Winnie Huang

Identity theft reportedly rampant on Facebook, protect yourself | Digital Trends - 0 views

  •  
    Simply, there are creepers on the internet that will steal whatever image you think yourself to be without hesitation and then commit mysterious, illegal, dangerous, suspicious activity under your name which could unfortunately get you into jail even though you are innocent. This is a fact. And you know what helps them create this problem of identity theft? It is the information people freely and openly decide to share on their social media accounts like Facebook. Just one insignificant status allows bad people to assume your identity - all they even need is a vague birth date and birth place, and you are basically done for. YOU COULD BE FRAMED. This goes beyond security issues and transcends what illegal is defined as. Say goodbye to your privacy laws and hello to a never ending game of pretend. Identity fraud is swarming on this site and people don't even realize the massive extent it goes to. People are oblivious and frankly don't care if someone is unfortunate enough to fall victim to identity theft.
ecaterina smirnov

South Carolina - State Computer System Is Hacked - NYTimes.com - 0 views

  •  
    This article is about South Carolina which had a hacker break into the state's computer system. It was said that a hacker from another country staged several attacks on the State Department of Revenue since August. This exposed 3.6 million social security numbers and 387,000 credit and debit card numbers and all but 16,000 of the credit card numbers are protected by encryption, but hackers can decrypt them. People that filed tax returns since 1998 are to contact state law enforcement officials to prevent identity theft. They still haven't found the hacker. This article relates to Privacy and Security as well as legal issues because it deals with hacking important information profiles of people such as their credit card numbers and social security numbers. As well as creating a possibility for identity theft.  This could create lots of problems for people and the government because of a hacker. It is times like these where we think how we can tighten security for these things stored on the computer? We also think is it just best to stay away from technology for these matters, because of moments like these where mass information that was stored is now exposed.
Anthony Mirabile

Universal Video Chat? Polycom Is Getting Close - 0 views

  •  
    For a service that had such an artificially high demand, the tech industry has not really capitalized on Video Chat. When Apple unveiled their video chat service 'FaceTime' in June of 2010, many thought that this would become the primary standardized service used by all. In practice, FaceTime is a clunky system that is evidently less productive and convenient than just vocal or text communication. So why hasn't video conferencing taken off as the industry had hoped? The answer is most likely because there is no standardized system and the market is too saturated; Polycom Inc. hopes to adress this issue by introducing a Universal Video Chat in early 2013. The product (called RealPresence CloudAxis) monetizes all of your contacts from Skype, Facebook, Google Talk and other apps into one place - all hosted on a web browser. This is a very ambitious task and if it delivers on what Polycom says (with the "same security and reliability as enterprise systems"), then there may be some validity to the video conference service. This relates to Privacy and Security because when monetizing a group of services, there is a chance for data leak and possible identity theft; Polycom promises to adress all security issues in order to make a safe and immersive experience for its users. This relates to eLifestyle because companies and their consumers have been trying for the past years to create a universal video chat service that actually worked in order to establish a multi-faceted social network: it might be too early to tell if Polycom has something that will fulfill the needs of consumers. This relates to ICS20 because as a class, we are no stranger to multiple accounts that often times serve the same purpose. As consumers, we hope for a streamlined service that can connect all of our multiple accounts into one place, preferably on a browser. It will be hard for Polycom, both legally and economically, to convince all of these pre-existing video chat developers to allow Polycom to
Nikita Varabei

Are Your Future Passwords Hidden In the Jiggling of Your Eyeballs? - 0 views

  •  
    This article describes how scientists are working to create new top off the line security. As we've seen in many sci-fi movies ; there is such a thing as eye scanners. they have existed for sometime now, but they have been primitive and worked just by using the iris of your eye. This could be faked easily by someone just taking a picture of your eye and simply holding it to the screen. This new technology however is a lot more sophisticated. It uses your eyes "fixations" and "saccades" to determine if it is really you. Fixations is how your eye behaves when it is still and saccades is how your eye behaves when it is moving from point to point. This new technology is a breakthrough in security, as it is virtually impossible to fake. no more stolen passwords, or hacked systems. Now unless its really you, the system wont let the person in. THis is extremely important as it prevents theft, hacking, and many other problems. To conclude, this technology is extremely important to our security and will greatly contribute to our future
Anthony Dao

Spin the Wheels on This Bike to Charge Your Phone - 0 views

  •  
    What if there a was a way to charge your smartphone and get a workout at the same time?  This project is currently being implemented in New York City. Bikes open to the public that are able to charge phones have been scattered all over New York City.  The Charge Cycle hopes to bring a network of outdoor neon-green stationary bikes that allows anyone to charge their phone for free by simply peddling.  It takes the same amount of time to charge as if you were to directly plug it into the wall. Although there are some concerns of theft, developers have chained the bikes and also put locks on the bikes, which makes it harder to move. Nowadays, we all rely on our smartphones, they are technically our everything.  Many people would be devastated if it were to die, and they will not be able to use it until they have their charger and an outlet.  The Charge Cycle offers a charging system for smartphone users while they get a workout as well, so it is a "win win" situation for these users.  This affects our lifestyle because instead of sitting around doing nothing while waiting for our phones to charge, we can get a workout out of it, and stay fit and healthy. I do think this a good idea because obesity rates today are increasing, which is dangerous.  In order to maintain a healthy diet, exercise is important.  This bike allows us to maintain said healthy diet, while charging our phones at the same time, which truly is a win win.
Nicked -

Anonymous Targets Israel by Taking Down Hundreds of Websites and Leaking Emails and Pas... - 0 views

  •  
    Many of us remember the PSN outage of April 2011. Sony blamed 'Anonymous,' a collective hacktivist group formed in 2003 on 4chan, after they found the Anonymous calling card 'We Are Legion' in their system. Anonymous is composed of individuals with the ideals of: 1. Freedom of Information 2. Freedom of Speech 3. Unregulated Internet Anonymous will only attack databases and websites only if provoked, and will not do so for monetary gain. The group has recently engaged in multiple attacks on international government databases. The article, by Casey Chan, is about the Anonymous digital attack on Israel, in retaliation after the Israeli government threatened to shut down Internet access and other telecommunications to the Palestinian people in the Gaza and "Occupied Territories. " The group attacked the Israel Foreign Affairs database and Bank of Jerusalem database, as well as DDos attacks on over 600 sites and theft of over 2000 email addresses and passwords. This attack has generated some controversy. Since the beginning of November, Israel has also received over 150 missile attacks from the Palestinians as well. Anonymous aids the Palestinians by sharing a 'Care Package,' instructions on what to do in the event Israel does sever the Internet connection. Anonymous has become quite influential on the Internet. This illustrates how important the Internet has become. The internet is not only a commodity, but a right to have. It has replaced forms of communication, entertainment, transactions, and more. A group of 'anonymous' users has been formed for the sole purpose of protecting it, with the will and capabilities to punish any party that wishes to disrupt it. As with every conflict, there are sides. Anonymous, in protection of Internet freedoms; and the Israeli government, that has been fighting a war for as long as anyone can remember. Who's side are you on?
Spider Man

CISPA is back. - 0 views

  •  
    CISPA (cyber intelligence sharing and protection act) is back into congress and threatens to internet privacy if passed. The bill allows the government, private security agencies, and private companies to access about a "cyber threat". These cyber threats are defined by any attack on government systems and networks, and the "Theft or misappropriation of private or government information, intellectual property, or personally identifiable information." This can mean things such as music, programs, games, etc. With this bill, the government and companies can anonymously take your information without any legal consequences. Your information can then be shared or sold. This is a direct violation of the 4th amendment, as it is similar to a search without a warrant. In summary, this bill grants the government and companies access to your information without any cost or legal risk.
Roman Mitjaev

Soon Security Cameras Will Be Predicting Your Next Move - 0 views

  •  
    This article discusses that soon, video cameras will be able to predict your next move.  By using technology similar to that used in Microsoft's Kinect and Google's self-driving cars, the cameras are getting better and better at spotting and identifying certain objects. The step the researchers are on now is creating a "cognitive engine" so that a computer can decide whether or not those objects are misbehaving and whether or not they are about to. This will defiantly make a thief's/shoplifter's job much harder. This new software can be implemented for not only military purposes, but also civilian situations. For example airports.( if someone is leaving a suspicious package somewhere.) This kind of technology will make our everyday lives much safer because it will prevent things such as theft, terrorism, etc.  This software is not complete yet but it's coming together very swiftly. Prepare everyone, Skynet is coming.
Serena Zaccagnini

Locking Handbag Thwarts Pickpockets and Easy Access to Your Keys - 0 views

  •  
    The new locking handbag is one sure-fire way to protect yourself from thieves and pickpockets. Plus, it looks a little daunting. It requires a security combination to open, and once opened, the handle can be looped around shopping carts, public benches, and anywhere else a theft may take place. Made from Tonka-tough copolymer plastic, it is harder than leather and other fabrics to open, it also happens to be dirt and waterproof, making it practical and useful, for, say, the beach. Not the most beautiful thing, but very useful and helpful for people everywhere, especially the incredibly paranoid.
Jonathan Villa

'Unwitting' thief helps police by uploading picture of himself on victim's Facebook pag... - 1 views

  •  
    When most thieves commit a crime they try to get away from police. However looks like karma got back at a man who stole a woman's cell phone. He tried uploading a picture onto facebook through her phone but the phone was set to automatically post it to her wall. This gives police pretty much all they need to catch him.
1 - 10 of 10
Showing 20 items per page