Skip to main content

Home/ Fabroa ICS2O/ Group items matching "identity" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Winnie Huang

Identity theft reportedly rampant on Facebook, protect yourself | Digital Trends - 0 views

  •  
    Simply, there are creepers on the internet that will steal whatever image you think yourself to be without hesitation and then commit mysterious, illegal, dangerous, suspicious activity under your name which could unfortunately get you into jail even though you are innocent. This is a fact. And you know what helps them create this problem of identity theft? It is the information people freely and openly decide to share on their social media accounts like Facebook. Just one insignificant status allows bad people to assume your identity - all they even need is a vague birth date and birth place, and you are basically done for. YOU COULD BE FRAMED. This goes beyond security issues and transcends what illegal is defined as. Say goodbye to your privacy laws and hello to a never ending game of pretend. identity fraud is swarming on this site and people don't even realize the massive extent it goes to. People are oblivious and frankly don't care if someone is unfortunate enough to fall victim to identity theft.
Nicole Trezzi

Facebook Provides 56 New Gender Identity Options - ReadWrite - 0 views

  •  
    On the 13th of February, Facebook made a change to their gender identity on profiles. You can now choose from the existing "male" and "female" option, but now there are also 56 different gender identities. Some options include agender, cis, gender fluid, transgender, and neither. Not only did Facebook change the identity, you can now also control what your friends can refer you as- male, female or neutral (they/their). Facebook worked with a group of leading LGBT organizations to help select the new genders in the option, now the only thing people ask for in the comments of this official announcement is for Facebook to change the "Interested in" option.
  •  
    thoughts & opinions?
ecaterina smirnov

South Carolina - State Computer System Is Hacked - NYTimes.com - 0 views

  •  
    This article is about South Carolina which had a hacker break into the state's computer system. It was said that a hacker from another country staged several attacks on the State Department of Revenue since August. This exposed 3.6 million social security numbers and 387,000 credit and debit card numbers and all but 16,000 of the credit card numbers are protected by encryption, but hackers can decrypt them. People that filed tax returns since 1998 are to contact state law enforcement officials to prevent identity theft. They still haven't found the hacker. This article relates to Privacy and Security as well as legal issues because it deals with hacking important information profiles of people such as their credit card numbers and social security numbers. As well as creating a possibility for identity theft.  This could create lots of problems for people and the government because of a hacker. It is times like these where we think how we can tighten security for these things stored on the computer? We also think is it just best to stay away from technology for these matters, because of moments like these where mass information that was stored is now exposed.
Julia Fracassi

You Are Not Your Name and Photo: A Call to Re-Imagine Identity | Epicenter | Wired.com - 0 views

  •  
    Christopher "moot" Poole, creator of 4chan and Canvas, talks at the web 2.0 summit on identity and the average person's persona on the web. According to him, social networking sites like Facebook think problems with security lie in who we share with, but Poole says that it's really our jobs to monitor the person we portray ourselves to be online. He says Facebook misrepresents people, making us think that a person's personality can be generally summed up in a name along side a photo. Poole praises Twitter for doing the exact opposite. We can't just blame companies like Google and Facebook for skewing our online image, because we are the ones who are abusing it by posting too much information anyways. But in the end, it's up to us to be careful what we post online.
Anthony Mirabile

Universal Video Chat? Polycom Is Getting Close - 0 views

  •  
    For a service that had such an artificially high demand, the tech industry has not really capitalized on Video Chat. When Apple unveiled their video chat service 'FaceTime' in June of 2010, many thought that this would become the primary standardized service used by all. In practice, FaceTime is a clunky system that is evidently less productive and convenient than just vocal or text communication. So why hasn't video conferencing taken off as the industry had hoped? The answer is most likely because there is no standardized system and the market is too saturated; Polycom Inc. hopes to adress this issue by introducing a Universal Video Chat in early 2013. The product (called RealPresence CloudAxis) monetizes all of your contacts from Skype, Facebook, Google Talk and other apps into one place - all hosted on a web browser. This is a very ambitious task and if it delivers on what Polycom says (with the "same security and reliability as enterprise systems"), then there may be some validity to the video conference service. This relates to Privacy and Security because when monetizing a group of services, there is a chance for data leak and possible identity theft; Polycom promises to adress all security issues in order to make a safe and immersive experience for its users. This relates to eLifestyle because companies and their consumers have been trying for the past years to create a universal video chat service that actually worked in order to establish a multi-faceted social network: it might be too early to tell if Polycom has something that will fulfill the needs of consumers. This relates to ICS20 because as a class, we are no stranger to multiple accounts that often times serve the same purpose. As consumers, we hope for a streamlined service that can connect all of our multiple accounts into one place, preferably on a browser. It will be hard for Polycom, both legally and economically, to convince all of these pre-existing video chat developers to allow Polycom to
James Harris

iPhone App Contains Secret Game Boy Advance Emulator, Get It Before It's Gone [Update: It's Gone] | TechCrunch - 0 views

  •  
    Early in the afternoon today, a clever developer managed to sneak a Game Boy Advance emulator into an innocent looking app named "Awesome Baby Names". The secret emulator is activated by a series of taps on the touchscreen inside of the app. Once it is activated you can play your classic gba games just like you did in 2005. Apple was quick to catch this security breach as it was only in the App Store for twenty something minutes, but in that time many people including myself managed to download the app. This kind of sneaky activity from developers happens very seldom, but when something is smuggled into the App Store, it is usually very important. As stated in the article, it is a very easy process to unlock the emulator from the app, but getting the games and the BIOS onto the iPhone is the hard part. You must first download a program that lets you access the phone's file directory, then you must find the app's directory and drop the relevant BIOS and game files there. I chose the portable computing tag for this article because it deals with mobile technology and exploiting it to run handheld gaming software. This idea is not knew and has been around for a long time, but the idea of hiding the identity of apps and smuggling them into the App Store is a new idea. Apple is updating their security daily, but clearly couldn't spot this "child naming app" and make it out for the emulator that it was. I chose the privacy and security tag because Apple has a high priority for the security of their ecosystem and operating system, but clever people can still find ways to bypass this and get unidentified files into the operating system. I believe that Apple must keep a close eye on how they approve future apps into the app store because one day we may see cydia disguised as a senseless app make its way into the app store. If this happens, Apple with really have some explaining to do!    
Victor Hugo Rodrigues Carvalho

Arizona Politician Parodied By Fake Twitter Accounts Pushes Bill To Make Online Impersonation A Felony | Techdirt - 1 views

  •  
     This article is about impersonating people online. Outside of the internet people can be arrested and fined for pretending to be a police officer, soldier, and even a normal person. This law still does not apply to life on the internet. This politician in Arizona is trying to make this a law. Doing this could stop people from scamming others online (ex. pretending to have cancer or someone else to get one) but could also stop popular parody accounts used for entertainment(ex. popular twitter accounts such as Fill Werell). Overall this law could probably bring more good than bad helping people protect their identity.
anthony garisto

Cyberwar Imperative: We Need A Next-Generation Internet - ReadWrite - 0 views

  •  
    With people becoming more tech savvy, the security and firewalls of major websites and servers are becoming just obstacles to hackers looking for valuable information these websites contain.  Michael Tchong suggests that we need a new internet, one built from the ground up. He says that China is far more advanced with technology and internet security than that of the United States and Canada. Some suggestions that Michael Tchong has made for this new internet is making the internet so secure that to hack it, you will need to be a genius with alot of time on your hands. He proposes that there should be a next-generation eye-recognition technology using a computer or mobile camera. This will help sites like Facebook and LinkedIn in their endless battle against identity fraud. Also he thinks that it should only be accessed by Americans for obvious reasons that the Chinese and other known hacking countries would try and destroy the new internet.  
saintmichaeld

All Gmail will now use HTTPS, messages will be encrypted when moving inside Google | Android Central - 0 views

  •  
    Google is improving the security of their email application. Gmail is switching to https, and is looking at a more private future for its users. Sending messages over a secure https connection ensures no one can come in contact with a message. This now has become the default in all gmail practices. It is no longer an option like in 2010. In addition, emails sent will be encrypted, along with communication. This is the news that I actually liked hearing from google, most of the time it's them trying to steal our identities through google search and targeting ads towards us w/out permission.
migmeister_98

Apple, Samsung patent war to resume in U.S. courts - Business - CBC News - 0 views

  •  
    Just when you thought that the Apple-Samsung dispute was long gone, the two rivaling tech companies will once again appear in court next week in Silicon Valley. As usual, they are accusing each other of ripping off designs and features. Apple is accusing Samsung of infringing on 5 patents including Samsung's popular Galaxy smartphones and tablets. Samsung on the other hand is accusing Apple of stealing ideas to use on Apple's iDevices. According to Apple attorneys, Apple "revolutionized the market in personal computing devices, while Samsung "systematically copied Apple's innovative technology and products. Samsung in defense says that it has been a "pioneer in the mobile business sector since the inception of the mobile device industry, and that Apple copied many of Samsung's innovations on Apple's iDevices. Some things Apple claims that Samsung copied are tap to search technology, and "slide to unlock" the latter in my opinion, is not true. However, each smartphone has many patents, but Apple is only challenging 5 of them. personally I think that Apple and Samsung devices are very different. Sure some features may be similar or identical, but that's just to have competition. Although both of them are innovators, I think that Samsung/Google is innovating more nowadays than Apple.
robford-jlm

Privacy report finds NSA spying illegal | MSNBC - 0 views

  •  
    By now, everyone who is the slightest bit technologically inclined - or just interested in the news - has heard of the 'questionable' activities of the NSA. The National Security Agency, for the uninitiated, is a United States government agency that deals with national security and recently became the object of scrutiny after leaked information showed the massive data collection effort of the agency. This included: recording phone calls, ingoing and outgoing call identities, computer browsing, emails, key-logging and much much more. Needless to say, this was perceived as a tad scandalous and independent panels were brought in to assess the agencies spying program. Recently, the Privacy and Civil Liberties Oversight Board concluded that the metadata collected by the NSA was obtained through illegal means. Before you cheer, however, this sort of conclusion has been reached before and has only resulted in a promise to limit spying. This is bad because its merely a promise; a promise from a government who lied repeatedly, committed perjury, knowingly covered its tracks, and chased a citizen away with the threat of life in prison. Unfortunately, many people have since stopped caring because its no longer new news, but we need to stand up for our right to privacy and demand legal action to prevent such breaches of trust in the future.
Serena Zaccagnini

Twitter Doesn't Give a Damn Who You Are - 0 views

  •  
    Though Twitter, Google+, and Facebook are all relatively the same (in that they are social networking sites), they are radically different. Facebook and Google+ take into account your identity, but Twitter doesn't. Both Facebook and Google+ tell you specifically who all users are, but with Twitter you can remain anonymous, use a pseudonym, or create a fake account based on someone else, so long as its indicated. Essentially, all social networking sites are different, and the user can choose which one to join based on personal preferences.
codrin gherghel

Add Some Color to Your iPhone 4S With Colorware - 0 views

  •  
    The iPhone 4S is physically more or less identical to its predecessor. If you want to be special, however, there is a way to make your new toy stand out from the rest and shine in many magnificent colors. A company called ColorWare will change the colour of your phone but this comes at quite a price. $1500  for a 16 GB model, $1,700 for a 64 GB one, or $250 if you opt to send your iPhone 4S to ColorWare and let them work their magic with it.
codrin gherghel

Very true article - 3 views

  •  
    Yes, very true indeed!!
  •  
    okay i have finally gotten to write a description about this :).. anyway... so basically what this article is about is secure internet web servers that use SSL encryption. what this does is make it very hard for hackers, malware, spyware, and all other bad kinds of "wares" out of your computer making it virus free and it doesn't allow ip hackers to watch what you are doing on the internet. The reason for this is mainly to protect bank account numbers, login id's, passwords, credit card information, and even personal information that, if not protected can get your identity stolen. Two big issues that website hosts do not agree with is that SSL (HTTPS secure connection) costs money. It is not that easy to keep a secure server blocking out hundreds of thousands of malware virus', phishing programs, and spyware, while at the same time keeping it free. Also another big problem with this is that it slows down the server. If there are a limited amount of people going on your website (meaning barely into the hundred hits) than you shouldnt have this problem, but for big websites like facebook,that have millions of hits per day, this is a big deal because they want to keep themselves on top of speed and one of the most popular social networking websites out there. basically, to sum everything up, HTTPS servers cost too much money, some websites dont even need them, and they slow down the servers a significant amount.
1 - 14 of 14
Showing 20 items per page