Skip to main content

Home/ Future of the Web/ Group items tagged alerts

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

Squawkr Alerts You When a Pirated Movie Leaks Online - TorrentFreak - 0 views

  •  
    " Ernesto on November 27, 2016 C: 33 Opinion Are you wondering when the latest blockbuster movies will leak online? Then Squawkr might be something for you. The new service allows people to maintain a watchlist of films and sends alerts when a high-quality scene release appears online."
  •  
    " Ernesto on November 27, 2016 C: 33 Opinion Are you wondering when the latest blockbuster movies will leak online? Then Squawkr might be something for you. The new service allows people to maintain a watchlist of films and sends alerts when a high-quality scene release appears online."
Gonzalo San Gil, PhD.

Alert: Our Privacy About to be Destroyed in Brussels? | La Quadrature du Net - 0 views

  •  
    [ Submitted on 22 Jan 2013 - 14:35 data protection press release Printer-friendly version Send by email Paris, 22 January 2013 - The consideration of the "data protection" privacy regulation is in progress in the European Parliament, with a vote in the consumers committee (IMCO) on Wednesday. It is the object of an unprecedented lobbying campaign, mostly driven by US companies. If citizens don't act, banks, insurance companies and Internet service operators will have a free hand to collect, process, store and sell all of our personal data, which will enable them to know and direct all that we do online and offline. ...]
Gonzalo San Gil, PhD.

Linux Distribution Chooser - 0 views

  •  
    [# ! Por cortesía de vinagreasesino.com a través de Google Alerts 'Linux'] "This test should help you while choosing the best Linux Distribution for you. The test contains several question to find the suitable distribution for you. Please note that the result is only a suggestion." [# ! #choose # ! … #Your #Perfect #FreeSoftware #Match. (# And don't scare about the opening home page written in #German… # ! #English version available, too)]
  •  
    [# ! Por cortesía de vinagreasesino.com a través de Google Alerts 'Linux'] "This test should help you while choosing the best Linux Distribution for you. The test contains several question to find the suitable distribution for you. Please note that the result is only a suggestion."
Gonzalo San Gil, PhD.

Apple's Insistence On DRM And Other Restrictions Means EFF's New App Is Android-Only | ... - 1 views

  •  
    "from the eff-your-walled-garden dept The EFF has produced a new mobile app that allows users to access its alert center and instantly take action on issues pertaining to digital rights and other areas the group focuses on. And, it's Android-only, because the EFF took a long look at Apple's walled garden and said, "Include us out.""
  •  
    "from the eff-your-walled-garden dept The EFF has produced a new mobile app that allows users to access its alert center and instantly take action on issues pertaining to digital rights and other areas the group focuses on. And, it's Android-only, because the EFF took a long look at Apple's walled garden and said, "Include us out.""
Gonzalo San Gil, PhD.

The Red Hat/MS Agreement Molehill | FOSS Force - 0 views

  •  
    Larry Cafiero First, let me thank those who took the time to alert me last week to the agreement between Red Hat and Microsoft on holding hands in the cloud. All the concern shown in the emails and social media posts were completely welcome, and could be broken up into two basic sentiments: curiosity about my reaction and serving me some crow to eat.
  •  
    Larry Cafiero First, let me thank those who took the time to alert me last week to the agreement between Red Hat and Microsoft on holding hands in the cloud. All the concern shown in the emails and social media posts were completely welcome, and could be broken up into two basic sentiments: curiosity about my reaction and serving me some crow to eat.
Gonzalo San Gil, PhD.

Install and Access Facebook Messenger on Linux Desktop - 0 views

  •  
    "linuxmessenger app is a "Facebook-like" client for Linux desktop was written in Python language. It allows you to login to your Facebook account right from the command line without installing it on your system and have chat with your loved ones with much a like a Facebook interface. If you want, you can install it as a desktop client. This application has some built-in features like desktop notifications, pop-up alert, friends request and chat sound (with On/Off options)."
Gary Edwards

Be Prepared: 5 Android Apps You Must Have in Case of Emergency - Best Android Apps - 2 views

  •  
    "WHEN CALAMITY STRIKES The unpredictable nature of most emergencies often puts us in dangerous situations. But today's technology has come far enough to inform, alert, secure and guide us through dangerous situation, if we happen to face any. Emergencies may come in the form of environmental or circumstantial problems. Therefore it is always better to accompany yourself with at least 5 apps that can help you in case of any emergency. Here is the list of top 5 emergency apps for Android."
Paul Merrell

Whistleblowers File $100 Million Suit against NSA, FBI - WhoWhatWhy - 0 views

  • In a $100 million lawsuit that has garnered virtually no public attention, five National Security Agency (NSA) whistleblowers are accusing the federal government of illegally retaliating against them for alerting the NSA and Congress to a waste of taxpayer funds that benefitted a well-connected contractor.The lawsuit tells the story of the infancy of the NSA’s efforts to surveil the Internet. Back then, there were two programs for the spying agency to choose from — and the first was called ThinThread. It had been developed internally, was comparatively inexpensive, had been tested and proven to be effective, and included safeguards preventing the spying on Americans without a court warrant. The other was called Trailblazer. It did not include such safeguards, had not yet been shown to be effective, and cost 1,000 times more than ThinThread. Instead of being developed internally, it was to be outsourced to Science Applications International Corporation (SAIC), a politically connected contractor.The NSA chose Trailblazer.
  • In response, four NSA employees who had worked on ThinThread, as well as a congressional staffer, alerted Congress and the Office of the Inspector General of the NSA that the agency was wasting taxpayer funds. That is when their troubles began, according to the lawsuit.It alleges that the defendants, which include the NSA, FBI, and the Department of Justice, as well as individuals associated with them, “knowingly and intentionally fabricated” a claim that the plaintiffs leaked classified information to New York Times reporters Eric Lichtblau and James Risen.“[The defendants] used this fabricated claim for retaliation, illegal searches and seizures, physical invasion of their residences and places of business, temporary false imprisonment, the confiscation of their property, cancellation of security clearances leading to the loss of their jobs and employment, intentional infliction of emotional distress, harassment and intimidation,” the lawsuit alleges.It also states that the defendants should have known that the plaintiffs were not the leaks because the NSA “was tracking all domestic telephone calls for the supposed purpose of protecting national security.”
  • The plaintiffs are former NSA employees Thomas Drake, Ed Loomis, J. Kirk Wiebe, William Binney, and former congressional staffer Diane Roark. They seek “punitive damages in excess of $100 million because of Defendants [sic] callous and reckless indifference and malicious acts …” as well as well as an additional $15 million for lost wages and to cover costs.Larry Klayman, the prominent conservative public interest attorney and founder of Judicial Watch, filed the suit on August 20th. However, it is expected to be amended this week, and it is possible that additional publicity for the case will be sought then.
Gonzalo San Gil, PhD.

ISPs and Rightsholders Extend "Six Strikes" Anti-Piracy Scheme - TorrentFreak - 0 views

  •  
    Ernesto on September 3, 2015 C: 32 Breaking The six-strikes Copyright Alert System will remain in place. The MPAA, RIAA and five large U.S. Internet providers have unanimously agreed to extend the program. The parties are currently negotiating if and how they can improve the warning system in the hope that it will eventually change people's attitudes toward piracy.
Gonzalo San Gil, PhD.

FBI Warns That WordPress Faces Terrorist Attack Risk - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! " Terrorists Attacks" that threaten The W@rld with... # ! DEFACED BLOGS... Oh My! it's a 'real danger'. # ! :D # ! Please stop seeding fear and mistrust # ! of every@ne towards everybody... # ! ... as stop discrediting every social empowerment, # ! as already did with, for example, with P2P networks... (Seriously: Where Is The Link Between Copyright Infringement And Terrorism/Organized Crime | by Mike Masnick | Fri, Jan 29th 2010 7:39pm https://www.techdirt.com/articles/20100129/0630057974.shtml) ( # ! And The #Press, so prideful to spreading all this #nonsense... # ! :/ )
  •  
    [The Federal Bureau of Investigation issued an alert on April 7 about the potential danger of Islamic State (ISIS) terrorists abusing vulnerabilities in the open-source WordPress blog and content management system software.]
Paul Merrell

Facebook and Corporate "Friends" Threat Exchange? | nsnbc international - 0 views

  • Facebook teamed up with several corporate “friends” to adapt Facebook’s in-house software to identify cyber threats and their source with other corporations. Countering cyber threats sounds positive while there are serious questions about transparency when smaller, independent media fall victim to major corporation’s unwillingness to reveal the source of attacks resulted in websites being closed for hours or days. Transparency, yes, but for whom? Among the companies Facebook is teaming up with are Printerest, Tumblr, Twitter, Yahoo, Drpbox and Bit.ly, reports Susanne Posel at Occupy Corporatism. The stated goal of “Threat Exchange” is to locate malware, the source domains, the IP addresses which are involved as well as the nature of the malware itself.
  • While the platform may be useful for major corporations, who can afford buying the privilege to join the club, the initiative does little to nothing to protect smaller, independent media from being targeted with impunity. The development prompts the question “Cyber security for whom?” The question is especially pertinent because identifying a site as containing malware, whether it is correct or not, will result in the site being added to Google’s so-called “Safe Browsing List”.
  • An article written by nsnbc editor-in-chief Christof Lehmann entitled “Censorship Alert: The Alternative Media are getting harassed by the NSA” provides several examples which raise serious questions about the lack of transparency when independent media demand information about either real or alleged malware content on their media’s websites. An alleged malware content in a java script that had been inserted via the third-party advertising company MadAdsMedia resulted in the nsnbc website being closed down and added to Google’s Safe Browsing list. The response to nsnbc’s request to send detailed information about the alleged malware and most importantly, about the source, was rejected. MadAdsMedia’s response to a renewed request was to stop serving advertisements to nsnbc from one day to the other, stating that nsnbc could contact another company, YieldSelect, which is run by the same company. Shell Games? SiteLock, who partners with most western-based web hosting providers, including BlueHost, Hostgator and many others contacted nsnbc warning about an alleged malware threat. SiteLock refused to provide detailed information.
  • ...1 more annotation...
  • BlueHost refused to help the International Middle East Media Center (IMEMC)  during a Denial of Service DoS attack. Asked for help, BlueHost reportedly said that they should deal with the issue themselves, which was impossible without BlueHost’s cooperation. The news agency’s website was down for days because BlueHost reportedly just shut down IMEMC’s server and told the editor-in-chief, Saed Bannoura to “go somewhere else”. The question is whether “transparency” can be the privilege of major corporations or whether there is need for legislation that forces all corporations to provide detailed information that enables media and other internet users to pursue real or alleged malware threats, cyber attacks and so forth, criminally and legally. That is, also when the alleged or real threat involves major corporations.
Gonzalo San Gil, PhD.

Review: Graylog delivers open source log management for the dedicated do-it-yourselfer ... - 0 views

  •  
    "By Joel Snyder Network World | Nov 9, 2015 3:06 AM PT RELATED TOPICS Open Source Subnet Network Management System Management Comments In most big security breaches, there's a familiar thread: something funny was going on, but no one noticed. The information was in the logs, but no one was looking for it. Logs from the hundreds or thousands of network devices are the secret sauce to problem solving, security alerting, and performance and capacity management. Gathering logs together, analyzing them, "
Gonzalo San Gil, PhD.

Review: Graylog delivers open source log management for the dedicated do-it-yourselfer ... - 0 views

  •  
    [... "Graylog is an open-source log management tool, complete with a three-tier architecture, super-scalable storage (based on Elasticsearch), an easy-to-use web interface, and a powerful toolkit to parse messages, build ad-hoc dashboards, and set alerts on logs. ...]
Gonzalo San Gil, PhD.

$38 Script Spawns Dozens of Free Spotify-Like Sites - TorrentFreak - 0 views

  •  
    " By Andy on February 14, 2016 C: 17 News Last month we were alerted to a beautiful site that merged the smart looks and playlists of Spotify with the music of YouTube to make a very decent free streaming service. Little did we know that almost anyone can put together a similar platform in minutes, all for an initial outlay of just $38."
Gonzalo San Gil, PhD.

Linux Today - How 'Security Fatigue' Affects Our Choices Online - 0 views

  •  
    "An overabundance of security news and alerts has led to "security fatigue," which is causing users to make bad choices when it comes to online security, suggests a report from the National Institute of Standards and Technology (NIST)."
Gonzalo San Gil, PhD.

Movie producers call for an end to the 'Six Strikes' rule [# ! Note to previous Article... - 1 views

    • Gonzalo San Gil, PhD.
       
      # ! Do You remember Yesterday... https://gonzalosangil.wordpress.com/2015/09/04/isps-and-rightsholders-extend-six-strikes-antipiracy-scheme-torrentfreak/ ...? # ! If ISPs and Rightsholders are unable to reach an agreement with Producers... what kind of 'Copyright Enforcement' is this...?
  •  
    "It may sound like the fictional government department that Patricia Arquette works for in CSI: Cyber, but that's not what the Internet Security Task Force is for. In fact, the ITSF is a group of independent film companies that have banded together to call for immediate reform on how internet piracy is handled. "
  •  
    "It may sound like the fictional government department that Patricia Arquette works for in CSI: Cyber, but that's not what the Internet Security Task Force is for. In fact, the ITSF is a group of independent film companies that have banded together to call for immediate reform on how internet piracy is handled. "
Paul Merrell

The coming merge of human and machine intelligence - 0 views

  • Now, as the Internet revolution unfolds, we are seeing not merely an extension of mind but a unity of mind and machine, two networks coming together as one. Our smaller brains are in a quest to bypass nature's intent and grow larger by proxy. It is not a stretch of the imagination to believe we will one day have all of the world's information embedded in our minds via the Internet.
  • BCI stands for brain-computer interface, and Jan is one of only a few people on earth using this technology, through two implanted chips attached directly to the neurons in her brain. The first human brain implant was conceived of by John Donoghue, a neuroscientist at Brown University, and implanted in a paralyzed man in 2004. These dime-sized computer chips use a technology called BrainGate that directly connects the mind to computers and the Internet. Having served as chairman of the BrainGate company, I have personally witnessed just how profound this innovation is. BrainGate is an invention that allows people to control electrical devices with nothing but their thoughts. The BrainGate chip is implanted in the brain and attached to connectors outside of the skull, which are hooked up to computers that, in Jan Scheuermann's case, are linked to a robotic arm. As a result, Scheuermann can feed herself chocolate by controlling the robotic arm with nothing but her thoughts.
  • Mind meld But imagine the ways in which the world will change when any of us, disabled or not, can connect our minds to computers.
  • ...2 more annotations...
  • Back in 2004, Google's founders told Playboy magazine that one day we'd have direct access to the Internet through brain implants, with "the entirety of the world's information as just one of our thoughts." A decade later, the road map is taking shape. While it may be years before implants like BrainGate are safe enough to be commonplace—they require brain surgery, after all—there are a host of brainwave sensors in development for use outside of the skull that will be transformational for all of us: caps for measuring driver alertness, headbands for monitoring sleep, helmets for controlling video games. This could lead to wearable EEGs, implantable nanochips or even technology that can listen to our brain signals using the electromagnetic waves that pervade the air we breathe. Just as human intelligence is expanding in the direction of the Internet, the Internet itself promises to get smarter and smarter. In fact, it could prove to be the basis of the machine intelligence that scientists have been racing toward since the 1950s.
  • Neurons may be good analogs for transistors and maybe even computer chips, but they're not good building blocks of intelligence. The neural network is fundamental. The BrainGate technology works because the chip attaches not to a single neuron, but to a network of neurons. Reading the signals of a single neuron would tell us very little; it certainly wouldn't allow BrainGate patients to move a robotic arm or a computer cursor. Scientists may never be able to reverse engineer the neuron, but they are increasingly able to interpret the communication of the network. It is for this reason that the Internet is a better candidate for intelligence than are computers. Computers are perfect calculators composed of perfect transistors; they are like neurons as we once envisioned them. But the Internet has all the quirkiness of the brain: it can work in parallel, it can communicate across broad distances, and it makes mistakes. Even though the Internet is at an early stage in its evolution, it can leverage the brain that nature has given us. The convergence of computer networks and neural networks is the key to creating real intelligence from artificial machines. It took millions of years for humans to gain intelligence, but with the human mind as a guide, it may only take a century to create Internet intelligence.
  •  
    Of course once the human brain is interfaced with the internet, then we will be able to do the Vulcan mind-meld thing. And NSA will be busily crawling the Internet for fresh brain dumps to their data center, which then encompasses the entire former state of Utah. Conventional warfare is a thing of the past as the cyberwar commands of great powers battle for control of the billions of minds making up BrainNet, the internet's successor.  Meanwhile, a hackers' Reaper malware trawls BrainNet for bank account numbers and paswords that it forwards for automated harvesting of personal funds. "Ah, Houston ... we have a problem ..."  
Gonzalo San Gil, PhD.

CISPA is back. - 1 views

  •  
    "This time, CISA is even worse than CISPA. The bill would give the NSA even more authority to access our data and force companies to fork over private data without a search warrant."
  •  
    "This time, CISA is even worse than CISPA. The bill would give the NSA even more authority to access our data and force companies to fork over private data without a search warrant."
Paul Merrell

The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus - The Intercept - 1 views

  • “Is this related to what we talked about before?” Bencsáth said, referring to a previous discussion they’d had about testing new services the company planned to offer customers. “No, something else,” Bartos said. “Can you come now? It’s important. But don’t tell anyone where you’re going.” Bencsáth wolfed down the rest of his lunch and told his colleagues in the lab that he had a “red alert” and had to go. “Don’t ask,” he said as he ran out the door. A while later, he was at Bartos’ office, where a triage team had been assembled to address the problem they wanted to discuss. “We think we’ve been hacked,” Bartos said.
  • They found a suspicious file on a developer’s machine that had been created late at night when no one was working. The file was encrypted and compressed so they had no idea what was inside, but they suspected it was data the attackers had copied from the machine and planned to retrieve later. A search of the company’s network found a few more machines that had been infected as well. The triage team felt confident they had contained the attack but wanted Bencsáth’s help determining how the intruders had broken in and what they were after. The company had all the right protections in place—firewalls, antivirus, intrusion-detection and -prevention systems—and still the attackers got in.
  • Bencsáth was a teacher, not a malware hunter, and had never done such forensic work before. At the CrySyS Lab, where he was one of four advisers working with a handful of grad students, he did academic research for the European Union and occasional hands-on consulting work for other clients, but the latter was mostly run-of-the-mill cleanup work—mopping up and restoring systems after random virus infections. He’d never investigated a targeted hack before, let alone one that was still live, and was thrilled to have the chance. The only catch was, he couldn’t tell anyone what he was doing. Bartos’ company depended on the trust of customers, and if word got out that the company had been hacked, they could lose clients. The triage team had taken mirror images of the infected hard drives, so they and Bencsáth spent the rest of the afternoon poring over the copies in search of anything suspicious. By the end of the day, they’d found what they were looking for—an “infostealer” string of code that was designed to record passwords and other keystrokes on infected machines, as well as steal documents and take screenshots. It also catalogued any devices or systems that were connected to the machines so the attackers could build a blueprint of the company’s network architecture. The malware didn’t immediately siphon the stolen data from infected machines but instead stored it in a temporary file, like the one the triage team had found. The file grew fatter each time the infostealer sucked up data, until at some point the attackers would reach out to the machine to retrieve it from a server in India that served as a command-and-control node for the malware.
  • ...1 more annotation...
  • Bencsáth took the mirror images and the company’s system logs with him, after they had been scrubbed of any sensitive customer data, and over the next few days scoured them for more malicious files, all the while being coy to his colleagues back at the lab about what he was doing. The triage team worked in parallel, and after several more days they had uncovered three additional suspicious files. When Bencsáth examined one of them—a kernel-mode driver, a program that helps the computer communicate with devices such as printers—his heart quickened. It was signed with a valid digital certificate from a company in Taiwan (digital certificates are documents ensuring that a piece of software is legitimate). Wait a minute, he thought. Stuxnet—the cyberweapon that was unleashed on Iran’s uranium-enrichment program—also used a driver that was signed with a certificate from a company in Taiwan. That one came from RealTek Semiconductor, but this certificate belonged to a different company, C-Media Electronics. The driver had been signed with the certificate in August 2009, around the same time Stuxnet had been unleashed on machines in Iran.
1 - 20 of 24 Next ›
Showing 20 items per page