Skip to main content

Home/ IB ITGS/ Group items tagged IMPACT

Rss Feed Group items tagged

Jeewon Yoon

Technology Review: Blogs: arXiv blog: How to Forecast Malicious Internet Attacks - 0 views

  • Today, computer scientists outline a new way of predicting the next attack so that you can block it in advance.
    • Jeewon Yoon
       
      Social Security
  • The technique, called highly predictive blacklisting, uses data from past attacks to create a network-type graph out of the pattern of links between victims . It then runs a Google PageRank type algorithm for each victim looking for the most relevant attackers.
    • Jeewon Yoon
       
      IT Systems Communication systems
Zaheen Ahmad

Hackers Break Into Police Computer | Australian Federal Police - 1 views

  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • ...15 more annotations...
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
    • Salman Rushdi
       
      Security: Security consultants are involved therefore it is a security issue.
  • accessed both police evidence and intelligence about federal police systems such as its IP addresses.
    • Salman Rushdi
       
      IT SYS APPS: When they have access to police evidenceit includes images and recordings.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • me came undone after the officers forgot to set a password. Last Wednesday, federal po
  • These included shots of files containing fake IDs and stolen credit card numbers, as well as the federal police's server information.
    • Salman Rushdi
       
      Politics: Govt information and files has been hacked. Against the law.
  • We can operate in a covert activity here fairly seamlessly with no harm to our members with continual and actual significant penetration,
  • the administrator of an underground hacking forum, r00t-y0u.org, which had about 5000 members.
  • These dipshits are using an automatic digital forensics and incident response tool,
Ali Parrish

Music Copyrighting - 0 views

  • the Business Software Alliance is a "far less unpopular organization" than the RIAA. I think the answers are quite illuminating. First, BSA's members have always offered their products for sale to the public, through any channel that wants to sell them. Second, BSA's members are consumer-oriented; they try to develop products that respond to consumers' needs, and not, the reverse: focusing on what they want to sell to consumers.
  • It is true that there have in the past been complaints about the music industry from the public and retailers -- retailers, almost all of whom have been driven out of business. These complaints are though about poor business practices, not business practices. The complaints aren't that the record industry is a business, but that it has been poorly run as a business.
  • The CD is not a fair fight with the download.
  • ...1 more annotation...
  • Third, because consumers can easily purchase BSA's members products, those who copy without paying are simply scofflaws. I think the fact that the public does not object to BSA's campaign proves my point and disproves yours and the music industry's: people do not want things for free; they are willing to pay for them. If people were simply thieves, then they would have an even stronger reaction against the BSA because the price spread between copying and buying is so much vaster than with music.
Risa Yokoi

Switching TV signal from analogue to digital - 0 views

  • The process of turning off the analogue television signal in Wales begins
  • It means that viewers who do not have digital will not be able to see BBC Two from Wednesday, and then they will lose all channels within a month
  • Digital UK said 90% of homes in Wales already had digital TV
  • ...4 more annotations...
  • process of turning off traditional analogue TV signals
  • "The UK is going digital, the US has already gone digital, some European countries as well.
  • It helps people of my age and it helps people who are very lonely," she said. "It brings life into the home when I can't get out. I couldn't be without it if I tried. I love my TV, I always have.
  • confusion leading to people being overcharged when changing
Farah Alam

Slashdot IT Story | Hackers (Or Pen-Testers) Hit Credit Unions With Malware On CD - 0 views

  • The discs have been showing up at credit unions around the country recently, a throwback to the days when viruses and Trojans were distributed via floppy disk.
  • the infected CDs
  • rather than an actual attack.
Ali Parrish

Nokia: New Laptop Offering - 0 views

  • The Booklet also has integrated Bluetooth, GPS, a webcam and an SD card reader. Nokia claims it has a 12-hour battery life.
  • "The presence of this internal wireless modem is why the Booklet 3G is a natural extension to Nokia's traditional phone handset product range."
  • "A growing number of people want the computing power of a PC with the full benefits of mobility," said Kai Oistamo, Nokia's executive vice president for devices.
  • ...3 more annotations...
  • The Booklet has an aluminium case, weighs 1.25 kilograms (2.75 lbs) and its 10-inch screen is HD-ready.
  • Mr Fogg said the Booklet's unique selling point was an "internal mobile broadband card with a SIM slot." "Other netbooks rely on external USB mobile broadband modems for Internet access," he wrote on his blog.
  • The Windows-based device is about 2cm thick and will offer 3G connectivity as well as wi-fi.
Zaheen Ahmad

BBC NEWS | Technology | 'Exploding' iPhones investigated - 0 views

  • iPhones and iPods heating up or bursting into flames in the US and the UK.
    • Kavita van der Loop
       
      hardware issue - IT systems
  • The system issue alerts for multiple products every week, sometimes leading to mass product recalls, but often with no consequence.
    • Kavita van der Loop
       
      consumer safety system it systems
  • "I took it out of my pocket and held it to my ear and saw the screen crack up like a car windscreen," he told AFP.
  • ...2 more annotations...
  • It has been reported that the device's lithium ion batteries could be the source of the problem.
  • Apple, which has sold 26 million iPhones and 200 million iPods to date, said it was aware of the reports.
iman mustafa

Twitter, Facebook attack targeted one user - 0 views

  • The blogger, who uses the account name "Cyxymu," (the name of a town in the Republic of Georgia) had accounts on all of the different sites that were attacked at the same time, Max Kelly, chief security officer at Facebook, told CNET New
  • A Georgian blogger with accounts on Twitter, Facebook, LiveJournal, and Google's Blogger and YouTube was targeted in a denial-of-service attack that led to the sitewide outage at Twitter and problems at the other sites on Thursday, according to a Facebook executive.
  • Kelly declined to speculate on who was behind the attack, but he said: "You have to ask who would benefit the most from doing this and think about what those people are doing and the disregard for the rest of the users and the Internet."
Sanchit Jain

Castle 'rebuilt' in virtual world-TOURS OFFERED! - 0 views

  • The 1740 virtual castle was cloned and then torn down to leave it looking like today's ruin.
  • Second Life is the best-known virtual world on the internet.
  • People are shown as digital versions of themselves, known as avatars, who can build homes and businesses, buy and sell land and have relationships.
iman mustafa

Spam offers to let people use their PC to attack Obama site - 0 views

  • The e-mail message says: "If You dont like Obama come here, you can help to ddos his site with your installs."
  • It's not clear whether the software does turn the computer into a DoS attacking zombie, or what it does, if anything. But it would be crazy to expose your computer like that, regardless of your political leanings.
anonymous

Israeli website was hacked and pictures of wounded Palestinians - 0 views

  • Attackers on the official Kadima website posted images of wounded Palestinians and the aftermath of suicide bombings in Israel.
    • anonymous
       
      Internet system because it involves hacking into a website
  • According to AP news agency, the hacked web page was signed Gaza Hacker Team.
    • anonymous
       
      Secutiry and privacy, this shows that those things were violated.
  • Kadima, a centrist political party that favours a two-state solution to the Middle East conflict, is the largest party in the Israeli parliament. It was unable to form a government, and is currently in opposition.
    • anonymous
       
      Shows policital issues between the two states and how they have technology helps create more effects.
« First ‹ Previous 121 - 140 of 471 Next › Last »
Showing 20 items per page