Skip to main content

Home/ IB ITGS/ Group items tagged Integrity

Rss Feed Group items tagged

Zaheen Ahmad

Hackers Break Into Police Computer | Australian Federal Police - 1 views

  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • ...15 more annotations...
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
    • Salman Rushdi
       
      Security: Security consultants are involved therefore it is a security issue.
  • accessed both police evidence and intelligence about federal police systems such as its IP addresses.
    • Salman Rushdi
       
      IT SYS APPS: When they have access to police evidenceit includes images and recordings.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • me came undone after the officers forgot to set a password. Last Wednesday, federal po
  • These included shots of files containing fake IDs and stolen credit card numbers, as well as the federal police's server information.
    • Salman Rushdi
       
      Politics: Govt information and files has been hacked. Against the law.
  • We can operate in a covert activity here fairly seamlessly with no harm to our members with continual and actual significant penetration,
  • the administrator of an underground hacking forum, r00t-y0u.org, which had about 5000 members.
  • These dipshits are using an automatic digital forensics and incident response tool,
Ali Parrish

Nokia: New Laptop Offering - 0 views

  • The Booklet also has integrated Bluetooth, GPS, a webcam and an SD card reader. Nokia claims it has a 12-hour battery life.
  • "The presence of this internal wireless modem is why the Booklet 3G is a natural extension to Nokia's traditional phone handset product range."
  • "A growing number of people want the computing power of a PC with the full benefits of mobility," said Kai Oistamo, Nokia's executive vice president for devices.
  • ...3 more annotations...
  • The Booklet has an aluminium case, weighs 1.25 kilograms (2.75 lbs) and its 10-inch screen is HD-ready.
  • Mr Fogg said the Booklet's unique selling point was an "internal mobile broadband card with a SIM slot." "Other netbooks rely on external USB mobile broadband modems for Internet access," he wrote on his blog.
  • The Windows-based device is about 2cm thick and will offer 3G connectivity as well as wi-fi.
iman mustafa

Spam offers to let people use their PC to attack Obama site - 0 views

  • The e-mail message says: "If You dont like Obama come here, you can help to ddos his site with your installs."
  • It's not clear whether the software does turn the computer into a DoS attacking zombie, or what it does, if anything. But it would be crazy to expose your computer like that, regardless of your political leanings.
Chalana Perera

Exploiting Browser Information & Privacy - 0 views

  • easy it was to exploit security loopholes
    • Chalana Perera
       
      Easy exploitation leads to a lot of negative consequences and areas of impact include all sorts of education online, banking and financial reserves, businesses and mainstream market affairs, governmental and nongovernmental work and damage to personal information and biological/health data. This also harms intellectual property and ideas can be stolen online far easier than usual... reliability & security....
  • redirect traffic
    • Chalana Perera
       
      Redirecting internet connection or regular user traffic could lead to a backlog of information on the web and a loss of personal details and this again as huge areas of impact including security, reliability and extended impact on finances and personal details & anonymity....this also affects systems in the social context with networks being hacked and codes and enscriptions being changed..
  • access and steal any information exchanged
    • Chalana Perera
       
      Stealing information can also connect to software and the usage/creation tools of software and other application....communication systems are also greatly affected such as wire tapping systems
Chalana Perera

Large-scale Credit Card Fraud - 0 views

  • identity theft
    • Chalana Perera
       
      SOCIAL --> Privacy, Control & Security
  • internet and telephone transactions
    • Chalana Perera
       
      concerns/impacts networking systems but also social issues regarding privacy, loss of information and security & anonymity.
  • payment systems of retailers, including the 7-Eleven chain.
  • ...7 more annotations...
  • This is a fairly common way that fraudsters try to gain access to consumers' card details.
  • Once they find a weakness, they insert a specially designed code into the network that allows them to access card details.
  • "a pretty standard way" for fraudsters to try to access personal data.
  • any victim of fraud would "always be refunded in full".
  • corporate victims included Heartland Payment Systems - a card payment processor - convenience store 7-Eleven and Hannaford Brothers, a supermarket chain, t
  • ckers, is already in custody on separate charges of hacking into the computer systems
  • that online, telephone and mail order fraud were on the increase, along with fraud committed abroad
  •  
    Great article Chalana. :)
Sanchit Jain

DNA Evidence Can Be Fabricated - 0 views

  • they could construct a sample of DNA to match that profile without obtaining any tissue from that person.
    • Sanchit Jain
       
      there is no individuality, aynbody can be "created".SOCIAL
  • You can just engineer a crime scene,”
    • Sanchit Jain
       
      Science and the Environment, Politics and Government IMPACT
  • A potential invasion of personal privacy is another.
    • Sanchit Jain
       
      Control, Policies and Standards, Integrity SOCIAL
  • ...1 more annotation...
  • stored in law enforcement databases as a series of numbers and letters corresponding to variations at 13 spots in a person’s genome.
    • Sanchit Jain
       
      IT SYSTEMS: basic hardware, used in the process to create DNA
  •  
    they could construct a sample of DNA to match that profile without obtaining any tissue from that person.
Omkar Naik

BBC NEWS | UK | Small town 'online crime hotspot' - 0 views

  • Last year, 24% of all internet purchases there were made using stolen credit card details, according to security company The Third Man.
  • Durham Police say investigations are being hampered because people are told to report fraud to their banks first.
  • Shildon, in the DL area, is a former industrial town with a population of 10,000, and police believe that just one or two people may be responsible for the crime wave.
Kavita van der Loop

Privacy of Facebook - 0 views

  • limit application developers' access to user information,
    • Kavita van der Loop
       
      social impact - control/ privacy
  • deactivated account information should be deleted
    • Kavita van der Loop
       
      ongoing privacy issue - social impact
‹ Previous 21 - 40 of 64 Next › Last »
Showing 20 items per page