Skip to main content

Home/ IB ITGS/ Group items tagged data

Rss Feed Group items tagged

Jeff Ratliff

Google threatens to leave China (Independent) - 2 views

  •  
    "Last month, Google discovered that it had been the subject of a sophisticated attack on its computer systems, carried out by hackers in search of private data from more than 30 internet companies. Among the targets were the accounts of Chinese human rights activists; experts claimed the hack could be traced to the Chinese government or its proxies. In response, Google announced on Tuesday that it would stop censoring results on Google.cn - the Chinese version of its search engine - or, should Beijing oppose the move, cease operating in China altogether. "
Chalana Perera

Cyber-attack Trends in US Corporations - Statistics (Biz Forum) - 1 views

  •  
    This document gives an in-depth analysis into the impacts on US Corporations and non-government businesses/private firms and contractors. It includes many statistics and reviews as well as collected data from a variety of sources.
anonymous

Facebook Demographics and Statistics Report 2010 (IStrategy Labs) - 0 views

  •  
    Data table showing information of growth of Facebook. Divided into sections such as gender, age, geography, current enrollment, Interests, Users, Percentage usage, and Growth. 
dr tech

'Our notion of privacy will be useless': what happens if technology learns to read our ... - 1 views

  •  
    "In a world first, in September 2021, Chilean law makers approved a constitutional amendment to enshrine mental integrity as a right of all citizens. Bills to regulate neurotechnology, digital platforms and the use of AI are also being worked on in Chile's senate. Neuro rights principles of the right to cognitive liberty, mental privacy, mental integrity, and psychological continuity will be considered. Europe is also making moves towards neuro rights. France approved a bioethics law this year that protects the right to mental integrity. Spain is working on a digital rights bill with a section on neuro rights, and the Italian Data Protection Authority is considering whether mental privacy falls under the country's privacy rights."
ajay tambay

Forecasting Malicious Internet Attacks - 0 views

  • cyberspace is dominated by it
    • ajay tambay
       
      IT Systems - Internet
  • Today, computer scientists outline a new way of predicting the next attack so that you can block it in advance.
    • ajay tambay
       
      Social - Security
  • Last year, computer scientists began exploring a potentially more effective approach: predicting the sites most likely to attack and blocking them in advance. The technique, called highly predictive blacklisting, uses data from past attacks to create a network-type graph out of the pattern of links between victims .
    • ajay tambay
       
      Impact - Business, education
Joe Chiverton

Credit and Debit cards stolen worth 130m - 0 views

  • Mr Gonzalez, who had once been an informant for the US Secret Service helping to track hackers, is already in custody on separate charges of hacking into the computer systems of a national restaurant chain and eight major retailers, including TJ Maxx, involving the theft of data related to 40 million credit cards.
    • Joe Chiverton
       
      This is why i put Social issues as security. As he used to work for the government trying to find hackers, therefore knowing how everything works.
Jeewon Yoon

Technology Review: Blogs: arXiv blog: How to Forecast Malicious Internet Attacks - 0 views

  • Today, computer scientists outline a new way of predicting the next attack so that you can block it in advance.
    • Jeewon Yoon
       
      Social Security
  • The technique, called highly predictive blacklisting, uses data from past attacks to create a network-type graph out of the pattern of links between victims . It then runs a Google PageRank type algorithm for each victim looking for the most relevant attackers.
    • Jeewon Yoon
       
      IT Systems Communication systems
Shih-Chen Chiu

BBC NEWS | Technology | Facebook changes privacy policy - 0 views

  • be more transparent about what data it collects and why.
    • Farah Alam
       
      social and ethical issues- privacy the user will be able to know why facebook wants certain information and not give it to them if they think its not justified and maintain their privacy.
  • privacy settings and make it clear to users that they can delete or deactivate an account
    • Farah Alam
       
      IT systems- communication systems are involved ( internet)
  • The country is the first to complete a full investigation of Facebook's privacy practices.
    • Farah Alam
       
      IMPACT- science. through their investigation they are able to find out more(and also create more jobs)
  • ...4 more annotations...
  • There are around 950,000 developers in 180 countries who provide applications for the site.
  • social network
  • Facebook's Michael Richter said if a user chose to deactivate their account, the site would still store their information "even if it is for 10 years".
  • "Application developers have had virtually unrestricted access to Facebook users' personal information,"
    • Salman Rushdi
       
      Social and Ethical issue Impacting on privacy.-sharing information through an unclear privacy policy
Jason Carlson

If You're Not Seeing Data, You're Not Seeing | Gadget Lab | Wired.com - 0 views

  •  
    As you shove your way through the crowd in a baseball stadium, the lenses of your digital glasses display the names, hometowns and favorite hobbies of the
iman mustafa

Privacy for palm consumers - 0 views

  • The discovery was made by software developer and Pre owner Joey Hess, who found that his phone was reporting his location over a secure connection back to Palm. It also sent back information about application crashes - even those not seen by a Pre owner.
  • It added: "Our privacy policy is like many policies in the industry and includes very detailed language about potential scenarios in which we might use a customer's information, all toward a goal of offering a great user experience."
  • The company issued a statement after one owner discovered his phone was sending data every day back to Palm.
Alex David

Hackers hit Twitter and Facebook - 0 views

  • in January this year Twitter announced that 33 accounts had been hacked, including those belonging to US President Barack Obama and singer Britney Spears.
    • Alex David
       
      Social & Ethical issues- security , privacy& anonymity
  • Denial-of-service (DOS) attacks take various forms but often involve a company's servers being flooded with data in an effort to disable them.
    • Alex David
       
      II Systems- Communication Systems
  • Twitter was taken offline for more than two hours whilst Facebook's service was "degraded", according to the firms.
    • Alex David
       
      Areas of impact- "Politics & government" & "Arts, Entertainment & Leisure"
Chalana Perera

Exploiting Browser Information & Privacy - 0 views

  • easy it was to exploit security loopholes
    • Chalana Perera
       
      Easy exploitation leads to a lot of negative consequences and areas of impact include all sorts of education online, banking and financial reserves, businesses and mainstream market affairs, governmental and nongovernmental work and damage to personal information and biological/health data. This also harms intellectual property and ideas can be stolen online far easier than usual... reliability & security....
  • redirect traffic
    • Chalana Perera
       
      Redirecting internet connection or regular user traffic could lead to a backlog of information on the web and a loss of personal details and this again as huge areas of impact including security, reliability and extended impact on finances and personal details & anonymity....this also affects systems in the social context with networks being hacked and codes and enscriptions being changed..
  • access and steal any information exchanged
    • Chalana Perera
       
      Stealing information can also connect to software and the usage/creation tools of software and other application....communication systems are also greatly affected such as wire tapping systems
Chalana Perera

Large-scale Credit Card Fraud - 0 views

  • identity theft
    • Chalana Perera
       
      SOCIAL --> Privacy, Control & Security
  • internet and telephone transactions
    • Chalana Perera
       
      concerns/impacts networking systems but also social issues regarding privacy, loss of information and security & anonymity.
  • payment systems of retailers, including the 7-Eleven chain.
  • ...7 more annotations...
  • This is a fairly common way that fraudsters try to gain access to consumers' card details.
  • Once they find a weakness, they insert a specially designed code into the network that allows them to access card details.
  • "a pretty standard way" for fraudsters to try to access personal data.
  • any victim of fraud would "always be refunded in full".
  • corporate victims included Heartland Payment Systems - a card payment processor - convenience store 7-Eleven and Hannaford Brothers, a supermarket chain, t
  • ckers, is already in custody on separate charges of hacking into the computer systems
  • that online, telephone and mail order fraud were on the increase, along with fraud committed abroad
  •  
    Great article Chalana. :)
‹ Previous 21 - 40 of 51 Next ›
Showing 20 items per page