Skip to main content

Home/ ARIN6902 Internet Cultures and Governance/ Group items tagged Internet security

Rss Feed Group items tagged

marinecf

Computers, Children and the Digital Divide | Special English | Learning English - 1 views

  •  
    The author puts forward that giving access to computer to children from developing countries is a remarkable opportunity for them but could alsobe a threat as they are not being familiarised with the dangers of the Internet.
Bujuanes Livermore

Yahoo proposes to hack DNS in the implementation of IPv6 - 0 views

  •  
    Yahoo has made public its proposal to hack the domain name system (DNS) so as to resolve issues with migrating to IPv6 from IPv4. Internet protocol version 4 (IPv4) was the first widely deployed version of IP that supports 32 bit addresses (equating to 4,294,967,296). The issue of exhausting the 32 bit address allocation was identified in the 1990's, prompting the development of IPv6. IPv6 supports 128 bit addresses, obviously offering a more expansive address system. The article claims that a 'significant percentage of internet users have broken IPv6 connectivity'. Yahoo thus proposes to switch users to IPv4 connectivity once detection of broken IPv6 connectivity is realised. Yahoo will forward its proposal to the Internet Engineering Task Force, however questions of DNS trust and security will surely be the two topics of debate in testing this proposal.
Rachael Bolton

Cybersecurity meet ends with calls for global cooperation - 0 views

  •  
    Government and industry leaders in the US call for international cooperation on internet security. The three-day conference discussed issues ranging from cyberterrorism to organised cybercrime. Measures suggested included "cyber defense exercises" and enlisting the support of the private sector.
yunju wang

Identity theft crisis worsens for ID security CEO | Technically Incorrect - CNET News - 0 views

  •  
    Almost everyone has an online identity in several different sites, in ordering to make our life "easier" we can now do lots of things from the internet. but how safe is this realm? Our online identity may be easily stolen than what we expected.
yunju wang

a set of: coming down from the cloud - 1 views

  •  
    blog entry: the security concern for cloud computing.
Gina Spithakis

Email scam targets Facebook - 0 views

  •  
    Once again, a social networking site Facebook is targeted, this time through email.
Gina Spithakis

Cyber crime made easy; A burgeoning service industry is springing up around the creatio... - 0 views

  •  
    With technology making it easier to for computer novices to steal user ids and data, now anyone can become a cybercriminal. This article showcases how easy it is to buy Zeus online, malware software which is used to steal information including online banking user ids and passwords and even security plans of US airports. Does accessibility turn you into a criminal? I still think if you're going to be a criminal you will find a way. Technology is certainly making it easier but you will only search for ways to hack into user info if you intend to steal in the first place.
Gina Spithakis

Verizon security expert optimistic about progress on cybersecurity - 1 views

  •  
    According to Peter Tippett, Vice President, Verizon, we will see far fewer cyber attacks by 2020, with the majority of them becoming targetted attacks instead. This will be aided by increased use of reputation systems and automation that will help users avoid sites and emails with malicious content.
anonymous

Facebook users concerned about privacy, says survey - 26 April 2010 - 0 views

  •  
    Interesting article based on survey that give details and updated information about Facebook stressing privacy issues. The survey has been made by F-Secure, an internet security firm with a sample of 450 Facebook users This article has been published three days after another one titled: "Facebook in new privacy row". See the link below: http://www.telegraph.co.uk/technology/facebook/7623492/Facebook-in-new-privacy-row.html
Sarah Manson

Cyberattack on Google Said to Hit Password System - NYTimes.com - 0 views

  •  
    Google has released the extent to which intruders broke into their system in January. It targeted their password system which controls access to users worldwide. This brings up the debate about the security and privacy of systems like Google that centralize personal information. However, the real issue behind this attack was that it was traced to two computers in China which then started the whole 'Google to change its policy toward China'.
Claudine Pache

Google sees 'everything'...The Australian - 1 views

  •  
    "Google sees 'everything'"\nLooks at cloud computing, benefits, and risks to security. Interesting point around search practices with Google "..everybody is constantly asking Google about the things they're working on. In effect, we're putting a tremendous amount of faith in Larry and Sergey and their claim that they don't do evil".
paul silmonet

Instant Fix Slow Computer Solutions - 0 views

I bought a brand new PC with good specifications just last month. But only three weeks of use, I noticed that my PC froze and slowed down a bit. For the next three days, it continued to slow down. ...

Fix Slow Computer internet governance Internet #ARIN6902 censorship government privacy governance google Facebook australia

started by paul silmonet on 08 Jun 11 no follow-up yet
Tom Champion

Transparency and Trust are the Keys to Online Success - 0 views

  •  
    On Thursday April 1st, the Ontario Securities Commission (OSC) - the Canadian equivalent to the SEC, put forth allegations against Agoracom.com an online investor relations forum for seeding fake conversations throughout their investor message board community. The allegations describe a scenario of more than 24,000 fraudulent posts made by 670 different accounts In the amount of time it took to create all these fake posts and different accounts, maybe they could have done something constructive? People don't seem to realise how much their actions are tracked on the internet. Beyond embarrassing, it's also becoming a grounds for legal action
Gina Spithakis

Google "Received Your Resume" Malware Email - 0 views

  •  
    Here's an example of how malware is distributed globally - usually via email. This is the latest one reported on the hoax slayer site. This is also a handy site to visit to check the latest online scam or hoax
Gina Spithakis

Cyber crooks target banks, social networks: report - 1 views

  •  
    Social networks become the prime target for cybercrime, according to a Cisco report. Malicious code is masked as an online game on a social networking site, that once clicked, infects the user's computer without them knowing
Gina Spithakis

Cyber virus targets online banking log-ins - 0 views

  •  
    Banks were the target of the clampi cyber virus which basically stole the online banking details of those using infected computers
Gina Spithakis

A Key Weapon to Thwart Cybercrime - 0 views

  •  
    The FBI cracks down on online crime as part of Operation Cyber Sweep in 2003. Although some would argue, that protecting users in the first place would be far more useful
Andra Keay

US reveals concerns over Conroy's net filter plan | Article | The Punch - 0 views

  •  
    Aust slammed by Google and US State Dept - they're the only ones allowed to filter (for agreed public good while maintaining fiction of unconstrained freedom).
Stephen Murphy

Botnet Sizes - Graphical Representation - Shadow Server - 0 views

  •  
    Organisation that monitors the Botnet size 24/7. Its quite interesting that as the internet and networks continue to grow so do the 'bandwidth leeching' botnets that are only on the rise even the efforts to shutdown specific bot nets. Check out the graphs across different time spans.
César Albarrán Torres

EDITORIAL: TSA to download your iTunes? - Washington Times - 0 views

  • Federal security workers are now free to snoop through more than just your undergarments and luggage at the airport. Thanks to a recent series of federal court decisions, the digital belongings of international fliers are now open for inspection. This includes reading the saved e-mails on your laptop, scanning the address book on your iPhone or BlackBerry and closely scrutinizing your digital vacation snapshots.
  • In other words, simply because a U.S. citizen is returning from a foreign country by airplane, the government thinks it is a "routine" matter to download sensitive business documents, personal correspondence and any other information that might be saved on a laptop or cell phone, regardless of whether there is any reason to suspect the traveler of a crime.
  •  
    Creepy: airport checks might now include checking the files in your laptop. 
‹ Previous 21 - 40 of 48 Next ›
Showing 20 items per page