Skip to main content

Home/ Internetni praktikum/ Group items tagged threats

Rss Feed Group items tagged

Nuša Gregoršanec

BBC News - Child safety measures to protect against internet threats - 0 views

  • Child safety measures to protect against internet threats
  • In a poll of over 19,000 parents and children conducted by security firm Norton, 7% of UK parents said they had absolutely no idea what their kids were up to on their computers and phones.
  • Even more worryingly, 30% (39% worldwide) said they had suffered a "serious" negative experience. This included, among other things, invitations to meet online "friends" in real life and exposure to indecent pictures of someone they did not know.
  • ...7 more annotations...
  • The ever-growing adoption of social networks, instant messages and mobile communication leaves the door open to more subtle attacks - both of a technological and psychological nature.
  • "Parents must realise that technology alone can't keep children safe online," Deborah Preston, the company's internet security advocate.
  • "To be truly safe it requires not only technology, but also a combination of open and ongoing dialogue and education between parents and children."
  • On social networks, account hijacking - where a child's account is accessed for a practical joke or more sinister purposes - can cause considerable distress.
  • A poll by Virgin Media suggests that 38% of parents whose children have suffered from cyberbullying feel unable to protect them due to a lack of knowledge and understanding of how the online world works.
  • This, Mr Abdul argued, could only be solved through greater education and a more honest understanding from parents about how real and damaging the effects of online bullying could be.
  • Mr Abdul added, the correct software, education and parental supervision means children can also be protected both at home and away.
mancamikulic

Google Glass: is it a threat to our privacy? | Technology | The Guardian - 1 views

  • glasses that can shoot video, take pictures, and broadcast what you're seeing to the world
  • They weren't due to get them until last Friday
  • Google Glass is the most hotly anticipated new arrival in "wearable computing"
  • ...46 more annotations...
  • from "mainframe" computers
  • Google's idea is that you need only speak to operate it
  • "OK, Glass, take video!"
  • The only other way to get that point of view is to strap a camera to your head.
  • And yet people are already beginning to fret about the social implications of Glass
  • the question of privacy
  • how will we behave in groups
  • David Yee, the chief technology officer at a company called Editorially
  • Yee's worry was that the young person might be filming everything
  • Joshua Topolsky
  • have tried out Google Glass
  • This is the company that has repeatedly breached the boundaries of what we think is "private".
  • forgetting that sometimes deadly enemies have mutual friends
  • use of personal data without an individual's clear consent.
  • So how comfortable – or uneasy – should we feel about the possibility that what we're doing in a public or semi-public place (or even somewhere private) might get slurped up and assimilated by Google?
  • Oliver Stokes
  • ou could inadvertently become part of somebody else's data collection – that could be quite alarming
  • Now it's going to be able to compute what it is you're looking at.
  • Song Chaoming
  • nalysing mobile phone records
  • how your smartphone is able to show where you are on an onscreen map
  • Social media
  • Where the five million are the wearers of Glass – and the one monitor is Google
  • Google probably knows what you're going to do before you do.
  • Twitter
  • we're more used to the snatched photo or video that tells a story
  • Google doesn't want to discuss these issues.
  • this is a live issue,
  • One of the reasons they're doing Explorers is to get feedback on these things
  • how will we behave with each other?
  • hows data such as your speed, altitude, and even ski-resort maps
  • Concentrating on what was in front of me wasn't hard
  • they do it without letting others realise you are doing anything
  • we get too deeply involved with our technology
  • she pointed out how smartphones change us:
  • Topolsky
  • It brought something new into view
  • the more I used Glass the more it made sense to me; the more I wanted it."
  • how text messages or phone calls would just appear as alerts
  • Glass makes you feel more powerful
  • Hurst
  • is likely to be annoying
  • here's where the problems really start – you don't know if they're taking a video of you.
  • body language change
  • model seems to require voice control
  • how much are we going to share with others
Katja Saje

Google Glass: is it a threat to our privacy? | Technology | The Guardian - 0 views

  • Google Glass is the most hotly anticipated new arrival in "wearable computing" – which experts predict will become pervasive.
  • The next stage is computers that fit on to your body, and Google's idea is that you need only speak to operate it.
  • (To activate Glass you need to tilt your head, or touch the side, and then say, "OK Glass, record a video" or "OK Glass take a picture".)
  • ...6 more annotations...
  • Google has become the company which knows where you are and what you're looking for. Now it's going to be able to compute what it is you're looking at."
  • For Google, "privacy" means "what you've agreed to", and that is slightly different from the privacy we've become used to over time. So how comfortable – or uneasy – should we feel about the possibility that what we're doing in a public or semi-public place (or even somewhere private) might get slurped up and assimilated by Google?
  • The first, and most obvious, is the question of privacy. The second is: how will we behave in groups when the distraction of the internet is only an eye movement away?
  • we already live in a world where the boundaries of what's private and what's public are melting.
  • Google doesn't want to discuss these issues. "We are not making any comment," says a company spokesperson. But other sources suggest that Google's chiefs know that this is a live issue, and they're watching it develop.
  • "People will have to work out what the new normal is,"
Katja Saje

Readers' privacy is under threat in the digital age | Books | The Guardian - 1 views

  • Every time you read a newspaper on your computer or buy an ebook, you can leave an electronic trail behind you. That trail is potentially lucrative for business, and is a new source of surveillance for government and law enforcement.
  • Retailers and search engines, most notably Amazon and Google, can now gather an astonishingly detailed portrait of our book-reading habits: what we buy, what we browse, the amount of time we spend on a page and even the annotations we make in an ebook.
  • Amazon also reserves the right to disclose information when it "believes release is appropriate to comply with the law". A stronger protection for our privacy should require a warrant before personal data is released.
  • ...2 more annotations...
  • Awareness of the problem is growing, from Google's catastrophic launch of its social network Buzz in 2010, which shared users' contacts without their permission, to the revelation last year that Facebook was still tracking users' browsing information after they had logged out.
  • The new possibilities for surveillance undermine the fundamental privacy of the act of reading.
Patricija Čelik

International cooperation is needed to make the internet safe for the world - Telegraph - 0 views

  • However, a severe downside is the challenge to data security and personal privacy. The internet is now overrun with cyber attacks and hackers. Internet security has become a very serious and common concern for the entire world.
  • Recently the American company Mandiant published a report on cyber security. This report accuses China of being the origin of most cyber attacks and portrays China as an arch-hacker.
  • Cyber attacks by nature are transnational, anonymous and deceptive. It is extremely difficult to ascertain the source of any attack. Cyber attacks launched from stolen or faked IP addresses take place around the world on daily basis.
  • ...3 more annotations...
  • China is a serious victim of cyber attacks.
  • The Chinese government is committed to international cooperation against cyber crime.
  • In September 2011 China and Russia jointly submitted to the United Nations a draft International Code of Conduct for Information Security. China is deeply sincere in seeking cooperation to tackle cyber crime. This common threat needs the participation of the whole international community.
metapavlin

European Parliament Rejects Anti-Piracy Treaty - NYTimes.com - 1 views

  • rejected an international treaty to crack down on digital piracy, a vote that Internet freedom groups hailed as a victory for democracy but that media companies lamented as a setback for the creative industries.
  • European legislators
  • Anti-Counterfeiting Trade Agreement, or ACTA, which has been signed by the United States, Japan, Canada, Australia, South Korea and a number of individual E.U. members.
  • ...4 more annotations...
  • unauthorized sharing of music, movies and other digital media. Treaty opponents had rallied tens of thousands of protesters to the streets of European capitals last winter, dangling the threat that approval of the pact would lead to the proliferation of anti-piracy measures.
  • “Hello democracy, goodbye ACTA.”
  • The vote, they added, would hurt efforts to reduce online copyright theft, potentially costing Europe jobs at a time when it desperately needs them.
  • “It’s a political symbol on an enormous scale, in which citizens of the world, connected by the Internet, have managed to defeat these powerful, entrenched industries.”
Patricija Čelik

Next generation of social media 'exposing girls to sexual abuse' - Online - Media - The... - 0 views

  • A new breed of social media websites is leaving young people open to cyber bullying, with anonymous users able to bombard others with sexually explicit messages and demands.
  • The anonymity provided by the sites has made them a hotbed for sexual pressure, bullying and abuse.
  • Despite little mainstream media coverage, “question and answer” websites such as ask.fm, qooh.me and formspring.me have exploded in popularity
  • ...1 more annotation...
  • Browsing some of the sites for just a few minutes reveals a torrent of sexual demands, explicit questions and abusive threats to users whose photos suggest they are young teenage girls.
Jan Keček

Cyber-security: To the barricades | The Economist - 0 views

  • European Commission and the White House have set out a series of new rules designed to stem the rising tide of cyber-attacks against public and private victims.
  • Alongside his state-of-the-union message on February 11th, Barack Obama released an executive order intended to plug the gap left by the failure of Congress to pass cyber-security legislation that matches the growing threat.
  • By contrast, the European Commission’s cyber-security strategy is at an earlier stage. It wants member countries to introduce laws compelling important firms in industries such as transport, telecoms, finance and online infrastructure to disclose details of any attack they suffer to a national authority, known as a CERT (Computer Emergency Response Team). Each CERT will be responsible for defending vital infrastructure-providers against online attacks and sharing information with its counterparts, law-enforcement agencies and data-protection bodies.
  • ...1 more annotation...
  • What neither the European nor American measures deal with directly is the shortage of cyber-security specialists. A gloomy review of the British government’s strategy by the National Audit Office, a spending watchdog, said the skills gap could take 20 years to bridge.
donnamariee

BBC News - O2's Tu Go aims to challenge Skype and other Voip apps - 0 views

  • O2 has launched an app which lets users make and receive phone calls and texts via a tablet, computer or smartphone. Tu Go is available for Android, Apple's iOS devices and Windows 7 PCs but limited to "pay monthly" subscribers - so excludes corporate accounts.
  • Users can be logged into the service on up to five devices at once - meaning all will ring if they receive a call - including handsets using Sim cards associated with different networks and internet enabled gadgets such as iPods.
  • The effort represents the telecom industry's latest attempt to tackle competition from Skype and other third-party Voip services. These typically do not charge for app-to-app calls, but do require the user to buy credit if they want to call or send a text to a standard mobile or landline number.
  • ...2 more annotations...
  • But the scale of the threat was highlighted earlier this week when the chairman of China Mobile - the world's largest telecom carrier - said his firm was now more concerned about the challenge posed by Microsoft's Skype and Tencent's WeChat services than it was about competition from China's rival mobile networks.
  • There are already dozens of Voip apps on the market including lesser-known names such as Tango, Fring, Bria and Zerofone as well as manufacturer's own services including BlackBerry BBM and Apple's Facetime.
nikasvajncer

Leading article: Thanks to the internet, the customer is king again. Long may he reign ... - 0 views

  • TripAdvisor, the consumer website for travellers, faces the threat of a lawsuit from hoteliers and others who claim they are being damaged by unsubstantiated and malicious reviews. The website, it appears, may have to fight its corner in court.
  • The internet has increased consumer power and started to even up the balance.
  • The internet has given ordinary consumers a voice. And if existing sites have their wings clipped by disgruntled businesses, others will simply spring up to replace them.
Katja Jerman

Letters: Big data and big problems for personal information | Technology | The Guardian - 0 views

  • describes a new product to collect and mine user data online
  • PII is a predetermined list of attributes that could identify an individual
  • personally identifiable information?
  • ...5 more annotations...
  • Identifiably personal information (IPI, if you must) is any set of data which by inspection could lead to the identification of an individual from a group, with a given level of confidence in a given time
  • is based on solid academic work on differential privacy and security threat modelling.
  • could turn data science into data surveillance.
  • Data mining by many businesses seeks to predict trends in purchasing behaviour, monitor customer response to service delivery and assess their marketing strategy against those of their rivals.
  • The real power of social media mining is establishing a "pattern of life" from which anomalies might stand out
Nuša Gregoršanec

BBC News - Wikipedia founder Jimmy Wales on the internet's future - 0 views

  • Wikipedia founder Jimmy Wales on the internet's future
  • Censorship is the biggest threat to the development of the internet, according to Wikipedia's founder Jimmy Wales.
  • More than 40 countries practise censorship
  • ...4 more annotations...
  • Wikipedia has encountered particular difficulties with censorship in the past in China. The Chinese government periodically blocked the site between 2004 and 2008, when restrictions were lifted to coincide with the Olympics.
  • What really excites Mr Wales is the idea of many people in the developing world using the internet for the first time.
  • "Massive numbers of people are going to come online from cultures we don't normally interact with."
  • This could have huge implications for governments which are unused to dealing with a well informed networked public. However, Mr Wales acknowledged one potential pitfall of all the extra users blogging and adding other material.
1 - 12 of 12
Showing 20 items per page