Skip to main content

Home/ Internetni praktikum/ Group items tagged vulnerabilities

Rss Feed Group items tagged

Gabrijela Vrbnjak

BBC News - Web code weakness allows data dump on PCs - 0 views

  • The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.
  • Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats. In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook. Clever code Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh. While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5. One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored. However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs. Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found. "Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug. Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed. In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers. More on This Story .related-links-list li { position: relative; } .related-links-list .gvl3-icon { position: absolute; top: 0; left: 0; } Related Stories Firefox smartphone partners revealed 24 FEBRUARY 2013, TECHNOLOGY Flash Player exits Android store 15 AUGUST 2012, TECHNOLOGY HTML 5 target for cybercriminals 02 DECEMBER 2011, TECHNOLOGY $render("page-see-also","ID"); $render("page-newstracker","ID"); Related Internet links Feross Aboukhadijeh The BBC is not responsible for the content of external Internet sites $render("page-related-items","ID"); Share this pageShare this page1.4KShareFacebookTwitter Email Print In association with $render("advert","advert-sponsor-module","page-bookmark-links"); $render("advert-post-script-load"); $render("advert-post-script-load"); More Technology stories RSS Computer glitch hits Mars rover Nasa's Curiosity Mars rover is put into "safe mode" after a computer glitch caused by corrupted files. US plans small-ship drone launches Hackers breach Evernote security $render("advert","advert-mpu-high"); $render("advert-post-script-load"); Top Stories http://news.bbcimg.co.uk/media/images/6618
  • found the bug and set up a demo page that fills visitors' hard drives with pictures of cartoon cats.
  • ...6 more annotations...
  • because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
  • found a way round this cap by creating lots of temporary websites linked to the one a person actually visited
  • Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug
  • was not vulnerable
  • Mozilla's Firefox
  • bug reports about the exploit have been filed with major browser makers.
inesmag

Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams > Spam - 0 views

  • Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
  • Spam is the common name for unsolicited e-mail and it is a problem that is rampant on the Internet today.
  • Spammers do their dirty work by purchasing or creating giant e-mail lists and automated mailing tools called spambots. The lists are usually compiled from web pages where people provide their e-mail address as part of a registration process.
  • ...2 more annotations...
  • How to Block Spam There is a good chance that your ISP has some sort of spam-blocking feature available and, if spam is a problem for you, we suggest starting there.
  • replying to a spam e-mail does not stop it from coming
Maj Krek

Slaves to the Internet » Counterpunch: Tells the Facts, Names the Names - 3 views

  • his description of modern slaves cum “hostages” is particularly applicable to our relationship to the internet.
  • Moreover, much of non-work related internet use is actually work insofar as it generates wealth for others.
  • as well as networking sites like Facebook and LinkedIn, that we are held hostage.
  • ...5 more annotations...
  • Yet, most people cannot permanently quit these sites, let alone the internet as a whole, as doing so would introduce huge practical burdens – as well as social alienation
  • better virtual company than none at all
  • the more people there are who try to make it only ensures that relatively fewer will
  • The internet’s exponential acceleration of capitalist penetration means that we’re all hostages now
  • workers’ vulnerability, making them work harder while intensifying competition and reducing wages for everyone. Notably, Yelp affects small businesses more than large ones, and
mancamikulic

Why the Internet Is About to Replace TV as the Most Important Source of News - Derek Th... - 1 views

  • "There are now signs that television news is increasingly vulnerable
  • But the larger story is the rise of the Web, which has surpassed newspapers and radio to become the second most popular source of news for Americans, after TV
  • TV channels get affiliate fees
  • ...5 more annotations...
  • Radio is supported by some donations and public financing.
  • As this Mary Meeker slide shows, we spend more time engaging with mobile devices than reading print, but print publications still get 25-times more ad money than mobile.
  • For younger people, the Internet is the new cable news.
  • For advertisers, cable news is still cable news.
  • An equal share said they saw news headlines from Facebook
Jan Majdič

Boot up: China's Android worry, Microsoft's new browser fine, PC decline forecast and m... - 1 views

  • is strictly controlled by Google."
  • to allow European users of its Windows operating system to choose among competing browsers, according to a Reuters report citing three anonymous sources.
  • A recently discovered flaw in the HTML 5 coding language could allow websites to bombard users with gigabytes of junk data, with a number of popular browsers being open to the vulnerability
Meta Arcon

Internet Marriages on Rise in Some Immigrant Communities - NYTimes.com - 0 views

  • With a red embroidered veil draped over her dark hair, Punam Chowdhury held her breath last month as her fiancé said the words that would make them husband and wife. After she echoed them, they were married.
  • Normally one of the most intimate moments two people can share, the marriage had taken place from opposite ends of the globe over the video chat program Skype
  • These are called proxy marriages, a legal arrangement that allows a couple to wed even in the absence of one or both spouses.
  • ...2 more annotations...
  • Such convenience has also raised concerns that it will facilitate marriage fraud — already a challenge for immigration authorities — as well as make it easier to ensnare vulnerable women in trafficking networks.
  • All people applying for American citizenship through marriage must first be interviewed by officials from the Homeland Security or State Department who are charged with rooting out fraud. Officials said that if the spouses were to explain they had been married thousands of miles apart over the Internet, it would quite likely raise a red flag.
Anja Vasle

Even Google won't be around for ever, let alone Facebook | Technology | The Observer - 0 views

  • At the moment, the four leading monsters are Apple, Google, Facebook and Amazon. Yet 18 years ago, Apple was weeks away from extinction, Amazon had just launched, Google was still three years away from incorporation and Facebook lay nine years into the future.
  • We understand pretty well the factors that determine the fortunes of companies that make things people buy – which is why, for example, one can predict thatApple won't be able indefinitely to sustain its huge profit margins on its iDevices.
  • This leaves Facebook, a company that has one billion products (called users) and earns its living by selling information about them to advertisers.
  • ...11 more annotations...
  • The two key factors that will determine Facebook's future are the power of network effects and the "stickiness" of its service – ie, the extent to which it can dissuade users from leaving.
  • he key determinants of success or failure were (i) the average number of friends that users have and (ii) whether the difficulty of using the site comes to outweigh the perceived benefits.
  • Facebook users will constitute a captive market and will be correspondingly exploited. And the company will be regulated as a monopoly.
  • How much exploitation will users tolerate before they decide to quit?
  • n fact, it is now so dominant that millions of people around the world think that Facebook is the internet.
  • At one point in the conversation, the Google boys noticed that their collaborator had suddenly gone rather quiet.
  • But the number of commercial companies that are more than a century old is vanishingly small.
  • in the technology world one can go from zero to hero is a very short time
  • Google has a well understood and currently profitable business model and a huge technical infrastructure but ultimately is vulnerable to a well-resourced competitor armed with better search technology.
  • A telephone network with a million subscribers is infinitely more valuable then one with only 10. In technological ecosystems, network effects are very powerful: they explain, for example, how Microsoft came to dominate the market for desktop operating and office systems.
  • If you put your faith in network effects, therefore, Facebook looks like a good investment because it'll be around for the long term.
Jernej Prodnik

Why I'm quitting Facebook - CNN.com - 0 views

  • Why I'm quitting Facebook By Douglas Rushkoff, CNN February 25, 2013 -- Updated 1502 GMT (2302 HKT)
  • (CNN) -- I used to be able to justify using Facebook as a cost of doing business. As a writer and sometime activist who needs to promote my books and articles and occasionally rally people to one cause or another, I found Facebook fast and convenient. Though I never really used it to socialize, I figured it was OK to let other people do that, and I benefited from their behavior. I can no longer justify this arrangement.
  • Today, I am surrendering my Facebook account, because my participation on the site is simply too inconsistent with the values I espouse in my work. In my upcoming book "Present Shock," I chronicle some of what happens when we can no longer manage our many online presences. I have always argued for engaging with technology as conscious human beings and dispensing with technologies that take that agency away.
  • ...3 more annotations...
  • Facebook is just such a technology. It does things on our behalf when we're not even there. It actively misrepresents us to our friends, and worse misrepresents those who have befriended us to still others. To enable this dysfunctional situation -- I call it "digiphrenia" -- would be at the very least hypocritical. But to participate on Facebook as an author, in a way specifically intended to draw out the "likes" and resulting vulnerability of others, is untenable.
  • Douglas Rushkoff Facebook has never been merely a social platform. Rather, it exploits our social interactions the way a Tupperware party does. Facebook does not exist to help us make friends, but to turn our network of connections, brand preferences and activities over time -- our "social graphs" -- into money for others.
  • We Facebook users have been building a treasure lode of big data that government and corporate researchers have been mining to predict and influence what we buy and for whom we vote. We have been handing over to them vast quantities of information about ourselves and our friends, loved ones and acquaintances. With this information, Facebook and the "big data" research firms purchasing their data predict still more things about us -- from our future product purchases or sexual orientation to our likelihood for civil disobedience or even terrorism.
1 - 8 of 8
Showing 20 items per page