"Security researcher Troy Hunt reports that the snuggly spies, from Spiral Toys, Security researcher Troy Hunt reports that the snuggly spies, from Spiral Toys, "represents the nexus" of the problem with internet-connected appliances and toys: children being recorded, data being leaked, and the technical possibility of surreptitious access to children through networked toys. "The best way to understand what these guys do is to simply watch the video [advertisement for the toy].""
"Turkey restricted access to Twitter hours after its prime minister, Recep Tayyip Erdoğan, threatened to "root out" the social media network where wiretapped recordings have been leaked, damaging the government's reputation ahead of local elections."
"A new study released this month in First Monday uncovers more than 4,000 unique keywords censored over the last year and a half on Chinese instant messaging platforms. Focusing on Skype and the microblogging service Sina Weibo, the researchers cultivated their keyword list using reverse-engineering techniques such as packet sniffing, which captures and analyzes packets of data as they pass through a network."
"The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself."
"Poland has become the first country in Europe to introduce a network of "finger vein ID" cash machines, with 2,000 of the new ATMs opening in bank branches and supermarkets across the country this year, backed by a marketing campaign that promises "cash within your finger"."
"Facebook is considering incorporating most of its 1 billion-plus members' profile photos into its growing facial recognition database, expanding the scope of the social network's controversial technology.
The possible move, which Facebook revealed in an update to its data use policy on Thursday, is intended to improve the performance of its "tag suggest" feature. The feature uses facial recognition technology to speed up the process of labelling or "tagging" friends and acquaintances who appear in photos posted on the network"
"Ddos attacks have been used to cause both financial and reputational damage to businesses and services from Sony to government websites. The attacks can last from hours to days, and typically use computers or internet routers infected with viruses to make innocent users unwitting parties to the attack.
The Lizard Stresser tool was used effectively by Lizard Squad during cyber attacks on Microsoft's Xbox Live and Sony's PlayStation Network online gaming services in December last year."
The access point itself will allow multiple devices to hook up to it so they can all share files with each other on a private little network. Then, for fun, the whole thing is shrunk down and stuffed inside a small notebook so you can stealthily share files anywhere. It's a little over the top, but fun nonetheless. Head over to Node for the full guide.
"Many of these cameras have no easy, networked means of getting a firmware update, either, making their zeroday bugs into foreverday bugs. Some of these bugs were simple programmer error, but Philips, ah, Philips: they shipped an Internet-connected home spycam whose default root login was admin and /ADMIN/. Security. "
The need for schools to prepare for 21st century learning was top of the agenda at this year's BETT conference.They must embrace mobile technologies, games, podcasts and social networking, according to leading educationalist Professor Stephen Heppell.Schools should also break away from traditional classroom and curriculum models, he argued.The gap between those schools embracing technology and those not is getting bigger, he said.Prof Heppell was speaking to delegates at BETT, the world's biggest educational technology show.
Clear rules are needed to govern what social networks can do with the massive amount of personal data they collect and how they inform their users about their practices, said Sen. Charles Schumer, who has asked the FTC to articulate a set of guidelines. Facebook claims it offers users "powerful" privacy tools, but Paul Stephens of the Privacy Rights Clearinghouse suggested consumers need a PhD to understand them.
"A newly released set of slides from the Snowden leaks reveals that the NSA is harvesting millions of facial images from the Web for use in facial recognition algorithms through a program called "Identity Intelligence." James Risen and Laura Poitras's NYT piece shows that the NSA is linking these facial images with other biometrics, identity data, and "behavioral" data including "travel, financial, behaviors, social network." "
"The hackers who stole 4.5 million patient records from an American hospital network might have exploited the infamous Heartbleed bug to carry out the hack - the first time the bug has been reported to be at the center of a high-profile breach."
"DNS (Domain Name System) is the system which translates web addresses, such as google.com, into an IP address, such as 74.125.224.72/. A network requires the latter to actually access a website, but if the look-up system gets confused, it can give the wrong IP address - which appears to be what happened in the Iconfactory's case. Except that rather than one DNS server messing up, it was the server for the whole of China."