Skip to main content

Home/ Digit_al Society/ Group items tagged network

Rss Feed Group items tagged

dr tech

Internet-connected teddy bear leaked kids' data online / Boing Boing - 0 views

  •  
    "Security researcher Troy Hunt reports that the snuggly spies, from Spiral Toys, Security researcher Troy Hunt reports that the snuggly spies, from Spiral Toys, "represents the nexus" of the problem with internet-connected appliances and toys: children being recorded, data being leaked, and the technical possibility of surreptitious access to children through networked toys. "The best way to understand what these guys do is to simply watch the video [advertisement for the toy].""
dr tech

Turkey blocks use of Twitter after prime minister attacks social media site | World new... - 0 views

  •  
    "Turkey restricted access to Twitter hours after its prime minister, Recep Tayyip Erdoğan, threatened to "root out" the social media network where wiretapped recordings have been leaked, damaging the government's reputation ahead of local elections."
dr tech

Tech Terms Censored Online in China - 0 views

  •  
    "A new study released this month in First Monday uncovers more than 4,000 unique keywords censored over the last year and a half on Chinese instant messaging platforms. Focusing on Skype and the microblogging service Sina Weibo, the researchers cultivated their keyword list using reverse-engineering techniques such as packet sniffing, which captures and analyzes packets of data as they pass through a network."
dr tech

NSA and GCHQ target Tor network that protects anonymity of web users | World news | The... - 0 views

  •  
    "The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself."
dr tech

Forget fingerprints - banks are starting to use vein patterns for ATMs | Money | thegua... - 0 views

  •  
    "Poland has become the first country in Europe to introduce a network of "finger vein ID" cash machines, with 2,000 of the new ATMs opening in bank branches and supermarkets across the country this year, backed by a marketing campaign that promises "cash within your finger"."
dr tech

Facebook considers adding profile photos to facial recognition database | Technology | ... - 0 views

  •  
    "Facebook is considering incorporating most of its 1 billion-plus members' profile photos into its growing facial recognition database, expanding the scope of the social network's controversial technology. The possible move, which Facebook revealed in an update to its data use policy on Thursday, is intended to improve the performance of its "tag suggest" feature. The feature uses facial recognition technology to speed up the process of labelling or "tagging" friends and acquaintances who appear in photos posted on the network"
dr tech

Six bailed teenagers accused of cyber attacks using Lizard Squad tool | Technology | Th... - 0 views

  •  
    "Ddos attacks have been used to cause both financial and reputational damage to businesses and services from Sony to government websites. The attacks can last from hours to days, and typically use computers or internet routers infected with viruses to make innocent users unwitting parties to the attack. The Lizard Stresser tool was used effectively by Lizard Squad during cyber attacks on Microsoft's Xbox Live and Sony's PlayStation Network online gaming services in December last year."
longspagetti

Hide a Wi-Fi Access Point Inside a Pocket Book for Stealthy File Sharing - 0 views

  •  
    The access point itself will allow multiple devices to hook up to it so they can all share files with each other on a private little network. Then, for fun, the whole thing is shrunk down and stuffed inside a small notebook so you can stealthily share files anywhere. It's a little over the top, but fun nonetheless. Head over to Node for the full guide.
dr tech

Your baby monitor is an Internet-connected spycam vulnerable to voyeurs and crooks - Bo... - 0 views

  •  
    "Many of these cameras have no easy, networked means of getting a firmware update, either, making their zeroday bugs into foreverday bugs. Some of these bugs were simple programmer error, but Philips, ah, Philips: they shipped an Internet-connected home spycam whose default root login was admin and /ADMIN/. Security. "
Mcdoogleh CDKEY

BBC News - US schools may get unused fibre links - 0 views

  •  
    US schools and libraries may be able to tap into unused fibre networks in a bid to boost connection speeds.
Mcdoogleh CDKEY

Apple's Ping succumbs to the spammers | Technology | guardian.co.uk - 0 views

  •  
    New social network built inside iTunes fails to keep out the spammers, showing a curse of social media - even inside proprietorial walls
Mcdoogleh CDKEY

BBC News - Schools must embrace mobile technology - 0 views

  •  
    The need for schools to prepare for 21st century learning was top of the agenda at this year's BETT conference.They must embrace mobile technologies, games, podcasts and social networking, according to leading educationalist Professor Stephen Heppell.Schools should also break away from traditional classroom and curriculum models, he argued.The gap between those schools embracing technology and those not is getting bigger, he said.Prof Heppell was speaking to delegates at BETT, the world's biggest educational technology show.
Mcdoogleh CDKEY

BBC News - Google Buzz 'breaks privacy laws' says watchdog - 0 views

  •  
    A leading privacy watchdog files a complaint with US regulators urging them to investigate Google's Buzz social network.
BOB SAGET

Social Nets Need New Privacy Rule Book, Says Senator - 0 views

  •  
    Clear rules are needed to govern what social networks can do with the massive amount of personal data they collect and how they inform their users about their practices, said Sen. Charles Schumer, who has asked the FTC to articulate a set of guidelines. Facebook claims it offers users "powerful" privacy tools, but Paul Stephens of the Privacy Rights Clearinghouse suggested consumers need a PhD to understand them.
dr tech

NSA facial recognition: combining national ID cards, Internet intercepts, and commercia... - 0 views

  •  
    "A newly released set of slides from the Snowden leaks reveals that the NSA is harvesting millions of facial images from the Web for use in facial recognition algorithms through a program called "Identity Intelligence." James Risen and Laura Poitras's NYT piece shows that the NSA is linking these facial images with other biometrics, identity data, and "behavioral" data including "travel, financial, behaviors, social network." "
dr tech

Hackers Reportedly Exploited Heartbleed Bug to Steal 4.5 Million Patient Records - 0 views

  •  
    "The hackers who stole 4.5 million patient records from an American hospital network might have exploited the infamous Heartbleed bug to carry out the hack - the first time the bug has been reported to be at the center of a high-profile breach."
dr tech

What happens when most of China visits your website? It dies a horrible death | Technol... - 0 views

  •  
    "DNS (Domain Name System) is the system which translates web addresses, such as google.com, into an IP address, such as 74.125.224.72/. A network requires the latter to actually access a website, but if the look-up system gets confused, it can give the wrong IP address - which appears to be what happened in the Iconfactory's case. Except that rather than one DNS server messing up, it was the server for the whole of China."
« First ‹ Previous 41 - 60 of 143 Next › Last »
Showing 20 items per page