Skip to main content

Home/ ITGSonline/ Group items tagged policiesandstandards anonymity

Rss Feed Group items tagged

dr tech

Congressional Democrats Demand Answers About Amazon's Facial Recognition Technology - 0 views

  •  
    ""The disproportionally high arrest rates for members of the black community make the use of facial recognition technology by law enforcement problematic," the letter reads, "because it could serve to reinforce this trend."
dr tech

Tech firms can't keep our data forever: we need a Digital Expiry Date | Opinion | The G... - 0 views

  •  
    "This Digital Expiry Date offers companies the benefits of getting your data, personalizing results and still making profits, while putting some control in the user's hands. You will not have to worry about governments or companies in the future mishandling years' worth of information - which would limit the damage they could do. A Digital Expiry Date would maintain online innovation and profitability, while helping to prevent any future privacy disasters."
dr tech

Meltdown and Spectre: 'worst ever' CPU bugs affect virtually all computers | Technology... - 0 views

  •  
    "Serious security flaws that could let attackers steal sensitive data, including passwords and banking information, have been found in processors designed by Intel, AMD and ARM.

    The flaws, named Meltdown and Spectre, were discovered by security researchers at Google's Project Zero in conjunction with academic and industry researchers from several countries. Combined they affect virtually every modern computer, including smartphones, tablets and PCs from all vendors and running almost any operating system."
dr tech

China wants to give all of its citizens a score - and their rating could affect every a... - 0 views

  •  
    "Imagine a world where an authoritarian government monitors everything you do, amasses huge amounts of data on almost every interaction you make, and awards you a single score that measures how "trustworthy" you are."
dr tech

Surveillance used to be a bad thing. Now, we happily let our employers spy on... - 0 views

  •  
    "This RFID-enabled device allowed its proud new owners to do things such as log into their computer, open doors and purchase food in the office cafeteria with a flick of the wrist. Nearly half of the company's 85 workers had the device implanted when the firm held a "chip party".
    YIKES!
dr tech

Malware hits millions of Android phones - BBC News - 0 views

  •  
    "Up to 10 million Android smartphones have been infected by malware that generates fake clicks for adverts, say security researchers.

    The software is also surreptitiously installing apps and spying on the browsing habits of victims.

    The malware is currently making about $300,000 (£232,000) a month for its creators, suggests research."
dr tech

NHS to scrap single database of patients' medical details | Technology | The Guardian - 0 views

  •  
    "The government's scheme to store patients' medical information in a single database, which ran into massive problems over confidentiality, is to be scrapped, NHS England has said.

    The decision to axe the scheme, care.data, follows the publication of two reports that support far greater transparency over what happens to the information, and opt-outs for patients who want their data seen only by those directly caring for them."
dr tech

Reclaim the Internet research reveals huge scale of social media misogyny | Technology ... - 0 views

  •  
    "To coincide with the launch, the campaign has released research by Demos revealing the huge scale of social media misogyny. The study monitored the use of the words "slut" and "whore" by UK Twitter users over three weeks from the end of April. It found that 6,500 individuals were targeted by 10,000 aggressive and misogynistic tweets in that period."
dr tech

UK spy agencies store sensitive data on millions of innocent people, with no safeguards... - 0 views

  •  
    "The document dump reveals that the spies hold data on millions of Britons who are suspected of no wrongdoing, including records on dead people who cannot possibly pose a threat to national security. These records, which include "private medical records, your correspondence with your doctor or lawyer, even what petitions you have signed, your financial data, and commercial activities," are safeguarded through self-regulating systems that are laughable in their tragic lack of seriousness. "
dr tech

British mobile phone users' movements 'could be sold for profit' | World news | The Gua... - 0 views

  •  
    "Many people unwittingly sign up to be location-tracked 24/7, unaware that the highly sensitive data this generates is being used and sold on for profit. Campaigners say that if this information were stolen by hackers, criminals could use it to target children as they leave school or homes after occupants have gone out."
amenosolja

An Android Porn App Takes Your Photo and Holds It to Ransom - 0 views

  •  
    "The Register reports that security firm Zscaler was first to spot the app, which presents itself as a normal video playing app, albeit for playing videos of an adult nature. Apparently once it has silently snapped photos of its victim it will display a message on screen demanding that they pay $500 . Otherwise, well... do you want people knowing you've used the app?"
dr tech

How the NSA searches the world's intercepted private communications - Boing Boing - 0 views

  •  
    "XKEYSCORE is a secret NSA program that indexes data slurped up from covert fiber-taps, hacked systems, and smartphones, including "full take" data and metadata. "
dr tech

Why the BBC is wrong to republish 'right to be forgotten' links | Technology | The Guar... - 0 views

  •  
    "They are a modest correction against failures in algorithmic prioritisation on the indelible web. Before the requests go to the BBC, individuals must prove to Google - which has every interest in rejecting their claim - that the links contain personal information that is inaccurate, irrelevant or out of date, and holds no public interest."
dr tech

The dick pic test: are you happy to show the government yours? | James Ball | Comment i... - 0 views

  •  
    "If you're doing nothing wrong, and have nothing to hide from your government, then mass surveillance holds no fears for you. This argument might be the oldest straw man in the privacy debate, but it's also a decent reflection of the state of the argument. In the UK's first major election since the Snowden revelations, privacy is a nonissue.

    This is a shame, because when it comes down to it, many of us who are doing nothing wrong have plenty we would prefer to hide."
dr tech

Should Britain introduce electronic voting? | Technology | The Guardian - 0 views

  •  
    ""In the 2020 general election, secure online voting should be an option for all voters," said the report. In response, the Electoral Commission's chair, Jenny Watson, said: "We will consider carefully the balance between maintaining the security of the system, whilst making it as accessible as possible for voters as part of this.""
dr tech

UK prime minister wants to ban encrypted messaging apps like Snapchat - 0 views

  •  
    "If reelected, British Prime Minister David Cameron would consider banning messaging apps like Snapchat and WhatsApp, if they don't make their data available to intelligence agencies, he said Monday."
dr tech

Europe's next privacy war is with websites silently tracking users | Technology | The G... - 0 views

  •  
    ""Parties who wish to process device fingerprints which are generated through the gaining of access to, or the storing of, information on the user's terminal device must first obtain the valid consent of the user (unless an exemption applies)," the Article 29 Working Party wrote.

    It means that some websites, including Google, Facebook and Microsoft, that have used alternative technical processes to try to bypass the need for a "cookie policy notice" will have to show a notification after all."
dr tech

Machine-Learning Maestro Michael Jordan on the Delusions of Big Data and Other Huge Eng... - 0 views

  •  
    "Now, the number of combinations of these columns grows exponentially with the number of columns. So if you have many, many columns-and we do in modern databases-you'll get up into millions and millions of attributes for each person.

    Now, if I start allowing myself to look at all of the combinations of these features-if you live in Beijing, and you ride bike to work, and you work in a certain job, and are a certain age-what's the probability you will have a certain disease or you will like my advertisement? Now I'm getting combinations of millions of attributes, and the number of such combinations is exponential; it gets to be the size of the number of atoms in the universe."
dr tech

Business analytics in the age of Big Data | Business analytics in the age of Big Data |... - 0 views

  •  
    "Going from small data analytics to Big Data analytics or to predictive and prescriptive analytics is trickier. Expanding in both dimensions is human capital intensive, requiring talented data scientists. A McKinsey report (2011) estimates that by 2018, there will be a shortage of 140,000 to 190,000 workers with "deep analytical" experience and a further 1.5 million data-literate managers in the US. Technology giants such as Google, Facebook and Amazon, and large investment banks and top hedge funds can afford such employees, however even now the competition is fierce, as is evidenced by the ongoing talent war in Silicon Valley. The data scientist is indeed a sexy job in the 21st century."
dr tech

Riding with the Stars: Passenger Privacy in the NYC Taxicab Dataset - Research - 0 views

  •  
    "The most well-documented of these deals with the hash function used to "anonymize" the license and medallion numbers. A bit of lateral thinking from one civic hacker and the data was completely de-anonymized. This data can now be used to calculate, for example, any driver's annual income. More disquieting, though, in my opinion, is the privacy risk to passengers. With only a small amount of auxiliary knowledge, using this dataset an attacker could identify where an individual went, how much they paid, weekly habits, etc. I will demonstrate how easy this is to do in the following section."
1 - 20 of 47 Next › Last »
Showing 20 items per page