Skip to main content

Home/ ITGSonline/ Group items tagged security

Rss Feed Group items tagged

dr tech

Surveillance used to be a bad thing. Now, we happily let our employers spy on... - 0 views

  •  
    "This RFID-enabled device allowed its proud new owners to do things such as log into their computer, open doors and purchase food in the office cafeteria with a flick of the wrist. Nearly half of the company's 85 workers had the device implanted when the firm held a "chip party".
    YIKES!
dr tech

Hackers breach dozens of voting machines brought to conference | TheHill - 0 views

  •  
    "The conference acquired 30 machines for hackers to toy with. Every voting machine in the village was hacked.

    Though voting machines are technologically simple, they are difficult for researchers to obtain for independent research."
dr tech

Wisconsin Company To Implant Microchips In Employees | KSTP.com - 0 views

  •  
    "Each chip costs $300 and the company is picking up the tab. They're implanted between a person's thumb and forefinger. Westby added the data is both encrypted and secure.

    "There's no GPS tracking at all," he said.

    No one who works at Three Square Market is required to get the chip implant."

    HOW scary is this!
dr tech

'Petya' ransomware attack strikes companies across Europe and US | World news | The Gua... - 0 views

  •  
    "Victims of a major ransomware cyberattack that has spread through the US and Europe can no longer unlock their computers even if they pay the ransom.

    The "Petya" ransomware has caused serious disruption at large firms including the advertising giant WPP, French construction materials company Saint-Gobain and Russian steel and oil firms Evraz and Rosneft.

    Infected computers display a message demanding a Bitcoin ransom worth $300. Those who pay are asked to send confirmation of payment to an email address. However, that email address has been shut down by the email provider. "
dr tech

British Parliament hit by cyber security attack - media reports - The Economic Times - 0 views

  •  
    ""Closer investigation by our team confirmed that hackers were carrying out a sustained and determined attack on all parliamentary user accounts in an attempt to identify weak passwords. These attempts specifically were trying to gain access to our emails. "
dr tech

Rise of the machines: who is the 'internet of things' good for? | Technology | The Guar... - 0 views

  •  
    "So, yes: the internet of things presents many new possibilities, and it would be foolish to dismiss those possibilities out of hand. But we would also be wise to approach the entire domain with scepticism, and in particular to resist the attempts of companies to gather ever more data about our lives - no matter how much ease, convenience and self-mastery we are told they are offering us."
dr tech

JetBlue is the latest to use facial recognition technology in airports - 0 views

  •  
    "However, there is some concern about how accurate these new procedures will be. Apparently the facial recognition technology doesn't recognize all people will the same accuracy. White women and black people aren't as easily recognized as white men, meaning there could be some mismatching of identities. Some are also concerned that this is crossing the line in terms of passenger privacy."
dr tech

Wcry ransomware is reborn without its killswitch, starts spreading anew / Boing Boing - 0 views

  •  
    " respite was thanks to a sloppy bit of programming from the worm's creator, who'd left a killswitch in the code: newly infected systems checked to see if a certain domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com) existed before attempting to spread the infection; by registering this domain, security researchers were able to freeze the worm.The respite was thanks to a sloppy bit of programming from the worm's creator, who'd left a killswitch in the code: newly infected systems checked to see if a certain domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com) existed before attempting to spread the infection; by registering this domain, security researchers were able to freeze the worm.

    But a day later, it's back, and this time, without the killswitch. Security researchers running honeypots have seen new infections by versions of the worm that can spread even when the iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com domain is live."
dr tech

Hacker Steals Millions of User Account Details from Education Platform Edmodo - Motherb... - 0 views

  •  
    "A hacker has stolen millions of user account details from popular education platform Edmodo, and the data is apparently for sale on the so-called dark web.

    Teachers, students and parents use Edmodo to work on lesson plans, assign homework, and more. The organization claims to have over 78 million members."
dr tech

NHS services in England and Scotland hit by global cyber-attack | Society | The Guardian - 0 views

  •  
    "Computer security experts suggested that the crisis could reflect weaknesses in the NHS's cybersecurity. Ross Anderson, of Cambridge University, said the attack appeared to exploit a weakness in Microsoft's software that was fixed by a "critical" software patch earlier this year but which may not have been installed across NHS computers."
dr tech

A massive Google Docs hack is spreading like wildfire - Recode - 0 views

  •  
    "Gmail users are under attack in a gigantic phishing operation that's spreading like wildfire across the internet right now.

    People took to Twitter to report receiving an email that looks like an invitation to join a Google Doc from someone they know.

    But when you click on the link to open the file, you are directed to grant access to an app that looks like Google Docs but is actually a program that sends spam emails to everyone you've emailed, according to a detailed outline of the attack on Reddit. "
dr tech

India's controversial national ID scheme leaks fraud-friendly data for 130,000,000 peop... - 0 views

  •  
    "Now, in a new report published yesterday by researchers from the Bangalore-based think-tank the Centre for Internet and Society, Amber Sinha and Srinivas Kodali comprehensively document the many ways in which Aadhaar is leaking, tracking the #aadhaarleaks hashtag, which has revealed potentially compromising information on more than 130,000,000 people, largely material that is intentionally available through official portals."
dr tech

Google Chrome: Phishing Scam 'Practically Impossible to Spot' | Fortune.com - 0 views

  •  
    "Indeed, this scam is far subtler. It works like this: fraudsters are able to register domains with characters plucked from various alphabets other than the default Latin script. When displayed, it's all but impossible to tell apart a Greek "O" from a Cyrillic "O" from a Latin "O," for instance."
dr tech

Vast majority of Americans reject mass surveillance to thwart terrorist attacks / Boing... - 0 views

  •  
    "75% 75% surveyed by Ipsos/Reuters said, "they would not let investigators tap into their Internet activity to help the U.S. combat domestic terrorism"(up from 67% in 20"
dr tech

Backdoor access to WhatsApp? Rudd's call suggests a hazy grasp of encryption | Technolo... - 0 views

  •  
    "That's the crux of the problem. While you can legislate to only give state agencies access to terrorists' communications, and with proper oversight and authorisation, you cannot actually build encryption that works like that. If you put a backdoor in, it's there not just for security services to exploit, but for cyber-criminals, oppressive regimes and anyone else."
dr tech

How the internet found a better way than illegible squiggles to prove you're not a robo... - 0 views

  •  
    "The company has revealed the latest evolution of the Captcha (short, sort of, for Completely Automated Public Turing test to tell Computers and Humans Apart), which aims to do away with any interruption at all: the new, "invisible reCaptcha" aims to tell whether a given visitor is a robot or not purely by analysing their browsing behaviour. Barring a short wait while the system does its job, a typical human visitor shouldn't have to do anything else to prove they're not a robot."
dr tech

WikiLeaks publishes 'biggest ever leak of secret CIA documents' | Media | The Guardian - 0 views

  •  
    "The thousands of leaked documents focus mainly on techniques for hacking and reveal how the CIA cooperated with British intelligence to engineer a way to compromise smart televisions and turn them into improvised surveillance devices."
dr tech

When Bad Code Caused Disaster: 10 Worst Programming Mistakes in History - 0 views

  •  
    "Plus, programming can teach valuable life lessons. However, in its storied past, coding wrought destruction as well. Instances of a little bit of bad code caused disaster on a major level. The following are 10 of the worst programming mistakes in history."
1 - 20 of 454 Next › Last »
Showing 20 items per page