Skip to main content

Home/ ITGSonline/ Group items tagged security Reliability

Rss Feed Group items tagged

dr tech

Open Rights Group Scotland - E-voting's Unsolvable Problem - 0 views

  •  
    Ahhh ITGS group - a great discussion on the evoting problem would have been perfect for your Paper 2. "Remember: all of these principles of security, anonymity and verifiability have to be achieved in an understandable way. If they can't be then you get the opportunity for losers to claim fraud, and their supporters to believe them."
dr tech

'Being cash-free puts us at risk of attack': Swedes turn against cashlessness | World n... - 0 views

  •  
    ""When you have a fully digital system you have no weapon to defend yourself if someone turns it off," he says. "If Putin invades Gotland [Sweden's largest island] it will be enough for him to turn off the payments system. No other country would even think about taking these sorts of risks, they would demand some sort of analogue system.""
dr tech

JetBlue is the latest to use facial recognition technology in airports - 0 views

  •  
    "However, there is some concern about how accurate these new procedures will be. Apparently the facial recognition technology doesn't recognize all people will the same accuracy. White women and black people aren't as easily recognized as white men, meaning there could be some mismatching of identities. Some are also concerned that this is crossing the line in terms of passenger privacy."
dr tech

When Bad Code Caused Disaster: 10 Worst Programming Mistakes in History - 0 views

  •  
    "Plus, programming can teach valuable life lessons. However, in its storied past, coding wrought destruction as well. Instances of a little bit of bad code caused disaster on a major level. The following are 10 of the worst programming mistakes in history."
dr tech

Password strength meters fail to spot easy-to-crack examples | Technology | The Guardian - 0 views

  •  
    "Instead password strength meters measure entropy - the amount of time or energy needed to crack a password using brute force methods. The longer and more complex the password, the longer it will take to crack by simply iterating through a list of all possible passwords. According to Stockley, however, brute force is a password cracker's last resort."
dr tech

Cryptocurrency raider takes $60 million in digital cash - 0 views

  •  
    "A cryptocurrency is only as reliable as the technology that keeps it running, and Ethereum is learning this the hard way. An attacker has taken an estimated $60 million in Ethereum's digital money (Ether) by exploiting vulnerabilities in the Decentralized Autonomous Organization, an investment collective. The raider took advantage of a "recursive call" flaw in the DAO's code-based smart contracts, which administer the funds, to scoop up Ether many times in a single pass."
dr tech

Lexus software update fail shows crashing future for cars | Technology | The Guardian - 0 views

  •  
    "Toyota's Lexus rolled out an update for some of its cars, including RX350, which broke the vehicles' navigation and entertainment systems leaving them stuck in a boot loop. Lexus confirmed that the software updates are routinely pushed out via satellite to cars and that a faulty application may be to blame."
dr tech

DDoSers sell attacks for $5 on Fivver / Boing Boing - 0 views

  •  
    "Now, researchers from Incapsula have delved into the world of cut-rate DDoS providers, who market their services for $5 a pop on the website Fiverr. The DDoSers figleaf their offerings by calling them "stress testers" that website owners can use to determine whether their sites are configured to handle lots of traffic, but as the Incapsula team found, most will cheerfully attack sites other than your own (though one vendor said he wouldn't attack "government state websites, hospitals"). "
amenosolja

How to Use USB Security Keys with your Google Account - 0 views

  •  
    "The verification codes required for logging into a 2-step enabled account can be generated either using a mobile app - like Authy or Google Authenticator - or you can have them sent to your mobile phone via a text message or a voice call. The latter option however will not work if the mobile phone associated with your account is outside the coverage area"
amenosolja

An Android Porn App Takes Your Photo and Holds It to Ransom - 0 views

  •  
    "The Register reports that security firm Zscaler was first to spot the app, which presents itself as a normal video playing app, albeit for playing videos of an adult nature. Apparently once it has silently snapped photos of its victim it will display a message on screen demanding that they pay $500 . Otherwise, well... do you want people knowing you've used the app?"
amenosolja

A Smile Detector and Other Apps You Need to Be Using | WIRED - 0 views

  •  
    "RECHO DOES ONE very simple, little thing: It lets you leave a voice message tied to a location. When other people using the app hit those coordinates, Recho will tell them there's something to listen to. You can use the app to discover different "rechoes" around you, if you actively want to listen in on someone's location-aware thoughts. You can also share interesting soundbytes with your Recho followers. It's a little weird and novel, but ultimately a new way to think about digital exploring a place."
amenosolja

Windows 10 Is Watching: Should You Be Worried? - 0 views

  •  
    "In amongst the numerous reports of privacy infringements, there have been a handful of genuine issues. Reports of Microsoft utilizing your computer as a P2P node for update sharing were completely founded, and the 13 pages of privacy settings are also no joke."
julia barr

New York Asks Cellphone Carriers to Explain Why They Rejected Antitheft Switch - 0 views

  •  
    SAN FRANCISCO - New York State's top prosecutor is investigating why American cellphone carriers have yet to embrace antitheft software on Samsung smartphones, raising questions about possible coordination among the biggest carriers.
Ruben De Fraye

Hacking the Lights Out: The Computer Virus Threat to the Electrical Grid: Scientific Am... - 0 views

  • Last year word broke of a computer virus that had managed to slip into Iran’s highly secure nuclear enrichment facilities. Most viruses multiply without prejudice, but the Stuxnet virus had a specific target in its sights—one that is not connected to the Internet.
maxresnikoff

Find the ungoogleable with crowdsourced search engine - tech - 04 December 2013 - New S... - 0 views

  • THERE'S nothing like the human touch.
  • DataSift is new kind of search engine that uses crowdsourced human intelligence to answer vague, complex or visual questions, even when the users are not sure what they are searching for.
  • answered easily and quickly by human workers
maxresnikoff

Bitcoin flaw could threaten booming virtual currency - tech - 06 November 2013 - New Sc... - 0 views

  • Bitcoin contains a hitherto unnoticed flaw which threatens to upset the balance of the $1.5 billion economy built on the virtual currency.
  • Although groups form to share computing power and split the profits, what they receive is proportional to the resources they contribute.
Mcdoogleh CDKEY

BBC News - Anti-censorship program Haystack withdrawn - 0 views

  •  
    Software developed to bypass Iranian Internet censorship has been scrapped, due to various reasons.
  •  
    Software created to help Iranians escape government control of the web has been withdrawn over security fears.
Mcdoogleh CDKEY

BBC News - Facebook fixes embarrassing security flaw - 0 views

  •  
    Facebook has rushed to fix a security flaw that allowed users to eavesdrop on the live chats of their friends and see their pending friend requests
1 - 20 of 24 Next ›
Showing 20 items per page