Skip to main content

Home/ ITGSonline/ Group items tagged security privacy

Rss Feed Group items tagged

dr tech

Meltdown and Spectre: 'worst ever' CPU bugs affect virtually all computers | Technology... - 0 views

  •  
    "Serious security flaws that could let attackers steal sensitive data, including passwords and banking information, have been found in processors designed by Intel, AMD and ARM.

    The flaws, named Meltdown and Spectre, were discovered by security researchers at Google's Project Zero in conjunction with academic and industry researchers from several countries. Combined they affect virtually every modern computer, including smartphones, tablets and PCs from all vendors and running almost any operating system."
dr tech

Google's AI knows when a stranger is looking at your phone - The Verge - 0 views

  •  
    "Ever get the feeling someone is looking over your shoulder at your phone? Well, you might not have to worry about that in the future: Google's researchers have developed an AI tool that can spot when someone is sneaking a peek at your screen."
dr tech

China's social credit score is like a 'Black Mirror' episode - Business Insider - 0 views

  •  
    "The Chinese government is planning on implementing a system that connects citizens' financial, social, political, and legal credit ratings into one big social trustability score. The idea would be that if someone breaks trust in one area, they'd be adversely affected everywhere."
dr tech

Who do you trust? How data is helping us decide | Technology | The Guardian - 0 views

  •  
    "Should we embrace these new trust algorithms? Baveja and Shapiro acknowledge the responsibility that comes with trying to take ethical decisions and translate them into code. How much of our personal information do we want trawled through in this way? And how comfortable are we with letting an algorithm judge who is trustworthy?"
dr tech

India's biometric database is a massive achievement and a dystopian nightmare - VICE News - 0 views

  •  
    ""What is emerging is that [Aadhaar] is being used to create a panopticon, a centralized database that's linked to every aspect of our lives - finances, travel, birth, deaths, marriage, education, employment, health, etc.," Reetika Khera, an Indian economist and social scientist, told VICE News.

    Security concerns have plagued the system for years, but in recent weeks criticism has grown deafeningly loud. Earlier this month, as part of the Supreme Court case on privacy, an activist's freedom of information request suggested that foreign firms were being given "full access" to the classified data - including fingerprints and iris scans."
dr tech

Surveillance used to be a bad thing. Now, we happily let our employers spy on... - 0 views

  •  
    "This RFID-enabled device allowed its proud new owners to do things such as log into their computer, open doors and purchase food in the office cafeteria with a flick of the wrist. Nearly half of the company's 85 workers had the device implanted when the firm held a "chip party".
    YIKES!
dr tech

British Parliament hit by cyber security attack - media reports - The Economic Times - 0 views

  •  
    ""Closer investigation by our team confirmed that hackers were carrying out a sustained and determined attack on all parliamentary user accounts in an attempt to identify weak passwords. These attempts specifically were trying to gain access to our emails. "
dr tech

Rise of the machines: who is the 'internet of things' good for? | Technology | The Guar... - 0 views

  •  
    "So, yes: the internet of things presents many new possibilities, and it would be foolish to dismiss those possibilities out of hand. But we would also be wise to approach the entire domain with scepticism, and in particular to resist the attempts of companies to gather ever more data about our lives - no matter how much ease, convenience and self-mastery we are told they are offering us."
dr tech

JetBlue is the latest to use facial recognition technology in airports - 0 views

  •  
    "However, there is some concern about how accurate these new procedures will be. Apparently the facial recognition technology doesn't recognize all people will the same accuracy. White women and black people aren't as easily recognized as white men, meaning there could be some mismatching of identities. Some are also concerned that this is crossing the line in terms of passenger privacy."
dr tech

Wcry ransomware is reborn without its killswitch, starts spreading anew / Boing Boing - 0 views

  •  
    " respite was thanks to a sloppy bit of programming from the worm's creator, who'd left a killswitch in the code: newly infected systems checked to see if a certain domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com) existed before attempting to spread the infection; by registering this domain, security researchers were able to freeze the worm.The respite was thanks to a sloppy bit of programming from the worm's creator, who'd left a killswitch in the code: newly infected systems checked to see if a certain domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com) existed before attempting to spread the infection; by registering this domain, security researchers were able to freeze the worm.

    But a day later, it's back, and this time, without the killswitch. Security researchers running honeypots have seen new infections by versions of the worm that can spread even when the iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com domain is live."
dr tech

Hacker Steals Millions of User Account Details from Education Platform Edmodo - Motherb... - 0 views

  •  
    "A hacker has stolen millions of user account details from popular education platform Edmodo, and the data is apparently for sale on the so-called dark web.

    Teachers, students and parents use Edmodo to work on lesson plans, assign homework, and more. The organization claims to have over 78 million members."
dr tech

NHS services in England and Scotland hit by global cyber-attack | Society | The Guardian - 0 views

  •  
    "Computer security experts suggested that the crisis could reflect weaknesses in the NHS's cybersecurity. Ross Anderson, of Cambridge University, said the attack appeared to exploit a weakness in Microsoft's software that was fixed by a "critical" software patch earlier this year but which may not have been installed across NHS computers."
dr tech

India's controversial national ID scheme leaks fraud-friendly data for 130,000,000 peop... - 0 views

  •  
    "Now, in a new report published yesterday by researchers from the Bangalore-based think-tank the Centre for Internet and Society, Amber Sinha and Srinivas Kodali comprehensively document the many ways in which Aadhaar is leaking, tracking the #aadhaarleaks hashtag, which has revealed potentially compromising information on more than 130,000,000 people, largely material that is intentionally available through official portals."
dr tech

Google Chrome: Phishing Scam 'Practically Impossible to Spot' | Fortune.com - 0 views

  •  
    "Indeed, this scam is far subtler. It works like this: fraudsters are able to register domains with characters plucked from various alphabets other than the default Latin script. When displayed, it's all but impossible to tell apart a Greek "O" from a Cyrillic "O" from a Latin "O," for instance."
dr tech

Vast majority of Americans reject mass surveillance to thwart terrorist attacks / Boing... - 0 views

  •  
    "75% 75% surveyed by Ipsos/Reuters said, "they would not let investigators tap into their Internet activity to help the U.S. combat domestic terrorism"(up from 67% in 20"
dr tech

Backdoor access to WhatsApp? Rudd's call suggests a hazy grasp of encryption | Technolo... - 0 views

  •  
    "That's the crux of the problem. While you can legislate to only give state agencies access to terrorists' communications, and with proper oversight and authorisation, you cannot actually build encryption that works like that. If you put a backdoor in, it's there not just for security services to exploit, but for cyber-criminals, oppressive regimes and anyone else."
dr tech

WikiLeaks publishes 'biggest ever leak of secret CIA documents' | Media | The Guardian - 0 views

  •  
    "The thousands of leaked documents focus mainly on techniques for hacking and reveal how the CIA cooperated with British intelligence to engineer a way to compromise smart televisions and turn them into improvised surveillance devices."
dr tech

Internet-connected teddy bear leaked kids' data online / Boing Boing - 0 views

  •  
    "Security researcher Troy Hunt reports that the snuggly spies, from Spiral Toys, Security researcher Troy Hunt reports that the snuggly spies, from Spiral Toys, "represents the nexus" of the problem with internet-connected appliances and toys: children being recorded, data being leaked, and the technical possibility of surreptitious access to children through networked toys. "The best way to understand what these guys do is to simply watch the video [advertisement for the toy].""
1 - 20 of 150 Next › Last »
Showing 20 items per page