Skip to main content

Home/ Digit_al Society/ Group items tagged security ITGS

Rss Feed Group items tagged

dr tech

Major vulnerability in 5G means that anyone with $500 worth of gear can spy on a wide a... - 0 views

  •  
    "That's why it was so important that the new 5G mobile protocol be designed to foil IMSI catchers, and why the 3rd Generation Partnership Project, or 3GPP (the body standardizing 5G) updated the Authentication and Key Agreement (AKA) to resist IMSI catching techniques."
dr tech

The Morris Worm Was the World's First Cyberattack - 0 views

  •  
    "His program became the first of a particular type of cyber attack called "distributed denial of service," in which large numbers of internet-connected devices, including computers, webcams and other smart gadgets, are told to send lots of traffic to one particular address, overloading it with so much activity that either the system shuts down or its network connections are completely blocked."
dr tech

Phishers steal San Diego school data going back to 2008 / Boing Boing - 0 views

  •  
    "After a successful phishing attack that captured over 50 accounts, hackers stole 500,000 records from the San Diego Unified School District, for staff, current students, and past students going all the way back to 2008; including SSNs, home addresses and phone numbers, disciplinary files, health information, emergency contact details, health benefits and payroll info, pay information, financial data for direct deposits."
dr tech

'Being cash-free puts us at risk of attack': Swedes turn against cashlessness | World n... - 0 views

  •  
    ""When you have a fully digital system you have no weapon to defend yourself if someone turns it off," he says. "If Putin invades Gotland [Sweden's largest island] it will be enough for him to turn off the payments system. No other country would even think about taking these sorts of risks, they would demand some sort of analogue system.""
dr tech

Together we can thwart the big-tech data grab. Here's how | John Harris | Opinion | The... - 0 views

  •  
    "Blockchain technology has also opened the way to new models whereby endless micropayments can be made in return for particular online services or content; and, if people voluntarily allow elements of their data to be used, rewards can flow the other way. Here perhaps lies the key to a system beyond the current, Google-led model, in which services appear to be free but the letting-go of personal data is the actual price."
dr tech

Largest dump in history: 2.7 billion records; 773 million of them unique; 140 million n... - 0 views

  •  
    "A dump called "Collection #1" has been released by parties unknown, containing email addresses and cracked passwords: in its raw form, it contains 2.7 billion records, which Troy "Have I Been Pwned" Hunt (previously) de-duplicated to come up with 773 million unique records -- of those 140,000,000 email addresses and 10,000,000 passwords have never been seen in the HaveIBeenPwned database before."
dr tech

The Glass Room - 0 views

  •  
    "And if your password can be reverse-engineered to reveal something about you or others like you, how safe or unique is it really."
dr tech

UK cops are secretly harvesting all data from the phones and cloud accounts of suspects... - 0 views

  •  
    "Many services retain the data they harvest indefinitely, and some have been caught storing (and losing) the data without encryption: for example, in 2017 the Greater Manchester Police were found to have lost data from victims of violent and sexual crimes, which had been stored unencrypted on DVDs and sent through the post."
dr tech

Quest Diagnostics Says Up to 12 Million Patients May Have Had Financial, Medical, Perso... - 0 views

  •  
    "Quest Diagnostics, one of the biggest blood testing providers in the country, warned Monday that nearly 12 million of its customers may have had personal, financial and medical information breached due to an issue with one of its vendors."
dr tech

5 Real World Problems That Are Straight Out Of Black Mirror - 0 views

  •  
    "Thanks to a map that shows the jogging habits of the 27 million people who use Fitbits and the like, we can see splotches of activity in otherwise dark areas, like Iraq and Syria. Some of those splotches are known American military sites full of exercising soldiers, and some, by extrapolation, are sites that the military would rather keep unknown. One journalist saw a lot of exercise activity on a Somalian beach that was suspected to be home to a CIA base. Someone else spotted a suspected missile site in Yemen, and a web of bases in Afghanistan were also revealed."
dr tech

Massive Disruption Is Coming With Quantum Computing - 0 views

  •  
    "Moore's Law (or the exponential growth of integrated circuits) is actually referring to the fifth paradigm of computation. Here's the list of the underlying technologies: (1) Electromechanical; (2) Vacuum Tube; (3) Relay; (4) Transistors; and (5) Integrated Circuits. Quantum computers may well be the sixth paradigm, given that they work in a fashion that is entirely different from "classical" computers"
dr tech

'Dyre' malware re-surfaces as 'TrickBot', targets Australian banks * The Register - 0 views

  •  
    "Fidelis malware mangler Jason Reaves says the TrickBot malware has strong code similarities to the Dyre trojan, a menace that ripped through Western banks and businesses in the US, the UK, and Australia, inflicting tens of millions of dollars in damages through dozens of separate spam and phishing campaigns since June 2014. Dyre stole some US$5.5 million from budget carrier Ryanair and fleeced individual businesses of up to $1.5 million each in substantial wire transfers using stolen online banking credentials."
dr tech

Surveillance used to be a bad thing. Now, we happily let our employers spy on... - 0 views

  •  
    "This RFID-enabled device allowed its proud new owners to do things such as log into their computer, open doors and purchase food in the office cafeteria with a flick of the wrist. Nearly half of the company's 85 workers had the device implanted when the firm held a "chip party". YIKES!
dr tech

Opinion | The Worm That Nearly Ate the Internet - The New York Times - 0 views

  •  
    "While some experts still disagree, most now believe that Conficker was the work of Ukrainian cybercriminals building a platform for global theft who succeeded beyond all expectation, or desire. The last thing a thief wants is to draw attention to himself. Conficker's unprecedented growth drew the alarmed attention of cybersecurity experts worldwide. It became, simply, too hot to use."
dr tech

Amazon says its facial recognition can now identify fear - 0 views

  •  
    "The tech giant revealed updates to the controversial tool on Monday that include improving the accuracy and functionality of its face analysis features such as identifying gender, emotions and age range."
dr tech

Google, Mozilla, and Apple are using this one weird trick to block Kazakhstan's surveil... - 0 views

  •  
    "Google and Mozilla are making changes to their respective web browsers to try and thwart the notoriously corrupt government of Kazakhstan's efforts to launch a surveillance operation against its own citizens."
« First ‹ Previous 561 - 580 of 701 Next › Last »
Showing 20 items per page