Skip to main content

Home/ Digit_al Society/ Group items tagged security ITGS

Rss Feed Group items tagged

dr tech

Centralized vs Decentralized Storage: Blockchain Changing Storage - 0 views

  •  
    "Decentralized storage platforms break apart the users' files and distribute them across multiple nodes on their network. Since the data is scattered across multiple nodes, there is no single point of failure."
dr tech

'Shocking' hack of psychotherapy records in Finland affects thousands | Finland | The G... - 0 views

  •  
    ""The Vastaamo data breach is a shocking act which hits all of us deep down," the country's interior minister, Maria Ohisalo, wrote on her website on Monday. Finland must be a country where "help for mental health issues is available and it can be accessed without fear", she added. Ministers met for crisis talks this weekend, with further emergency discussions tabled for the coming week over the data breach."
dr tech

Lazada suffers data breach; personal information from 1.1 million RedMart accounts for ... - 0 views

  •  
    "Lazada added that the information stolen was last updated in March 2019, and the affected RedMart-only database is not linked to any Lazada database."
dr tech

The Surgeon Who Wants to Connect You to the Internet with a Brain Implant | MIT Technol... - 0 views

  •  
    "But Leuthardt, for one, expects he will live to see it. "At the pace at which technology changes, it's not inconceivable to think that in a 20-year time frame everything in a cell phone could be put into a grain of rice," he says. "That could be put into your head in a minimally invasive way, and would be able to perform the computations necessary to be a really effective brain-computer interface.""
dr tech

The Fresh Smell of ransomed coffee - Avast Threat Labs - 0 views

  •  
    "Let's say you have an IoT device that is well protected with functions that can be accessed through a well-defined API; even if you can control the device through the API, you probably can't do too much harm. Firmware, the programming inside the device has logical constraints that don't allow you, for example, to close garage doors while someone is in the way of them or overheat a device so that it combusts.  We used to trust that hardware, such as a common kitchen appliance, could be trusted and could not be easily altered without physically dismounting the device. But with today's "smart" appliances, this is no longer the case."
dr tech

Facebook 'SilentFade' Malware Attack Stole Credentials For Years | Threatpost - 0 views

  •  
    "Dubbed SilentFade (short for "Silently running Facebook Ads with Exploits"), the malware compromised Facebook accounts and used them to promote malicious ads, steal browser cookies and more. The social-media giant said that the Chinese malware campaign started in 2016, but it was first discovered in December 2018, due to a suspicious traffic spike across a number of Facebook endpoints. After an extensive investigation, Facebook shut down the campaign and pursued legal action against the cybercriminals behind the attack in December 2019. "
dr tech

2 hospital data breaches on Monday exposed patient data | Thaiger - 0 views

  •  
    "Two prominent hospitals were the victims of data breaching hackers in the last few days with each hospital having over 40,000 patients' personal information at risk. On Monday, Phetchabun Hospital had the personal data of 46,000 of their patients compromised while Bhumirajanagarindra Kidney Institute Hospital had the data from 40,000 patients stolen in parallel attacks."
dr tech

The great data robbery - 0 views

  •  
    "A major data breach at Phetchabun Hospital last week served as a loud wake-up call to state and private organisations to pay attention to their cybersecurity measures, as experts warned cybercrimes could become more commonplace in the years to come. The breach involved the data of 10,095 patients, including their names and dates of admission and discharge."
dr tech

Amazon's Ring is the largest civilian surveillance network the US has ever seen | Laure... - 1 views

  •  
    "Ring is effectively building the largest corporate-owned, civilian-installed surveillance network that the US has ever seen. An estimated 400,000 Ring devices were sold in December 2019 alone, and that was before the across-the-board boom in online retail sales during the pandemic. Amazon is cagey about how many Ring cameras are active at any one point in time, but estimates drawn from Amazon's sales data place yearly sales in the hundreds of millions. The always-on video surveillance network extends even further when you consider the millions of users on Ring's affiliated crime reporting app, Neighbors, which allows people to upload content from Ring and non-Ring devices."
melodyyy

Japan firms to jointly develop facial recognition payment system - 0 views

  • Four Japanese firms will jointly develop a payment system using facial recognition technology that will allow customers to make deposits and withdrawals at banks and shop at stores without presenting anything if they register their facial images in advance.
  • While the registration of facial images would require the consent of customers, many people may hesitate to provide their image data due to privacy concerns. How to ensure the security of the planned system will be key to its widespread use. The four companies plan to develop a system under which facial image data will be stored on a server that cannot be accessed from the outside. Resona will manage the system.
dr tech

Costco finds five card skimmers at four Chicago-area warehouses, warns customers of pot... - 0 views

  •  
    "Costco customers at four of the retailer's Chicago-area warehouses may have had their payment information compromised after employees discovered five card-skimming devices during routine PIN pad inspections at the end of August. "We promptly removed the skimmers, notified law enforcement, and engaged a forensics firm to analyze the devices," A Costco spokesperson told FOX Business in a statement. "It appears that these skimmers had the ability to capture information on the magnetic stripe of a payment card, including name, card number, expiration date, and CVV.""
dr tech

Why you and I will pay the price for the next big cybersecurity crisis | John Naughton ... - 0 views

  •  
    "Virtually every company and organisation now has - indeed has to have - an online presence. But many still take only rudimentary cybersecurity precautions and are sitting ducks for hackers. For most of companies, that's a matter for them and their boards of directors - it's their lookout if a ransomware attack makes them insolvent."
dr tech

Will blockchain fulfil its democratic promise or will it become a tool of big tech? | J... - 0 views

  •  
    "The problem with digital technology is that, for engineers, it is both intrinsically fascinating and seductively challenging, which means that they acquire a kind of tunnel vision: they are so focused on finding solutions to the technical problems that they are blinded to the wider context. At the moment, for example, the consensus-establishing processes for verifying blockchain transactions requires intensive computation, with a correspondingly heavy carbon footprint. Reducing that poses intriguing technical challenges, but focusing on them means that the engineering community isn't thinking about the governance issues raised by the technology. There may not be any central authority in a blockchain but, as Vili Lehdonvirta pointed out years ago, there are rules for what constitutes a consensus and, therefore, a question about who exactly sets those rules. The engineers? The owners of the biggest supercomputers on the chain? Goldman Sachs? These are ultimately political questions, not technical ones."
dr tech

Recently uncovered software flaw 'most critical vulnerability of the last decade' | Sof... - 0 views

  •  
    "The flaw, dubbed "Log4Shell", may be the worst computer vulnerability discovered in years. It was uncovered in an open-source logging tool that is ubiquitous in cloud servers and enterprise software used across the industry and the government. Unless it is fixed, it grants criminals, spies and programming novices alike, easy access to internal networks where they can loot valuable data, plant malware, erase crucial information and much more."
dr tech

More on Roblox's exploitation of children | Boing Boing - 0 views

  •  
    "Why? Because it has an internal app store that puts its young player base to work making virtual stuff and selling it for scrip or peanuts while the company pockets the profits. It even promotes the far-right personalities and groups using it to recruit. It is a ruthless money machine that embodies the perverse incentives of social media, aimed directly at children and operated by amoral reptiles."
dr tech

Medical data hacked from 10m Australians begins to appear on dark web | World news | Th... - 0 views

  •  
    "Nearly 10 million Australians have had their private health data hacked - with sensitive medical records detailing treatments for alcoholism, drug addictions, and pregnancy terminations already posted online - in a cyber-attack believed to have been coordinated from Russia."
dr tech

Can anyone avoid CCTV surveillance? We ask an expert | Social trends | The Guardian - 0 views

  •  
    "You're nailing the problem: the tech sales people and the politicians are all on the same drug, which is "This tech is perfect", because it's cheaper than more police. There's a lawsuit in the US because a black man was wrongly arrested based on facial recognition. Tech companies need to be held to account. One company we focused on, Clearview AI, scraped social networks - collected images of people's faces and data from publicly available information - to create its software. Facial recognition relies on artificial intelligence. It needs to study faces. And only the government - the DVLA etc - and social networking companies have access to a lot of faces."
dr tech

Exclusive: Qatar World Cup will be most heavily surveilled tournament in history - 0 views

  •  
    "Local organisers say that their artificial intelligence [AI] programmes are so advanced that they can tell whether a spectator is angry from analysing facial expressions. The cameras are sufficiently powerful that they can zoom in and identify each spectator in every single stadium seat."
dr tech

Cracking apps: are crimefighters going too far to bring down cartels? | Organised crime... - 0 views

  •  
    "The Italian supreme court ordered prosecutors last month to disclose how the Sky ECC data had been retrieved, arguing that it was impossible to have a fair trial if the accused is unable to access the evidence or assess its reliability and legality, a position supposed by the NGO Fair Trials. Whether prosecutors choose to do so could determine whether the arrests made this week lead to convictions or not. Prosecutors in the UK face a similar dilemma in relation to the hacking of EncroChat, another secret messaging platform that had the added facility of a "panic" button that when pressed would immediately erase the phone's contents."
« First ‹ Previous 661 - 680 of 704 Next › Last »
Showing 20 items per page