Skip to main content

Home/ ITGSonline/ Group items tagged security

Rss Feed Group items tagged

dr tech

Hacker fakes German minister's fingerprints using photos of her hands | Technology | Th... - 0 views

  •  
    "It's an old cliché of security researchers: fingerprints might appear more secure than passwords. But if your password gets stolen, you can change it to a new one; what happens when your fingerprint gets copied?"
dr tech

Efail: can email be saved? / Boing Boing - 0 views

  •  
    "The revelation that encrypted email is vulnerable to a variety of devastating attacks (collectively known as "Efail") has set off a round of soul-searching by internet security researchers and other technical people -- can we save email?

    One way to think about Efail is that it was caused by a lack of central coordination and control over email-reading programs -- the underlying protocols are strong and robust, but they can be implemented in ways that create real problems. In particular, the ability to show HTML inside a message makes email very hard to secure:"
dr tech

5 Real World Problems That Are Straight Out Of Black Mirror - 0 views

  •  
    "Thanks to a map that shows the jogging habits of the 27 million people who use Fitbits and the like, we can see splotches of activity in otherwise dark areas, like Iraq and Syria. Some of those splotches are known American military sites full of exercising soldiers, and some, by extrapolation, are sites that the military would rather keep unknown. One journalist saw a lot of exercise activity on a Somalian beach that was suspected to be home to a CIA base. Someone else spotted a suspected missile site in Yemen, and a web of bases in Afghanistan were also revealed."
dr tech

'Being cash-free puts us at risk of attack': Swedes turn against cashlessness | World n... - 0 views

  •  
    ""When you have a fully digital system you have no weapon to defend yourself if someone turns it off," he says.

    "If Putin invades Gotland [Sweden's largest island] it will be enough for him to turn off the payments system. No other country would even think about taking these sorts of risks, they would demand some sort of analogue system.""
dr tech

Meltdown and Spectre: 'worst ever' CPU bugs affect virtually all computers | Technology... - 0 views

  •  
    "Serious security flaws that could let attackers steal sensitive data, including passwords and banking information, have been found in processors designed by Intel, AMD and ARM.

    The flaws, named Meltdown and Spectre, were discovered by security researchers at Google's Project Zero in conjunction with academic and industry researchers from several countries. Combined they affect virtually every modern computer, including smartphones, tablets and PCs from all vendors and running almost any operating system."
dr tech

Google's AI knows when a stranger is looking at your phone - The Verge - 0 views

  •  
    "Ever get the feeling someone is looking over your shoulder at your phone? Well, you might not have to worry about that in the future: Google's researchers have developed an AI tool that can spot when someone is sneaking a peek at your screen."
dr tech

China's social credit score is like a 'Black Mirror' episode - Business Insider - 0 views

  •  
    "The Chinese government is planning on implementing a system that connects citizens' financial, social, political, and legal credit ratings into one big social trustability score. The idea would be that if someone breaks trust in one area, they'd be adversely affected everywhere."
dr tech

Email scammers targeted by new bot that inundates them with endless annoying questions ... - 0 views

  •  
    "The organisation is inviting anyone who thinks they've been targeted by a scam email to forward it to Re:scam, which will verify if it is a scam or not.

    It will then use its own email address to target any scammers it manages to detect.  "
dr tech

Who do you trust? How data is helping us decide | Technology | The Guardian - 0 views

  •  
    "Should we embrace these new trust algorithms? Baveja and Shapiro acknowledge the responsibility that comes with trying to take ethical decisions and translate them into code. How much of our personal information do we want trawled through in this way? And how comfortable are we with letting an algorithm judge who is trustworthy?"
dr tech

Deloitte hit by cyber-attack revealing clients' secret emails | Business | The Guardian - 0 views

  •  
    "The hacker compromised the firm's global email server through an "administrator's account" that, in theory, gave them privileged, unrestricted "access to all areas".

    The account required only a single password and did not have "two-step" verification, sources said."
dr tech

Major cyber-attack will happen soon, warns UK's security boss | Technology | The Guardian - 0 views

  •  
    "A "category one" cyber-attack, the most serious tier possible, will happen "sometime in the next few years", a director of the National Cybersecurity Centre has warned.

    According to the agency, which reports to GCHQ and has responsibly for ensuring the UK's information security, a category one cybersecurity incident requires a national government response. "
dr tech

India's biometric database is a massive achievement and a dystopian nightmare - VICE News - 0 views

  •  
    ""What is emerging is that [Aadhaar] is being used to create a panopticon, a centralized database that's linked to every aspect of our lives - finances, travel, birth, deaths, marriage, education, employment, health, etc.," Reetika Khera, an Indian economist and social scientist, told VICE News.

    Security concerns have plagued the system for years, but in recent weeks criticism has grown deafeningly loud. Earlier this month, as part of the Supreme Court case on privacy, an activist's freedom of information request suggested that foreign firms were being given "full access" to the classified data - including fingerprints and iris scans."
dr tech

Surveillance used to be a bad thing. Now, we happily let our employers spy on... - 0 views

  •  
    "This RFID-enabled device allowed its proud new owners to do things such as log into their computer, open doors and purchase food in the office cafeteria with a flick of the wrist. Nearly half of the company's 85 workers had the device implanted when the firm held a "chip party".
    YIKES!
dr tech

Hackers breach dozens of voting machines brought to conference | TheHill - 0 views

  •  
    "The conference acquired 30 machines for hackers to toy with. Every voting machine in the village was hacked.

    Though voting machines are technologically simple, they are difficult for researchers to obtain for independent research."
dr tech

Wisconsin Company To Implant Microchips In Employees | KSTP.com - 0 views

  •  
    "Each chip costs $300 and the company is picking up the tab. They're implanted between a person's thumb and forefinger. Westby added the data is both encrypted and secure.

    "There's no GPS tracking at all," he said.

    No one who works at Three Square Market is required to get the chip implant."

    HOW scary is this!
dr tech

'Petya' ransomware attack strikes companies across Europe and US | World news | The Gua... - 0 views

  •  
    "Victims of a major ransomware cyberattack that has spread through the US and Europe can no longer unlock their computers even if they pay the ransom.

    The "Petya" ransomware has caused serious disruption at large firms including the advertising giant WPP, French construction materials company Saint-Gobain and Russian steel and oil firms Evraz and Rosneft.

    Infected computers display a message demanding a Bitcoin ransom worth $300. Those who pay are asked to send confirmation of payment to an email address. However, that email address has been shut down by the email provider. "
dr tech

British Parliament hit by cyber security attack - media reports - The Economic Times - 0 views

  •  
    ""Closer investigation by our team confirmed that hackers were carrying out a sustained and determined attack on all parliamentary user accounts in an attempt to identify weak passwords. These attempts specifically were trying to gain access to our emails. "
dr tech

Rise of the machines: who is the 'internet of things' good for? | Technology | The Guar... - 0 views

  •  
    "So, yes: the internet of things presents many new possibilities, and it would be foolish to dismiss those possibilities out of hand. But we would also be wise to approach the entire domain with scepticism, and in particular to resist the attempts of companies to gather ever more data about our lives - no matter how much ease, convenience and self-mastery we are told they are offering us."
dr tech

JetBlue is the latest to use facial recognition technology in airports - 0 views

  •  
    "However, there is some concern about how accurate these new procedures will be. Apparently the facial recognition technology doesn't recognize all people will the same accuracy. White women and black people aren't as easily recognized as white men, meaning there could be some mismatching of identities. Some are also concerned that this is crossing the line in terms of passenger privacy."
1 - 20 of 467 Next › Last »
Showing 20 items per page