Skip to main content

Home/ ITGSonline/ Group items tagged security

Rss Feed Group items tagged

dr tech

Together we can thwart the big-tech data grab. Here's how | John Harris | Opinion | The... - 0 views

  •  
    "Blockchain technology has also opened the way to new models whereby endless micropayments can be made in return for particular online services or content; and, if people voluntarily allow elements of their data to be used, rewards can flow the other way. Here perhaps lies the key to a system beyond the current, Google-led model, in which services appear to be free but the letting-go of personal data is the actual price."
dr tech

Open Rights Group Scotland - E-voting's Unsolvable Problem - 0 views

  •  
    Ahhh ITGS group - a great discussion on the evoting problem would have been perfect for your Paper 2. "Remember: all of these principles of security, anonymity and verifiability have to be achieved in an understandable way. If they can't be then you get the opportunity for losers to claim fraud, and their supporters to believe them."
dr tech

Phishers steal San Diego school data going back to 2008 / Boing Boing - 0 views

  •  
    "After a successful phishing attack that captured over 50 accounts, hackers stole 500,000 records from the San Diego Unified School District, for staff, current students, and past students going all the way back to 2008; including SSNs, home addresses and phone numbers, disciplinary files, health information, emergency contact details, health benefits and payroll info, pay information, financial data for direct deposits."
dr tech

"Privacy Not Included": Mozilla's guide to insecure, surveillant gadgets to avoid / Boi... - 0 views

  •  
    ""Privacy Not Included" is Mozilla's Christmas shopping (anti)-guide to toys and gadgets that spy on you and/or make stupid security blunders, rated by relative "creepiness," from the Nintendo Switch (a little creepy) to the Fredi Baby monitor (very creepy!). Mozilla's reviews include a detailed rationale for each ranking, including whether the product includes encryption, whether it forces a default password change, how easy to understand the documentation is, whether it shares your data for "unexpected reasons," whether it has known security vulnerabilities, whether it has parental controls and more."
dr tech

Security chips have not reduced US credit-card fraud / Boing Boing - 0 views

  •  
    "The adoption of security chips has not slowed credit card fraud, either. 60,000,000 US credit cards were compromised in the past 12 months and 90% of those were chip-enabled. The majority of compromised cards were stolen by infected point-of-sale terminals. The US has the worst credit card security in the world. The findings come from a Gemini Advisory report, which blames a "lack of chip compliance" in merchants for the rise."
dr tech

Exclusive: Tim Berners-Lee tells us his radical new plan to upend the - 0 views

  •  
    "The app, using Solid's decentralized technology, allows Berners-Lee to access all of his data seamlessly-his calendar, his music library, videos, chat, research. It's like a mashup of Google Drive, Microsoft Outlook, Slack, Spotify, and WhatsApp."
dr tech

Facebook Is Breached by Hackers, Putting 50 Million Users' Data at Risk - The New York ... - 0 views

  •  
    "Three software flaws in Facebook's systems allowed hackers to break into user accounts, including those of the top executives Mark Zuckerberg and Sheryl Sandberg, according to two people familiar with the investigation but not allowed to discuss it publicly. Once in, the attackers could have gained access to apps like Spotify, Instagram and hundreds of others that give users a way to log into their systems through Facebook."
dr tech

Report: someone is already selling user data from defunct Canadian retailer's auctioned... - 0 views

  •  
    "When Vancouver tech retailer NCIX went bankrupt, it stopped paying its bills, including the bills for the storage where its servers were being kept; that led to the servers being auctioned off without being wiped first, containing sensitive data -- addresses, phone numbers, credit card numbers, passwords, etc -- for thousands of customers. Also on the servers: tax and payroll information for the company's employees."
dr tech

Schneier's "Click Here To Kill Everyone": pervasive connected devices mean we REALLY ca... - 1 views

  •  
    "I've got a theory of change I call the "peak indifference" theory. The early stage of a crisis involves trying to convince people that the crisis even exists, because things haven't gotten really terrible yet and it's not obvious that there's anything to really worry about, and the people who profit from the status quo will spend liberally to convince people that there's no reason to worry or change anything (see also: climate change, Facebook, cancer from smoking)."
blackthunder175

Facial recognition tech a threat to privacy: Microsoft, United States News & Top Storie... - 0 views

  •  
    "Firm urges regulation, raises concerns about possible misuse of fast improving technology"
dr tech

You Don't Understand Bitcoin Because You Think Money Is Real - 0 views

  •  
    "The bitcoin blockchain was created, in part, to address this historical weakness. After the 21 millionth bitcoin is mined, in around 2140, the system will produce no more."
dr tech

Leading voting machine company admits it lied, reveals that its voting machines ship ba... - 0 views

  •  
    "Kim Zetter asked them, on behalf of the New York Times, if their products shipped with backdoors allowing remote parties to access and alter them over the internet, they told her unequivocally that they did not engage in this practice. But now, in a letter to Senator Ron Wyden [D-OR], they admit that they lied, and that they "provided pcAnywhere remote connection software … to a small number of customers between 2000 and 2006.""
dr tech

Hacker fakes German minister's fingerprints using photos of her hands | Technology | Th... - 0 views

  •  
    "It's an old cliché of security researchers: fingerprints might appear more secure than passwords. But if your password gets stolen, you can change it to a new one; what happens when your fingerprint gets copied?"
dr tech

Efail: can email be saved? / Boing Boing - 0 views

  •  
    "The revelation that encrypted email is vulnerable to a variety of devastating attacks (collectively known as "Efail") has set off a round of soul-searching by internet security researchers and other technical people -- can we save email? One way to think about Efail is that it was caused by a lack of central coordination and control over email-reading programs -- the underlying protocols are strong and robust, but they can be implemented in ways that create real problems. In particular, the ability to show HTML inside a message makes email very hard to secure:"
dr tech

5 Real World Problems That Are Straight Out Of Black Mirror - 0 views

  •  
    "Thanks to a map that shows the jogging habits of the 27 million people who use Fitbits and the like, we can see splotches of activity in otherwise dark areas, like Iraq and Syria. Some of those splotches are known American military sites full of exercising soldiers, and some, by extrapolation, are sites that the military would rather keep unknown. One journalist saw a lot of exercise activity on a Somalian beach that was suspected to be home to a CIA base. Someone else spotted a suspected missile site in Yemen, and a web of bases in Afghanistan were also revealed."
dr tech

'Being cash-free puts us at risk of attack': Swedes turn against cashlessness | World n... - 0 views

  •  
    ""When you have a fully digital system you have no weapon to defend yourself if someone turns it off," he says. "If Putin invades Gotland [Sweden's largest island] it will be enough for him to turn off the payments system. No other country would even think about taking these sorts of risks, they would demand some sort of analogue system.""
1 - 20 of 483 Next › Last »
Showing 20 items per page