Skip to main content

Home/ Digit_al Society/ Group items tagged security

Rss Feed Group items tagged

dr tech

Snapchat Hacked: 'The Snappening' - Business Insider - 0 views

  •  
    "A giant database of intercepted Snapchat photos and videos has been released by hackers who have been collecting the files for years. Shocked users of the notorious chat forum 4chan are referring to the hack as "The Snappening," noting that this is far bigger than the iCloud hacks that recently targeted celebrities."
dr tech

NHS medical records to be stored in regional data centres | Technology | The Guardian - 0 views

  •  
    "Privacy campaigners say the plan for the regional centres revives talk of "pseudonymised information" being extracted from medical records. That refers to a process whereby some personal identifiers are removed but not enough to make information completely anonymous."
dr tech

Apple and White House in new push for HTTPS connections | Technology | The Guardian - 0 views

  •  
    "Both Apple and the White House have announced new policies aimed at boosting the use of encrypted connections on the internet, suggesting that the days of insecure internet connections could be numbered."
dr tech

France's plan to legalize mass surveillance will give it the power to spy on the world ... - 0 views

  •  
    "After getting caught breaking its own laws with a mass surveillance program, the French government has introduced legislation that mirrors the NSA's rules, giving it the power to spy on all foreigners -- and any French people who happen to be swept up in the dragnet."
dr tech

CryptoLocker Is The Nastiest Malware Ever - Here's What You Can Do - 0 views

  •  
    "Ransomware is an especially odious type of malware. The way it works is simple. Your computer will be infected with some malicious software. That software then renders your computer entirely unusable, sometimes purporting to be from local law enforcement and accusing you of committing a computer crime or viewing explicit pictures of children. It then demands monetary payment, either in the form of a ransom or a 'fine' before access to your computer is returned."
dr tech

NSA surveillance: don't underestimate the extraordinary power of metadata | Technology ... - 0 views

  •  
    "President Obama has reassured US citizens that 'nobody is listening to your calls', but it's not the content of conversations that intelligence agencies crave"
dr tech

Did your Adobe password leak? Now you and 150m others can check | Technology | theguard... - 0 views

  •  
    "Nearly 150 million people have been affected by a loss of customer data by Adobe, over 20 times more than the company admitted in its initial statement last week."
dr tech

Six bailed teenagers accused of cyber attacks using Lizard Squad tool | Technology | Th... - 0 views

  •  
    "Ddos attacks have been used to cause both financial and reputational damage to businesses and services from Sony to government websites. The attacks can last from hours to days, and typically use computers or internet routers infected with viruses to make innocent users unwitting parties to the attack. The Lizard Stresser tool was used effectively by Lizard Squad during cyber attacks on Microsoft's Xbox Live and Sony's PlayStation Network online gaming services in December last year."
amenosolja

A Smile Detector and Other Apps You Need to Be Using | WIRED - 0 views

  •  
    "RECHO DOES ONE very simple, little thing: It lets you leave a voice message tied to a location. When other people using the app hit those coordinates, Recho will tell them there's something to listen to. You can use the app to discover different "rechoes" around you, if you actively want to listen in on someone's location-aware thoughts. You can also share interesting soundbytes with your Recho followers. It's a little weird and novel, but ultimately a new way to think about digital exploring a place."
amenosolja

Twitter takes on Facebook, Snapchat with improved photo tools | Gigaom - 0 views

  •  
    "The new tools appear to allow Twitter users to share images with text overlays, stickers, and other modifications. Twitter's existing tools merely allow people to crop images or run them through filters that greatly change their appearance, whether it's by upping the contrast or making them look like old Polaroid shots."
dr tech

My Stolen Life - Boing Boing - 0 views

  •  
    "In some ways, losing access to your home and documents is worse than having your home and documents physically destroyed."
amenosolja

Windows 10 Is Watching: Should You Be Worried? - 0 views

  •  
    "In amongst the numerous reports of privacy infringements, there have been a handful of genuine issues. Reports of Microsoft utilizing your computer as a P2P node for update sharing were completely founded, and the 13 pages of privacy settings are also no joke."
longspagetti

Hackers Home in on Health, Education, Government Sectors | Cybersecurity | TechNewsWorld - 0 views

  •  
    New York healthcare provider, California's higher education system and the U.S. Department of Energy have become the latest targets of data bandits.
jamandham

Scientists claim breakthrough in quest for invisibility technology - 0 views

  •  
    This is not necessarily to do with ITGS however it does bring up some similar issues that we discuss in class.
dr tech

The 'Athens Affair' shows why we need encryption without backdoors | Trevor Timm | Comm... - 0 views

  •  
    "One of the biggest arguments against mandating backdoors in encryption is the fact that, even if you trust the United States government never to abuse that power (and who does?), other criminal hackers and foreign governments will be able to exploit the backdoor to use it themselves. A backdoor is an inherent vulnerability that other actors will attempt to find and try to use it for their own nefarious purposes as soon as they know it exists, putting all of our cybersecurity at risk. "
dr tech

Autonomous weapons: UN delay could open door to robot wars, say experts | Science | The... - 0 views

  •  
    ""China wanted to discuss 'existing and emerging technologies' but the wording insisted on by the US and the UK is that it is only about emerging technologies," said Noel Sharkey, a professor of artificial intelligence and robotics at the University of Sheffield and co-founder of the International Committee for Robot Arms Control, a coalition of robotics experts who are campaigning against the military use of robots."
dr tech

Internet-connected hospital drug pumps vulnerable to remote lethal-dose attacks - Boing... - 0 views

  •  
    "Researcher Billy Rios (previously) has extended his work on vulnerabilities in hospital drug pumps, discovering a means by which their firmware can be remotely overwritten with new code that can result in lethal overdoses for patients. "
« First ‹ Previous 381 - 400 of 734 Next › Last »
Showing 20 items per page