Skip to main content

Home/ Digit_al Society/ Group items tagged security

Rss Feed Group items tagged

Max van Mesdag

Google engineer fired for privacy breach after 'stalking and harrassing teenagers' - 0 views

  •  
    A worker at Google was fired for breaking company rules.
dr tech

Ransomware hunters: the self-taught tech geniuses fighting cybercrime | Cybercrime | Th... - 0 views

  •  
    "Ransomware hunters: the self-taught tech geniuses fighting cybercrime"
dr tech

Wi-Spy - Hackster.io - 0 views

  •  
    "A duo of researchers at the University of Waterloo and the University of Illinois Urbana-Champaign have turned this old assumption of impracticality on its head with their description of a Wi-Fi localization exploit they call Wi-Peep. They have outlined how an inconspicuous and inexpensive device can locate hidden Wi-Fi devices without their cooperation."
dr tech

Amazon to pay $25m over child privacy violations - BBC News - 0 views

  •  
    "Amazon is to pay $25m (£20m) to settle allegations that it violated children's privacy rights with its Alexa voice assistant. The company agreed to pay the US Federal Trade Commission (FTC) after it was accused of failing to delete Alexa recordings at the request of parents. It was found to have kept hold of sensitive data for years. Amazon's doorbell camera unit Ring will also pay out after giving employees unrestricted access to customers' data."
dr tech

Warnings over NHS data privacy after 'stalker' doctor shares woman's records | NHS | Th... - 0 views

  •  
    "Sam Smith, of the health data privacy group MedConfidential, said: "This is an utterly appalling case. It's an individual problem that the doctor did this. But it's a systemic problem that they could do it, and that flaws in the way the NHS's data management systems work meant that any doctor can do something like this to any patient."
dr tech

Tech tool offers police 'mass surveillance on a budget' | AP News - 0 views

  •  
    "What distinguishes Fog Reveal from other cellphone location technologies used by police is that it follows the devices through their advertising IDs, unique numbers assigned to each device. These numbers do not contain the name of the phone's user, but can be traced to homes and workplaces to help police establish pattern-of-life analyses."
dr tech

Encryption services are sending the right message to the quantum codebreakers | John Na... - 0 views

  •  
    "The folks at Signal are taking one of the four post-quantum cryptography algorithms that have been chosen by the US National Institute of Standards and Technology to withstand attacks by quantum computers, but instead of using it to replace their existing public-key encryption system, they are layering the new algorithm on top of what they already have. "We are augmenting our existing cryptosystems," they say, "such that an attacker must break both systems in order to compute the keys protecting people's communications." And they will be rolling out this augmented system to all users in the next few months."
dr tech

'I employ a lot of hackers': how a stock exchange chief deters cyber-attacks | Cyberwar... - 0 views

  •  
    "After "social engineering" efforts using personal details to target staff were uncovered, badges no longer carry last names, clean-desk policies are far more strictly enforced and the processing and communication of sensitive information is now subject to higher bars of regular mandatory training."
dr tech

Rhysida, the new ransomware gang behind British Library cyber-attack | Cybercrime | The... - 0 views

  •  
    "While the name behind the attack might be relatively new, the criminal technique is not. Ransomware gangs render an organisation's computers inaccessible by infecting them with malicious software - malware - and then demanding a payment, typically in cryptocurrency, to unlock the files. In recent years, however, in a process dubbed "double extortion", the majority of gangs steal data at the same time and threaten to release it online, which they hope will strengthen their negotiating hand."
dr tech

Forget state surveillance. Our tracking devices are now doing the same job | John Naugh... - 0 views

  •  
    "But in internet time 2009 was aeons ago. Now, intensive surveillance is available to anyone. And you don't have to be a tech wizard to do it. In mid-January this year, Kashmir Hill, a talented American tech reporter, used three bits of everyday consumer electronics - Apple AirTags, Tiles and a GPS tracker - to track her husband's every move. He agreed to this in principle, but didn't realise just how many devices she had planted on him. He found only two of the trackers: a Tile he felt in the breast pocket of his coat and an AirTag in his backpack when he was looking for something else. "It is impossible to find a device that makes no noise and gives no warning," he said when she showed him the ones he missed."
dr tech

Russia unleashed data-wiper malware on Ukraine, say cyber experts | Ukraine | The Guardian - 0 views

  •  
    ""It's not so much the technical disruption, it's what it does to undermine confidence, like in the financial sector. It gets people quite nervous. It's more that kind of secondary impact," said Jamie Collier, a Mandiant consultant, who described a DDoS as akin to stuffing a thousand envelopes through a letterbox every second."
dr tech

Anonymous: the hacker collective that has declared cyberwar on Russia | Ukraine | The G... - 0 views

  •  
    "Cyber conflicts are fought in the shadows, but in the case of Russia's invasion of Ukraine, it is a group that calls itself Anonymous that has made the most public declaration of war. Late on Thursday the hacker collective tweeted from an account linked to Anonymous, @YourAnonOne, that it had Vladimir Putin's regime in its sights."
ocean14

Strengthening National Security and Privacy in the Digital Era - Office of the Privacy ... - 1 views

  •  
    The Canadian office of primary commissioner stated the changes in the privacy policies, especially after 9-11 when the privacy laws were looked past to concentrate on the gathering of information to reduce terrorism in the US and Canada with no real results. However, this problem has been tackled in Canada and stated that they "believe that Canadians deserve federal privacy laws based on rights. The incorporation of a rights-based framework in our privacy laws would help support responsible innovation and foster trust in government, giving people confidence to fully participate in the digital age."
ocean14

Privacy Without Monopoly: Data Protection and Interoperability | Electronic Frontier Fo... - 0 views

  •  
    "A new regime of interoperability can revitalize competition in the space, encourage innovation, and give users more agency over their data; it may also create new risks to user privacy and data security. This paper considers those risks and argues that they are outweighed by the benefits. New interoperability, done correctly, will not just foster competition, it can be a net benefit for user privacy rights."
ocean14

Mitigating Barriers to Interoperability in Health Care | HIMSS - 0 views

  •  
    Interoperability in the healthcare system is the gateway to a successful healthcare information exchange. It has excellent benefits like it improves clinical decision-making and reduces time wasting. However, even though there are many attempts to implement the policy, interoperability still has barriers that stop it from success. There are still some third parties that use this for financial gains. Also, the people struggle with the technical and practical challenges of the protocol. Plus, privacy and trust are not truly gained in terms of the privacy and security of those data exchanges.
dr tech

Bomb disguised as USB flash drive exploded when inserted into journalist's computer | B... - 0 views

  •  
    "In Ecuador, journalist Lenin Artieda opened an envelope he received in the newsroom of Ecuavisa TV. Inside was a USB flash drive. But when he inserted the device into his laptop, it exploded. Fortunately, Artieda only suffered minor injuries."
dr tech

'Smart' tech is being weaponised by domestic abusers, and women are experiencing the wo... - 0 views

  •  
    "Because for all the promises of smart tech, at least a "dumb" heating system can't be taken over by a vindictive ex, and used to torment you with unbearable heat or terrible cold, when you have no idea why. A daft doorbell can't tell a stalker when you leave, or when you're home, or where you go if you use a smartwatch, too. And no stupid speaker can be used to listen in on your private conversations. These situations may sound like nightmares, but they are all real cases of smart tech-enabled domestic abuse. And the number of cases is shooting up: between 2018 and 2022, the domestic violence charity Refuge saw an increase of 258% in the number of survivors supported by their tech abuse team."
« First ‹ Previous 721 - 740 of 748 Next ›
Showing 20 items per page