Skip to main content

Home/ Digit_al Society/ Group items matching "security,internet" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
dr tech

Pakistan Orders ISPs To Block 429,343 Websites Completely, Because There's Porn On The Internet | Techdirt - 0 views

  •  
    "has told ISPs that they need to start blocking an astounding 429,343 websites at the domain level as quickly as possible, following a Supreme Court order to the PTA about the evils of porn online."
dr tech

How the internet found a better way than illegible squiggles to prove you're not a robot | Technology | The Guardian - 0 views

  •  
    "The company has revealed the latest evolution of the Captcha (short, sort of, for Completely Automated Public Turing test to tell Computers and Humans Apart), which aims to do away with any interruption at all: the new, "invisible reCaptcha" aims to tell whether a given visitor is a robot or not purely by analysing their browsing behaviour. Barring a short wait while the system does its job, a typical human visitor shouldn't have to do anything else to prove they're not a robot."
dr tech

The Surgeon Who Wants to Connect You to the Internet with a Brain Implant | MIT Technology Review - 0 views

  •  
    "But Leuthardt, for one, expects he will live to see it. "At the pace at which technology changes, it's not inconceivable to think that in a 20-year time frame everything in a cell phone could be put into a grain of rice," he says. "That could be put into your head in a minimally invasive way, and would be able to perform the computations necessary to be a really effective brain-computer interface.""
aren01

The future of cybersecurity: Your body as a hacker-proof network | ZDNet - 1 views

  •  
    "The Purdue researchers have created Electro-Quasistatic Human Body Communication (EQS-HBC) which uses low-frequency, carrier-less broadband transmission, and so keeps the signal almost entirely within the human body. That means data from pacemakers and other implantable medical devices would only be readable a handful of centimetres outside the wearer."
  •  
    "Increasing numbers of implantable medical devices are now gaining internet connectivity, giving doctors the ability to monitor patients health remotely, and even update the devices to tweak a treatment plan. Unfortunately, that flexibility offers a way for hackers to hijack that hardware, and even potentially make changes to the way the devices work. While so far no attacks have been successful, proof-of-concept attacks have been available for years"
dr tech

Snooper's charter: wider police powers to hack phones and access web history | World news | The Guardian - 0 views

  •  
    "The bill will now allow police to access all web browsing records in specific crime investigations, beyond the illegal websites and communications services specified in the original draft bill. It will extend the use of state remote computer hacking from the security services to the police in cases involving a "threat to life" or missing persons. This can include cases involving "damage to somebody's mental health", but will be restricted to use by the National Crime Agency and a small number of major police forces."
dr tech

The Mirai Botnet Isn't Easy to Defeat | WIRED - 0 views

  •  
    ""It's accelerating because there's a wide-open, unprotected landscape that people can go to," says Chris Carlson, vice president of product management at Qualys. "It's a gold rush to capture these devices for botnets.""
dr tech

Vast majority of Americans reject mass surveillance to thwart terrorist attacks / Boing Boing - 0 views

  •  
    "75% 75% surveyed by Ipsos/Reuters said, "they would not let investigators tap into their Internet activity to help the U.S. combat domestic terrorism"(up from 67% in 20"
dr tech

Bitcoin Thefts Surge, DDoS Hackers Take Millions - InformationWeek - 0 views

  •  
    "Bitcoin Internet Payment System (BIPS), a Denmark-based Bitcoin payment processor, suffered a denial-of-service (DDoS) attack."
dr tech

Six bailed teenagers accused of cyber attacks using Lizard Squad tool | Technology | The Guardian - 0 views

  •  
    "Ddos attacks have been used to cause both financial and reputational damage to businesses and services from Sony to government websites. The attacks can last from hours to days, and typically use computers or internet routers infected with viruses to make innocent users unwitting parties to the attack. The Lizard Stresser tool was used effectively by Lizard Squad during cyber attacks on Microsoft's Xbox Live and Sony's PlayStation Network online gaming services in December last year."
dr tech

Internet-connected hospital drug pumps vulnerable to remote lethal-dose attacks - Boing Boing - 0 views

  •  
    "Researcher Billy Rios (previously) has extended his work on vulnerabilities in hospital drug pumps, discovering a means by which their firmware can be remotely overwritten with new code that can result in lethal overdoses for patients. "
Max van Mesdag

PleaseRobMe website reveals dangers of social networks - 0 views

  •  
    If you're out of the house and you tweet about it, the Internet will soon know about it!
dr tech

NSA facial recognition: combining national ID cards, Internet intercepts, and commercial facial databases for millions of people - Boing Boing - 0 views

  •  
    "A newly released set of slides from the Snowden leaks reveals that the NSA is harvesting millions of facial images from the Web for use in facial recognition algorithms through a program called "Identity Intelligence." James Risen and Laura Poitras's NYT piece shows that the NSA is linking these facial images with other biometrics, identity data, and "behavioral" data including "travel, financial, behaviors, social network." "
dr tech

Open Rights Group - ISC report into Lee Rigby's murder is misleading - 0 views

  •  
    ""When the intelligence services are gathering data about every one of us but failing to act on intelligence about individuals, they need to get back to basics, and look at the way they conduct targeted investigations. "The committee is particularly misleading when it implies that US companies do not co-operate, and it is quite extraordinary to demand that companies pro-actively monitor email content for suspicious material. Internet companies cannot and must not become an arm of the surveillance state."
« First ‹ Previous 41 - 60 of 78 Next ›
Showing 20 items per page