Skip to main content

Home/ StJulians_ITGS/ Group items tagged 1.2_security

Rss Feed Group items tagged

2More

Technology News: Cybersecurity: Anonymous Lashes Out in Wake of Megaupload Shutdown - 3 views

  • This time, though, Anonymous distributed a link that ran a Web version of that program on Twitter and in Anonymous chatrooms. Someone looking for more information on the group could have clicked on the link and unwittingly participated in the attack.
    • Ines Simon
       
      Make sure you are aware of this since you can unwillingly participate in the attack 
4More

European draft data law announced: What you need to know | ZDNet - 3 views

  • Right to be forgotten
  • will in effect allow European users to wipe their online slate clean. It will allow users to have their photos, details, and other data removed from websites, social networks, and search engines.
  • Regulation will dictate that a data breach or loss should be reported “if feasible, within 24 hours” of it occurring.
  • ...1 more annotation...
  • The draft rules dictate that serious violations, such as processing sensitive data without the individual’s consent, can be punished by a fine up to €1 million ($1.3 million), or even up to 2 percent of their global annual turnover.
4More

BBC News - Storage sites unnerved by Megaupload action - 3 views

  •  
    The arrest of Megaupload's founders has led to other file storage sites taking action in an apparent attempt to protect themselves from legal action. The following is a link to a news story describing the disciplinary action taken against the founder of Megaupload: http://www.bbc.co.uk/news/world-asia-16711416
  • ...1 more comment...
  •  
    The manner of his arrest is unnerving. Apparently they used two helicopters, had to break down doors and electronic locks - only to find him in a safe room with sawed off shotgun. Seems like something out of a B-movie. Even more so, when you consider that these things are allowed under the current regulations. If SOPA, ACTA or equivalent passes and gives the government more free reins, it becomes truly terrifying(bit exaggerated, I know). Megaupload is claiming to be "just like youtube". Check this article out, his lawyer is making quite the argument for it. http://arstechnica.com/tech-policy/news/2012/01/were-just-like-youtube-megaupload-lawyer-tells-ars.ars He was the lawyer to defend isohunt.com as well. A well known search engine for torrents.
  •  
    How online storage works Online storage in websites such as Megaupload, upload.to and Rapidshare work using cloud storage. This is similar to the storage used in Gmail, Youtube and Facebook Essentially this is how it works: 1. User accesses websites and selects file he/she wants to upload 2. File is uploaded to the cloud storage server, which is located in the house cloud storage systems called data centers. 3. Usually the files are then copied to other servers around the world in case one of them goes down or needs repairing, this is known as redundancy. Without redundancy cloud storage cannot guarantee that the user will be ble to access his files. Servers are also powered by multiple power supplies in case one of them fails. 4. When the user wants to access the files he uploaded he may do so through a web-based interface. For more information on how cloud storage systems work http://computer.howstuffworks.com/cloud-computing/cloud-storage1.htm
  •  
    http://www.techdirt.com/articles/20120121/16551717500/jonathan-coulton-destroys-rationale-behind-megaupload-seizure-with-single-tweet-follows-up-with-epic-blog-post.shtml In the article above Jonathon Coultron makes a good point. Although there might be a lot of illegal activity on MegaUpload such as: sharing DVDs and CDs, there are also a large group of people that use MegaUpload as a tool to legally upload data that they wish to share with others or keep a backup for themselves. Furthermore, I think his tweet says it all in regards to the millions of dollars the music and film industry will gain from the death of MegaUpload.
5More

BBC News - Hackers outwit online banking identity security systems - 3 views

  • The threat does not strike until the user visits particular websites
  •  
    Criminal hackers have found a way round the latest generation of online banking security devices given out by banks, the BBC has learned.
  • ...1 more comment...
  •  
    The main social and ethical issues here are mainly security and reliability, it is interesting how the hackers use malware software to obtain the users information. What is more concerning is the fact that it is difficult for the account owner to actually realise any suspicious activity due to the fact the hackers are able to alter the banks database details in order to display a normal online statement. In most cases a up to date anti-virus is recommended however, according to the bbc click investigation most of the security softwares did not pick up the malware software.
  •  
    I agree with Jorge. There are various ways in which hackers can obtain personal information by the internet. One way by which hackers can do this is by phishing. In this article, account holders are being tricked by the offer of training in a new "upgraded security system", meaning that account holders click on the link and their money is moved out of their account without them even noticing! This is a big problem, and as this article says "Online banking fraud losses totalled £16.9 million in the first six months of 2011, according to Financial Fraud Action UK" therefore in only 6 months, millions of pounds were gone! Phishing is increasing more and more, some day we can't even click a link because we're scared it could be something similar!
  •  
    Here is a website which is explaining how China is trying to combat hi-tech spyware! http://www.bbc.co.uk/news/technology-16357238
7More

Feds: We obtained MegaUpload conversations with search warrant | Media Maverick - CNET ... - 2 views

  • there are hints that the FBI managed to place government-issued spyware on the defendants' computers.
  • The FBI cites alleged conversations between DotCom and his top lieutenants, including e-mail and Skype instant-messaging logs. Some of the records go back nearly five years,
  • Sources told CNET yesterday that Skype, the Internet phone service now owned by Microsoft, was not asked by the feds to turn over information and was not served with legal process.
  • ...2 more annotations...
  • Ira Rothken, MegaUpload's attorney, declined to comment yesterday about how his client's internal documents were obtained by the government, but said the government's "allegations are flimsy under the law."
  • On January 19, New Zealand police raided the home of DotCom in a rural area outside of Auckland. The U.S. government is seeking to extradite DotCom; a local judge denied bail and an extradition hearing is scheduled for February 22.
  •  
    The concern is privacy.Apparently the FBI was able to acquire Kim DotCom's messages with other MegaUpload employers by means of spyware, which could access skype conversations stored on a local host. Even though the FBI had a warrant to search for information, this is still rather disconcerting. This software can easily be misused. The software is called CIPAV and it stands for Computer and Internet Protocol Address Verifier. This software is able to send "network-level messages" containing the target computer's IP address, Ethernet MAC address, environment variables, the last-visited Web site, and other registry-type information including the name of the registered owner of the computer and the operating system's serial number. http://news.cnet.com/8301-13578_3-10222294-38.html
  •  
    I agree with you Morten. The social and ethical issue here is privacy. In the article they specify when saying "Sources told CNET yesterday that Skype, the Internet phone service now owned by Microsoft, was not asked by the feds to turn over information and was not served with legal process" that Skype did not give permission to the FBI to access this information. Even though the Data Protection Act states that "Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes." it is still not appropriate to "hack" into Kim DotCom's messages. Here is a link with the rules for Data Protection Act. http://www.legislation.gov.uk/ukpga/1998/29/schedule/1 Privacy is coming to bits, the only way we can talk to people knowing that knowing is going to get hold o f that information is by face-to-face communication, and even by that way people can be hearing the conversation secretly. Where has privacy gone?
2More

LulzSec leader Sabu was working for us, says FBI | Technology | guardian.co.uk - 1 views

    • Mr Brooke
       
      OMG!!!
  •  
    "Hacking group leader, identified as Hector Xavier Monsegur, revealed"
1More

Undisclosed number of Verizon employees at risk of identity theft | News Blog - CNET News - 0 views

  • Undisclosed number of Verizon employees at risk of identity theft
2More

Credit card breach exposes 40 million accounts - CNET News - 0 views

  • Credit card breach exposes 40 million accounts
  •  
    In what could be the largest data security breach to date, MasterCard International on Friday said information on more than 40 million credit cards may have been stolen.
2More

Pentagon Hacker Compromises Personal Data - 0 views

  • Pentagon Hacker Compromises Personal Data
  •  
    WASHINGTON - An intruder gained access to a Defense Department computer server and compromised confidential health care insurance information for more than 14,000 people, the department said Friday.
1More

MacDailyNews - 0 views

  • Pentagon confirms 2008 hack was ‘most significant breach of U.S. military computers ever’
1More

The 451 Group - Security Coverage - 1 views

  •  
    Security Taxonomy
3More

Feds Fail Computer Security Test - InternetNews.com - 0 views

  • Feds Fail Computer Security Test Despite improvements, the government's computer security program proves lacking once again.
  • The federal government has made progress in securing its computer systems since last year, but it still only earned a D-plus from Congress for its overall performance in 2004.
  •  
    The federal government has made progress in securing its computer systems since last year, but it still only earned a D-plus from Congress for its overall performance in 2004.
1More

Twitter worm was unleashed by 17-year-old Australian | Technology | guardian.co.uk - 1 views

  •  
    "Twitter worm was unleashed by 17-year-old Australian"
‹ Previous 21 - 40 of 68 Next › Last »
Showing 20 items per page