Skip to main content

Home/ StJulians_ITGS/ Group items tagged 3.4_internet

Rss Feed Group items tagged

Tranny Franny

BBC News - Police crackdown on fake shopping sites - 3 views

  •  
    This article refers to the authenticity of the identity of web shops, and the security of shoppers' credentials. "DI Hoare said shoppers should also be wary of unsolicited offers that arrive via email." A common scamming tool that cyber thieves resort to in order to "harvest credit card and banking details" is phishing. "Phishing emails usually appear to come from a well-known organization and ask for your personal information - such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from sites, services and companies with which you do not even have an account. In order for Internet criminals to successfully "phish" your personal information, they must get you to go from an email to a website. Phishing emails will almost always tell you to click a link that takes you to a site where your personal information is requested. Legitimate organizations would never request this information of you via email." http://www.phishtank.com/what_is_phishing.php
  •  
    this gives a similar example where they used a real store and created the fake website then... the shop owners would receive all the complaints with out actually knowing what was going on http://voices.washingtonpost.com/securityfix/2009/01/caveat_emptor.html
Fiche Galinha

Kaspersky Warns of New Facebook Chat Phishing Attack - eSecurity Planet - 2 views

  • Kaspersky Warns of New Facebook Chat Phishing Attack
Ines Simon

Technology News: Cybersecurity: Anonymous Lashes Out in Wake of Megaupload Shutdown - 3 views

  • This time, though, Anonymous distributed a link that ran a Web version of that program on Twitter and in Anonymous chatrooms. Someone looking for more information on the group could have clicked on the link and unwittingly participated in the attack.
    • Ines Simon
       
      Make sure you are aware of this since you can unwillingly participate in the attack 
Morten Nielsen

European draft data law announced: What you need to know | ZDNet - 3 views

  • Right to be forgotten
  • will in effect allow European users to wipe their online slate clean. It will allow users to have their photos, details, and other data removed from websites, social networks, and search engines.
  • Regulation will dictate that a data breach or loss should be reported “if feasible, within 24 hours” of it occurring.
  • ...1 more annotation...
  • The draft rules dictate that serious violations, such as processing sensitive data without the individual’s consent, can be punished by a fine up to €1 million ($1.3 million), or even up to 2 percent of their global annual turnover.
Jorge F1

BBC News - Storage sites unnerved by Megaupload action - 3 views

  •  
    The arrest of Megaupload's founders has led to other file storage sites taking action in an apparent attempt to protect themselves from legal action. The following is a link to a news story describing the disciplinary action taken against the founder of Megaupload: http://www.bbc.co.uk/news/world-asia-16711416
  • ...1 more comment...
  •  
    The manner of his arrest is unnerving. Apparently they used two helicopters, had to break down doors and electronic locks - only to find him in a safe room with sawed off shotgun. Seems like something out of a B-movie. Even more so, when you consider that these things are allowed under the current regulations. If SOPA, ACTA or equivalent passes and gives the government more free reins, it becomes truly terrifying(bit exaggerated, I know). Megaupload is claiming to be "just like youtube". Check this article out, his lawyer is making quite the argument for it. http://arstechnica.com/tech-policy/news/2012/01/were-just-like-youtube-megaupload-lawyer-tells-ars.ars He was the lawyer to defend isohunt.com as well. A well known search engine for torrents.
  •  
    How online storage works Online storage in websites such as Megaupload, upload.to and Rapidshare work using cloud storage. This is similar to the storage used in Gmail, Youtube and Facebook Essentially this is how it works: 1. User accesses websites and selects file he/she wants to upload 2. File is uploaded to the cloud storage server, which is located in the house cloud storage systems called data centers. 3. Usually the files are then copied to other servers around the world in case one of them goes down or needs repairing, this is known as redundancy. Without redundancy cloud storage cannot guarantee that the user will be ble to access his files. Servers are also powered by multiple power supplies in case one of them fails. 4. When the user wants to access the files he uploaded he may do so through a web-based interface. For more information on how cloud storage systems work http://computer.howstuffworks.com/cloud-computing/cloud-storage1.htm
  •  
    http://www.techdirt.com/articles/20120121/16551717500/jonathan-coulton-destroys-rationale-behind-megaupload-seizure-with-single-tweet-follows-up-with-epic-blog-post.shtml In the article above Jonathon Coultron makes a good point. Although there might be a lot of illegal activity on MegaUpload such as: sharing DVDs and CDs, there are also a large group of people that use MegaUpload as a tool to legally upload data that they wish to share with others or keep a backup for themselves. Furthermore, I think his tweet says it all in regards to the millions of dollars the music and film industry will gain from the death of MegaUpload.
Tranny Franny

BBC News - Backlash over Google move to change privacy settings - 1 views

  •  
    The main stakeholder here is the google, youtube, gmail, etc. user. The change in privacy policy settings in the system affects the stakeholder in these ways, as outlined in the article: In "suggesting search queries, or tailoring search results, based on the interests expressed in Google+, Gmail and YouTube" (mining data to provide "ever more targeted adverts"), the results become limited: "something I am interested in this week, I might not be interested in next week. I use Google's facilities as both a private individual and in my professional life. Which bit are they going to give back to me?" There is no opt-out alternative to the changes in the system. "Google has become a way of life for some people. They can't do without it even if they don't like the direction it is going in". The simplification of policies could lead to graver problems. http://edition.cnn.com/2012/01/27/tech/web/google-privacy-clarified/index.html
Mr Brooke

BBC News - Can Netflix compete with 'offline' TV? - 0 views

  •  
    "With streaming services now established and a number of web-first companies investing heavily in bespoke and exclusive content, is it time we started speaking of YouTube or Netflix in the same breath as the BBC or Sky?"
Mr Brooke

BBC News - War or gaming fun? Spot the difference - 3 views

  •  
    The blurring of reality and the virtual world has come full circle. Just over twenty years ago I can remember watching the first stirrings of the Gulf War, arguably the first television war, and one where the images of missile strikes were commonplace.
The Zhan

A Fair(y) Use Tale - Copyright - 1 views

  •  
    An entertaining video on copyright laws. It covers these topics: Chapter 1: Copyright definition - 0.52 Chapter 2: What things can be copyrighted? - 2.52 Chapter 3: Copyright Duration and the Public Domain - 3.52 Chapter 4: Fair Use - 6.22 Chapter 5: Why use Disney cartoons? - 8.14 Credits - 8.52 Public domain
Fiche Galinha

How to identify fake Facebook accounts | InSecurity Complex - CNET News - 1 views

  •  
    The main social and ethical in this article would have to be authenticity, as it deals with the fact that people are making accounts to be real people. In my own experience I've had this happen to me once and it was easily identified for the reasons this article states, no status updates etc. Although in my case it was harmless, it can lead to issues of a greater significance. This article also highlights the worrying ease at which people can fake an accout and that there is a very significant number of these accounts. They could in some cases be used in a harmful manner. For example, sexual predators could easily make a profile pretending to be 15 years old, add a profile picture of a child and then add other children as friends. This creates a security issue as the children's life is in a potentially harmful situation, as these cases of sexual predators over the internet has been a security issue since social networks came to be. Another issue that lack of authenticity brings is that these fake accounts could be used for spam, and could also potentially be used to spread malware. This is a very common problem in Facebook as these fake accounts can share a link with their "friends" and from this it starts spreading throughout the entire social network.
Jorge F1

BBC News - TripAdvisor rebuked over 'trust' claims on review site - 2 views

  • Entertainment Video $render("advert","advert-leaderboard");Advertisement $render("advert-post-script-load");
  • TripAdvisor rebuked over 'trust' claims on review site

    TripAdvisor screenshot The travel site's UK homepage no longer makes the claims that provoked the complaints

    Related Stories

    TripAdvisor has been ordered to rewrite some of its marketing claims by the UK's Advertising Standards Authority.

    The ruling follows complaints by hotels that the site had said that its holiday reviews could be "trusted".

    The ASA said it was concerned that consumers might be fooled by fraudulent posts since the entries could be made "without any form of verification".

    TripAdvisor described the ruling as a "highly technical view" of "copy that was used in a limited capacity".

    However, the watchdog said that the ruling served as a warning to all UK-focused sites with user-generated material.

    Fraud systems

    The ASA said that the US-based firm's site originally carried statements saying that it contained "reviews that you can trust" and that it had "more than 50 million honest travel reviews".

    It said that two hotels and the online reputation firm Kwikchex, which represented others, had complained that the claims were misleading since they could not be substantiated.

    The advertising body said it acknowledged that reviewers were asked to sign a declaration that their reviews were real and that they had no incentive or competitive interest with the places commented on.

    Start Quote

    Don't major on trustworthiness if fake reviews can appear”

  • "This should be regarded as a benchmark ruling which applies to all web sites which make claims about the reliability of their user-created content," the ASA's spokesman Matthew Wilson told the BBC.
  • ...1 more annotation...
  • When asked about this the ASA said that its remit only extended to claims targeted at a UK audience, so it would not be pursuing changes at the .com site.
  •  
    TripAdvisor has been ordered to rewrite some of its marketing claims by the UK's Advertising Standards Authority.
  •  
    the social and ethical issue here is reliability. No one can be completely confident that what they see online is true whether it is with traveling companies or something mr brooke showed us in class: http://www.familywatchdog.us/search.asp in this website for example, we can not be sure that the people registered really are sex offenders.
The Zhan

Bridges and Barriers to Digital Inclusion - 0 views

  • some 91 percent of Americans now use a cell phone, and 90 percent of cell phone subscribers in the United States and Western Europe have phones that are Internet-ready
  • Digital Inclusion: In some circles, the term digital divide is itself defunct. Instead, using digital inclusion is not only a way to reframe the discourse in a more positive light but also reflective of what access, adoption, and literacy in the digital world really mean today. Students who are excluded from the digital universe know exactly what they're missing
  • In May 2011, U.N. Special Rapporteur Frank La Rue released a report declaring that access to the Internet is a basic human right.
  • ...2 more annotations...
  • The digital divide, once seen as a factor of wealth, is now seen as a factor of education
  • "The question is not whether we can get an iPod into every kid's hand. It's whether communities can leverage the capacity of networks to make learning more authentic and powerful for students." It's not just word processing, but blogging and tweeting; not just a class project, but an international student collaboration; not reinventing the wheel every time, but tapping into a professional-learning community that shares ideas and resources.
  •  
    How do we define digital access when the price of personal computers and related technologies has dropped dramatically over the years?
Ines Simon

What scares Facebook: Privacy and phones - CNN.com - 3 views

  • In the IPO filing, Facebook listed growth in usage from phones and tablets in place of computers as a risk.
  • "That was the first thing in the prospectus that was in flashing red lights for me," Lieb said. Access from mobile devices, she said, "will eventually put a serious dent in desktop use."
Mr Brooke

Adobe kills mobile Flash, giving Steve Jobs the last laugh | Technology | guardian.co.uk - 0 views

  •  
    The comments section adds a great analysis to this article.
Morten Nielsen

Feds: We obtained MegaUpload conversations with search warrant | Media Maverick - CNET ... - 2 views

  • there are hints that the FBI managed to place government-issued spyware on the defendants' computers.
  • The FBI cites alleged conversations between DotCom and his top lieutenants, including e-mail and Skype instant-messaging logs. Some of the records go back nearly five years,
  • Sources told CNET yesterday that Skype, the Internet phone service now owned by Microsoft, was not asked by the feds to turn over information and was not served with legal process.
  • ...2 more annotations...
  • Ira Rothken, MegaUpload's attorney, declined to comment yesterday about how his client's internal documents were obtained by the government, but said the government's "allegations are flimsy under the law."
  • On January 19, New Zealand police raided the home of DotCom in a rural area outside of Auckland. The U.S. government is seeking to extradite DotCom; a local judge denied bail and an extradition hearing is scheduled for February 22.
  •  
    The concern is privacy.Apparently the FBI was able to acquire Kim DotCom's messages with other MegaUpload employers by means of spyware, which could access skype conversations stored on a local host. Even though the FBI had a warrant to search for information, this is still rather disconcerting. This software can easily be misused. The software is called CIPAV and it stands for Computer and Internet Protocol Address Verifier. This software is able to send "network-level messages" containing the target computer's IP address, Ethernet MAC address, environment variables, the last-visited Web site, and other registry-type information including the name of the registered owner of the computer and the operating system's serial number. http://news.cnet.com/8301-13578_3-10222294-38.html
  •  
    I agree with you Morten. The social and ethical issue here is privacy. In the article they specify when saying "Sources told CNET yesterday that Skype, the Internet phone service now owned by Microsoft, was not asked by the feds to turn over information and was not served with legal process" that Skype did not give permission to the FBI to access this information. Even though the Data Protection Act states that "Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes." it is still not appropriate to "hack" into Kim DotCom's messages. Here is a link with the rules for Data Protection Act. http://www.legislation.gov.uk/ukpga/1998/29/schedule/1 Privacy is coming to bits, the only way we can talk to people knowing that knowing is going to get hold o f that information is by face-to-face communication, and even by that way people can be hearing the conversation secretly. Where has privacy gone?
Isy :)

BBC - Newsbeat - Not enough done to tackle cyberbullying, warns NSPCC - 4 views

  • One thousand teenagers across the UK were questioned for the survey and 12% said they had been cyberbullied.
  • more than half a million
  • It follows you home, it follows you over the weekend, it doesn't leave you alone.
  • ...1 more annotation...
  • educating the children they come into contact with into staying safe online.
  •  
    The news article shows some very important facts for instance, out of 5.3m teenagers in the UK more than half a million of them have suffered from cyber bullying. Furthermore, as social networks are now becoming more available on mobile devices this number is likely to increase in the coming years.
  • ...1 more comment...
  •  
    This website offers good advice on how cyber bullying works and prevention techniques: http://www.stopcyberbullying.org/index2.html
  •  
    Nowadays lots of cyber bullying is going on, and it is increasing. Not only cyber bullying exists via text messages, yet also through anonymous calls and what is increasing a lot now, via social networks. People create facebook pages with names such as 'The ugliest person in Cascais' (this is probably an example of one of the 'less worse') and post images of people, with insulting descriptions on the photos. This is a big issue since people who are bullied may psychologically or even physically suffer from this. "half a million of them had been a victim of online bullying.". Technology is increasing, so surely, if no one tries to actually do something to change this, cyber bullying will also increase.
  •  
    I'm a bit surprised at the number, it's lower than what I thought it would be. Perhaps I'm just a pessimist. Nevertheless, I agree with Ines. We're getting more and more cyber bullying, Stopping cyber bullying has proved difficult with the exponential growth of social networking. Cyber bullying is of course as we know, the use of the Internet or text messaging to bully others. But what can we do to change this escalation of cyber bullying? Not a whole lot really, in my opinion. Kids will, unsurprisingly, bully each other. The Facebook-generation is merely using the medium they are given.
Tranny Franny

BBC News - Twitter sued by Brazil over drink-driving trap alerts - 4 views

  •  
    By banning accounts, Twitter is giving into outside pressure to effectively censor its own website, and destroying one of the main goals that was set out at the time of the company's creation: freedom of speech. Once one account is banned it sets up a precedent for other governments, and businesses to politetly request Twitter to 'censor' what governments believe to be 'illegal' accounts.
  •  
    The social and ethical issue mainly presented is surveillance. The twitter accounts are set up to warn the followers of traffic stops, roadblocks etc, this gives time for the followers to avoid the police. This is an even bigger problem to tackle because most smartphones have access to Twitter through a 3G connection, this means that users are able to get push notifications on the road as well as at home. I agree with 'Fiche Galinha' in the sense that the banning of the accounts does go against freedom of speech however, it is a sensible measure to take as the account users are making police officers jobs more difficult.
Jorge F1

BBC News - Trendnet security cam flaw exposes video feeds on net - 8 views

  • "We first became aware of this on 12 January," said Zak Wood, Trendnet's director of global marketing.
  •  
    SO scary!!!!!! After reading this shocking article I'll probably start covering my security cameras while I'm at home! A main social and ethical issue is SURELY privacy. I think that many people aren't aware that security is coming to bits by the second, privacy isn't what it was some years ago. And, in my opinion, it's the technology's fault. Even though computers, internet, phones etc have become useful, society's becoming too much dependent to technology and this is an issue as technology will continue to increase even more, meaning that society's privacy will continue to decrease even more. Can't we even have privacy at home?
  •  
    To some extent I agree with you Ines. But technology isn't all bad. Yes, we are losing privacy at a rapid pace. But these cameras provided us with security. Well, they would have if it wasn't for the breach in Trendnet's security they would have provided people with security. Our world has become much dependent on social networking etc. We do not have as much privacy as one would like, but this is not solely the technology fault in my opinion. It is as much human nature, the drive to have 15 minutes of fame. Just my two cents anyway : )
  •  
    The IT system in focus is the Trendnet home security camera. Here is how real-time, live video broadcasting works. This information originally referred to IP based cameras, which essentially work the same way. Image: http://www.ipcctv.com/images/learnMore/Single-Camera.gif The camera is installed and ran "The camera turns video & audio into binary data The camera connects to your the and transmits this data onto the network This data can then be viewed on a PC; on the local network, or over the internet." The remote viewer inputs the Internet addresses which link to the video streams and is able to see footage. source: http://www.ipcctv.com/article.php?xArt=13
The Zhan

Bosses switch on antisocial network - 2 views

  • 'It's about informing you where you stand in relation to other people rather than a manager having to come over and talk to you about it
  • Some companies are introducing internal social networks to try to encourage staff to talk to their colleagues rather than escape into the ether
  •  
    Rather than blocking access to Facebook and Twitter, a growing of employers are monitoring what proportion of the working day individuals spend on them.
  •  
    State and Describe the main Social and Ethical issues that relates to this article: The main social and ethical issue that relates to this article is surveillance. In this article, it is suggested that workers in an office space would have the time they spend on a social network being monitored and controlled. This survaillence of how the workers spend their time on the computer seems somewhat appropriate in my opinion. What this is doing is it's reaching a compromise for the workers, by still letting them access these social networks, while limiting how long they can access it for daily so as to ensure that they focus as much on their work. Although it could be question whether it's ethical to monitor people's computer, what this is doing is avoiding measures such as a boss visually monitoring everyone's computer behind their backs,which raises a much bigger surveillance issue. The second suggestion of an internal and local social network that would only include people in the workplace is also a good option that attempts to keep the workers focused on the workplace and to ecourage communication between workers, rather than getting distracted with life outside the workplace. This is also, in my opinion an excellent suggestion as it offers an alternative to simply blocking social networks, which raises an issue in terms of how ethical it is to simply restrict someone from visiting a website, which could be seen as censorship.
« First ‹ Previous 61 - 80 of 155 Next › Last »
Showing 20 items per page