Skip to main content

Home/ StJulians_ITGS/ Group items tagged 3.7_databases

Rss Feed Group items tagged

Jorge F1

Hackers hit US security company - 1 views

  •  
    The activist hacker group Anonymous says it has stolen thousands of emails, passwords and credit card details from a US-based security think-tank. The hackers claim they were able to obtain the information because the company, Stratfor, did not encrypt it. They say Stratfor's clients include the US defence department, law enforcement agencies and media organisations.
  •  
    At least it was for a good cause, instead of keeping the money they gave it to charities.
Jorge F1

Israeli hacker retaliates to credit card hacking - 2 views

  •  
    An Israeli hacker has published details of hundreds of Saudi credit cards online and is threatening to post more in revenge for acts by Arab hackers.
  • ...1 more comment...
  •  
    One of the main social and ethical issues in this article is surly privacy. Privacy has been a main issue for our society, not only about credit card details, yet also other personal information. As technology is increasing, the less privacy we have as there are more ways in obtaining this information. And in this case, as technology is increasing, hackers are also as there are easier and more ways in order to get the information they want. There are various ways the hacker can get access to these thousands of credit card numbers, here is one step-by-step of one of the ways of how this IT system works: Firstly, the hacker (or hackers) go around lots of banks and put a small video camera pointing to the bank machine keypad. This video camera is well hidden so that people cannot see them. When someone goes to the machine, they put their credit card number and this analogue information converts to digital information and is recorded in the memory in the video camera. After a few hours/days, the hackers remove the video cameras and upload the data in the memory card via a USB cable and save the data on their servers. The hackers then watch the video and record the credit card numbers on a paper/other computer. With this information, they can obtain more personal information such as names, phone numbers, post codes etc with specialized programs. Finally, when they have all the information they have, they post the personal information including the credit card numbers, on the internet. Yet, in order to maintain the hacker anonymous and not being able to be found via the IP address, he uses another proxy server when uploading this information on the internet. There are also other ways to get the credit card information such as: - Intercepting emails containing passwords - Popups infected by viruses - Spyware - Spam - Keyloggers etc. Some possible solutions for this issue is: - When typing your credit card number in the bank machine keypad, hide the keypad coveri
  •  
    Well yes, I agree with Ines. This is to some extent about privacy. However, I doubt that they obtained that much information by use of cameras in banks. I'd find it much more likely if they have obtained the data from a database in the private sector. I do not think privacy is the most important issue here though. By far and large the most important issue in the article - is how cyber warfare could start to affect the conflict in the Middle East. We've seen how valuable the Internet was in the Arab Spring. The cyber warfare is going to be, and to some extent I imagine, is already an essential tool for the different factions in the Middle East. As this was a breach in the private sector, the security there must be improved with f.ex. stronger firewalls.They must improve their security, if not they are sure to lose money because of the reliability issue.
  •  
    I agree with you, Morten. However, I gave one example of how it would be possible to obtain the credit card numbers, where I gave in the end more examples of how it would be possible to do so.
Jorge F1

DNA link led to sex attack arrest - 4 views

  •  
    The national DNA database proved "uniquely crucial" in an investigation that led to the conviction of a sex attacker in Essex. But police fear the service that helped to link Lawrence Button to the sexual assault of a former University of Essex student, in 2009, may be scaled back.
  • ...3 more comments...
  •  
    This article compromises the privacy of British citizens, as well as the reliability and integrity of the DNA database. I will focus my comment on the latter. It was a matter of fortune that Button's DNA had been collected due to his arrest for a domestic assault in May 2010. This is because according to the Protection of Freedoms Bill, biometric material can only be retained if the holder consents it formally. This consent "can be withdrawn at any time". There are also strict regulations on the amount of time that a DNA profile can be retained by authorities according to the new Bill. In addition to that, what way is there to ensure the 62 million(http://en.wikipedia.org/wiki/United_Kingdom) British citizens have their DNA profile taken and input in the database? This compromises the integrity and completeness of the DNA database. According to the article itself, "The national database is believed to hold over five million DNA profiles". The new Bill also "requires schools to get parents' consent before processing children's biometric information" (http://services.parliament.uk/bills/2010-11/protectionoffreedoms.html) The full official bill on the regulation of biometric data can be found at: http://www.publications.parliament.uk/pa/bills/lbill/2010-2012/0099/lbill_2010-20120099_en_2.htm#pt1-ch1-pb1-l1g1 Hence the sweeping statement "The odds, we were told, were over a billion to one, so we were quite confident we'd got the right man", is certainly misleading, because the database is likely not to include a fraction of the British population. The most disturbing thing is that the responsible chief Richard McNamara states "it was the DNA alone that convicted the man, because we never had any other evidence". Is it really ethical to convict a criminal solely based on a potentially incomplete database? A solution to this problem would be to enforce surveillance systems and active police monitoring in order to obtain more plausible evidence.
  •  
    This article regards the compromising of the privacy of British citizens, as well as the reliability and integrity of the DNA database. I will focus my comment on the latter.
  •  
    "The Zhan" you raise some interesting points on the privacy issues of DNA databases. However I think you may have misunderstood the reliability issue of the DNA test. When two DNA samples are found to be the same then it is 99.99% certain that it is in fact the DNA of the suspect and is a very reliable indicator that it was that person. There are forensic issues involved in the collection and contamination of DNA samples from a crime scene but that is another issue. The main social and ethical issue here that you have rightly pointed out is the collection and storage of DNA from people. This article outlines some of these issues from 2008: http://news.bbc.co.uk/2/hi/uk_news/7177152.stm Here the issue of innocent peoples data being stored has come because ....."following a change in the law in 2001, all DNA collected by forensics - for whatever purpose - can be stored permanently. " It was promised in the recent election in the UK to destroy old data but it appears to be one of the many U turns that the current government has made: http://www.telegraph.co.uk/comment/telegraph-view/8659968/A-Bill-to-curtail-our-liberty.html
  •  
    I agree with your first point to some extent, but I think that implying that it DNA profiling is 99.99% accurate is when in fact it is 99.9999999999% accurate (one to a trillion sir, get it right), is not acceptable - according to this http://www.guardian.co.uk/commentisfree/henryporter/2009/may/25/dna-database-false-positive I think that retaining DNA samples in databases and profiling an individual in a pervasively detailed manner could lead to extremes such as that of convicting criminals for pre-crimes, as portrayed in the film Minority Report. That would heavily compromise a citizen's privacy. http://3.bp.blogspot.com/-I7tBjrA8Mj0/TWPfWNY9-0I/AAAAAAAAADg/QTXlFpTtNvM/s1600/MINORITY+REPORT.jpg "The US government has come up with a Big Brother-esque machine that senses if an individual intends to do harm". The system, "Future Attribute Screening Technology (FAST), determines if a person intends to do harm by using a mal-intent algorithm that uses data from sensors that monitor a person's physiological and behavioral changes." http://news.techworld.com/security/3309928/tom-cruise-pre-crime-minority-report-machine-brought-to-life/
  •  
    Good find Zhan! Would be interesting to see what the bods in the maths department have to say about "adventitious matches" and statistical probability. Maybe any of you who do HL maths can follow it up and add to this? Nice to see a reference to some classic sci-fi as well. This is a favourite read of mine. Also one of my all time top ten films! http://en.wikipedia.org/wiki/Do_Androids_Dream_of_Electric_Sheep%3F http://www.imdb.com/title/tt0083658/
Morten Nielsen

BBC News - Valve's online game service Steam hit by hackers - 3 views

  • The attackers used login details from the forum hack to access a database that held ID and credit card data
  • The initial investigation showed that the attackers gained access to a Steam database that held "user names, hashed and salted passwords, game purchases, email addresses, billing addresses and encrypted credit card information".
  •  
    This article further increases the already notorious fear of databases containing people's details being accessed by undesired people, who could potentially use this data to cause harm. This raises a serious privacy issue, as, although it has not been confirmed, these hackers have accessed the Steam database which holds up to 35 million people's credit card data and email addresses, posing a threat to a large amount of people. Although it is not known if any harm came of this attack, security measures such as changing password and transferring credit card data to a more secure service (Steam Guard security service) were suggested to Steam users. This is a solution that doesn't undo the harm that has already been made, but is still a positive measure as it can help prevent potential future attacks from hackers on this database.
  •  
    "Valve has officially rolled out its new Steam security system, Steam Guard, which allows users to lock their accounts to a single PC if they so choose. Steam Guard essentially blocks all attempts to access a protected Steam account, then sends verification emails to a registered email address which allow the account owner to monitor account activity and grant access on a single PC at a time. " http://www.bit-tech.net/news/gaming/2011/03/17/valve-launches-steam-guard-security/1 This ensures the 35 million users "the account security they need as they purchase more and more digital goods", especially if they use Steam in public spaces such as cibercafés. http://www.joystiq.com/2011/03/03/valve-introduces-steam-guard-to-fight-acount-phishing-and-hijack/
joey <3

Chinese Hackers Blamed for Huge South Korean Database Theft - CSO Online - Security and... - 2 views

  • the main worry is that the data theft will fuel a rise in spamming, phishing and social engineering attacks.
  •  
    "Hackers have stolen the personal data of 35 million users of the South Korean social network Cyworld and search engine Nate, the company that runs them SK Communications has admitted."
  •  
    This article talks about the theft of personal details such as email addresses, phone numbers and passwords, despite having been encrypted. This article brings up the ethical issues of privacy, reliability and security, showing that even though precautions such as encryption were taken to avoid such incidents, private and confidential information was still hacked. It questions the reliability and the security of online systems which store private data in databases, and will no doubt discourage people from using or providing personal information to such websites. Though the incident can be overcome by asking users to "reset those credentials", the theft presents the possibility of increased amounts of spamming and phishing, therefore actions should be taken to inform and protect users from becoming victims of such scams. The following website gives suggestions on how to protect yourself against phishing: http://www.focus.com/fyi/44-ways-protect-phishing/
El Mexicano Pastiche

Hackers expose defence and intelligence officials in US and UK - 4 views

  •  
    This article presents intellectual property theft of civil servants. The article raises many ethical issues such as of privacy, anonymity, security etc. The hackers have accessed private information of government officials, (some of them who work in sensitive areas) their details and emails. Some officials fear that their e-mails can be quickly cracked using off the self software. Some companies client's credit card numbers and addresses were also hacked. The hackers, who are an anonymous groups have clearly violated the privacy rights of individuals. Exposing civil servants data can turn out to be of serious problem for the government. New methods should be developed to secure these confidential data.
  • ...2 more comments...
  •  
    Good overview of the issues there Benjon. Intellectual property is not the issue here however so be careful using terminology correctly. You have stated one of the problems can anyone be more specific about that problem and provide a solution?
  •  
    The article depicts how the personal information of various government organisations have been illegally accessed, furthermore these details have been posted on a vast amount of websites and details such as email passwords etc can be easily cracked using off the shelf software. This means that anyone who has seen the exposed data can easily gain further access to credit card details etc. Furthermore, this puts lives at risk for MI6 agents especially as their cover is supposed to maintain secret, if that sort of information gets into the wrong hands the cover of many agents will be blown and their lives will be at risk.
  •  
    There are various different ways in which security could be improved to prevent a similar incident from happening. It is mentioned in the article, and by Benjon that simple of the shelf software would be capable of decrypting the passwrords stored on the Stratfor database. This in my opinion is quite shocking as Stratfor offers its service to government officials all around the world, most likely for a monetary fee, and seem to not care whether or not the information they are MEANT to secure is infact secure. This issues could be easily solved by improving their encryption technology to or close to military grade encryption. It is most likely that the company's reputation has been severely damaged and rightly so.
  •  
    Nice link here explaining basics of military encryption: http://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard Also I follow this guy's blog and he always has some interesting stories on security and has done a lot of work in the world of cryptography: http://www.schneier.com/
Mr Brooke

Ordering Pizza in 2015 | American Civil Liberties Union - 7 views

  •  
    "Ordering Pizza in 2015"
  • ...1 more comment...
  •  
    Scary! After this video I surely don't want to order another pizza. The social and ethical issue here is surely privacy. With only one phone call, people can "wire into the system" and be able to view this type of personal information. Plus, if this is in 2005, nowadays not only we can figure out this information, but also more! Privacy is becoming a great issue as we are seeing that as technology is increasing, the less privacy we have, more people are starting to be able to access people's personal information. Relating to this videos, solutions that could apply could be: 1. When ordering a pizza, instead of calling from your mobile phone or home phone, call from the nearest phone booth to your house an order to somewhere near your house. Yet, don't give any personal information such as home address or mobile phone number. 2. Don't order! Go to the pizzaria and buy your pizza straight from the restaurant. In this way, you surely don't have to give any personal information so that you'll have more privacy than if you called from your phone.
  •  
    The social and ethical issue here is surely privacy. We can see here that there are various databases which are interconnected and the pizza restaurant is able to access all of them. This is a major issue as the pizza restaurant can invade the customers privacy and use the data to exploit the customer e.g. the pizza restaurant may see that the customer is wealthy and charge a higher price. Furthermore, If anyone else can gains access to this information the customers safety can be put at risk for instance, the pizza service knows whether or not you are at home therefore this could increase home robberies.
  •  
    i think this can even be considered dangerous. There could be a scenario where a young and wealth girl places the pizza offer. what could happen then is the person on the phone would know all her private information where she lives, where she works/studies her income and would probably end up with a picture of her. the person on the phone might not be a very reliable person and decide to do something dangerous
joey <3

BBC News - Hackers outwit online banking identity security systems - 3 views

  • The threat does not strike until the user visits particular websites
  •  
    Criminal hackers have found a way round the latest generation of online banking security devices given out by banks, the BBC has learned.
  • ...1 more comment...
  •  
    The main social and ethical issues here are mainly security and reliability, it is interesting how the hackers use malware software to obtain the users information. What is more concerning is the fact that it is difficult for the account owner to actually realise any suspicious activity due to the fact the hackers are able to alter the banks database details in order to display a normal online statement. In most cases a up to date anti-virus is recommended however, according to the bbc click investigation most of the security softwares did not pick up the malware software.
  •  
    I agree with Jorge. There are various ways in which hackers can obtain personal information by the internet. One way by which hackers can do this is by phishing. In this article, account holders are being tricked by the offer of training in a new "upgraded security system", meaning that account holders click on the link and their money is moved out of their account without them even noticing! This is a big problem, and as this article says "Online banking fraud losses totalled £16.9 million in the first six months of 2011, according to Financial Fraud Action UK" therefore in only 6 months, millions of pounds were gone! Phishing is increasing more and more, some day we can't even click a link because we're scared it could be something similar!
  •  
    Here is a website which is explaining how China is trying to combat hi-tech spyware! http://www.bbc.co.uk/news/technology-16357238
Jorge F1

BBC - Newsbeat - Sim cards used to send thousands of spam texts blocked - 0 views

  • Never reply to spam text messages (if you do it just confirms your number exists and you're likely to get even more) Forward any spam messages to your operator (most of them have dedicated text numbers you can send spam to so they can investigate where it came from) Always be careful about handing over your mobile number, especially online (you'll often need to untick small boxes in forms if you don't want your number passed on)
The Zhan

Data Mining - 1 views

  •  
    The mechanics of data mining.
Fiche Galinha

An Introduction to Data Mining - 0 views

  • An Introduction to Data Mining
Mr Brooke

kmlfactbook.org - 0 views

  •  
    huge database full of global statistics
Mr Brooke

Experimental Shoe-Print Database Sees the Soles of Criminals | Threat Level | Wired.com - 0 views

  •  
    "Brown shoes don't make it"
1 - 20 of 22 Next ›
Showing 20 items per page