Skip to main content

Home/ StJulians_ITGS/ Group items tagged news

Rss Feed Group items tagged

Jorge F1

BBC News - TripAdvisor rebuked over 'trust' claims on review site - 2 views

  • Entertainment Video $render("advert","advert-leaderboard");Advertisement $render("advert-post-script-load");
  • TripAdvisor rebuked over 'trust' claims on review site

    TripAdvisor screenshot The travel site's UK homepage no longer makes the claims that provoked the complaints

    Related Stories

    TripAdvisor has been ordered to rewrite some of its marketing claims by the UK's Advertising Standards Authority.

    The ruling follows complaints by hotels that the site had said that its holiday reviews could be "trusted".

    The ASA said it was concerned that consumers might be fooled by fraudulent posts since the entries could be made "without any form of verification".

    TripAdvisor described the ruling as a "highly technical view" of "copy that was used in a limited capacity".

    However, the watchdog said that the ruling served as a warning to all UK-focused sites with user-generated material.

    Fraud systems

    The ASA said that the US-based firm's site originally carried statements saying that it contained "reviews that you can trust" and that it had "more than 50 million honest travel reviews".

    It said that two hotels and the online reputation firm Kwikchex, which represented others, had complained that the claims were misleading since they could not be substantiated.

    The advertising body said it acknowledged that reviewers were asked to sign a declaration that their reviews were real and that they had no incentive or competitive interest with the places commented on.

    Start Quote

    Don't major on trustworthiness if fake reviews can appear”

  • "This should be regarded as a benchmark ruling which applies to all web sites which make claims about the reliability of their user-created content," the ASA's spokesman Matthew Wilson told the BBC.
  • ...1 more annotation...
  • When asked about this the ASA said that its remit only extended to claims targeted at a UK audience, so it would not be pursuing changes at the .com site.
  •  
    TripAdvisor has been ordered to rewrite some of its marketing claims by the UK's Advertising Standards Authority.
  •  
    the social and ethical issue here is reliability. No one can be completely confident that what they see online is true whether it is with traveling companies or something mr brooke showed us in class: http://www.familywatchdog.us/search.asp in this website for example, we can not be sure that the people registered really are sex offenders.
benjon hamal

short summary on Effect of Technology on Our Lives - 1 views

  • Demand Sensing Technology Demand Sensing increases forecast accuracy by up to 50%. www.TerraTechnology.comHigh Tech Campus business Want to do business with leading high tech companies in Brainport? www.technogation.comInternational Master ICT innovativ &amp; international - study at MCI in Innsbruck / Austria www.mci.edu/en/ma-communication-itBlood Pressure Technology Customized Blood Pressure Modules with Excellent Service</di
  • Article Word Count: 517 [View Summary] Comments (0)
Morten Nielsen

Over 3 years later, "deleted" Facebook photos are still online - 2 views

  • "did not always delete images from content delivery networks in a reasonable period of time even though they were immediately removed from the site,
  • In the meantime, photos that users thought they "deleted" from the social network months or even years ago remain accessible via direct link.
  • "working with our content delivery network (CDN) partner to significantly reduce the amount of time that backup copies persist."
  • ...1 more annotation...
  • but said the company is working on a new system that will delete the photos in a mere month and a half
  •  
    I find, in this scenario, Facebook's behaviour immoral. They have known of this problem for three years, and they have yet to produce any progress. Facebook does not seem to respect one's stance on these things. If you wish the picture deleted, then it should be deleted.
  • ...2 more comments...
  •  
    I agree with Morten, if Facebook has known this problem for the past three years they should have done something about it not wait for someone to find out and then apologise and attempt to fix the problem later. However, i'm not quite sure on how this works because I have had friends send me links to pictures that were deleted minutes before and a content error appears and i'm not able to access the picture/link.
  •  
    Jorge I think the difference is that if you have a direct link ie the url of the image then you can still see it. A link from someone's wall will be broken and the image will appear to have gone.
  •  
    The apparent deletion of photos takes place by the elimination "all of the metadata for the photo as well as any and all tagging and linking information. For all practical purposes, the photo no longer exists. However, technically, the bits that make up the photo persist somewhere. It's possible that someone who previously had access to a photo and saved the direct URL from the CDN (...) could still access the photo." http://webapps.stackexchange.com/questions/2493/how-long-does-facebook-keep-data-of-a-deleted-account In the article, "Wolens claims that Facebook is on the verge of fixing up its content systems so that "deleted" photos are really, truly deleted from the CDN within 45 days." However, the reliability of this claim is compromised by Facebook's Terms of Service, which every user must comply prior to creating an account. Summing up, it grants Facebook the right to do whatever they like with old content. They can even sublicense it: "You hereby grant Facebook an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to (a) use, copy, publish, stream, store, retain, publicly perform or display, transmit, scan, reformat, modify, edit, frame, translate, excerpt, adapt, create derivative works and DISTRIBUTE (through multiple tiers), any User Content." http://consumerist.com/2009/02/facebooks-new-terms-of-service-we-can-do-anything-we-want-with-your-content-forever.html Note the contradictions with the principles of the Data Protection Act 1998: "If you collect data about people for one reason, you can not use it for another; You can not give people's data to other people or
  •  
    ...organizations unless they agree;" http://simple.wikipedia.org/wiki/Data_Protection_Act I get the impression that through blurring the ownership of intellectual property and personal records, social networks have some ulterior motives. The following passage in the article suggests the photos could, in fact, be instantly deleted from the CDN databases: "(Amusingly, after publishing the 2010 followup, Facebook appeared to delete my photos from its CDN that I had linked in the piece. (...) Other "deleted" photos that I had saved links to-ones that weren't from my account and were deleted even earlier than mine-remained online.)" Zuckerberg counterargues: "trust us, we're not doing this to profit from you, it's so we are legally protected as we enable you to share content with other users and services." http://consumerist.com/2009/02/facebooks-new-terms-of-service-we-can-do-anything-we-want-with-your-content-forever.html In the end, it is in the hands of the user to control what is shared and given up ownership of.
The Zhan

Kodak declares bankruptcy: The company that captured the 20th century (Photos) - 0 views

  • Unable to keep up with the 21st-century transition from film to digital technology, Kodak listed a debt of $6.8 billion
  • Kodak has been felled by exactly what it espoused: universal access to cameras.
  •  
    The main social and ethical issue that this article brings up is that of people and machines. The fact that Kodak has declared bankruptcy is hardly surprising, as though they were the company who worked so hard to develop the world of photography, they have failed to develop themselves in order to adapt to the new world of photography, while other companies such as nikon, samsung etc, have by constantly creating new digital cameras with new attractive features. This article is recent story of how Kodak are trying to sue Samsung for potentially infringing one of their patents: http://www.bbc.co.uk/news/technology-16631710 This article is prime example of how having an innovative idea is simply not enough to be successful over an elongated period of time: Just because Kodak had the idea of digital photography, that does not mean that they did not have to compete with other companies to remain the leading brand in photography. It seems to me that Kodak's complacency after having had the idea of digital photography led to their downfall. Explain the relationship between the IT system (digital photography) and the social/ethical (people and machines) The article shows how for the the public to continue to have an interest in machines such as digital cameras, they must continue to be developed, improved, updated and upgraded, as the appeal of new technology attracts customers. In this case, Kodak failed to keep up with the rate at which the world of digital photography is evolving.
  •  
Jorge F1

DNA link led to sex attack arrest - 4 views

  •  
    The national DNA database proved "uniquely crucial" in an investigation that led to the conviction of a sex attacker in Essex. But police fear the service that helped to link Lawrence Button to the sexual assault of a former University of Essex student, in 2009, may be scaled back.
  • ...3 more comments...
  •  
    This article compromises the privacy of British citizens, as well as the reliability and integrity of the DNA database. I will focus my comment on the latter. It was a matter of fortune that Button's DNA had been collected due to his arrest for a domestic assault in May 2010. This is because according to the Protection of Freedoms Bill, biometric material can only be retained if the holder consents it formally. This consent "can be withdrawn at any time". There are also strict regulations on the amount of time that a DNA profile can be retained by authorities according to the new Bill. In addition to that, what way is there to ensure the 62 million(http://en.wikipedia.org/wiki/United_Kingdom) British citizens have their DNA profile taken and input in the database? This compromises the integrity and completeness of the DNA database. According to the article itself, "The national database is believed to hold over five million DNA profiles". The new Bill also "requires schools to get parents' consent before processing children's biometric information" (http://services.parliament.uk/bills/2010-11/protectionoffreedoms.html) The full official bill on the regulation of biometric data can be found at: http://www.publications.parliament.uk/pa/bills/lbill/2010-2012/0099/lbill_2010-20120099_en_2.htm#pt1-ch1-pb1-l1g1 Hence the sweeping statement "The odds, we were told, were over a billion to one, so we were quite confident we'd got the right man", is certainly misleading, because the database is likely not to include a fraction of the British population. The most disturbing thing is that the responsible chief Richard McNamara states "it was the DNA alone that convicted the man, because we never had any other evidence". Is it really ethical to convict a criminal solely based on a potentially incomplete database? A solution to this problem would be to enforce surveillance systems and active police monitoring in order to obtain more plausible evidence.
  •  
    This article regards the compromising of the privacy of British citizens, as well as the reliability and integrity of the DNA database. I will focus my comment on the latter.
  •  
    "The Zhan" you raise some interesting points on the privacy issues of DNA databases. However I think you may have misunderstood the reliability issue of the DNA test. When two DNA samples are found to be the same then it is 99.99% certain that it is in fact the DNA of the suspect and is a very reliable indicator that it was that person. There are forensic issues involved in the collection and contamination of DNA samples from a crime scene but that is another issue. The main social and ethical issue here that you have rightly pointed out is the collection and storage of DNA from people. This article outlines some of these issues from 2008: http://news.bbc.co.uk/2/hi/uk_news/7177152.stm Here the issue of innocent peoples data being stored has come because ....."following a change in the law in 2001, all DNA collected by forensics - for whatever purpose - can be stored permanently. " It was promised in the recent election in the UK to destroy old data but it appears to be one of the many U turns that the current government has made: http://www.telegraph.co.uk/comment/telegraph-view/8659968/A-Bill-to-curtail-our-liberty.html
  •  
    I agree with your first point to some extent, but I think that implying that it DNA profiling is 99.99% accurate is when in fact it is 99.9999999999% accurate (one to a trillion sir, get it right), is not acceptable - according to this http://www.guardian.co.uk/commentisfree/henryporter/2009/may/25/dna-database-false-positive I think that retaining DNA samples in databases and profiling an individual in a pervasively detailed manner could lead to extremes such as that of convicting criminals for pre-crimes, as portrayed in the film Minority Report. That would heavily compromise a citizen's privacy. http://3.bp.blogspot.com/-I7tBjrA8Mj0/TWPfWNY9-0I/AAAAAAAAADg/QTXlFpTtNvM/s1600/MINORITY+REPORT.jpg "The US government has come up with a Big Brother-esque machine that senses if an individual intends to do harm". The system, "Future Attribute Screening Technology (FAST), determines if a person intends to do harm by using a mal-intent algorithm that uses data from sensors that monitor a person's physiological and behavioral changes." http://news.techworld.com/security/3309928/tom-cruise-pre-crime-minority-report-machine-brought-to-life/
  •  
    Good find Zhan! Would be interesting to see what the bods in the maths department have to say about "adventitious matches" and statistical probability. Maybe any of you who do HL maths can follow it up and add to this? Nice to see a reference to some classic sci-fi as well. This is a favourite read of mine. Also one of my all time top ten films! http://en.wikipedia.org/wiki/Do_Androids_Dream_of_Electric_Sheep%3F http://www.imdb.com/title/tt0083658/
Jorge F1

BBC News - Storage sites unnerved by Megaupload action - 3 views

  •  
    The arrest of Megaupload's founders has led to other file storage sites taking action in an apparent attempt to protect themselves from legal action. The following is a link to a news story describing the disciplinary action taken against the founder of Megaupload: http://www.bbc.co.uk/news/world-asia-16711416
  • ...1 more comment...
  •  
    The manner of his arrest is unnerving. Apparently they used two helicopters, had to break down doors and electronic locks - only to find him in a safe room with sawed off shotgun. Seems like something out of a B-movie. Even more so, when you consider that these things are allowed under the current regulations. If SOPA, ACTA or equivalent passes and gives the government more free reins, it becomes truly terrifying(bit exaggerated, I know). Megaupload is claiming to be "just like youtube". Check this article out, his lawyer is making quite the argument for it. http://arstechnica.com/tech-policy/news/2012/01/were-just-like-youtube-megaupload-lawyer-tells-ars.ars He was the lawyer to defend isohunt.com as well. A well known search engine for torrents.
  •  
    How online storage works Online storage in websites such as Megaupload, upload.to and Rapidshare work using cloud storage. This is similar to the storage used in Gmail, Youtube and Facebook Essentially this is how it works: 1. User accesses websites and selects file he/she wants to upload 2. File is uploaded to the cloud storage server, which is located in the house cloud storage systems called data centers. 3. Usually the files are then copied to other servers around the world in case one of them goes down or needs repairing, this is known as redundancy. Without redundancy cloud storage cannot guarantee that the user will be ble to access his files. Servers are also powered by multiple power supplies in case one of them fails. 4. When the user wants to access the files he uploaded he may do so through a web-based interface. For more information on how cloud storage systems work http://computer.howstuffworks.com/cloud-computing/cloud-storage1.htm
  •  
    http://www.techdirt.com/articles/20120121/16551717500/jonathan-coulton-destroys-rationale-behind-megaupload-seizure-with-single-tweet-follows-up-with-epic-blog-post.shtml In the article above Jonathon Coultron makes a good point. Although there might be a lot of illegal activity on MegaUpload such as: sharing DVDs and CDs, there are also a large group of people that use MegaUpload as a tool to legally upload data that they wish to share with others or keep a backup for themselves. Furthermore, I think his tweet says it all in regards to the millions of dollars the music and film industry will gain from the death of MegaUpload.
Mr Brooke

BBC News - Soldier Andrew Garthwaite to get bionic arm controlled by mind - 2 views

  •  
    Criterion B . Describe, step by step, how the IT system works. 1. Surgically implanted nerves are connected to electrodes placed on the chest area. 2.The nerves prompt electrical signals from the brain to the electrodes. 3. The electrical signals are then interpreted by a micro-processor, into natural movements. More information on how bionic arms work: http://thetartan.org/2008/9/22/scitech/howthingswork
  •  
    Outline how this IT system works: Essentially, this system consists of hardware (electrodes) that replace the nerves going to and from the brain. Electrodes are connected to the chest muscles which control 6 motors that move the prosthetic joints. When the mind sends a message through the nerves to move a muscle in the arm, the signal causes a muscle in the chest to contract, which activates a certain electrode to tell a motor to move a part of the bionic arm. A more detailed account of how mind-controlled bionics works is here: http://science.howstuffworks.com/bionic-arm.htm This story is a prime example of how IT is being used to radically develop medical research and treatments.
  •  
    The main social and ethical issue in this article is People and Machines. This new bionic arm which is controlled by the mind is an important development, in this technology, now allowing people who have had to have limbs amputated to have new arms/legs that they can control as they would their original arms/legs. However, due to the fact that it is very new and expensive technology to develop, although it points to the future, at the moment almost no one that would need a bioninc arm would be able to afford it. This means that although it is an essential step forward, at the moment it will not be something that can help the majority of people who most need it. As well as this, the bionic arm, although it is controlled by the mind, it will never be as fluid and will never work as intuitively as your arm.
The Zhan

BBC News | Whiteboard projector safety fears - 2 views

  • Interactive whiteboards have been heralded as devices that will enhance education and be a major plank in the government's drive for new technology in schools. But the BBC has learnt that while millions of pounds have been spent on them, very little attention has been paid to a potential threat to the eyesight of teachers and children.
  • Documents from the Health and Safety Executive, obtained by the BBC under the Freedom of Information Act, say users "should make sure that direct beam viewing of the optical output from this equipment is both controlled and restricted to no more than a few tens of seconds at a time".
  • A straw poll of teaching representatives in Wiltshire shows only a small number have been told how to use whiteboards safely
  • ...2 more annotations...
  • "It's very difficult to avoid the beam because if you are standing in front and demonstrating a point to the class you immediately want to turn round to know that they are aware of what you are saying, rather than ducking out of the beam. You want to stay there and face the class."
  • 250,000 whiteboards in the UK used on a daily basis
  •  
    Interactive whiteboards have been heralded as devices that will enhance education and be a major plank in the government's drive for new technology in schools. But the BBC has learnt that while millions of pounds have been spent on them, very little attention has been paid to a potential threat to the eyesight of teachers and children
  •  
    That's a very good point. Most teachers never think about that.
  •  
    I had better wear some shades in future.
Mr Brooke

Disk encryption may not be secure enough, new research finds | Politics and Law - CNET ... - 0 views

  •  
    "Disk encryption may not be secure enough, new research finds"
The Zhan

Are the WikiLeaks War Docs Overhyped Old News? | Danger Room | Wired.com - 1 views

  • Longtime Afghanistan watchers are diving into Wikileaks’ huge trove of unearthed U.S. military reports about the war.
  • For one thing — and this supports Exum’s argument — many, if not most, of these documents are frontline reports.
  • And some of the heavy-breathing accounts surrounding the documents don’t really match what the logs say. “Taliban sympathisers listening in to top-secret phone calls of US-led coalition,” pants the Guardian.
  • ...3 more annotations...
  • That both clarifies the focus of individual reports and limits the degree to which any analyst can responsibly extrapolate them into clear trends.
  • here’s a bias in journalism toward believing that what’s secret is inherently a hive of hidden truth. That operating principle animates reporters’ practice of breaking down governmental secrecy. But it can also create a misleading expectation that leaks represent huge new revelations.
  • Whether they add up to more than the sum of their parts is a judgment.
  •  
    There's a bias in journalism toward believing that what's secret is inherently a hive of hidden truth,which can create a misleading expectation that leaks represent huge new revelations. When these don't manifest, it creates an expectation that the trove is neither useful nor significant. In this case, that would be a mistake.
Morten Nielsen

BBC News - Valve's online game service Steam hit by hackers - 3 views

  • The attackers used login details from the forum hack to access a database that held ID and credit card data
  • The initial investigation showed that the attackers gained access to a Steam database that held "user names, hashed and salted passwords, game purchases, email addresses, billing addresses and encrypted credit card information".
  •  
    This article further increases the already notorious fear of databases containing people's details being accessed by undesired people, who could potentially use this data to cause harm. This raises a serious privacy issue, as, although it has not been confirmed, these hackers have accessed the Steam database which holds up to 35 million people's credit card data and email addresses, posing a threat to a large amount of people. Although it is not known if any harm came of this attack, security measures such as changing password and transferring credit card data to a more secure service (Steam Guard security service) were suggested to Steam users. This is a solution that doesn't undo the harm that has already been made, but is still a positive measure as it can help prevent potential future attacks from hackers on this database.
  •  
    "Valve has officially rolled out its new Steam security system, Steam Guard, which allows users to lock their accounts to a single PC if they so choose. Steam Guard essentially blocks all attempts to access a protected Steam account, then sends verification emails to a registered email address which allow the account owner to monitor account activity and grant access on a single PC at a time. " http://www.bit-tech.net/news/gaming/2011/03/17/valve-launches-steam-guard-security/1 This ensures the 35 million users "the account security they need as they purchase more and more digital goods", especially if they use Steam in public spaces such as cibercafés. http://www.joystiq.com/2011/03/03/valve-introduces-steam-guard-to-fight-acount-phishing-and-hijack/
Fiche Galinha

Kaspersky Warns of New Facebook Chat Phishing Attack - eSecurity Planet - 2 views

  • Kaspersky Warns of New Facebook Chat Phishing Attack
Fiche Galinha

BBC News - O2 apology for disclosing mobile phone numbers online - 3 views

  •  
    25 January 2012 Last updated at 12:23 ET O2 has apologised for a technical problem which caused users' phone numbers to be disclosed when using its mobile data. The company said it normally only passed numbers to "trusted partners". A problem during routine maintenance meant that from 10 January numbers could have been seen by other websites.
  • ...5 more comments...
  •  
    Well, the main problem in this story is the privacy of the O2 users in my opinion. The issue is the fact that they've let(intentional or not) websites gain the user's phone number. Even though they "investigated, identified and fixed it this afternoon" - it is still rather disconcerting that it happened. It might have a been an isolated problem, but that does not change the fact that their personal information was shared without their consent. But I may be overreacting, as of now there is no knowing how many will be affected. However, one would expect that there some are legal obligations in terms of notifing the offended costumer and the authorities - this does not seem to be the case in a lot of EU countries. Including the UK as far as I can tell. Last year there was talk of creating data breach notification laws in the EU - but from what I gather has not passed yet.
  •  
    This article writes about the EU data protection act - I guess I was right, there are no laws universal EU law at the moment. http://www.pcworld.com/businesscenter/article/248566/eus_data_protection_proposals_likely_to_include_24hour_breach_notification.html It says that the EU should have made an announcement today about it.
  •  
    http://www.bbc.co.uk/news/magazine-15730499 How much privacy can smartphone owners expect?
  •  
    How much privacy can anyone except these days? It is no only owners of smartphones. Our generation is literally throwing away our privacy. Smartphones, facebook - it seems to be that most mainstream technology items lessen our privacy nowadays. http://www.theatlantic.com/technology/archive/2012/01/use-google-time-to-get-real-about-protecting-your-digital-self/251981/#.TyBIy3wo_AA "Google's decided to integrate the data it has about you, which means you better think about the digital tracks you're leaving. "
  •  
    I agree with Morten and Isy. Privacy is decreasing by the second. Technology is increasing rapidly and many people like these new technologies, such as using smartphones, social networks etc. Yet, are they aware of all these drawbacks? Privacy is lacking, and many people believe that we don't even have privacy anymore since data can be accessed much easily now that technology has evolved. Here's a video about how a smartphone can cause privacy issues. http://www.youtube.com/watch?v=N2vARzvWxwY&feature=fvst With one click on a person's picture, people may obtain their location, where they live and other personal information. This is a cause of technology rising so much in the past years, which has lead to all these privacy issues. People should start to be more aware of this situation, that by only a picture on the internet people can obtain personal information that can lead to severe issues. One of the solutions for this issue could be to turn off the location service on their smartphone in order to not be able to be tracked where hackers can see the exact place where a person is.
  •  
    As mentioned above the the issue concerned about in this article is privacy as peoples information (mobile phone numbers) are displayed on websites without their consent. Obviously the fact of having others know personal information may leave people concerned, however they must be aware that their personal information is spread all over the internet. From pictures on facebook to a gmail/youtube accounts peoples names, adresses and surnames are most likely known by some companies. Google and Facebook holds personal information that belongs to each one of us. What companies like such do to profit from this is sell a list of names, adresses and emails to third party which will then have means of communication with us to advertise their products and this is responsible for some of the spam we receive. The solution for this specific scenario of mobile phones isn't very clear, although it has been fixed no way of how it could of been prevented was suggested. Perhaps a the server could be shut down while it was under maintenance and another one should've been running in the meanwhile. Clearly the issue here had nothing to do with the mobile phone users and there was nothing they could have done as they were unnaware of the situation. I personally believe that privacy does not exist on the internet. It someone wishes to have privacy then the safest way to go do so is to not use/be connected to the internet. http://www.dailyfinance.com/2011/09/30/when-it-comes-to-cell-phone-privacy-youre-an-open-book/ Shows how mobile phones can cause privacy issues and how police officers now have gadgets that allows then to see everything that a person has done in their mobile phone, this clearly violates peoples privacy.
  •  
    I would just like to mention that I posted this, not fiche galinha -.- diigo is trolling me.
joey <3

BBC News - Hackers outwit online banking identity security systems - 3 views

  • The threat does not strike until the user visits particular websites
  •  
    Criminal hackers have found a way round the latest generation of online banking security devices given out by banks, the BBC has learned.
  • ...1 more comment...
  •  
    The main social and ethical issues here are mainly security and reliability, it is interesting how the hackers use malware software to obtain the users information. What is more concerning is the fact that it is difficult for the account owner to actually realise any suspicious activity due to the fact the hackers are able to alter the banks database details in order to display a normal online statement. In most cases a up to date anti-virus is recommended however, according to the bbc click investigation most of the security softwares did not pick up the malware software.
  •  
    I agree with Jorge. There are various ways in which hackers can obtain personal information by the internet. One way by which hackers can do this is by phishing. In this article, account holders are being tricked by the offer of training in a new "upgraded security system", meaning that account holders click on the link and their money is moved out of their account without them even noticing! This is a big problem, and as this article says "Online banking fraud losses totalled £16.9 million in the first six months of 2011, according to Financial Fraud Action UK" therefore in only 6 months, millions of pounds were gone! Phishing is increasing more and more, some day we can't even click a link because we're scared it could be something similar!
  •  
    Here is a website which is explaining how China is trying to combat hi-tech spyware! http://www.bbc.co.uk/news/technology-16357238
Morten Nielsen

Feds: We obtained MegaUpload conversations with search warrant | Media Maverick - CNET ... - 2 views

  • there are hints that the FBI managed to place government-issued spyware on the defendants' computers.
  • The FBI cites alleged conversations between DotCom and his top lieutenants, including e-mail and Skype instant-messaging logs. Some of the records go back nearly five years,
  • Sources told CNET yesterday that Skype, the Internet phone service now owned by Microsoft, was not asked by the feds to turn over information and was not served with legal process.
  • ...2 more annotations...
  • Ira Rothken, MegaUpload's attorney, declined to comment yesterday about how his client's internal documents were obtained by the government, but said the government's "allegations are flimsy under the law."
  • On January 19, New Zealand police raided the home of DotCom in a rural area outside of Auckland. The U.S. government is seeking to extradite DotCom; a local judge denied bail and an extradition hearing is scheduled for February 22.
  •  
    The concern is privacy.Apparently the FBI was able to acquire Kim DotCom's messages with other MegaUpload employers by means of spyware, which could access skype conversations stored on a local host. Even though the FBI had a warrant to search for information, this is still rather disconcerting. This software can easily be misused. The software is called CIPAV and it stands for Computer and Internet Protocol Address Verifier. This software is able to send "network-level messages" containing the target computer's IP address, Ethernet MAC address, environment variables, the last-visited Web site, and other registry-type information including the name of the registered owner of the computer and the operating system's serial number. http://news.cnet.com/8301-13578_3-10222294-38.html
  •  
    I agree with you Morten. The social and ethical issue here is privacy. In the article they specify when saying "Sources told CNET yesterday that Skype, the Internet phone service now owned by Microsoft, was not asked by the feds to turn over information and was not served with legal process" that Skype did not give permission to the FBI to access this information. Even though the Data Protection Act states that "Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes." it is still not appropriate to "hack" into Kim DotCom's messages. Here is a link with the rules for Data Protection Act. http://www.legislation.gov.uk/ukpga/1998/29/schedule/1 Privacy is coming to bits, the only way we can talk to people knowing that knowing is going to get hold o f that information is by face-to-face communication, and even by that way people can be hearing the conversation secretly. Where has privacy gone?
Sara Roberts

BBC News - New York Times and Twitter struggle after Syrian hack - 2 views

  •  
    interesting!
  •  
    ...not
Fiche Galinha

Agencies aim to bolster cybersecurity - 1 views

  • Agencies aim to bolster cybersecurity
  •  
    "Agencies aim to bolster cybersecurityThe White House is reviewing whether to ask for new authorities for the Defense Department and other government agencies to ensure that the nation's critical computer systems are protected in the event of a major attack, the commander of the Pentagon's new Cyber Command said Thursday. "
Fiche Galinha

FBI Uncovers Worldwide $9M ATM Card Scam - Local News | News Articles | National News |... - 2 views

  • FBI Uncovers Worldwide $9M ATM Card Scam
  •  
    "FBI Uncovers Worldwide $9M ATM Card Scam"
joey <3

Technology - 1 views

shared by joey <3 on 06 Sep 11 - Cached
  •  
    reddit's sub-reddit 'technology' is constantly updated on news and new technologies by people around the world on relevant issues... so from here i can get a variety of information and updates from many different websites at once... obviously looking directly at others would also be a good idea.
  •  
    Reddit technology has some great links to ITGS material! How about picking one for discussion tomorrow. See if you can think which tags would be most appropriate from the ones on this page: http://itgsopedia.wikispaces.com/Global+Tagging Then share the link to the group with the tags.
Mr Brooke

BBC News - Apple launches e-textbook tools with new iBooks - 9 views

  •  
    1.11_people_machines 1.12_digital_citizenship 2.2_edu_training 2.2_hw_networks_classroom
  • ...1 more comment...
  •  
    1.11_people_machines 2.2_IT_teach_learn 3.4_internet
  •  
    1.11_people_machines 1.6_digital_div_equ_access 2.2_IT_teach_learn 3.2 _software
  •  
    Stakeholders: Students Advantages for students Productivity applications and textbooks are available to download online - easy global Access. the files are digital, so they can be transfered easily The online texbooks are safe from physical dangers, such as fires Convenience - being able to access iTunes U (university level resources) and the internet Saving time - files in an electronic format can be edited, searched and backed up easily. Disadvantages for students Although the files are safe, the iBook itself is still susceptible to physical damage The files may be corrupt Battery power failures and technical problems (they don't happen with physical notebooks) Access to internet and resources may depend on whether the space has wireless Access to games and rich interactive productivity applications can become the norm. Thence users' attention span may decrease The cost of product, of electronic textbooks and applications is the major issue From an evaluative point of view, I think that using a portable electronic device in place of a physical textbook would not benefit the students very much. The values a teacher is looking for are the ability to focus and listen, and the iBook could encourage the student to run parallel tasks at inappropriate times. The device would not be suitable for younger audiences, and in my opinion, it would contribute to a child being spoiled. Rather more mature users would benefit from this product, because they are more conscious of its function and, most importantly, the price they had to pay for it. Other stakeholders may include Apple, educators and digital course material publishers.
1 - 20 of 207 Next › Last »
Showing 20 items per page