Keeping Your Network Secure : CCTV Security Cameras - 2 views
-
intercepted
-
change the default administrator password
-
packet sniffers
- ...2 more annotations...
-
A solution to the problem associated to IP security cameras. as seen in: http://www.bbc.com/news/technology-16919664
BBC News - Apple UDID code leak - 0 views
Lines Are Drawn on Legislation Against Internet Piracy - NYTimes.com - 2 views
-
“It’s really robbery — it’s theft —
-
Those goods include not just movies shot surreptitiously in a theater with a jiggly hand-held video camera, the companies argue, but dangerously flawed pharmaceuticals, faulty brake pads and defective smoke alarms, to name a few categories of illegally copied goods.
-
“Unfortunately,” Mr. Erickson said, “the amendment also creates new problems in other places and fails to correct some of the original concerns we have raised since the start of the debate.
- ...5 more annotations...
Who's to blame when an autonomous vehicle crashes? - 3 views
-
Also, here's a link to another article explaining about how google's self-driving car works.
- ...2 more comments...
-
I'm a bit curious Jorge, how would this invade the privacy of some? This is an amazing technological improvement, it will be interesting to see what happens in the future with this. This is a quite good article on how it works http://news.discovery.com/autos/how-google-self-driving-car-works-111018.html
-
Because the car records it's position using the GPS, if a black hacker is able to get hold of this information the owner of the car could be put at risk.
Apple's Siri curses out 12-year-old - 2 views
-
Someone reportedly tampers with a demo iPhone 4S so that when a 12-year-old boy picks it up and asks Siri a question, she is not amused or amusing. She tells him to 'Shut the f*** up.' Read this blog post by Chris Matyszczyk on Technically Incorrect.
-
The main social and ethical issues are integrity of the system, security, and people and machines. Although I do not own an iPhone 4S, I would imagine it the product had been hacked and its set-up instructions had been reprogrammed by a user who is extremely knowledgeable on issues such as encryption and programming know-how. Perhaps because the iPhone referred to in the news story was a "demonstration" version, I suppose its encryption levels are not as powerful as the real product (Apple would have to invest less money in manufacturing). However, there is a much simpler explanation, according to "MacTrast" (http://www.mactrast.com/2011/12/siri-tells-twelve-year-old-to-shut-the-fck-up-after-pranksters-tamper-with-display-iphone/): Simply changing the name in the contact card by verbalising it (asking Siri "Call me (insert ridiculous statement here)") allows the user to tamper with the phrase voiced by Siri, without having to deal with complicated encryption or validation processes. This means the system itself is integral and works correctly, but the given primary contact's nickname is has been inappropriately altered. To solve this problem, the company should enforce the security of its demo versions of the Siri for iPhone 4S by impossibilitating a deliberate change of contact names and redistribute them across retailers.
BBC News - Facebook works with Websense to add phishing safety net - 5 views
-
Don't forget the other tags. You are missing one from section 2 and one from section 3
- ...1 more comment...
-
Seems to be a good solution but what are the limits of this solution?
-
In theory this would be a good solution, due to the fact that as soon as the user read the warning message in detail, they would feel encouraged not to follow the link. However, due to the facebook's nature, in practice, this solution isn't as effective as one would expect. Throughout Facebook's history, when a user clicks a link that leads to an application, a message appears stating that if the user accepts then information from their profile will be accessed. Because of this, when users see this message they will simply think it is one of the usual messages and skip to the link due to habit. Another obvious limitation is the fact that all it does is simply suggest that it MIGHT be malicious, and therefore most users that are unaware of the dangers of phishing might ignore it and choose to follow the link.
« First
‹ Previous
41 - 60 of 207
Next ›
Last »
Showing 20▼ items per page