Skip to main content

Home/ StJulians_ITGS/ Group items tagged spam

Rss Feed Group items tagged

Mr Brooke

How spam works, from end to end - Boing Boing - 1 views

  •  
    spam spam spam spam
Jorge F1

BBC - Newsbeat - Sim cards used to send thousands of spam texts blocked - 0 views

  • Never reply to spam text messages (if you do it just confirms your number exists and you're likely to get even more) Forward any spam messages to your operator (most of them have dedicated text numbers you can send spam to so they can investigate where it came from) Always be careful about handing over your mobile number, especially online (you'll often need to untick small boxes in forms if you don't want your number passed on)
Mr Brooke

What's the carbon footprint of ... email? | Environment | guardian.co.uk - 4 views

  •  
    "What's the carbon footprint of ... email?"
  •  
    The news article mainly addresses the issue of people and machines, although the use of email has numerous advantages, it is affecting the environment and speeding up the greenhouse effect. However, the main cause of the high carbon footprint is predominantly due to spam emails; each spam email creates 0.3g of Carbon dioxide if you times this by the 62 trillion spam emails sent globally it is equivalent to "driving around the Earth 1.6 million times". Here is a link to another news article which breaks down the several aspects of email and shows their impact on CO2 emissions: http://news.cnet.com/8301-1023_3-10220363-93.html
joey <3

Chinese Hackers Blamed for Huge South Korean Database Theft - CSO Online - Security and... - 2 views

  • the main worry is that the data theft will fuel a rise in spamming, phishing and social engineering attacks.
  •  
    "Hackers have stolen the personal data of 35 million users of the South Korean social network Cyworld and search engine Nate, the company that runs them SK Communications has admitted."
  •  
    This article talks about the theft of personal details such as email addresses, phone numbers and passwords, despite having been encrypted. This article brings up the ethical issues of privacy, reliability and security, showing that even though precautions such as encryption were taken to avoid such incidents, private and confidential information was still hacked. It questions the reliability and the security of online systems which store private data in databases, and will no doubt discourage people from using or providing personal information to such websites. Though the incident can be overcome by asking users to "reset those credentials", the theft presents the possibility of increased amounts of spamming and phishing, therefore actions should be taken to inform and protect users from becoming victims of such scams. The following website gives suggestions on how to protect yourself against phishing: http://www.focus.com/fyi/44-ways-protect-phishing/
Jorge F1

Israeli hacker retaliates to credit card hacking - 2 views

  •  
    An Israeli hacker has published details of hundreds of Saudi credit cards online and is threatening to post more in revenge for acts by Arab hackers.
  • ...1 more comment...
  •  
    One of the main social and ethical issues in this article is surly privacy. Privacy has been a main issue for our society, not only about credit card details, yet also other personal information. As technology is increasing, the less privacy we have as there are more ways in obtaining this information. And in this case, as technology is increasing, hackers are also as there are easier and more ways in order to get the information they want. There are various ways the hacker can get access to these thousands of credit card numbers, here is one step-by-step of one of the ways of how this IT system works: Firstly, the hacker (or hackers) go around lots of banks and put a small video camera pointing to the bank machine keypad. This video camera is well hidden so that people cannot see them. When someone goes to the machine, they put their credit card number and this analogue information converts to digital information and is recorded in the memory in the video camera. After a few hours/days, the hackers remove the video cameras and upload the data in the memory card via a USB cable and save the data on their servers. The hackers then watch the video and record the credit card numbers on a paper/other computer. With this information, they can obtain more personal information such as names, phone numbers, post codes etc with specialized programs. Finally, when they have all the information they have, they post the personal information including the credit card numbers, on the internet. Yet, in order to maintain the hacker anonymous and not being able to be found via the IP address, he uses another proxy server when uploading this information on the internet. There are also other ways to get the credit card information such as: - Intercepting emails containing passwords - Popups infected by viruses - Spyware - Spam - Keyloggers etc. Some possible solutions for this issue is: - When typing your credit card number in the bank machine keypad, hide the keypad coveri
  •  
    Well yes, I agree with Ines. This is to some extent about privacy. However, I doubt that they obtained that much information by use of cameras in banks. I'd find it much more likely if they have obtained the data from a database in the private sector. I do not think privacy is the most important issue here though. By far and large the most important issue in the article - is how cyber warfare could start to affect the conflict in the Middle East. We've seen how valuable the Internet was in the Arab Spring. The cyber warfare is going to be, and to some extent I imagine, is already an essential tool for the different factions in the Middle East. As this was a breach in the private sector, the security there must be improved with f.ex. stronger firewalls.They must improve their security, if not they are sure to lose money because of the reliability issue.
  •  
    I agree with you, Morten. However, I gave one example of how it would be possible to obtain the credit card numbers, where I gave in the end more examples of how it would be possible to do so.
Fiche Galinha

BBC News - O2 apology for disclosing mobile phone numbers online - 3 views

  •  
    25 January 2012 Last updated at 12:23 ET O2 has apologised for a technical problem which caused users' phone numbers to be disclosed when using its mobile data. The company said it normally only passed numbers to "trusted partners". A problem during routine maintenance meant that from 10 January numbers could have been seen by other websites.
  • ...5 more comments...
  •  
    Well, the main problem in this story is the privacy of the O2 users in my opinion. The issue is the fact that they've let(intentional or not) websites gain the user's phone number. Even though they "investigated, identified and fixed it this afternoon" - it is still rather disconcerting that it happened. It might have a been an isolated problem, but that does not change the fact that their personal information was shared without their consent. But I may be overreacting, as of now there is no knowing how many will be affected. However, one would expect that there some are legal obligations in terms of notifing the offended costumer and the authorities - this does not seem to be the case in a lot of EU countries. Including the UK as far as I can tell. Last year there was talk of creating data breach notification laws in the EU - but from what I gather has not passed yet.
  •  
    This article writes about the EU data protection act - I guess I was right, there are no laws universal EU law at the moment. http://www.pcworld.com/businesscenter/article/248566/eus_data_protection_proposals_likely_to_include_24hour_breach_notification.html It says that the EU should have made an announcement today about it.
  •  
    http://www.bbc.co.uk/news/magazine-15730499 How much privacy can smartphone owners expect?
  •  
    How much privacy can anyone except these days? It is no only owners of smartphones. Our generation is literally throwing away our privacy. Smartphones, facebook - it seems to be that most mainstream technology items lessen our privacy nowadays. http://www.theatlantic.com/technology/archive/2012/01/use-google-time-to-get-real-about-protecting-your-digital-self/251981/#.TyBIy3wo_AA "Google's decided to integrate the data it has about you, which means you better think about the digital tracks you're leaving. "
  •  
    I agree with Morten and Isy. Privacy is decreasing by the second. Technology is increasing rapidly and many people like these new technologies, such as using smartphones, social networks etc. Yet, are they aware of all these drawbacks? Privacy is lacking, and many people believe that we don't even have privacy anymore since data can be accessed much easily now that technology has evolved. Here's a video about how a smartphone can cause privacy issues. http://www.youtube.com/watch?v=N2vARzvWxwY&feature=fvst With one click on a person's picture, people may obtain their location, where they live and other personal information. This is a cause of technology rising so much in the past years, which has lead to all these privacy issues. People should start to be more aware of this situation, that by only a picture on the internet people can obtain personal information that can lead to severe issues. One of the solutions for this issue could be to turn off the location service on their smartphone in order to not be able to be tracked where hackers can see the exact place where a person is.
  •  
    As mentioned above the the issue concerned about in this article is privacy as peoples information (mobile phone numbers) are displayed on websites without their consent. Obviously the fact of having others know personal information may leave people concerned, however they must be aware that their personal information is spread all over the internet. From pictures on facebook to a gmail/youtube accounts peoples names, adresses and surnames are most likely known by some companies. Google and Facebook holds personal information that belongs to each one of us. What companies like such do to profit from this is sell a list of names, adresses and emails to third party which will then have means of communication with us to advertise their products and this is responsible for some of the spam we receive. The solution for this specific scenario of mobile phones isn't very clear, although it has been fixed no way of how it could of been prevented was suggested. Perhaps a the server could be shut down while it was under maintenance and another one should've been running in the meanwhile. Clearly the issue here had nothing to do with the mobile phone users and there was nothing they could have done as they were unnaware of the situation. I personally believe that privacy does not exist on the internet. It someone wishes to have privacy then the safest way to go do so is to not use/be connected to the internet. http://www.dailyfinance.com/2011/09/30/when-it-comes-to-cell-phone-privacy-youre-an-open-book/ Shows how mobile phones can cause privacy issues and how police officers now have gadgets that allows then to see everything that a person has done in their mobile phone, this clearly violates peoples privacy.
  •  
    I would just like to mention that I posted this, not fiche galinha -.- diigo is trolling me.
Fiche Galinha

How to identify fake Facebook accounts | InSecurity Complex - CNET News - 1 views

  •  
    The main social and ethical in this article would have to be authenticity, as it deals with the fact that people are making accounts to be real people. In my own experience I've had this happen to me once and it was easily identified for the reasons this article states, no status updates etc. Although in my case it was harmless, it can lead to issues of a greater significance. This article also highlights the worrying ease at which people can fake an accout and that there is a very significant number of these accounts. They could in some cases be used in a harmful manner. For example, sexual predators could easily make a profile pretending to be 15 years old, add a profile picture of a child and then add other children as friends. This creates a security issue as the children's life is in a potentially harmful situation, as these cases of sexual predators over the internet has been a security issue since social networks came to be. Another issue that lack of authenticity brings is that these fake accounts could be used for spam, and could also potentially be used to spread malware. This is a very common problem in Facebook as these fake accounts can share a link with their "friends" and from this it starts spreading throughout the entire social network.
1 - 10 of 10
Showing 20 items per page