"One thing is certain, and is unlikely to be news that's welcomed at Facebook HQ. There is a growing perception out there that Facebook isn't the safest of places to be," wrote Sophos senior technology consultant Graham Cluley in a recent blog post.
Some of the key threats recently highlighted by Sophos are rogue applications or survey scams that pop up from users' own Facebook friends who have been tricked into clicking on an interesting looking news headline or YouTube video that then duplicates to everyone in their friend's list. It then directs them to click on a website or survey, or inadvertently download malware.
One of the offenders now doing the rounds is a fake application that promises to let you see who has been viewing your profile.
an attempt to extend the brilliant accessibility of Scratch to somewhat older users-in particular, non-CS-major computer science students-without becoming inaccessible to its original audience. BYOB 3 adds first class lists and procedures to BYOB's original contribution of custom blocks and recursion.
companies involved say customers' privacy is protected because no personally identifying details are released.
Although common tracking systems, known as cookies, have counted a consumer's visits to a network of sites, the new monitoring, known as "deep-packet inspection," enables a far wider view -- every Web page visited, every e-mail sent and every search entered. Every bit of data is divided into packets -- like electronic envelopes -- that the system can access and analyze for content.
There's a fear here that a user's ISP is going to betray them and turn their information over to a third party
The online behavior of a small but growing number of computer users in the United States is monitored by their Internet service providers, who have access to every click and keystroke that comes down the line
The project is meant to explore both positive and negative aspects of a world saturated with technology that can monitor people and objects remotely.
"What we want to understand," Borriello said, "is what makes it useful, what makes it threatening and how to balance the two."
Our objective is to create a future world where RFID is everywhere and figure out problems we'll run into before we get there,
For more than a year, a dozen researchers have carried around RFID tags equipped with tiny computer chips that store an identification number unique to each tag. Researchers installed about 200 antennas throughout the computer-science building that pick up any tag near them every second.
I can see these things being useful. Like the idea of transparency
have been designed to divulge more information than necessary, opening the door to security and privacy problems
There's no reason to have remotely readable technology in a driver's license," Borriello said. He recommends a system that requires contact with the surface of a reader, so the license-holder knows when information on his license is being read.
Ethical issues to choose the right technology for the problem. Good point
data from radio tags can be pieced together to offer a detailed profile of a person's habits without his or her knowledge.
People don't understand the implications of information they're giving out," Borriello said. "They can be linked together to paint a picture, one you didn't think you were painting."
Critical for people to be street smart. Important role for schools
Last year, the number of police requests for information from London's RFID-based transit card rose from four per month to 100
It's important to understand what the technology can do and we, collectively, have to decide what we're going to use it for
As soon as it becomes widely used, then it's more attractive and people start attacking it," showing its vulnerabilities, Borriello said. The trouble is "by that time, it's hard to change.
The project is meant to explore both positive and negative aspects of a world saturated with technology that can monitor people and objects remotely.
"What we want to understand," Borriello said, "is what makes it useful, what makes it threatening and how to balance the two."
I think Scratch →Greenfoot → Eclipse is a good path for Scratch users who want to get deeperinto programming. And many Scratch users may not go on to learn Java ormajor in computer science, just as most of us who took music lessons did notgrow up to become professional musicians.[SC] This is something I really like about Scratch (and its fail-soft strategy).In a sense, I think this had been one of the original goals of Alice; I don't listin my article largely because it became challenging to realize in practice (3D issomewhat of a culprit here). I do agree that the transitions Scratch → Greenfoot, Alice → Greenfoot, and Scratch → Alice → Greenfoot wind up making agreat deal of sense in terms of what gets exposed to the student.
"Security researchers have discovered that Apple's iPhone keeps track ofwhere you go - and saves every detail of it to a secret file on the devicewhich is then copied to the owner's computer when the two are synchronised."
"Apple can legitimately claim that it has permission to collect the data:near the end of the 15,200-word terms and conditions for its iTunes program,used to synchronise with iPhones, iPods and iPads, is an 86-word paragraphabout "location-based services""