Skip to main content

Home/ VCE Info Tech/ Group items matching "accessibility" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

iCloud celebrity photo hack: texts, address books and more 'also accessible' - 0 views

  •  
    "It's not just nude photographs Jennifer Lawrence, Kirsten Dunst and other victims of the celebrity photo theft have to worry about being accessed by hackers - it's their GPS co-ordinates, private text messages, calendars, address books, phone call logs and any other data stored on their phones and backed up to the cloud."
1More

Digital archaeologists dig up internet's past - 0 views

  •  
    "In an age in which uninterrupted access to the sum total of human knowledge now seems a given, we're in paradoxical danger of losing a lot of recent history."
1More

'One more thing': Apple Watch unveiled - 0 views

  •  
    "Apple Chief Executive Tim Cook has unveiled Apple Watch, a device that will not only do what other smartwatches are now expected to do - give you access to apps, email, text messages and health monitoring, but also serve as a payment tool."
1More

Guide to securing personal information| Office of the Australian Information Commission... - 0 views

  •  
    This 'Guide to securing personal information' (Guide) provides guidance on the reasonable steps entities are required to take under the Privacy Act 1988 (Cth) (Privacy Act) to protect the personal information they hold from misuse, interference, loss, and from unauthorised access, modification or disclosure. It also includes guidance on the reasonable steps entities are required to take to destroy or de-identify personal information that they hold once it is no longer needed (unless an exception applies).
4More

Spies blow their cover through the internet - 0 views

  • Social engineering is the art of manipulating people into divulging confidential information, either through the introduction of malware into computer systems through carefully crafted, personalised emails - spear phishing, obtaining access to security codes - or by orchestrating social contact with intelligence targets.
  • the abundance of personal and career information available on the internet posed a clear security risk for both government and the corporate sector, especially companies engaged in national security work or high technology activities
  • Defence Department security instructions require that ''when engaged in online forums … Defence personnel must exercise professional judgment to ensure no information breaches operational security''.
  •  
    "HUNDREDS of former and some present Australian spies have posted information about their employment with intelligence agencies on the internet in what security experts have called ''a gift for foreign espionage''. "
4More

My talk on Data Liberation at Ignite Sydney | pipka.org - 0 views

  • Transparency in the first instance is about raw data. You need access to the raw materials to make new and interesting things
  • Open data and raw data also gives us new opportunities to innovation
  • iterative, collaborate government. That’s what Gov 2.0 is about. Transparency, Participation and a Citizen Focus in how we do things
  •  
    "I'm here to speak to you about the legend of data liberation. It's an important story, it's a story about society, about people, about geeks, and it's a story about government."
1 - 8 of 8
Showing 20 items per page