blog trackingRealtime Web Statistics Over | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 14

Posts Tagged ‘over’

Hand over your Facebook username and password if you want a job

What would you if, at a job interview, the interviewer requests Facebook username and password?
Hand over your Facebook username and password if you want a job, Blog, Facebook, over, want, password, hand, username

View full post on Naked Security – Sophos

View full post on National Cyber Security

SXSW panel sparks over Big Data privacy concerns even without Google, Facebook

A Sunday afternoon panel designed to address head-on privacy concerns stemming from so-called “big data” collection sparked passions even though both Facebook and Google, whose privacy practices draw most consternation from critics, declined to participate, leaving no one to take the side of industry.

Moderator Molly Wood, the executive director of CBS Interactive, said Facebook didn’t feel it had any staff at SXSW who could speak on the issue. Google’s privacy counsel Will DeVries was scheduled to participate but bowed out, citing ongoing litigation with the privacy advocacy group Electronic Privacy Information Center, whose representative Lillie Coney was also on the panel.

Coney said that EPIC was not in litigation with Google, nor does it ever sue corporations. EPIC did recently sue the US Federal Trade Commission, pushing it to take action to block implementation of the company’s controversial consolidated privacy policy that took effect 1 March. EPIC lost that suit, although it could appeal to the Supreme Court.

Coney called Google’s apparent understanding of the action as legal action against the company as “a very strange way to take the regulatory process and the mechanisms that are available to civil society, or even individuals”.

Google did not respond to requests for comment.

Even without Google and Facebook in attendance, the panel was hard-fought as Coney and Jay Stanley, a senior policy analyst with the American Civil Liberties Union, battled Berin Szoka, president of the libertarian-leaning nonprofit TechFreedom, over whether the collection and increasingly sophisticated analysis of large amounts of user data for use in corporate marketing constitutes a real harm to consumers and whether government regulators should step in.

Szoka cited an “assumption in the privacy debate that it’s unusual that the doing of things precedes the figuring out what we should do about it, but that’s how the Internet works”. His approach is “sometimes derided as a patchwork approach”, he said, “But to me that’s a good approach. Government should get involved when there’s actual harm.”

Privacy advocates Coney and Stanley pointed to other industries, like the auto industry, to make the case that government should regulate practices that pose a clear risk. Coney said that if and when demonstrable harms to consumers come from big data, they, too, will be outsized, affecting thousands of people.

Stanley pointed to Gmail as an example. Calling it “the first step toward the application of artificial intelligence monitoring us,” he said, “It’s not that smart yet, so it’s not that scary. But as it gets smarter it will get scarier, when you get to artificial intelligence levels that approach humans and they’re still reading your mail.”

The audience appeared to side with privacy advocates. One questioner who identified himself as building social networking applications for the Apple platform said he feared harming his own customers. “If we can’t as an industry even defend passwords, how can we protect privacy?” he asked.


Article source: http://rss.feedsportal.com/c/270/f/3551/s/1d5c21da/l/0Lnews0Btechworld0N0Csecurity0C33437140Csxsw0Epanel0Esparks0Eover0Ebig0Edata0Eprivacy0Econcerns0Eeven0Ewithout0Egoogle0Efacebook0C0Dolo0Frss/story01.htm

View full post on National Cyber Security » Computer Hacking

Gordon Ramsay sues over hacked emails that revealed hair transplant

Celebrity chef Gordon Ramsay is suing a former editor of the disgraced News of the World newspaper in a case involving hacked emails.Gordon Ramsay sues over hacked emails that revealed hair transplant, Blog, Hacked, over, Revealed, sues, emails, Gordon, hair, Ramsay, transplant

View full post on Naked Security – Sophos

View full post on National Cyber Security

BPAS Hacker Confesses to Stealing over 9,000 Records

The hacker who broke into the British Pregnancy Advisory Service (BPAS) has plead guilty to violating the UK Computer Misuse Act in a London Court today.

Jeffrey admitted to gaining unauthorized access to data and a computer with the intention of compromising its operation.

James Jeffrey stole over 9,000 personal records on on March 8th from BPAS and compromised the confidentiality of people who contacted BPAS to inquire about information and services regarding STDs, testing, sterilization, abortion, and other women’s health services.

The 27 year old was brought before Westminster Magistrates court in London after he attempted to break into BPAS’s site 26,000 times within a six hour period. He plead guilty to the offense and accepted responsibility for defacing the website with an image of Anonymous.

On Friday we covered the details of Jeffrey’s arrest in an article that I posted on Friday. Jeffrey was arrested by the Metropolitan police at his home in Wednesbury, West Midlands last week after “he boasted of breaking into the BPAS by tweeting details of the exploit, including the login for the BPAS sysadmin, under the name Pablo Escobar.”

According to The Inquirer, BPAS stated that the incident was an extreme example of how anti-abortion activity has been becoming more agressive in its efforts to target abortion providers. Prosecutors told the court Jeffery targeted the BPAS website after two women he knew had terminations.

Judge Daphne Wickham described him as a “zealot with an anti-abortion campaign” and refused to grant Jeffrey bail, saying that he was an “able hacker” who could target other organizations.

Jeffery remains in custody and will be sentenced at Southwark Crown Court at a later date.

Article source: http://www.webpronews.com/bpas-hacker-confesses-to-stealing-over-9000-records-2012-03

View full post on National Cyber Security » Computer Hacking

Store warning over PayPoint con trick

A ‘CLEVER’ credit card scam sweeping the country has landed in Weston, costing one shopkeeper hundreds of pounds.

View full post on credit card scam – Yahoo! News Search Results

View full post on National Cyber Security

Pair wanted over credit card fraud

THESE two men are wanted in connection with a credit card fraud. Police want to speak to them about a stolen card used to buy gift vouchers at Asda, Currys, Tesco, Argos and Marks and Spencer.

View full post on credit card fraud – Yahoo! News Search Results

View full post on National Cyber Security

ProtectMyID: Investment #scams have hurt 1 in 5 Americans over age 65 (~7.5 M #retirement age individuals) according to Investor Protection Trust.

ProtectMyID: Investment #scams have hurt 1 in 5 Americans over age 65 (~7.5 M #retirement age individuals) according to Investor Protection Trust.

View full post on Twitter / ProtectMyID

View full post on National Cyber Security

FBI says it is concerned over cyber terror

A former senior intelligence official has warned that a full-scale cyber-attack against the United States by a terrorist organization is "a certitude." read more

View full post on cyber attack – Yahoo! News Search Results

View full post on National Cyber Security

Town staffer plans suit over ‘spy’ camera in office

WHEATFIELD—Tracy Gurnett, a Recreation Department staffer who has already sued the Town of Wheatfield once, has filed another notice of claim accusing town officials of spying on her by installing a video camera in her office.

View full post on internet saftey – Yahoo! News Search Results

View full post on National Cyber Security

Chinese hackers ‘had full control’ over Nasa lab that commands 23 spacecraft

Chinese hackers had 'full access' to the computer network in one of Nasa's key laboratories, the Jet Propulsion Laboratory, allowing them to steal information and even upload hacking software.

View full post on hacking tools – Yahoo! News Search Results

View full post on National Cyber Security

Page 14 of 24« First...10«1213141516»20...Last »

My Twitter

Gregory D. Evans On Facebook