information

Thu
23
Dec
Dennis Faas's picture

Bank of America Severs Wikileaks Affiliation

In recent weeks, corporations associated with Wikileaks have had to make the difficult decision of whether or not to sever all ties with the organization, and if so, face the potential of backlash on their own companies, including distributed denial ... of service attacks. Bank of America is the latest to join the list of financial and technology companies that have cut off services to Wikileaks, but their decision might have been made with the knowledge that Wikileaks is prepared to release confidential and likely scandalous information about the institution. Two Sides to the Story The official ... (view more)

Mon
15
Nov
Dennis Faas's picture

'SIV (System Information Viewer) 4.14', and 'PeerBlock 1.0+ (r484) Beta'

SIV (System Information Viewer) 4.14 'System Information Viewer' (SIV) is a general Windows utility for displaying useful Windows, Network and hardware information, including: CPU info, PCI info, PCMCIA info, USB info SMBus info, SPD info, Machine ... Info, Hardware Sensors, Networked computers, Operating System Information and more. http:/rh-software.com PeerBlock 1.0+ (r484) Beta PeerBlock is a firewall-like program that lets you specify who your computer can / cannot communicate with on the Internet. By selecting appropriate lists of "known bad" websites / computers, you can block ... (view more)

Tue
02
Nov
Dennis Faas's picture

Facebook Bans Developers for Selling User Info

Facebook says it has discovered that some application ("app") developers have been deliberately selling user information for the intention of third-party marketing, and has responded by banning a list of developers from the site for six months. A ... similar breach was reported in a Facebook investigation last month . In that case, a technical error in the way developers used the information provided by Facebook meant they were revealing the user IDs of members who used the relevant applications, such as games. It's important to note this is simply Facebook's own reference number for ... (view more)

Tue
10
Aug
Dennis Faas's picture

Data Mining

Data mining is the process of extracting patterns from data. Data mining is becoming an increasingly important tool to transform otherwise abstract data into useable information. It is commonly used in a wide range of profiling practices, such as ... marketing, surveillance, fraud detection and scientific discovery. Data mining can be used to uncover patterns in data but is often carried out only on samples of data. The mining process will be ineffective if the samples are not a good representation of the larger body of data. Data mining cannot discover patterns that may be present in the larger ... (view more)

Tue
10
Aug
Dennis Faas's picture

Your Smartphone App May be Watching You: Report

Computer users aren't the only ones who need to worry about their privacy and security. A new report from San Francisco-based Lookout Inc., a mobile phone security firm, reveals that smart phone applications may be closely monitoring users and ... relaying that information to others. (Source: yahoo.com ) Personal Data Secretly Transmitted to Third Parties Nearly 300,000 free applications for Apple's iPhone and phones built around Google's Android software were scanned by Lookout, Inc. Results of those scans found that many of those apps were secretly pulling sensitive data off user phones and ... (view more)

Tue
03
Aug
Dennis Faas's picture

Hackers Birth Automated Phishing Kit that Never Dies

Hackers have now started using what is being referred to as "indestructible" cloud computing -based phishing attacks . In short, a phishing attack is a "criminally fraudulent process of attempting to acquire user names, passwords, and credit card ... details by masquerading as a trustworthy website." (Source: wikipedia.org ) For example, you may have received a dubious email asking you to "update" your banking information or to "change your online banking password." These are typical phishing scams whereby the information you input is stolen by fake ... (view more)

Mon
12
Jul
Dennis Faas's picture

Honeypot

In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a ... network, but is actually isolated, (un)protected, and monitored, and which seems to contain information or a resource of value to attackers. Honeypot Function A honeypot is valuable as a surveillance and early-warning tool. While it is often a computer, a honeypot can take other forms, such as files or data records, or even unused IP address space. ... (view more)

Fri
28
May
Dennis Faas's picture

Facebook Privacy Changes Under Attack

Even as Facebook constantly adjusts its privacy settings to make critics happy, privacy groups remain convinced that the site can do much more to protect the personal information of its many, many members. In a series of recent interviews, Facebook ... critics have launched new but familiar tirades against the site. Criticism of Facebook has been mounting over the past year. Privacy groups have sent a reported three letters to federal regulators claiming the site's executives are guilty of illegal activity -- including exposing user information to third parties without consent -- and they promise ... (view more)

Wed
26
May
Dennis Faas's picture

Most Browsers Leave Your History Behind, Study Says

Research conducted by the Electronic Frontier Foundation (EFF) suggests that more than 8 in 10 of web browsers have unique signatures, creating identifiable "fingerprints" that can be used to track almost any user that browses the Internet. The ... results ( PDF ) were found after an experiment was conducted by the EFF with volunteers who visited panopticlick.eff.org. Each participant who visited that site had the configuration and version information of their operating systems, browser, and browser plug-ins anonymously logged. (Source: eff.org ) The information gathered by the website ... (view more)

Tue
11
May
Dennis Faas's picture

Facebook Glitch Exposes Chat Conversations

Facebook users are generally trusting when it comes to their privacy, but some issues push them right over the edge. Take a recent glitch that allowed outsiders to view private user information, including friend names and the content of their chat ... conversations. The glitch emerged late last week, and has once again brought scrutiny and anger down upon the heads of Facebook brass. Users of the social networking site discovered that they were able to find out more about their friends than had been the case in the past, and some could even uncover chat conversations between other people. (Source ... (view more)

Pages

Subscribe to RSS - information