information

Wed
26
Jan
Dennis Faas's picture

Software Glitch Compromises 400K Organ Donor Records

When people decide to become an organ donor, they trust that their final wishes will be carried out and in good hands when the day comes. Unfortunately, that may not be the case, as a recently discovered software glitch in Britain has compromised ... the donation preferences of 444,031 people. The discrepancies were first discovered back in March 2010 and found to have existed between the organ donation information found on Driver and Vehicle Licensing Agencies (DVLA) application forms and the information recorded in the British Organ Donor Register (ODR). Twelve-Year-Old Software Glitch ... (view more)

Fri
07
Jan
Dennis Faas's picture

'Sys Information 3.0.0.0', and 'ChromePlus 1.5.2.0'

Sys Information 3.0.0.0 Sys Information is a sleek program for viewing system information, such as CPU usage, hard drive free space, motherboard information, Windows installation date, Processor name, graphics card information, and much more. ... http://arvinsoft.weebly.com ChromePlus 1.5.2.0 ChromePlus is a twist on Google's Chrome web browser. It has all the functionalities that Google Chrome has, but ads more features such as Mouse gesture, Super drag, IE tab, and more. http://www.chromeplus.org This freeware software program is brought to you by MajorGeeks.com: The Original Spyware-Free ... (view more)

Thu
23
Dec
Dennis Faas's picture

Bank of America Severs Wikileaks Affiliation

In recent weeks, corporations associated with Wikileaks have had to make the difficult decision of whether or not to sever all ties with the organization, and if so, face the potential of backlash on their own companies, including distributed denial ... of service attacks. Bank of America is the latest to join the list of financial and technology companies that have cut off services to Wikileaks, but their decision might have been made with the knowledge that Wikileaks is prepared to release confidential and likely scandalous information about the institution. Two Sides to the Story The official ... (view more)

Mon
15
Nov
Dennis Faas's picture

'SIV (System Information Viewer) 4.14', and 'PeerBlock 1.0+ (r484) Beta'

SIV (System Information Viewer) 4.14 'System Information Viewer' (SIV) is a general Windows utility for displaying useful Windows, Network and hardware information, including: CPU info, PCI info, PCMCIA info, USB info SMBus info, SPD info, Machine ... Info, Hardware Sensors, Networked computers, Operating System Information and more. http:/rh-software.com PeerBlock 1.0+ (r484) Beta PeerBlock is a firewall-like program that lets you specify who your computer can / cannot communicate with on the Internet. By selecting appropriate lists of "known bad" websites / computers, you can block ... (view more)

Tue
02
Nov
Dennis Faas's picture

Facebook Bans Developers for Selling User Info

Facebook says it has discovered that some application ("app") developers have been deliberately selling user information for the intention of third-party marketing, and has responded by banning a list of developers from the site for six months. A ... similar breach was reported in a Facebook investigation last month . In that case, a technical error in the way developers used the information provided by Facebook meant they were revealing the user IDs of members who used the relevant applications, such as games. It's important to note this is simply Facebook's own reference number for ... (view more)

Tue
10
Aug
Dennis Faas's picture

Data Mining

Data mining is the process of extracting patterns from data. Data mining is becoming an increasingly important tool to transform otherwise abstract data into useable information. It is commonly used in a wide range of profiling practices, such as ... marketing, surveillance, fraud detection and scientific discovery. Data mining can be used to uncover patterns in data but is often carried out only on samples of data. The mining process will be ineffective if the samples are not a good representation of the larger body of data. Data mining cannot discover patterns that may be present in the larger ... (view more)

Tue
10
Aug
Dennis Faas's picture

Your Smartphone App May be Watching You: Report

Computer users aren't the only ones who need to worry about their privacy and security. A new report from San Francisco-based Lookout Inc., a mobile phone security firm, reveals that smart phone applications may be closely monitoring users and ... relaying that information to others. (Source: yahoo.com ) Personal Data Secretly Transmitted to Third Parties Nearly 300,000 free applications for Apple's iPhone and phones built around Google's Android software were scanned by Lookout, Inc. Results of those scans found that many of those apps were secretly pulling sensitive data off user phones and ... (view more)

Tue
03
Aug
Dennis Faas's picture

Hackers Birth Automated Phishing Kit that Never Dies

Hackers have now started using what is being referred to as "indestructible" cloud computing -based phishing attacks . In short, a phishing attack is a "criminally fraudulent process of attempting to acquire user names, passwords, and credit card ... details by masquerading as a trustworthy website." (Source: wikipedia.org ) For example, you may have received a dubious email asking you to "update" your banking information or to "change your online banking password." These are typical phishing scams whereby the information you input is stolen by fake ... (view more)

Mon
12
Jul
Dennis Faas's picture

Honeypot

In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a ... network, but is actually isolated, (un)protected, and monitored, and which seems to contain information or a resource of value to attackers. Honeypot Function A honeypot is valuable as a surveillance and early-warning tool. While it is often a computer, a honeypot can take other forms, such as files or data records, or even unused IP address space. ... (view more)

Fri
28
May
Dennis Faas's picture

Facebook Privacy Changes Under Attack

Even as Facebook constantly adjusts its privacy settings to make critics happy, privacy groups remain convinced that the site can do much more to protect the personal information of its many, many members. In a series of recent interviews, Facebook ... critics have launched new but familiar tirades against the site. Criticism of Facebook has been mounting over the past year. Privacy groups have sent a reported three letters to federal regulators claiming the site's executives are guilty of illegal activity -- including exposing user information to third parties without consent -- and they promise ... (view more)

Pages

Subscribe to RSS - information