FCC adopts historic Internet rules

Posted by & filed under Civil Liberties, Consumer Technology, IT Infrastructure, The Internet.

The FCC has passed a historic measure to more strictly regulate the Internet. The new rules, known as “net neutrality,” act to provide equal opportunity for Internet speeds and access to websites. Source: CNN Money Date: February 26th, 2015 Link (to paste into browser): http://money.cnn.com/2015/02/26/technology/fcc-rules-net-neutrality/index.html Discussion 1) The Internet can be described as being very… Read more »

Hundreds of ISIS social media accounts shut down

Posted by & filed under Civil Liberties, Cyber Security, DoS/Denial of Service, IT Security.

Hundreds of social media accounts apparently linked to terrorist group ISIS have been shut down. Hacking group Anonymous claimed responsibility for targeting nearly 800 Twitter accounts, 12 Facebook pages and over 50 email addresses because of their links with ISIS (a global terrorist organization based largely in Syria and Iraq). Source: CNN Money Date: February… Read more »

Hacking cars and traffic lights at Def Con

Posted by & filed under Civil Liberties, Cyber Security, IT Security, IT Trends, Privacy.

One of the biggest hacking conferences in the world is Def Con (defense readiness condition (DEFCON) is an alert state used by the United States Armed Forces). Cybersecurity talks at Def Con included hacking cars, traffic lights and social engineering – where actors tried to get real companies to reveal compromising information. Source: BBC News… Read more »

“Super cookies” track you, even in privacy mode

Posted by & filed under Business Analytics, Civil Liberties, Electronic Surveillance, IT Security.

Ironically, a trusty online privacy feature can now be reworked into a “super cookie” that tracks you like a bloodhound. Any respectable Web browser has a “privacy mode,” a clean slate without the tiny bits of information (cookies) that identify you to websites. Google Chrome has “incognito.” Mozilla’s Firefox has “private window.” But there’s a… Read more »

The device that can help block wireless surveillance

Posted by & filed under Civil Liberties, Cyber Security, IT Security, Wi-Fi.

A team of artists, technologists and designers in Germany have created a device which they believe can block wireless surveillance. The machine, called Cyborg Unplug, works by detecting wireless networks in the surrounding area and then acting against that signal. Source: BBC Date: November 11th, 2014 Link: http://www.bbc.com/news/technology-29801921 Discussion 1) Should it be legal to… Read more »

In the mind of a hacker

Posted by & filed under Civil Liberties, Fraud, IT Security.

Rare insight into the motivations, and hopes of convicted Russian hacker Vladislav Horohorin. Source: CNN Money Date: November 1st, 2014 Link: http://money.cnn.com/video/technology/2014/10/29/mind-of-a-hacker.cnnmoney/index.html Discussion 1) The Russian hacker speaks of the “freedom to operate” in Russia. Do you think Russia has more room for hackers to operate, and do you think the Russian government is doing… Read more »

Surveillance: The hidden ways you’re tracked

Posted by & filed under Civil Liberties, Cyber Security, Electronic Surveillance, IT Security, Security.

“Every cell phone tower you pass, friend you keep, article you write, site you visit, subject line you type, and packet you route, is in the hands of a system whose reach is unlimited but whose safeguards are not.” Your day-to-day behaviour is monitored in ways you wouldn’t even realise, so these details and many… Read more »

Computer spyware is newest weapon in Syrian conflict

Posted by & filed under Civil Liberties, Cyber Security, Electronic Surveillance, IT Security, Privacy.

Discussion:  In Syria, regime supporters have released computer viruses that are designed to rob information from targeted users and send it to a government-owned server.  The information collected, such as user names, locations, and contact info, is then used by the regime to help fight protestors and activists in the country.  This information is collected… Read more »