Smartphones can be “taken over”

Posted by & filed under Business Intelligence, Civil Liberties, Cyber Security, Ethical issues, IT Security, Politics.

Smartphone users can do “very little” to stop security services getting “total control” over their devices, US whistleblower Edward Snowden has said.  The former intelligence contractor has said that UK intelligence agency GCHQ had the power to hack into phones without their owners’ knowledge.  Mr Snowden said GCHQ could gain access to a handset by sending… Read more »

Microsoft battles US over warrant for drugs case emails

Posted by & filed under Civil Liberties, Cloud Computing, IT and Politics, Uncategorized.

Microsoft is returning to court to continue its fight against the US government’s demand that it hand over emails stored at an Irish data centre.  The messages involved are alleged to contain details of narcotics sales.  In 2014, a court ruled in favour of the government’s claim that because it had jurisdiction over the US-based… Read more »

FCC adopts historic Internet rules

Posted by & filed under Civil Liberties, Consumer Technology, IT Infrastructure, The Internet.

The FCC has passed a historic measure to more strictly regulate the Internet. The new rules, known as “net neutrality,” act to provide equal opportunity for Internet speeds and access to websites. Source: CNN Money Date: February 26th, 2015 Link (to paste into browser): Discussion 1) The Internet can be described as being very… Read more »

Hundreds of ISIS social media accounts shut down

Posted by & filed under Civil Liberties, Cyber Security, DoS/Denial of Service, IT Security.

Hundreds of social media accounts apparently linked to terrorist group ISIS have been shut down. Hacking group Anonymous claimed responsibility for targeting nearly 800 Twitter accounts, 12 Facebook pages and over 50 email addresses because of their links with ISIS (a global terrorist organization based largely in Syria and Iraq). Source: CNN Money Date: February… Read more »

Hacking cars and traffic lights at Def Con

Posted by & filed under Civil Liberties, Cyber Security, IT Security, IT Trends, Privacy.

One of the biggest hacking conferences in the world is Def Con (defense readiness condition (DEFCON) is an alert state used by the United States Armed Forces). Cybersecurity talks at Def Con included hacking cars, traffic lights and social engineering – where actors tried to get real companies to reveal compromising information. Source: BBC News… Read more »

“Super cookies” track you, even in privacy mode

Posted by & filed under Business Analytics, Civil Liberties, Electronic Surveillance, IT Security.

Ironically, a trusty online privacy feature can now be reworked into a “super cookie” that tracks you like a bloodhound. Any respectable Web browser has a “privacy mode,” a clean slate without the tiny bits of information (cookies) that identify you to websites. Google Chrome has “incognito.” Mozilla’s Firefox has “private window.” But there’s a… Read more »

The device that can help block wireless surveillance

Posted by & filed under Civil Liberties, Cyber Security, IT Security, Wi-Fi.

A team of artists, technologists and designers in Germany have created a device which they believe can block wireless surveillance. The machine, called Cyborg Unplug, works by detecting wireless networks in the surrounding area and then acting against that signal. Source: BBC Date: November 11th, 2014 Link: Discussion 1) Should it be legal to… Read more »