Yahoo scanned millions of its users’ emails on behalf of the US government.

Posted by & filed under Cyber Security, Ethical issues, IT and Politics, IT and the law.

Yahoo has downplayed a report that said it had scanned millions of its users’ emails on behalf of the US government.  Reuters made the allegation recently, saying Yahoo had created special software to comply with a classified directive. Source: BBC Technology News Date: October 11th, 2016 Link: http://www.bbc.com/news/technology-37568106 Discussion 1) Every email was scanned.  “Sources had told said… Read more »

Meeting Cellebrite – Israel’s master phone crackers

Posted by & filed under Business Intelligence, Civil Liberties, Competitive Advantage, Cyber Security, Ethical issues.

Cellebrite is an Israeli company that helps police forces gain access to data on the mobile phones of suspected criminals.  Cellebrite was in the headlines earlier this year when it was rumoured to have helped the FBI to crack an iPhone used by the San Bernardino shooter. Source: BBC Technology News Date: October 4th, 2016 Link to… Read more »

How tech is helping a casino catch the cheats

Posted by & filed under Competitive Advantage, Cyber Security, Electronic Surveillance, Ethical issues.

  In the past, casinos would employ agents to observe gamblers’ behaviour and watch out for cheats, but now technology is playing a role. Source: BBC Technology News Date: September 28th, 2016 Link: http://www.bbc.com/news/technology-37095120 Discussion 1) What other businesses could use this sort of technology? 2) What sort of disclosures should a casino, or other business using this… Read more »

How I caught my online scammer – and Facebooked his mom

Posted by & filed under App Economy, Cyber Security.

A cybersecurity researcher living in Austria who was scammed out of $500 says his money was returned after he tracked down the scammer’s family and contacted them on Facebook. Source: BBC Technology Date: September 14th, 2016 Link: http://www.bbc.com/news/technology-37348014 Discussion 1) “He had decided to accept payment in the digital currency as he thought it would be less of… Read more »

Who are the hackers who cracked the iPhone?

Posted by & filed under Civil Liberties, Competitive Advantage, Cyber Security, Electronic Surveillance.

  The cyber arms NSO Group was founded in 2010 and is based in Herzliya, an attractive city north of Tel Aviv that is known as being a cluster of tech start-ups. The group was likely funded by the elite 8200 Intelligence Unit, an Israeli military-funded scheme for start-ups. Source: BBC Technology Date: September 1st, 2016 Link: http://www.bbc.com/news/technology-37192670… Read more »

Thailand’s students reveal their vice — cheating by device

Posted by & filed under Competitive Advantage, Cyber Security, Ethical issues, Fraud.

  This is a confiscated smartwatch showing a student’s math data.  In Thailand, being brought up to be polite, tolerant, and respectful hasn’t prevented rampant cheating on university entrance exams, now aided by embedded cameras, smartwatches and all other manner of high tech gear. Source: Toronto Star Date: September 1st, 2016 Link: https://www.thestar.com/business/tech_news/2016/05/11/thailands-students-reveal-their-vice-cheating-by-device.html 1) How might you prevent… Read more »

Are hi-tech spies stealing all your firm’s secrets?

Posted by & filed under Cyber Security.

Last weekend’s reports about the New Zealand rugby team’s discovery of a listening device sewn in to a hotel meeting room chair, have illustrated just how much spying technology has advanced in recent years.  These days, you don’t need to sit outside in a van with your headphones on, listening to static for an hour… Read more »

Counter-counter-hacking

Posted by & filed under Business Intelligence, Civil Liberties, Competitive Advantage, Cyber Security, Ethical issues, Fraud, IT Security.

  The whistleblower Edward Snowden believes Russia is behind a leak of malware allegedly belonging to the US National Security Agency (NSA).  Hackers calling themselves Shadow Brokers started an auction for the malware last week.  The malware is used by the NSA to attack or counter-attack in cyberspace. Source: BBC Technology Date: August 17th, 2016 Link: http://www.bbc.com/news/technology-37104745 Discussion… Read more »

Who is watching you online?

Posted by & filed under Big Data, Business Intelligence, Civil Liberties, Competitive Advantage, Cyber Security, Electronic Surveillance, Email.

Around 40 million UK adults – 78% of us – go online every day or almost every day. By posting on social media, booking tickets or buying a DVD, we add to the 2.3 billion gigabytes of internet data created daily.  The data trail we leave on our online journey says much about our habits… Read more »