The disturbing consequences of ultra-connectivity

Posted by & filed under Civil Liberties, Cyber Security, IT and Politics, IT Security, IT Trends.

When we share pictures of our kids on Flickr, we probably don’t expect to see them turn up as faces on coffee mugs for sale on website Koppie-Koppie. Using Twitter (TWTR, Tech30) to comment on politics wasn’t supposed to land us in jail, as is happening in Turkey. Having a mobile phone with a SIM card wasn’t… Read more »

LA Hospital Pays Hackers Nearly $17,000 To Restore Computer Network

Posted by & filed under Business Intelligence, Civil Liberties, Cyber Security, DoS/Denial of Service.

A Los Angeles hospital paid a nearly $17,000 ransom to hackers who breached and disabled its computer network, the hospital said in a statement Wednesday.  Hollywood Presbyterian Medical Center paid the ransom of 40 bitcoins, which is currently worth $16,664, in order to restore the computer system that was infiltrated on Feb. 5.  The hackers… Read more »

JOHN MCAFEE: I’ll decrypt the San Bernardino phone free of charge so Apple doesn’t need to place a back door on its product

Posted by & filed under Business Intelligence, Civil Liberties, Cyber Security.

Using an obscure law, written in 1789 — the All Writs Act — the US government has ordered Apple to place a back door into its iOS software so the FBI can decrypt information on an iPhone used by one of the San Bernardino shooters. Source: Business Insider Date: February 19th, 2016 Link: Discussion 1) The article starts… Read more »

An interview with a hacker

Posted by & filed under Business Intelligence, Civil Liberties, Cyber Security, DoS/Denial of Service.

  CNN Tech conducts interviews with hackers to learn more about what motivates them. Source: CNN Tech Date: January 18th, 2016 Link to video: Discussion 1) In the video one hacker is asked why he thinks it is ok to break the law to do what he does.  His response: “If we have to break the law… Read more »

Why politicians still dream of controlling the internet

Posted by & filed under Cyber Security, Ethical issues, IT and Politics.

Who’s in charge of the internet?  Both Xi Jinping, President of China, and Donald Trump, Presidential candidate, clearly think it is time for national governments to grasp control of the internet to bend it to their own political purposes. Source: BBC News Date: December 17th. 2015 Link: Discussion 1) China has an “increasingly sophisticated Great Firewall acts… Read more »

What is ransomware?

Posted by & filed under Cyber Security.

Computer viruses that threaten to delete your files unless you pay a ransom are known as ransomware. Security experts have warned that ransomware is the fastest growing form of computer virus. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody… Read more »

Pirate avoids lawsuit after hitting 200,000 video views

Posted by & filed under Cyber Security, Entertainment, Ethical issues, Fraud.

A convicted software pirate has been handed an unusual punishment.  The man, named only as Jakub F, was told he would be spared having to pay hefty damages as long as a film denouncing piracy he was made to produce got 200,000 views. Source: BBC Tech news Date: November 30th, 2015 Link: Discussion 1) These were major… Read more »

Facebook quizzes: What happens to your data?

Posted by & filed under Big Data, Business Analytics, Business Intelligence, Civil Liberties, Consumer Technology, Cyber Security, Entertainment, Ethical issues, Fraud.

Recently 17 million users visited an app via Facebook which offered to provide them with a word cloud of their most used words on the social network.  A few days later, freelance journalist Paul Bischoff wrote a piece for Comparitech entitled “That most used words Facebook quiz is a privacy nightmare” which outlined the huge amounts of data… Read more »

Instagram-tracking app actually stole your password

Posted by & filed under Competitive Advantage, Consumer Technology, Cyber Security, Electronic Surveillance, Entertainment, Fraud.

Ever wondered who viewed your Instagram profile? There was a popular iPhone app for that … until it was caught stealing your Instagram password. Source: CNN Date: November 19th, 2015 Link: Discussion 1) The article says that the InstaAgent app stole a user’s Instagram password, which might be the same as the user’s other site or… Read more »