European schools told to drop Dropbox

Posted by & filed under Big Data, Cloud Computing, Cyber Security, Electronic Surveillance, Intellectual Property, IT and Politics, IT Governance, IT Security, IT Standards.

The European Court of Justice recently ruled that US firms signed up to what is called a “Safe Harbour scheme” with European companies could no longer be automatically considered to provide “adequate protection” to personal data they had received from the EU.  The “Safe Harbour scheme” was put in place to allow European companies to store data… Read more »

Could Russian submarines disrupt the Internet?

Posted by & filed under Cyber Security, Electronic Surveillance, Ethical issues, IT and Politics, IT Infrastructure, The Internet.

Russian submarines and spy ships are aggressively operating near the vital undersea cables that carry almost all global Internet communications, raising concerns among some American military and intelligence officials that the Russians might be planning to attack those lines in times of tension or conflict. Source: New York Times Date: October 27th, 2015 Link: http://www.nytimes.com/2015/10/26/world/europe/russian-presence-near-undersea-cables-concerns-us.html Discussion 1) Assume… Read more »

Apple refuses to unlock an iPhone seized by the U.S. Government

Posted by & filed under Civil Liberties, Cyber Security, Electronic Surveillance, Ethical issues, IT and Politics, IT Security.

Ordering Apple to access data against its will would be akin to making a reluctant drug company carry out a lethal injection, a US judge has said.   Judge James Orenstein was hearing a US government request to make Apple retrieve information from a locked iPhone seized by law enforcement officers.  The judge expressed doubt that he… Read more »

Wikileaks publishes CIA chief’s personal information

Posted by & filed under Business Intelligence, Civil Liberties, Cyber Security, Ethical issues, Fraud, IT and Politics, IT Security.

“WikiLeaks on Wednesday published personal information of CIA Director John Brennan after a brazen hack attack of the top spy’s personal email account.” says CNN Source: CNN Date: October 21st, 2015 Link: http://us.cnn.com/2015/10/21/politics/john-brennan-hacked-cia-director/index.html Discussion 1) The CIA is saying that the hacking of the Director of the CIA’s e-mail “is something that could happen to anyone”.  Do you… Read more »

Would you tell Apple when you’ve had sex?

Posted by & filed under App Economy, Big Data, Consumer Technology, Cyber Security, Ethical issues, Healthcare.

  When Apple released its iOS9 mobile operating system it included a new feature – the ability for women to log their sexual activity alongside details of their menstrual cycles.  An earlier version of its HealthKit software – which tracks everything from electrodermal activity to chromium intake – had lacked the facility.  Other apps existed… Read more »

How Facebook knows who you might be dating online

Posted by & filed under App Economy, Big Data, Business Analytics, Business Intelligence, Civil Liberties, Cloud Computing, Cyber Security.

Users of dating apps have expressed concerns about their privacy after their matches appeared as “suggested friends” on Facebook.   It’s happened on apps like Tinder and Grindr and people have called it “creepy”.   “There are people whose name might just show up as ‘looking’, and then suddenly you see them on Facebook.” Source: BBC News Date: October… Read more »

Smartphones can be “taken over”

Posted by & filed under Business Intelligence, Civil Liberties, Cyber Security, Ethical issues, IT Security, Politics.

Smartphone users can do “very little” to stop security services getting “total control” over their devices, US whistleblower Edward Snowden has said.  The former intelligence contractor has said that UK intelligence agency GCHQ had the power to hack into phones without their owners’ knowledge.  Mr Snowden said GCHQ could gain access to a handset by sending… Read more »

Medical devices vulnerable to hackers

Posted by & filed under Cyber Security, Ethical issues, Fraud, Healthcare, IT Security.

Thousands of critical medical systems, such as MRI machines, are available for hackers to access online, according to researchers.  Some 68,000 medical systems from just one large unnamed US health group have been exposed. Source: BBC Technology News Date: October 2nd, 2015 Link: http://www.bbc.com/news/technology-34390165 Discussion 1) The article says that “The researchers used Shodan – a search engine… Read more »

How to pick the perfect password

Posted by & filed under Cyber Security, Fraud, IT Security.

Hackers have managed to decode more than 11 million encrypted passwords stolen from the Ashley Madison website, shining fresh light on the importance of password security. Source: BBC News Date: September 22nd, 2015 Link: http://www.bbc.com/news/technology-34221843 Discussion 1) The article says “Some security experts have recommended the adoption of “passphrases”, such as “Iown50%ofSClub7albums”.” (SClub7 is a British pop music band)… Read more »