Facebook quizzes: What happens to your data?

Posted by & filed under Big Data, Business Analytics, Business Intelligence, Civil Liberties, Consumer Technology, Cyber Security, Entertainment, Ethical issues, Fraud.

Recently 17 million users visited an app via Facebook which offered to provide them with a word cloud of their most used words on the social network.  A few days later, freelance journalist Paul Bischoff wrote a piece for Comparitech entitled “That most used words Facebook quiz is a privacy nightmare” which outlined the huge amounts of data… Read more »

Instagram-tracking app actually stole your password

Posted by & filed under Competitive Advantage, Consumer Technology, Cyber Security, Electronic Surveillance, Entertainment, Fraud.

Ever wondered who viewed your Instagram profile? There was a popular iPhone app for that … until it was caught stealing your Instagram password. Source: CNN Date: November 19th, 2015 Link: http://money.cnn.com/2015/11/12/technology/instaagent-instagram/index.html?iid=ob_article_hotListpool&iid=obinsite Discussion 1) The article says that the InstaAgent app stole a user’s Instagram password, which might be the same as the user’s other site or… Read more »

A Blackberry

Posted by & filed under Competitive Advantage, Consumer Technology, Cyber Security, History of IT and IS.

  Well before Apple’s iPhone, Blackberry kicked off the smartphone revolution and brought the office out of the office and into the tap-tap-tap grasp of workers all over the world. Source: BBC Tech Date: November 11th, 2015 Link: http://www.bbc.com/news/technology-34741778 (includes a video) Discussion 1) For years, Blackberry was totally dominant as the smartphone of choice.  Indeed, the company… Read more »

European schools told to drop Dropbox

Posted by & filed under Big Data, Cloud Computing, Cyber Security, Electronic Surveillance, Intellectual Property, IT and Politics, IT Governance, IT Security, IT Standards.

The European Court of Justice recently ruled that US firms signed up to what is called a “Safe Harbour scheme” with European companies could no longer be automatically considered to provide “adequate protection” to personal data they had received from the EU.  The “Safe Harbour scheme” was put in place to allow European companies to store data… Read more »

Could Russian submarines disrupt the Internet?

Posted by & filed under Cyber Security, Electronic Surveillance, Ethical issues, IT and Politics, IT Infrastructure, The Internet.

Russian submarines and spy ships are aggressively operating near the vital undersea cables that carry almost all global Internet communications, raising concerns among some American military and intelligence officials that the Russians might be planning to attack those lines in times of tension or conflict. Source: New York Times Date: October 27th, 2015 Link: http://www.nytimes.com/2015/10/26/world/europe/russian-presence-near-undersea-cables-concerns-us.html Discussion 1) Assume… Read more »

Apple refuses to unlock an iPhone seized by the U.S. Government

Posted by & filed under Civil Liberties, Cyber Security, Electronic Surveillance, Ethical issues, IT and Politics, IT Security.

Ordering Apple to access data against its will would be akin to making a reluctant drug company carry out a lethal injection, a US judge has said.   Judge James Orenstein was hearing a US government request to make Apple retrieve information from a locked iPhone seized by law enforcement officers.  The judge expressed doubt that he… Read more »

Wikileaks publishes CIA chief’s personal information

Posted by & filed under Business Intelligence, Civil Liberties, Cyber Security, Ethical issues, Fraud, IT and Politics, IT Security.

“WikiLeaks on Wednesday published personal information of CIA Director John Brennan after a brazen hack attack of the top spy’s personal email account.” says CNN Source: CNN Date: October 21st, 2015 Link: http://us.cnn.com/2015/10/21/politics/john-brennan-hacked-cia-director/index.html Discussion 1) The CIA is saying that the hacking of the Director of the CIA’s e-mail “is something that could happen to anyone”.  Do you… Read more »

Would you tell Apple when you’ve had sex?

Posted by & filed under App Economy, Big Data, Consumer Technology, Cyber Security, Ethical issues, Healthcare.

  When Apple released its iOS9 mobile operating system it included a new feature – the ability for women to log their sexual activity alongside details of their menstrual cycles.  An earlier version of its HealthKit software – which tracks everything from electrodermal activity to chromium intake – had lacked the facility.  Other apps existed… Read more »

How Facebook knows who you might be dating online

Posted by & filed under App Economy, Big Data, Business Analytics, Business Intelligence, Civil Liberties, Cloud Computing, Cyber Security.

Users of dating apps have expressed concerns about their privacy after their matches appeared as “suggested friends” on Facebook.   It’s happened on apps like Tinder and Grindr and people have called it “creepy”.   “There are people whose name might just show up as ‘looking’, and then suddenly you see them on Facebook.” Source: BBC News Date: October… Read more »

Smartphones can be “taken over”

Posted by & filed under Business Intelligence, Civil Liberties, Cyber Security, Ethical issues, IT Security, Politics.

Smartphone users can do “very little” to stop security services getting “total control” over their devices, US whistleblower Edward Snowden has said.  The former intelligence contractor has said that UK intelligence agency GCHQ had the power to hack into phones without their owners’ knowledge.  Mr Snowden said GCHQ could gain access to a handset by sending… Read more »