Why politicians still dream of controlling the internet

Posted by & filed under Cyber Security, Ethical issues, IT and Politics.

Who’s in charge of the internet?  Both Xi Jinping, President of China, and Donald Trump, Presidential candidate, clearly think it is time for national governments to grasp control of the internet to bend it to their own political purposes. Source: BBC News Date: December 17th. 2015 Link: http://www.bbc.com/news/technology-35112856 Discussion 1) China has an “increasingly sophisticated Great Firewall acts… Read more »

What is ransomware?

Posted by & filed under Cyber Security.

Computer viruses that threaten to delete your files unless you pay a ransom are known as ransomware. Security experts have warned that ransomware is the fastest growing form of computer virus. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody… Read more »

Pirate avoids lawsuit after hitting 200,000 video views

Posted by & filed under Cyber Security, Entertainment, Ethical issues, Fraud.

A convicted software pirate has been handed an unusual punishment.  The man, named only as Jakub F, was told he would be spared having to pay hefty damages as long as a film denouncing piracy he was made to produce got 200,000 views. Source: BBC Tech news Date: November 30th, 2015 Link: http://www.bbc.com/news/technology-34932628 Discussion 1) These were major… Read more »

Facebook quizzes: What happens to your data?

Posted by & filed under Big Data, Business Analytics, Business Intelligence, Civil Liberties, Consumer Technology, Cyber Security, Entertainment, Ethical issues, Fraud.

Recently 17 million users visited an app via Facebook which offered to provide them with a word cloud of their most used words on the social network.  A few days later, freelance journalist Paul Bischoff wrote a piece for Comparitech entitled “That most used words Facebook quiz is a privacy nightmare” which outlined the huge amounts of data… Read more »

Instagram-tracking app actually stole your password

Posted by & filed under Competitive Advantage, Consumer Technology, Cyber Security, Electronic Surveillance, Entertainment, Fraud.

Ever wondered who viewed your Instagram profile? There was a popular iPhone app for that … until it was caught stealing your Instagram password. Source: CNN Date: November 19th, 2015 Link: http://money.cnn.com/2015/11/12/technology/instaagent-instagram/index.html?iid=ob_article_hotListpool&iid=obinsite Discussion 1) The article says that the InstaAgent app stole a user’s Instagram password, which might be the same as the user’s other site or… Read more »

A Blackberry

Posted by & filed under Competitive Advantage, Consumer Technology, Cyber Security, History of IT and IS.

  Well before Apple’s iPhone, Blackberry kicked off the smartphone revolution and brought the office out of the office and into the tap-tap-tap grasp of workers all over the world. Source: BBC Tech Date: November 11th, 2015 Link: http://www.bbc.com/news/technology-34741778 (includes a video) Discussion 1) For years, Blackberry was totally dominant as the smartphone of choice.  Indeed, the company… Read more »

European schools told to drop Dropbox

Posted by & filed under Big Data, Cloud Computing, Cyber Security, Electronic Surveillance, Intellectual Property, IT and Politics, IT Governance, IT Security, IT Standards.

The European Court of Justice recently ruled that US firms signed up to what is called a “Safe Harbour scheme” with European companies could no longer be automatically considered to provide “adequate protection” to personal data they had received from the EU.  The “Safe Harbour scheme” was put in place to allow European companies to store data… Read more »

Could Russian submarines disrupt the Internet?

Posted by & filed under Cyber Security, Electronic Surveillance, Ethical issues, IT and Politics, IT Infrastructure, The Internet.

Russian submarines and spy ships are aggressively operating near the vital undersea cables that carry almost all global Internet communications, raising concerns among some American military and intelligence officials that the Russians might be planning to attack those lines in times of tension or conflict. Source: New York Times Date: October 27th, 2015 Link: http://www.nytimes.com/2015/10/26/world/europe/russian-presence-near-undersea-cables-concerns-us.html Discussion 1) Assume… Read more »

Apple refuses to unlock an iPhone seized by the U.S. Government

Posted by & filed under Civil Liberties, Cyber Security, Electronic Surveillance, Ethical issues, IT and Politics, IT Security.

Ordering Apple to access data against its will would be akin to making a reluctant drug company carry out a lethal injection, a US judge has said.   Judge James Orenstein was hearing a US government request to make Apple retrieve information from a locked iPhone seized by law enforcement officers.  The judge expressed doubt that he… Read more »

Wikileaks publishes CIA chief’s personal information

Posted by & filed under Business Intelligence, Civil Liberties, Cyber Security, Ethical issues, Fraud, IT and Politics, IT Security.

“WikiLeaks on Wednesday published personal information of CIA Director John Brennan after a brazen hack attack of the top spy’s personal email account.” says CNN Source: CNN Date: October 21st, 2015 Link: http://us.cnn.com/2015/10/21/politics/john-brennan-hacked-cia-director/index.html Discussion 1) The CIA is saying that the hacking of the Director of the CIA’s e-mail “is something that could happen to anyone”.  Do you… Read more »