Instagram-tracking app actually stole your password

Posted by & filed under Competitive Advantage, Consumer Technology, Cyber Security, Electronic Surveillance, Entertainment, Fraud.

Ever wondered who viewed your Instagram profile? There was a popular iPhone app for that … until it was caught stealing your Instagram password. Source: CNN Date: November 19th, 2015 Link: http://money.cnn.com/2015/11/12/technology/instaagent-instagram/index.html?iid=ob_article_hotListpool&iid=obinsite Discussion 1) The article says that the InstaAgent app stole a user’s Instagram password, which might be the same as the user’s other site or… Read more »

European schools told to drop Dropbox

Posted by & filed under Big Data, Cloud Computing, Cyber Security, Electronic Surveillance, Intellectual Property, IT and Politics, IT Governance, IT Security, IT Standards.

The European Court of Justice recently ruled that US firms signed up to what is called a “Safe Harbour scheme” with European companies could no longer be automatically considered to provide “adequate protection” to personal data they had received from the EU.  The “Safe Harbour scheme” was put in place to allow European companies to store data… Read more »

Could Russian submarines disrupt the Internet?

Posted by & filed under Cyber Security, Electronic Surveillance, Ethical issues, IT and Politics, IT Infrastructure, The Internet.

Russian submarines and spy ships are aggressively operating near the vital undersea cables that carry almost all global Internet communications, raising concerns among some American military and intelligence officials that the Russians might be planning to attack those lines in times of tension or conflict. Source: New York Times Date: October 27th, 2015 Link: http://www.nytimes.com/2015/10/26/world/europe/russian-presence-near-undersea-cables-concerns-us.html Discussion 1) Assume… Read more »

Apple refuses to unlock an iPhone seized by the U.S. Government

Posted by & filed under Civil Liberties, Cyber Security, Electronic Surveillance, Ethical issues, IT and Politics, IT Security.

Ordering Apple to access data against its will would be akin to making a reluctant drug company carry out a lethal injection, a US judge has said.   Judge James Orenstein was hearing a US government request to make Apple retrieve information from a locked iPhone seized by law enforcement officers.  The judge expressed doubt that he… Read more »

Chryslers can be hacked over the Internet

Posted by & filed under Cyber Security, Electronic Surveillance, IT Security.

A flaw in several Chrysler models lets hackers remotely control them over the Internet, posing an unprecedented danger for American drivers.  Hackers can cut the brakes, shut down the engine, drive it off the road, or make all the electronics go haywire. Source: CNN Money Date: September 9th, 2015 Link: http://money.cnn.com/2015/07/21/technology/chrysler-hack/index.html Discussion 1) Imagine you are… Read more »

Kettle poses a hacking risk

Posted by & filed under Cyber Security, Electronic Surveillance, Emerging Technologies, Internet of Things, IT Security.

The Internet of Things involves just about everything in your house being connected to the internet in different ways – and that means a big security headache. What, for instance, if your kettle could give away your wi-fi password to hackers? Source: BBC Date: June 6th, 2015 Link: http://www.bbc.com/news/technology-32978561  Discussion 1) What is the Internet of… Read more »

Robo-wings: Military drones that mimic hawks and insects

Posted by & filed under AI/Artificial Intelligence, Electronic Surveillance, IT Trends, Robotics.

A Defense agency is working on a surveillance robotic hawk that could fly through an urban combat jungle at 45mph The study is looking at developing new algorithms to allow a small UAV to operate without a remote pilot. Source: CNN Tech Date: January 31, 2015 Link (to paste into browser): http://www.cnn.com/2015/01/14/tech/mci-drone-robohawk-robofly/index.html 1) How could… Read more »

“Super cookies” track you, even in privacy mode

Posted by & filed under Business Analytics, Civil Liberties, Electronic Surveillance, IT Security.

Ironically, a trusty online privacy feature can now be reworked into a “super cookie” that tracks you like a bloodhound. Any respectable Web browser has a “privacy mode,” a clean slate without the tiny bits of information (cookies) that identify you to websites. Google Chrome has “incognito.” Mozilla’s Firefox has “private window.” But there’s a… Read more »

Surveillance: The hidden ways you’re tracked

Posted by & filed under Civil Liberties, Cyber Security, Electronic Surveillance, IT Security, Security.

“Every cell phone tower you pass, friend you keep, article you write, site you visit, subject line you type, and packet you route, is in the hands of a system whose reach is unlimited but whose safeguards are not.” Your day-to-day behaviour is monitored in ways you wouldn’t even realise, so these details and many… Read more »