European schools told to drop Dropbox

Posted by & filed under Big Data, Cloud Computing, Cyber Security, Electronic Surveillance, Intellectual Property, IT and Politics, IT Governance, IT Security, IT Standards.

The European Court of Justice recently ruled that US firms signed up to what is called a “Safe Harbour scheme” with European companies could no longer be automatically considered to provide “adequate protection” to personal data they had received from the EU.  The “Safe Harbour scheme” was put in place to allow European companies to store data… Read more »

Could Russian submarines disrupt the Internet?

Posted by & filed under Cyber Security, Electronic Surveillance, Ethical issues, IT and Politics, IT Infrastructure, The Internet.

Russian submarines and spy ships are aggressively operating near the vital undersea cables that carry almost all global Internet communications, raising concerns among some American military and intelligence officials that the Russians might be planning to attack those lines in times of tension or conflict. Source: New York Times Date: October 27th, 2015 Link: http://www.nytimes.com/2015/10/26/world/europe/russian-presence-near-undersea-cables-concerns-us.html Discussion 1) Assume… Read more »

Apple refuses to unlock an iPhone seized by the U.S. Government

Posted by & filed under Civil Liberties, Cyber Security, Electronic Surveillance, Ethical issues, IT and Politics, IT Security.

Ordering Apple to access data against its will would be akin to making a reluctant drug company carry out a lethal injection, a US judge has said.   Judge James Orenstein was hearing a US government request to make Apple retrieve information from a locked iPhone seized by law enforcement officers.  The judge expressed doubt that he… Read more »

Chryslers can be hacked over the Internet

Posted by & filed under Cyber Security, Electronic Surveillance, IT Security.

A flaw in several Chrysler models lets hackers remotely control them over the Internet, posing an unprecedented danger for American drivers.  Hackers can cut the brakes, shut down the engine, drive it off the road, or make all the electronics go haywire. Source: CNN Money Date: September 9th, 2015 Link: http://money.cnn.com/2015/07/21/technology/chrysler-hack/index.html Discussion 1) Imagine you are… Read more »

Kettle poses a hacking risk

Posted by & filed under Cyber Security, Electronic Surveillance, Emerging Technologies, Internet of Things, IT Security.

The Internet of Things involves just about everything in your house being connected to the internet in different ways – and that means a big security headache. What, for instance, if your kettle could give away your wi-fi password to hackers? Source: BBC Date: June 6th, 2015 Link: http://www.bbc.com/news/technology-32978561  Discussion 1) What is the Internet of… Read more »

Robo-wings: Military drones that mimic hawks and insects

Posted by & filed under AI/Artificial Intelligence, Electronic Surveillance, IT Trends, Robotics.

A Defense agency is working on a surveillance robotic hawk that could fly through an urban combat jungle at 45mph The study is looking at developing new algorithms to allow a small UAV to operate without a remote pilot. Source: CNN Tech Date: January 31, 2015 Link (to paste into browser): http://www.cnn.com/2015/01/14/tech/mci-drone-robohawk-robofly/index.html 1) How could… Read more »

“Super cookies” track you, even in privacy mode

Posted by & filed under Business Analytics, Civil Liberties, Electronic Surveillance, IT Security.

Ironically, a trusty online privacy feature can now be reworked into a “super cookie” that tracks you like a bloodhound. Any respectable Web browser has a “privacy mode,” a clean slate without the tiny bits of information (cookies) that identify you to websites. Google Chrome has “incognito.” Mozilla’s Firefox has “private window.” But there’s a… Read more »

Surveillance: The hidden ways you’re tracked

Posted by & filed under Civil Liberties, Cyber Security, Electronic Surveillance, IT Security, Security.

“Every cell phone tower you pass, friend you keep, article you write, site you visit, subject line you type, and packet you route, is in the hands of a system whose reach is unlimited but whose safeguards are not.” Your day-to-day behaviour is monitored in ways you wouldn’t even realise, so these details and many… Read more »

Smart cities: How easy is it to hack our urban environment?

Posted by & filed under Cyber Security, Electronic Surveillance, IT Security.

Source: BBC Date: September 12, 2014 Link: http://www.bbc.com/news/technology-28446658 Questions for discussion: 1) Are there any “good” uses for technology that allows a person to hack into the electricity grid, or disable a wifi network? 2) Should there be regulation on the sale and purchase of hacking technologies that allow a person to access the electricity… Read more »