Monday, April 13, 2015
Well, no not really. Still this is a good way to start the discussion with my Ethical Hackers. How do you get someone to carry your malware to a targeted computer.
Chinese hacker group among first to target networks isolated from Internet
An otherwise unremarkable hacking group likely aligned with China appears to be one of the first to have targeted so-called air-gapped networks that are not directly connected to the Internet, according to FireEye.
The computer security firm released a 69-page technical report on Sunday on the group, which it calls APT (Advanced Persistent Threat) 30 and that targets organizations in southeast Asia and India.
A friend of mine once said that the way to become truly rich was to “Invent a new sin.” Apparently “revenge porn” was a new sin, since there was no law to prevent it?
'Revenge porn' just became illegal in England and Wales
Sharing private material as "revenge porn" online is now illegal in England and Wales. The legislation, which went through Parliament as an amendment to the Criminal Justice and Courts Bill, comes into force today, Monday, April 13.
Would a US based team reach the same conclusions?
A critical analysis of Facebook’s Revised Policies and Terms
by Sabrina I. Pacifici on Apr 12, 2015
From social media service to advertising network – A critical analysis of Facebook’s Revised Policies and Terms DRAFT 31 March 2015. The authors are part of the Interdisciplinary Centre for Law and ICT/Centre for Intellectual Property Rights(ICRI/CIR) of KU Leuven (www.icri.be), the department of Studies on Media, Information and Telecommunication (SMIT) of the Vrije Universiteit Brussel (VUB) (www.smit.vub.ac.be) and the department of Computer Security and Industrial Cryptography(nCOSIC) of KU Leuven (www.esat.kuleuven.be/cosic). All three departments are part of iMinds (www.iminds.be). This report was commissioned by the Belgian Privacy Commission.
“Facebook combines data from an increasingly wide variety of sources. These sources include acquired companies, partnering platforms and websites or mobile applications that rely on Facebook (or one of its companies) for advertising or other services. In addition, Facebook’s ability to monitor and track users’ activities outside Facebook has increased exponentially as time has gone by. Facebook’s tracking capabilities have expanded mainly through the spread of social-plugins (“likebuttons”) and through new forms of mobile tracking… The re-use of user content for targeting and advertising purposes is deeply embedded in Facebook’s practices. It is impossible to add any information that may not later be re-used for targeting, and any “like” may become a trigger to portray a user in a “Sponsored Story” or Social Ad. From the latter one can opt-out, but the only way to stop appearing in Sponsored Stories, is by stopping to “like” content altogether. Users are even more disempowered because they are unaware about how exactly their data is used for advertising purposes. Furthermore, they are left in the dark about their appearance in promotional content. Facebook should not only provide users with more options to control how their data is gathered, but also show users how their name and picture is used in specific instances.”
Would this not make a terrific program for censoring users? (Item 4)
Google Patents Spoiler-Free System
Google has patented a system designed to help Internet users avoid spoilers. Google filed the patent in 2012, and it was published last week after being awarded in 2014. With the Game of Thrones leak, as reported above, such a system couldn’t come at a better time.
The system works by users tracking their progress through film series, TV shows, and books on social networking sites. This would then be compared to other’s progress, and any potential spoilers would be blurred out by default.
There is no indication Google is actually working on implementing the system, but it seems ready-made for Google+. However, we suspect that by the time this actually becomes a thing, Google+ will be no more, despite Google’s promises.
In case you missed it.
FCC net neutrality rule published in Federal Register
… Before the regulation can go into effect, a final rule must first be published in the Federal Register. The new rule, referred to as the Open Internet Order, has Monday as the effective publication date and goes into effect on June 12. The FCC said in March, when it released the order, that it would become effective 60 days after its publication in the Federal Register.
Bing adds more functionality to image search, making it more informative
DARPA Open Catalog
by Sabrina I. Pacifici on Apr 12, 2015
“Welcome to the DARPA Open Catalog, which contains a curated list of DARPA-sponsored software and peer-reviewed publications. DARPA sponsors fundamental and applied research in a variety of areas that may lead to experimental results and reusable technology designed to benefit multiple government domains. The DARPA Open Catalog organizes publicly releasable material from DARPA programs. DARPA has an open strategy to help increase the impact of government investments. DARPA is interested in building communities around government-funded research. DARPA plans to continue to make available information generated by DARPA programs, including software, publications, data, and experimental results. The table on this page lists the programs currently participating in the catalog.”
A Brief History of Search and How Google Came Out on Top
Zen and the art of eMail Trivial, but it can't hurt to make my students read this.
15 Ways to Make Your Emails More Professional
Whether you're looking for a job or communicating with co-workers, customers or clients, you need to be able to send proper, professional emails.
From proofreading to crafting the perfect signature, every step you take when composing and sending a professional email is important.