You can't underestimate anyone's
understanding of security concepts...
Syrian President Bashar al-Assad has
been under fire from world leaders to step down this week. He’s
also under fire from hacktivist group Anonymous,
who leaked hundreds of his office’s emails on Monday.
While Anonymous is infamous for its
hacking know-how, it doesn’t take a genius computer programmer to
guess one of the passwords commonly used by Assad’s office
accounts: 12345. The string of consecutive numbers is the
second-weakest
password according to a 2011 study. [“Password”
is number one Bob]
No liability, because you have no
Privacy?
Backdoor
in TRENDnet IP Cameras Provide Real-Time Peeping Tom Paradise?
Nearly a month after a console cowboy
identified a security vulnerability in Trendnet streaming IP cameras,
Trendnet issued a security advisory. So far there
have been 26 vulnerable models identified [I'm pretty sure they mean
camera models, not tall anorexic women Bob] that allow
voyeurs to spy in real time on homes and offices. Since many of the
cameras were not registered, this vulnerability may remain an
exploitable Peeping Tom paradise for a long time.
… The vulnerability allows users to
tune in and to spy in real-time on thousands of private lives via
Trendnet home
security cameras. "There does not appear to
be a way to disable access to the video stream,
… Since looking for these Trendnet
cameras "manually is boring and tedious," SomeLuser created
a Python script that uses the Shodan
search engine to find the URL
of web cam video streams, regardless of if it has a password on it or
not. By now there are all kinds of lists circulating on forums,
pastebin and sites like 4chan, giving armchair
surfers unobstructed views into offices, homes, living rooms and
kids' bedrooms.
Is this how companies act in a polite
society? Should we expect anti-social networks?
Path
caught storing users’ unencrypted data
February 7, 2012 by Dissent
Heather Taylor writes:
Today developer
Arun Thampi discovered his entire address book including full names,
emails and phone numbers was being collected by the new social app,
Path.
In trying
to make things easy for users, Path uploads your address book to
their servers so you can easily connect to your friends
and family on its network.
The problem is
Path doesn’t tell you its going to do it.
Read more on eConsultancy.
(Related) So, is this evil? How about
a 15 minute delay like a stock ticker?
"There is media (but not
public?) outcry over the Pasadena, CA police switch from analog radio
that can be picked up by scanners to encrypted
digital radio that cannot. 'On Friday, Pasadena police Lt.
Phlunte Riddle said the department was unsure whether it could
accommodate the media with digital scanners. Riddle said the
greatest concern remains officer safety. "People who do bank
robberies use scanners, and Radio Shack sells these things cheap,"
Riddle said. "We just had a robbery today on Hill Avenue and
Washington Boulevard," Riddle said. "The last thing I want
to do is to have the helicopter or the officers set up on the street
and the criminals have a scanner and know where our officers are."
Just prior to the switch over, city staffers said they would look
into granting access to police radio chatter, most likely by loaning
media outlets a scanner capable of picking up the secure signal.'"
Is this anti-social? We keep telling
you that “Delete” does not mean “Delete.”
Given the cutting-edge technological
reputation of Facebook, you’d perhaps think profile holders need
only execute a simple button press in order to swiftly cast unwanted
or embarrassing photographs into social networking oblivion.
However, it would appear that personal
images deleted by users are still doing the rounds on Facebook for up
to three years after that initial button press.
Zuckerberg & Co. have this week
revealed that not all images are removed “in a reasonable period of
time” and that access to them can still be gained by Facebook users
that maintain a direct link to the deleted image(s).
What that means is, for example, a
Facebook photograph emailed out to friends can still be viewed via
the original email link even though the image no longer appears on
the user’s photo page.
I see this as a bit scary. Something
like a “Minority Report” enabling technology. Walk past my store
and I'll signal your Smartphone to tell you about my special offers
(For you? $19.95)
Your dogs are going to hate you...
Why
Lady Gaga Could Deploy a Sound Only Your Smartphone Can Hear
Audio tags are looking more and more
like the new QR code — not only are they way less ugly than those
jagged black-on-white
squares, but you don’t need to take a picture of anything in
order for them to work.
A startup called SonicNotify
embeds inaudibly high-pitched audio signals within music or any other
audio track. When a compatible app hears that signal, it triggers
any available smartphone function to link you to websites, display
text, bring up map locations, display a photo, let you vote on which
song a performer plays next and so on.
… Buyers and journalists with the
app installed at Fashion Week will be zapped an image of each
model the instant they step onto the catwalk so they can examine the
outfits up-close, in real time. Similarly impressive capabilities
exist within the music realm. Best of all, the
audience doesn’t even need to be actively running the app in order
for it to pick up on those inaudible signals. [Remind you of the
intro to the old “Outer Limits” TV show? “We control the
vertical... and horizontal...” Bob]
“With Sonic, we can
unlock anything that your iPhone or Android can do, as
long as the SonicNotify SDK is built into an app that’s running in
the background on your phone,” explained Israel. “For example,
some of the stuff we’re doing with Gaga is when she is performing,
mid-set, everyone in the arena gets a notification which lets them
choose which song she plays for her encore.”
(Related) “We can, therefore we
must!” What if your insurance company required you to monitor your
health and report it to them in exchange for a break in premiums?
(Auto insurance companies are already doing something similar...)
mHealth:
Remote Patient Monitoring Is On The Rise, With Smartphones Leading
The Way
… As smartphone processors become
more powerful, a growing number of patients will be monitored by
mobile networks. A recent
report by Juniper on the mHealth sector estimated that 3 million
patients will be monitored on those networks over the course of the
next four years.
Ubiquitous surveillance. Now my model
airplane skills can translate into “Urban Crop Dusting!” as I
swoop down and spread Scott's fertilizer (only the best) on your
lawn.
Congress
Welcomes The Drones
February 7, 2012 by Dissent
Kashmir Hill writes:
The Senate passed
a $63 billion bill Monday to provide four years of funding for the
Federal Aviation Administration. One of the provisions of the
Reauthorization
Act is that the FAA clear the path for wider spread use of drones
(a.k.a. unmanned aircraft) for governmental and commercial purposes.
Within 90 days, the FAA has to speed up the process by which
government agencies and law enforcement can get permission to use
drones, and by 2015, it has to start allowing
commercial use of drones
Read more on Forbes.
I don't understand... Did he say,
“What you're doing is a crime. Keep doing it?”
Judge
Refuses to Shut Down Online Market for Used MP3s
A one-of-a-kind website enabling the
online sale of pre-owned digital-music files got a legal boost late
Monday when a federal judge refused to shutter it at the request of
Capitol Records.
It could be short-lived boost, however.
… The brief
ruling (.pdf) by U.S. District Judge Richard Sullivan of New York
did not clearly outline the reason for the decision. But in a
transcript
(.pdf) of a court proceeding Monday, he said that Capitol is likely
to prevail at trial.
… Sullivan’s decision means that
the case is still headed to trial, where Capitol will attempt to
prove its allegations that ReDigi facilitates wanton copyright
infringement and is not protected by the first-sale doctrine.
… ReDigi explained to Sullivan in
court papers (.pdf) that its undisclosed number of account
holders have a right to upload their purchased iTunes files into
ReDigi’s cloud. And when a file is sold to another ReDigi account
holder, no copy is made. What’s more, because of ReDigi’s
technology, the original uploaded file that is sold cannot be
accessed by the seller any more through ReDigi or via the seller’s
iTunes account.
Prices for songs vary on ReDigi, with
some files having asking prices as high as 87 cents — just 12 cents
less than what many songs retail for on iTunes. The company, which
earns up to 15 percent per sale, also offers cloud-storage music
streaming.
Might be worth checking into...
http://www.pogowasright.org/?p=27115
New
Web-Browser Add-On Protects Privacy
February 7, 2012 by Dissent
Leslie Meredith gives a nice write-up
on Cocoon:
Last week
Microsoft and Google clashed over who had a better privacy policy.
When you use a Web-browser add-on called Cocoon, it just doesn’t
matter. The free tool creates a safety
zone within Firefox and Internet Explorer to stop
websites from tracking you, reduce spam and protect against viruses.
Cocoon’s
co-founder Jeff Bermant admits he’s not a tech guy. “I wanted to
give people relief from worrying about what can go wrong on the
Internet,” he said. “Cocoon is for people who don’t know much
about their computers.”
Read more on Tech
News Daily.
[From the article:
Cocoon
appears as a toolbar at the top of your browser window. When you
click the "power button," the tool bar turns blue to
indicate that Cocoon has been activated and your activities are
protected.
Cocoon includes "disposable email"
that lets users set up unique, throw-away email addresses to use when
they subscribe to a website. Then they can easily delete the address
to stop an onslaught of spam.
… Cocoon touts its portability, but
to access your Cocoon account on another computer the plugin must be
installed in the browser of the computer you'd like to use.
[Or, install your browser on a thumb drive and carry your security
with you. Bob] Once it is installed, you can log into
your account with your email and password. When you log out of your
session, it's as if you've never been there.
A great list of websites to start
reading via you favorite RSS reader...
I probably have enough material for a
half dozen textbooks on my thumb drive...
"The Saylor
Foundation has a vision: Free and open materials for a complete
undergraduate university education. To that end, they've announced
the first winners in their Open
Textbook Challenge: Four textbooks were relicensed under a
Creative Commons Attribution 3.0 (CC-BY
3.0) Unported license, the most open of the CC licenses, and in
return the
authors were awarded a prize of $20,000 for each book. See the
blog
entries and the accompanying press
releases
for details. The second
wave of submissions will be accepted until May 31, 2012."
(Related)
Rice
University And OpenStax Announce First Open-Source Textbooks
… Rice University, which has been
pushing alternative distribution mechanisms for scholarly
publications for years, has announced
a new initiative, by which they hope to publish free,
high-quality textbooks in core subjects like physics and biology via
a non-profit publisher called OpenStax
College. It’s the polar opposite of Apple’s
iBooks textbooks, which, while they too help drag this dusty
industry into the present, amount more to a new sales vector for the
publishers than competition.
No comments:
Post a Comment