That's up a bit from the 50,000
reported earlier.
Up
to 1.5M credit card numbers stolen from Global Payments
As many as 1.5 million Visa and
MasterCard accounts may have been compromised by the recent Global
Payments security breach, the payment processor announced this
evening.
Credit card numbers may have been
exported, but no customer names, addresses, or Social Security
numbers were accessed, the company said in a statement. The company
believes the breach, which was revealed
Friday, was confined to North America.
The nature of the breach, which was
originally pegged at 50,000 accounts, has not been revealed.
… As a result of the breach, Visa
removed Global Payments from its list of approved service providers.
Visa told The
Wall Street Journal (subscription required) that the move was in
response to "Global Payments' reported unauthorized access."
Visa said it has invited Global Payments to re-apply for validation
by submitting evidence that its security is in compliance with Visa's
standards. [It will likely come out that they were
in compliance all along, but this way Visa looks tough. Bob]
Of course it's only “public data,”
that's the scary part!
Developer
defends Girls Around Me app
The Girls Around Me app, which used
Foursquare and Facebook data to automatically pinpoint the location
of specific women near users, was blocked
by Foursquare after a firestorm of criticism over user privacy.
Russian developer i-Free Innovations
insisted in a statement that the app, which many blogs criticized as
creepy and stalking, used publicly available information and provided
the same functionality as many other apps.
That's one problem with having all
those young whipper-snappers who have no memory of (nor interest in)
promises made by politicians from the stone age... Attention Class
Action Lawyers?
The
census’ broken privacy promise
April 2, 2012 by Dissent
Adam Marcus reports:
Seventy-two years
ago, the federal government made a promise to the American public:
“No one has access to your census record except you.”
So said a radio ad
intended to promote participation in the 1940 census by assuaging
privacy concerns. President Franklin Roosevelt even proclaimed, “No
person can be harmed in any way by furnishing the information
required. There need be no fear that any disclosure will be made
regarding any individual or his affairs.”
Yet today, the
government is posting online
all 3.8
million pages of the 1940 census rolls for all to access — at
no charge and with no need to register before viewing them.
Eighty-seven
percent of Americans can find a direct family link to one or more of
the 132+ million people listed on those rolls. The 1940 census
included 65
questions, with an additional 16 questions asked of a random 5
percent sample of people.
Read more on Cnet.
Is this a true surprise in the land
that invented “1984?” No doubt someone in Congress will be
convinced that we need to “keep up” and the NSA will be granted
similar power...
UK:
Privacy under assault: Internet activity ‘to be monitored’ under
new laws
April 2, 2012 by Dissent
Under legislation
expected in next month’s Queen’s Speech, internet companies will
be instructed to install hardware enabling GCHQ – the Government’s
electronic “listening” agency – to examine “on demand” any
phone call made, text message and email sent, and website accessed in
“real time”, The Sunday Times reported.
A previous attempt
to introduce a similar law was abandoned by the former Labour
government in 2006 in the face of fierce opposition.
Read more on The
Telegraph.
The BBC
reports that civil libertarians are criticizing the plan roundly.
Why Counterintelligence? Are these
scams being looked at as funding for Al Qaeda Al Qaida
the bad guys? Do these two pages represent everything they know?
Why release this on April 1st?
April 01, 2012
FBI
- Social Networking Risks Outlined in Latest Counterintelligence
Brochure
- "Internet-based social networking sites have created a revolution in social connectivity. However, con artists, criminals, and other dishonest actors are exploiting this capability for nefarious purposes. So warns our Counterintelligence Division in its latest informative brochure, Internet Social Networking Risks, which not only depicts the hazards present online, but also describes common tactics used criminals and spies in the cyber world as well as counter-tactics and preventative measures you can employ to protect yourself. View the other brochures in our collection for information and security tips on topics such as insider threats, intellectual property protection, and keeping safe abroad."
For the Criminal Justice students
"The New York Times has
published a large
collection of law enforcement training documents obtained by the
ACLU. The documents describe in detail what kind of information can
be obtained from cell phones and cell phone carriers, and how to
obtain it. The 189-page PDF also contains dozens of invoices from
the major carriers for their services to law enforcement that
describe the fees for those services."
For sending obscure messages to my
students: “Dude! OMG STINO” (Oh, my grade! Study time is never
over)
MobiTexter
– Text from Any Browser, Anywhere
MobiTexter, too, is an Android
application that lets you send text messages from your browser. This
time, through a webpage instead of a browser extension. This way
it’s not bound to any specific browser. Contrary to MightyText,
MobiTexter has a very rudimentary interface. Among other things,
MobiTexter does not create message threads, but shows all your
messages in chronological order.
MightyText
– Seamless Google Chrome Integration
MightyText is a twofold application.
The MightyText extension goes in your Google Chrome web browser, the
MightyText application on your Android phone. With hardly 2 minutes
worth of work, your Android messages finds a second home on your
computer.
Right now, MightyText is only available
on Google Chrome, but support for Firefox, Safari and Internet
Explorer is in the pipeline.
I will add those “online magazine”
subscriptions that I can't stop even after going through their 62
step “unsubscribe” process...
… Grey mail is the new productivity
killer, and it’s only going to get worse.
… Spam is easy to define – you
don’t want it, and you never asked for it. Grey mail on the other
hand is more difficult. You perhaps don’t want it – not all
of it anyway – but you probably asked for it. Typical grey
mail includes:
- Offers or newsletters from an online shop you use (or purchased something from, just once).
- Groupon or Living Social “daily deals” that are generally only relevant for the day they’re sent, yet they still collect in your inbox.
- Mailing lists such as Freecycle which generate an enormous volume of emails and are mostly useless.
- Social media updates, as if we didn’t already get enough on
Facebook.
Last year, Hotmail introduced a new
Sweep button to help you deal with inboxes full of grey mail.
Here’s a quick video from Microsoft
to explain the process (you can view it full size on the Conquer
Greymail site):
No comments:
Post a Comment