Well,
no not really. Still this is a good way to start the discussion with
my Ethical Hackers. How do you get someone to carry your malware to
a targeted computer.
Chinese
hacker group among first to target networks isolated from Internet
An
otherwise unremarkable hacking group likely aligned with China
appears to be one of the first to have targeted so-called air-gapped
networks that are not directly connected to the Internet, according
to FireEye.
The
computer security firm released a 69-page technical
report on Sunday on the group, which it calls APT (Advanced
Persistent Threat) 30 and that targets organizations in southeast
Asia and India.
A
friend of mine once said that the way to become truly rich was to
“Invent a new sin.” Apparently “revenge porn” was a new sin,
since there was no law to prevent it?
'Revenge
porn' just became illegal in England and Wales
Sharing
private material as "revenge porn" online is now illegal in
England and Wales. The legislation, which went through Parliament as
an amendment
to the Criminal Justice and Courts Bill, comes into force today,
Monday, April 13.
Would
a US based team reach the same conclusions?
A
critical analysis of Facebook’s Revised Policies and Terms
by
Sabrina
I. Pacifici on Apr 12, 2015
From
social media service to advertising network – A critical analysis
of Facebook’s Revised Policies and Terms DRAFT 31 March 2015.
The authors are part of the Interdisciplinary Centre for Law and
ICT/Centre for Intellectual Property Rights(ICRI/CIR) of KU Leuven
(www.icri.be),
the department of Studies on Media, Information and Telecommunication
(SMIT) of the Vrije Universiteit Brussel (VUB) (www.smit.vub.ac.be)
and the department of Computer Security and Industrial
Cryptography(nCOSIC) of KU Leuven (www.esat.kuleuven.be/cosic).
All three departments are part of iMinds (www.iminds.be).
This report was commissioned by the Belgian Privacy Commission.
“Facebook
combines data from an increasingly wide variety of sources. These
sources include acquired companies, partnering platforms and websites
or mobile applications that rely on Facebook (or one of its
companies) for advertising or other services. In
addition, Facebook’s ability to monitor and track users’
activities outside Facebook has increased exponentially as time has
gone by. Facebook’s tracking capabilities have expanded mainly
through the spread of social-plugins (“likebuttons”) and through
new forms of mobile tracking… The re-use of user content for
targeting and advertising purposes is deeply embedded in Facebook’s
practices. It is impossible to add any information that may not
later be re-used for targeting, and any “like” may become a
trigger to portray a user in a “Sponsored Story” or Social Ad.
From the latter one can opt-out, but the only way to stop appearing
in Sponsored Stories, is by stopping to “like” content
altogether. Users are even more disempowered because they are
unaware about how exactly their data is used for advertising
purposes. Furthermore, they are left in the dark about their
appearance in promotional content. Facebook should not only provide
users with more options to control how their data is gathered, but
also show users how their name and picture is used in specific
instances.”
Would
this not make a terrific program for censoring users? (Item 4)
Google
Patents Spoiler-Free System
Google
has patented a system designed to help
Internet users avoid spoilers. Google filed the patent in 2012,
and it was published last week after being awarded in 2014. With the
Game of Thrones leak, as reported above, such a system couldn’t
come at a better time.
The
system works by users tracking their progress through film series, TV
shows, and books on social networking sites. This would then be
compared to other’s progress, and any potential spoilers would be
blurred out by default.
There
is no indication Google is actually working on implementing the
system, but it seems ready-made for Google+.
However, we suspect that by the time this actually becomes a thing,
Google+ will be no more, despite
Google’s promises.
In
case you missed it.
FCC
net neutrality rule published in Federal Register
…
Before the regulation can go into effect, a final rule must first be
published in the Federal Register. The new rule, referred to as the
Open Internet Order, has
Monday as the effective publication date and goes into effect on
June 12. The FCC said in March, when it released the order, that it
would become effective 60 days after its publication in the Federal
Register.
A
follow up to yesterday's post about Jennifer Lopez as the stimulus
for image search in the first place. Apparently, image search needs
to be at least as good as text search.
Bing
adds more functionality to image search, making it more informative
Redmond,
Washington based Microsoft has enhanced its Bing Image search engine
for desktop and mobile app users. With new functionality a user will
get more information now when searching for an image. The user will
get more image options such as similar results, top suggestions, what
other users are searching, etc. When a user now opens on an image
from Bing, they will get a cleaner look of the image with much more
information.
For
my Computer Science students. “DARPA is like a box of chocolates.
You never know what you're gonna get.”
DARPA
Open Catalog
by
Sabrina
I. Pacifici on Apr 12, 2015
“Welcome
to the DARPA Open Catalog, which contains a curated list of
DARPA-sponsored software and peer-reviewed publications. DARPA
sponsors fundamental and applied research in a variety of areas that
may lead to experimental results and reusable technology designed to
benefit multiple government domains. The DARPA Open Catalog
organizes publicly releasable material from DARPA programs. DARPA
has an open strategy to help increase the impact of government
investments. DARPA is interested in building communities around
government-funded research. DARPA plans to continue to make
available information generated by DARPA programs, including
software, publications, data, and experimental results. The table
on this page lists the programs currently participating in the
catalog.”
For
my Techie students. Know where you came from to know where you are
going.
A
Brief History of Search and How Google Came Out on Top
Zen
and the art of eMail Trivial, but it can't hurt to make my students
read this.
15
Ways to Make Your Emails More Professional
Whether
you're looking for a job or communicating with co-workers, customers
or clients, you need to be able to send proper, professional emails.
From
proofreading to crafting the perfect signature, every step you take
when composing and sending a professional email is important.
No comments:
Post a Comment