Top 5 social media scams to avoid

Posted by & filed under Advertisement, Android, app, Apple, Banking, encryption, hackers, Privacy, Security, Social Media.

Description: Scammers have been worming their way into giant social media networks to trick people into giving over their personal and financial information Source: CNN Money Date: April 22, 2016 1. Fake customer service accounts on Twitter: Online criminals set up fake customer service accounts to phish for bank login and password information and other sensitive… Read more »

Inside the mind of a hacktivist

Posted by & filed under Anonymous, hackers, Security.

Description: Some people hack for a cause — it’s known as hacktivism. Laurie Segall speaks to face-to…mask with Anonymous, and speaks with a hacker who fights for justice by attacking racist websites, but finances his operations by selling security flaws. Source: CNN Money Date: March 12, 2016 Questions for discussion: 1. Do you believe the “hacktavist”… Read more »

Apple computers targeted in first ‘ransomware’ attack

Posted by & filed under Apple, hackers, malware, ransomware, Security.

Description: Apple computers targeted in first ‘ransomware’ attack Source: CNN Money Date: March 7, 2016 Questions for discussion: 1. Do you believe that the hackers waited until the most opportune moment, when Apple has been must under scrutiny, to release this new malware? 2. If you are an Apple user, was one of the deciding factors… Read more »

Hacker Steals 1.2 Billion Logins

Posted by & filed under fraud, hackers, Privacy, Security.

Description: The FBI has linked a hacker to the theft of 1.2 billion internet credentials – the largest heist of its kind. Source: BBC Date: November 25, 2015 A hacker known as “mr.grey” is named in court documents filed by the bureau last year. Previously, “mr.grey” had advertised the credentials to Facebook and Twitter accounts for… Read more »

The Doctor on a Quest to Save Our Medical Devices From Hackers

Posted by & filed under hackers, Hardware, health, medicine, technology.

Description: Dr. David Klonoff is trying to make his patients’ medical devices more secure. Source: Wired Date: November 24, 2015   Klonoff wants to find a way to secure insulin pumps to shut out nefarious hackers while still letting patients hack their own pumps for better performance. Read More. Questions for discussion: 1. Do you think that… Read more »

Technology and the Fight Against Terrorism

Posted by & filed under cyber terroism, free speech, hackers, Internet, politics, Privacy, Security, Social Media.

Description: Preventing terrorist plots is harder than ever, and technology is both the problem and the solution. Source: CNN Money Date: November 24, 2015 Violent extremists like ISIS meet in the open on Facebook or Twitter. Then they take the conversation private, using technology called encryption to encode their messages. It’s called “going dark”, and it’s one… Read more »

The Hackers Fighting ISIS You’ve Never Heard of

Posted by & filed under cyber terroism, cyber war, Digital Policy, ethics, hackers, Privacy, Security.

Description: Ghost Security Group, also known as GhostSec, is small hacker army composed of ex-military and ex-Anonymous members fighting ISIS online. Source: CNN Money Date: November 20, 2015 Ghost Security Group is a counter terrorism network that combats extremism on the digital front lines of today using the internet and social media as a weapon. Questions for… Read more »

$20K Hackathon Winner Uses Open Data to Design Career Path App

Posted by & filed under app, Careers, data analytics, data mining, Data storage, education, Entrepreneurship, hackers, programming.

Description: Industry Minister Tony Clement and CODE winner Danil Shevelev, who helped develop an app to help students decide what degree to apply for. Source: CTV News Date: March 27, 2015 After 48 hours spent mining government data, designing an app, and writing computer code, this year’s Canadian Open Data Experience winners came up with a way… Read more »

The Social Psychology Of The Naked Selfie

Posted by & filed under app, Cloud Computing, cyber bullying, ethics, hackers, peer file sharing, pornography, Security, social impacts, Social Media, Uncategorized.

Description: There’s actually a science behind why we are seeing repeated nude photo hacking scandals — the science of social Source: TechCrunch Date: November 29, 2014   If you’re building a tech product that has anything to do with photos then you’re probably feeling an uncomfortable sense of déjà vu lately, and it has to do with… Read more »

Canadian Charged in Hacking Ring Involving U.S. Military Software and Xbox Games

Posted by & filed under ethics, fraud, Gaming, hackers, virtualization.

Description: A 22-year-old Mississauga man has been charged in an international hacking ring. The group allegedly stole over $100-million in intellectual property. Source: Canada.com Date: October 1, 2014             Four members of a hacking ring, including one Canadian, have been charged with breaking into the computer networks of various technology companies as well… Read more »