Hacker Steals 1.2 Billion Logins

Posted by & filed under fraud, hackers, Privacy, Security.

Description: The FBI has linked a hacker to the theft of 1.2 billion internet credentials – the largest heist of its kind. Source: BBC Date: November 25, 2015 A hacker known as “mr.grey” is named in court documents filed by the bureau last year. Previously, “mr.grey” had advertised the credentials to Facebook and Twitter accounts for… Read more »

Technology and the Fight Against Terrorism

Posted by & filed under cyber terroism, free speech, hackers, Internet, politics, Privacy, Security, Social Media.

Description: Preventing terrorist plots is harder than ever, and technology is both the problem and the solution. Source: CNN Money Date: November 24, 2015 Violent extremists like ISIS meet in the open on Facebook or Twitter. Then they take the conversation private, using technology called encryption to encode their messages. It’s called “going dark”, and it’s one… Read more »

Android Apps Sending Hidden Data

Posted by & filed under Analytics, Android, app, data analytics, data mining, Digital Policy, Privacy, Security, Social Media.

Description: How many of your Android Apps are sending your hidden data? Source: Engadget Date: November 22, 2015   You may already know that Android apps send a lot of data, but you might be surprised at how much of it isn’t really necessary. While the data collected is likely to be harmless, there is always… Read more »

The Hackers Fighting ISIS You’ve Never Heard of

Posted by & filed under cyber terroism, cyber war, Digital Policy, ethics, hackers, Privacy, Security.

Description: Ghost Security Group, also known as GhostSec, is small hacker army composed of ex-military and ex-Anonymous members fighting ISIS online. Source: CNN Money Date: November 20, 2015 Ghost Security Group is a counter terrorism network that combats extremism on the digital front lines of today using the internet and social media as a weapon. Questions for… Read more »

Kodak’s Latest Live-streaming Camera Offers HD Video for Less

Posted by & filed under Hardware, industry analysis, market intelligence, Privacy, Security, streaming video.

Description: Kodak enters the security camera space. Source: CNET Date: October 10, 2015   Kodak isn’t new to the world of live-streaming cameras, but its $150 Video Monitor CFH-V20, announced this week, boasts the most impressive specs in the brand’s expanding lineup. Read More Questions for discussion: 1.  Do you think this is a space Kodak… Read more »

NEXT Unveils “The Oyster” USB Fingerprint Scanner

Posted by & filed under Biometrics, branding, Business Intelligence, business models, Data storage, Digital Policy, Privacy, Security.

Description: We are seeing more and more companies getting into the biometrics security solutions game and “The Oyster” is the next player. Source: Find Biometrics Date: February 19, 2015   NEXT Biometrics has unveiled a new USB fingerprint scanner. The NB-3010-U, nicknamed “The Oyster”, is designed for Windows 7 and 8.1 compatibility, but NEXT is also offering… Read more »

Smart TV Eavesdropping on You? It’s Not the Only One

Posted by & filed under Business Intelligence, data mining, Data storage, ethics, Privacy, Security, social tv, television, voice recognition.

Description: For the purposes of “improving their product”, Samsung announces that users of Smart TVs need to be conscious of what they say in front of the device, as voice recordings are being shared with subsidiaries and agents. Source: Globe and Mail Date: February 9, 2015 In an era of increasing concern about data breaches and government eavesdropping comes… Read more »

Facebook’s Anonymous App Could Kill Trolls With Secret Identity

Posted by & filed under app, Business Intelligence, cyber bullying, FaceBook, Privacy, Security, Social Media.

Description: Facebook’s new app is promising to help ward off spammers and internet “trolls”. Source: Tech Crunch Date: October 10, 2014 Wack-a-mole. That’s what it’s usually like fighting trolls, bullies, and spammers in anonymous communities. Ban them and they just start new accounts. That’s why the fact that Facebook knows who you really are could be… Read more »

Apple’s New Software Security Is So Tight, Even Police Can’t Break In

Posted by & filed under Apple, branding, Cloud Computing, Data storage, hackers, iphone, Privacy, Security, Uncategorized.

Description: Apple has upped it’s game in the security department, promising that once your phone has been locked, it’s next to impossible to access the information on it. Source: The Globe and Mail Date: September 19, 2014 In light of the celebrity photo leaks that have been happening over the last little while, the new release of… Read more »