Did The iPhone’s ‘Find My Friends’ Already Out A Cheating Wife?

Posted by & filed under Apple, Cyberforensics, EXAM ARTICLE, FaceBook, IS ethics, Privacy, Security.

Description: Welcome to iCheers, where everybody knows your whereabouts. Both Apple and Foursquare are offering new tools for iOS5 that will let us know where our friends are at all times. Source: Forbes.com Date: Oct 17, 2011 Late Saturday night, “ThomasMetz” posted to MacRumors (via 9to5Mac) about how he turned his wife’s iPhone into a… Read more »

No Cards, No Cash. Just a Phone.

Posted by & filed under e-payment, Ecommerce, EXAM ARTICLE, fraud, Google, industry analysis, M-commerce, revenue model, Security, smartphones.

Description: Plenty of companies would love to get their hands on our wallets. But Google wants to go one step further: it wants to be our wallets. Source: NYT.com. Date: Sept 21, 2011 Its new phone software, called Google Wallet, is intended to replace the credit cards in our actual wallets. It does sound pretty… Read more »

Microsoft unveils a radically redesigned Windows 8

Posted by & filed under Cloud Computing, operating system, Security, Software, Uncategorized.

Description: Windows 8 is coming soon — and it looks nothing like the Windows you’re used to. Source: CNN .com. Date: Sept 14, 2011 Microsoft formally introduced Windows 8 on Tuesday to thousands of software developers gathered at the company’s annual Build conference in Anaheim, Calif. The software giant said it reimagined Windows for the… Read more »

A hacker’s attack sheds light on internet security holes

Posted by & filed under EXAM ARTICLE, fraud, hackers, IS ethics, Security.

Description: The encryption used by many websites to prevent eavesdropping on their interactions with visitors is not very secure. This technology is in use when Web addresses start with “https” (in which “s” stands for secure) and a closed lock icon appears on Web browsers. Source: Globe&Mail Date: April 7, 2011 The Electronic Frontier Foundation,… Read more »

Banks fight fraud with new social networking weapons

Posted by & filed under cyber terroism, Digital Policy, fraud, Privacy, Security.

Description: An older type of social network, and it’s being used to help detect fraud. It is the connections between people in the physical world. Source: Globe&Mail.com Date: March 8, 2011 Banks, telecoms providers and insurance companies, among other businesses, are using analytic software to correlate all of their various data sources to produce visualizations of relationships… Read more »

New Hacking Tools Pose Bigger Threats to Wi-Fi Users

Posted by & filed under Cloud Computing, Cyberforensics, IS ethics, Privacy, Security, WI-Fi, wireless networks.

Description: Until recently, only determined and knowledgeable hackers with fancy tools and lots of time on their hands could spy while you used your laptop or smartphone at Wi-Fi hot spots. Source: NYTimes.com Date: Feb 17, 201 You may think the only people capable of snooping on your Internet activity are government intelligence agents or… Read more »

F.T.C. Backs Plan to Honor Privacy of Online Users

Posted by & filed under business models, Copyright, Cyberforensics, Digital Policy, Ecommerce, FaceBook, industry analysis, M-commerce, Privacy, Security.

Description: Signaling a sea change in the debate over Internet privacy, the government’s top consumer protection agency on Wednesday advocated a plan that would let consumers choose whether they want their Internet browsing and buying habits monitored. Source: NYTimes.com Date: Dec 1, 2010 Saying that online companies have failed to protect the privacy of Internet… Read more »

Security needs drive cyberforensics industry

Posted by & filed under Biometrics, cyber terroism, Cyberforensics, industry analysis, Privacy, Security.

Description: Cyberforensics, the science of finding and securing digital evidence buried deep within company networks, is fast emerging as a global industry. Source: USAToday.com Date: Nov 23, 2010 Three major players are in the vanguard.PricewaterhouseCoopers has recently hired several former law enforcement agents and prosecutors to supplement its cyberforensic services, which already have 3,000 employees… Read more »

Worm Was Perfect for Sabotaging Centrifuges

Posted by & filed under cyber terroism, cyber war, Security.

Description: Experts dissecting the computer worm suspected of being aimed at Iran’s nuclear program have determined that it was precisely calibrated in a way that could send nuclear centrifuges wildly out of control. Source: The New York Times Date: Nov 18, 2010 Their conclusion, while not definitive, begins to clear some of the fog around the Stuxnet… Read more »