Top 5 social media scams to avoid

Posted by & filed under Advertisement, Android, app, Apple, Banking, encryption, hackers, Privacy, Security, Social Media.

Description: Scammers have been worming their way into giant social media networks to trick people into giving over their personal and financial information Source: CNN Money Date: April 22, 2016 1. Fake customer service accounts on Twitter: Online criminals set up fake customer service accounts to phish for bank login and password information and other sensitive… Read more »

Google, Facebook and other tech giants file in court to support Apple’s fight against the FBI

Posted by & filed under Apple, ethics, FBI, Privacy.

Description: The biggest names in the Internet technology world have officially put their legal support behind Apple in its controversial and high-stakes battle with the FBI. Source: Mashable Date: March 3, 2016 Twitter, Reddit, LinkedIn, Airbnb and a dozen other prominent companies filed a joint amicus brief in court Thursday afternoon. The amicus curiae, or “friend… Read more »

Minority Report’s “Pre-Crime” is almost reality

Posted by & filed under ethics, Privacy, social impacts.

Description: LA City Council Considers Sending ‘Dear John’ Letters To Homes Of Men Who Solicit Prostitutes Source: Washington Post Date: December 1, 2015 Los Angeles is considering sending “Dear John” letters to the homes of men who solicit prostitutes hoping the mail will be opened by mothers, girlfriends or wives. Read More. Questions for discussion: 1…. Read more »

Hacker Steals 1.2 Billion Logins

Posted by & filed under fraud, hackers, Privacy, Security.

Description: The FBI has linked a hacker to the theft of 1.2 billion internet credentials – the largest heist of its kind. Source: BBC Date: November 25, 2015 A hacker known as “mr.grey” is named in court documents filed by the bureau last year. Previously, “mr.grey” had advertised the credentials to Facebook and Twitter accounts for… Read more »

Technology and the Fight Against Terrorism

Posted by & filed under cyber terroism, free speech, hackers, Internet, politics, Privacy, Security, Social Media.

Description: Preventing terrorist plots is harder than ever, and technology is both the problem and the solution. Source: CNN Money Date: November 24, 2015 Violent extremists like ISIS meet in the open on Facebook or Twitter. Then they take the conversation private, using technology called encryption to encode their messages. It’s called “going dark”, and it’s one… Read more »

Android Apps Sending Hidden Data

Posted by & filed under Analytics, Android, app, data analytics, data mining, Digital Policy, Privacy, Security, Social Media.

Description: How many of your Android Apps are sending your hidden data? Source: Engadget Date: November 22, 2015   You may already know that Android apps send a lot of data, but you might be surprised at how much of it isn’t really necessary. While the data collected is likely to be harmless, there is always… Read more »

The Hackers Fighting ISIS You’ve Never Heard of

Posted by & filed under cyber terroism, cyber war, Digital Policy, ethics, hackers, Privacy, Security.

Description: Ghost Security Group, also known as GhostSec, is small hacker army composed of ex-military and ex-Anonymous members fighting ISIS online. Source: CNN Money Date: November 20, 2015 Ghost Security Group is a counter terrorism network that combats extremism on the digital front lines of today using the internet and social media as a weapon. Questions for… Read more »

Kodak’s Latest Live-streaming Camera Offers HD Video for Less

Posted by & filed under Hardware, industry analysis, market intelligence, Privacy, Security, streaming video.

Description: Kodak enters the security camera space. Source: CNET Date: October 10, 2015   Kodak isn’t new to the world of live-streaming cameras, but its $150 Video Monitor CFH-V20, announced this week, boasts the most impressive specs in the brand’s expanding lineup. Read More Questions for discussion: 1.  Do you think this is a space Kodak… Read more »