Your new post is loading...
Here’s how to maximize the security of your most sensitive conversations — the ones that could be misinterpreted by an employer; be of interest to snooping governments; or allow a hacker to steal your identity.
For most people, having their Facebook account hacked is a nightmare. Imagine if someone had access to all your private messages, could contact your friends, abuse your Facebook page, and delete your personal information. To avoid this, you should regularly update your password and keep other security settings tight.
A senior agent in his forties who had overseen the cyber security field at the National Intelligence Service (NIS) for a long time took his own life. He left behind a suicide note mentioning the use of the controversial hacking program which the intelligence service had purchased.
But what if the dynamic changed such that employees could use corporate and office items for their personal profit? Most firms have never thought about the concept and certainly have no processes in place to deal with it.
Fifty thousand activists from 5,000 NGOs around the world attended the World Social Forum in Tunis last week to press for change on a wide variety of issues.
Just a week ago, Director of National Intelligence James Clapper testified before Congress that his fundamental concern focuses on the “moderate, iterative..
"Open source and peer production have been praised as organisational models that could change the world for the better. It is commonly asserted that almost any societal activity could benefit from distributed, bottom-up collaboration — by making societal interaction more open, more social, and more democratic. However, we also need to be mindful of the limits of these models. How could they function in environments hostile to openness? Security is a societal domain more prone to secrecy than any other, except perhaps for romantic love. In light of the destructive capacity of contemporary cyber attacks, how has the Internet survived without a comprehensive security infrastructure? Secrecy vs. openness describes the realities of Internet security production through the lenses of open source and peer production theories. The study offers a glimpse into the fascinating communities of technical experts, who played a pivotal role when the chips were down for the Internet after large-scale attacks. After an initial flirtation with openness in the early years, operational Internet security communities have put in place institutional mechanisms that have resulted in less open forms of social production."
Open source and peer production have been praised as organisational models that could change the world for the better. It is commonly asserted that almost any societal activity could benefit from distributed, bottom-up collaboration — by making societal interaction more open, more social, and more democratic. However, we also need to be mindful of the limits of these models. How could they function in environments hostile to openness? Security is a societal domain more prone to secrecy than any other, except perhaps for romantic love. In light of the destructive capacity of contemporary cyber attacks, how has the Internet survived without a comprehensive security infrastructure? Secrecy vs. openness describes the realities of Internet security production through the lenses of open source and peer production theories. The study offers a glimpse into the fascinating communities of technical experts, who played a pivotal role when the chips were down for the Internet after large-scale attacks. After an initial flirtation with openness in the early years, operational Internet security communities have put in place institutional mechanisms that have resulted in less open forms of social production.
While Obama wants tougher penalties for criminal hackers, the administration can't afford to alienate good hackers working to improve security.
How to be Safe in the Sharing Economy
Among both American and British law-enforcement communities, the temptation runs strong to treat hackers and hacktivists in simplistic terms.
Deep Lab is a collective of cyberfeminist researchers, organized by STUDIO Fellow Addie Wagenknecht to examine how privacy, security, surveillance, and anonymity are problematized in the arts and society. The Deep Lab participants, all women, are an international group of new-media artists, visualization designers, data scientists, software engineers, hackers, journalists and theoreticians, who are engaged in the critical assessment of contemporary digital culture. In the second week of December, these experts will work at the STUDIO on an accelerated pressure project, and deliver four evenings of public presentations: the Deep Lab Lecture Series.
In a move not surprising from a partner organization of DATA (the organization that assisted New York state employees to write the “BitLicense”), ID3 has announced the release of new identity-tracking software that they hope cryptocurrency companies will make a pre-condition for customers wanting to do business.
|
ERCS - Website for an ESRC funded project on the Common Good: Ethics and Rights in Cyber Security
Following a coordinated attack in Paris on Nov. 13, some are asking whether law enforcement should have access to encrypted social network platforms, like Telegram, allegedly used for terrorist planning purposes.
In this powerful and indignant article, Aral Balkan – verging on ‘mad as hell and I’m not going to take this any more‘ mode, exposes the nascent total surveillance state, what he calls ‘Spyware 2.0′ and their fraudulent ‘free’ services.
The popular ride-hailing company hired Facebook's Chief Security Officer Joe Sullivan to head up its own security department, the New York Times reports today.
As Early as 2016, Robot Cops Will Be Patrolling Your Streets
With the price of Bitcoin plummeting, the technology that stores the currency’s transactions is gaining value as a safe and open way to keep other kinds of records.
"Open source and peer production have been praised as organisational models that could change the world for the better. It is commonly asserted that almost any societal activity could benefit from distributed, bottom-up collaboration — by making societal interaction more open, more social, and more democratic. However, we also need to be mindful of the limits of these models. How could they function in environments hostile to openness? Security is a societal domain more prone to secrecy than any other, except perhaps for romantic love. In light of the destructive capacity of contemporary cyber attacks, how has the Internet survived without a comprehensive security infrastructure? Secrecy vs. openness describes the realities of Internet security production through the lenses of open source and peer production theories. The study offers a glimpse into the fascinating communities of technical experts, who played a pivotal role when the chips were down for the Internet after large-scale attacks. After an initial flirtation with openness in the early years, operational Internet security communities have put in place institutional mechanisms that have resulted in less open forms of social production."
The premise of the Internet of Things carries with it a corollary statement; everything that can be connected to the Internet can be hacked.
Given the size and complexity of the problem, we need more people to help.
Mass trolling of internet data — as done by Canada's electronic spy agency in a project dubbed Levitation — can impede cyber spies in the hunt for extremists more than it helps, some security experts argue.
Persecution of Barrett Brown offers chilling preview of cybersecurity proposals
"project illustrates which companies track us when we read the news online, where our data travels to and how our data is handled everytime we access a media website"
|