Create an Account
username: password:
 
  MemeStreams Logo

the nexus of the information universe

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
the nexus of the information universe
Topic: Miscellaneous 7:42 am EST, Jan 29, 2015

Assaf Regev:

Of the 2.3 billion smartphones around the globe, Kindsight Security estimates that 40 percent of them contain spyware used to monitor the phone's owner by tracking the device's location, incoming and outgoing calls, text messages, email, Web browsing and history.

Natasha Singer:

Verizon is now at the forefront of telecommunications companies selling intelligence about their customers to advertisers. The ad-targeting experiments by Verizon and AT&T are striking examples of the data-mining opportunities open to phone carriers now that they have become the nexus of the information universe, providing a connection to the Internet for people anywhere they go, at any time.

Jonathan Mayer:

There are widespread collateral consequences from Turn's zombie cookie.

EFF:

Eighteen pages of amendments to the Counter-Terrorism and Security Bill would grant the UK government sweeping new powers to compel telecommunications companies to harvest and store data collected on their users, and for police and intelligence companies to obtain and analyze that data without warrants or effective oversight.

Qualys:

The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to remotely take complete control of the victim system without having any prior knowledge of system credentials.

During our testing, we developed a proof-of-concept in which we send a specially created e-mail to a mail server and can get a remote shell to the Linux machine. This bypasses all existing protections (like ASLR, PIE and NX) on both 32-bit and 64-bit systems.

The first vulnerable version of the GNU C Library affected by this is glibc-2.2, released on November 10, 2000.

Jen Ellis:

We are frequently more comfortable pointing out weakness and failures than recommending solutions. We must move beyond this if our industry is to survive, and if we ever hope to create a more secure ecosystem.

Zuo Xiaodong, vice president of the China Information Security Research Institute:

We're under the yoke of others. ... We're breaking away from these types of circumstances.



 
 
Powered By Industrial Memetics
RSS2.0