“But they, in many cases, have ignored the consequences of some of the downsides of the innovations they brought to our society”.
In a talk to the Stanford Graduate School of Business, Palihapitiya said he feels ” tremendous guilt ” about Facebook , a company he helped craft as vice president for user growth between 2007 and 2011.
“Researchers hypothesize that reading about others online might lead to negative social comparison “, wrote Facebook director of researcher David Finsberg and research scientist Moira Burke, “and perhaps even more so than offline, since people’s posts are often more curated and flattering”. This is a global problem.
There was “no civil discourse, no cooperation, misinformation, mistruth and its not just an American problem, it’s […]
Elliot (Rami Malek) in Mr. Robot Season 3, Episode 9. (USA Network Photo) [Spoiler Alert] This article delves deep into the technical guts of Mr. Robot episode 9. Though it focuses on the show’s hacks, it might describe key plots points too. Only continue if you’ve seen the latest episode.
LATEST IN A SERIES : Corey Nachreiner, CTO at Seattle-based WatchGuard Technologies , is reviewing episodes of Mr. Robot on GeekWire. The show airs on USA Network on Wednesdays at 10 p.m. Join the conversation on Twitter using #MrRobotRewind, and follow Corey @SecAdept .
Hello Friend. Hacker Elliot is back!
After a short flashback scene, this episode starts where the last left off; with Elliot considering the implications of Trenton’s email. He needs to hack the FBI if he wants to get his hands on Romero’s hardware keyloggers. Only, it seems Mr. Robot is up to some hacks of his own…
blvdone/Shutterstock.com LOS ANGELES – Four years ago, cybersecurity operations for the city of Los Angeles were divided between four centers that didn’t regularly share information with each other. When they did communicate, it was a managed through phone calls and emailed spreadsheets.
Cybersecurity awareness among the city’s 48,000 employees was mixed. Protections at the city’s 40 departments were hit or miss. Top department officials often didn’t know all the computer systems they were running, making it impossible to defend them.
Despite these deficiencies, LA was a high-tech city and believed it was reasonably well defended. “We thought we were secure, but we just didn’t know,” the city’s Chief Information Security Officer Timothy Lee told Nextgov this week.
The truth, Lee said, was […]
The hacker group Anonymous issued a threat against quite a few U.S. government targets including state.gov, whitehouse.gov, data.gov, ssa.gov, federal reserve.gov, and usa.gov. Needless to say, those include websites of some of the most prominent government entities in the United States. The threat is made to protest America’s foreign policies concerning the Middle-East.
The text for the threat appeared on the blog of the website cyberguerilla.com on Dec. 7, and it reads thus:
“Government of Israel and United States, our patience is exhausted!
No more words! Now only acts.Anonymous can’t be silent when we see your actions.Now it’s Anonymous time.United State and Israel Government Target list. ( Main Attacks: Data Dump , Government Breach , Defacing , DDoSing )Targets:https://www.usa.gov/ = USAhttps://www.gov.il/ = […]
In the recent past #censorship was big debate on social network; these days many accounts are deactivated or blocked by the social network authorities. In general, censorship in India, which involves the suppression of speech or other public communication, raises issues of freedom of speech, which is protected by the Indian constitution. A classic example of censorship in India is the Central Board of Film Certification or Censor Board, which comes under the purview of Ministry of Information and Broadcasting. The Board regularly orders, directors to remove anything it deems offensive or subjects considered to be politically subversive. The censorship of films is governed by the Cinematograph Act, 1952. It assigns certification as Universal, Adults, and Parental Guidance to films in India before public exhibition.
Censorship has become a weapon in the hands of the State to make people agree with its ideology. Now is the time to look into the role that can be played by healthy criticism, analysis, and cinema literacy, posts, cartoons, blogs or tweets rather than relying on controllers that acts as a moral police, stopping the dissent. Information technology seems to be the latest weapon of waging proxy wars. Countries have borders and restrictions to each other’s jurisdiction, but cyber space has no boundaries. Recent NE exodus was a disastrous moment for Indian citizens and government. With 2-3 online users and couple of hours of editing work, various groups were able to trigger the most massive internal exodus of people in India and nationwide protests. Most of the public, who does this, assume that they do this with a false sense of secrecy.
While Cyber War between India and Pakistan is not new, it was limited to hacking of each other’s websites. Interestingly, this time it may not have been carried out by so called hackers. Since then it was easy to spread hatred than to block websites, the whole episode would have been carried out by 4-5 Social Media addicts. The law is there to prevent this, but enforcement is far from adequate. There are many such instances and evidences that one country rages its anger or one particular religion condemns another religion hurting its sentiments online. The fact that there is proof of some Pakistani organisations uploading obnoxious and provocative stuff on the Internet, leading to the exodus of people of the northeast from Bangalore, Chennai, Hyderabad and other cities, shows that some elements from across the border want to knock off balance of our country. To prevent their designs we, people, should defy such provocations. In the wake of the Assam riots, the rest of the country should have stood together to condemn all forms of violence. But we did not do so. It was our prejudice and lack of unity that contributed to the success of the mischief-mongers. To control the situations and stabilise country, government opted for censorship. There is no point in blaming the government. At least the educated should take pains to verify the truth. Pointing a finger at Pakistan will not solve the problem. The crisis has brought the social media to the forefront, relegating the print and electronic media to the background. Perhaps it is one more revolution in the history of mankind. It is clear that people today believe in non-stop, one-to-one communication or conversation, rather than the mass media.
Anyways time being censorship might help controlling situation but this will remain as superficial treatment of the problems that country is facing. Making the people aware of the “cyber threat” is need of an hour but censorship can’t be the exact way out. India really requires proper systems to be adopted in order to be safe or else this might really create big disasters in the future. In the information age we cannot lock our cyberspace because it is among one of the main tool for the sustainable development of the state. But curbing of cyber attack in any form either cyber war or putting illegitimate material on the web has really become necessary around the globe. Though we are having strict policies but still we are not guarding our information web properly and which has caused the NE exodus type events. Technology can be a great rescuer, but can it sometimes be a public menace?
The Indian government has earlier blocked around 250 websites, ordered Google and Facebook to pull content, threatened legal action against Twitter if it doesn’t delete certain accounts, and has arrested several people for sending provocative text messages, all in the name of public safety. Despite the government’s persistence may not be as clear-cut as a case of state domination and over-reach. It turns out that the Indian government might be right to fear that technology, for all the very real benefits it’s brought India, could also be helping to magnify ancient communal tensions in a way that costs lives and, perhaps even worse, might destabilise the delicate social balance within the world’s second-largest country. Technology didn’t cause any of this, of course. But social media and text messaging, both of which are becoming increasingly common in reaches of India’s enormous lower and middle classes, accelerated the flow of rumours and of inflammatory images. The government, unable to counter the destabilising rumours, shut down some of the means of their dispersal. Whether or not the Indian government’s censorship does anything to calm this crisis, their apparent desperation is understandable. Still, India’s willingness to censor the web is part of the government’s longer-running effort to standardise the Internet, to which western governments and web freedom advocates have persistently objected. Some of India’s sweeping restrictions compel web companies like Google and Facebook to self-police, and then self-censor, any content that could be perceived as profane or offensive to ethnic groups. Web freedom activists distinguish this as little more than an excuse for online authoritarianism, and they’re probably often correct. We cannot isolate ourselves from this but can make a safe distance to access genuine information. And parallel system need to strict its security norms so that any state against information and data is not in the reach of common citizen of the country.
Being a person from Cyber Security, I know how much it is simple for us to fool the inexperienced people on internet and then use those resources to do something illegal and improper. There should be a body which will not only work towards security of cyber crime in government and Militant organisation but also work towards enforcement of awareness of cyber crime. It is always better to take precautions. Rapidly increasing two-edged sword, Social media has created a vibrant online community and widened public discourse, allowing a platform for activists with thousand causes. On the flip side, it has also become a vehicle of skewered misinformation. The prospective of an individual using a social networking site in an enigmatic manner is much more in a social networking site than in a social media. There is no procedure for registration and ownership. And so there is no way to pin down the culprits.
Intelligent transport is no longer a pipe dream with smart cars popping up all over the show. However, as technology advances, so too does the chance of cyber criminals to hack systems and cause chaos, writes ANVEE ALDERTON, Channel Manager, Trend Micro Southern Africa. Smart cities are coming, and they are no longer a pipe dream or an idea for fiction anymore. With the speed of technological developments, and the greater connectivity globally, we may soon see smart cities everywhere.
We may not be seeing this right now in South Africa, however there will be a time when they will become part of our landscape. We are seeing more connected cars and autonomous vehicles appearing and being successfully adopted. With […]