Submitted by acohill on Thu, 04/05/2012 - 08:02
A lot of new phishing schemes are popping up....a family member mentioned that she got an email "from US Airways" telling her to check in for a flight....I've gotten hundreds of those in the past week.
Submitted by acohill on Tue, 01/31/2012 - 15:18
I had to read the first sentence of this article twice because I thought it must be a joke:
Teens, after being friended by parents, grandparents, aunts and uncles on Facebook, have moved to Twitter to get a little more privacy.
Trading Facebook for Twitter? Really?
Submitted by acohill on Tue, 01/31/2012 - 14:00
A guy named Jake Reilly dropped all electronic communication, including the phone, for ninety days, calling it "The Amish Project." This story is really interesting, as he ran into all sorts of logistical challenges, some of them amusing. For example, he'd meet a girl in a bar, she would give him her phone number, and he'd have to explain he could not call her. And the girl would think he was lying to avoid telling her he did not like her.
Submitted by acohill on Thu, 11/17/2011 - 11:45
Submitted by acohill on Tue, 08/30/2011 - 14:34
The National Security Agency has released a very nice set of tips for managing desktop computers and home and small office network devices like routers and wireless base stations. Here is the link, and I have attached it to this article.
Submitted by acohill on Thu, 07/14/2011 - 09:32
I just got an invite to Google+, the new Facebook-like offering from Google. So I created an account, and at first glance, I would say Facebook and LinkedIn have a lot to worry about. Note, however, that Google has a very mixed track record of success outside search and mapping. Anyone remember Orkut? It never caught on the U.S., although it has been successful in some other countries like India. If Google can do a better job of supporting business-oriented uses of Google+, both Facebook and LinkedIn will have to work very hard to keep their customer base.
Submitted by acohill on Thu, 06/09/2011 - 09:46
PCWorld calls what Facebook is doing with facial recognition "creepy." The social networking site has rolled out facial recognition software that tries to tag photos with your face in them without asking permission.
Submitted by acohill on Wed, 05/11/2011 - 10:27
So Microsoft has purchased Skype and will integrate voice communications into various MS hardware and software products. The company paid an enormous amount of money for Skype ($8.5 billion), which is a projected future value of the voice communications firm. Microsoft obviously hopes to monetize what they bought, but what did they really get? VoIP technology is hardly cutting edge, and Microsoft has plenty of smart software folks that could cough up equivalent software in short order.
Submitted by acohill on Wed, 04/27/2011 - 09:36
I have waited a bit to write about the hoo-ha surrounding the accusation that Apple and Google were tracking user locations via GPS information stored in iPhones and Android phones. I suspected there was more to the story than was being cited in the news. And I was right. Apple has released a Q&A that explains what is going on, and it is indeed benign. Note that this applies only to Apple--I have not seen a similar statement from Google, although it is likely to appear soon.
Submitted by acohill on Sun, 02/06/2011 - 11:45
SandMonkey, a prominent Egyptian blogger who was briefly detained by Egyptian security forces, advocates that opponents of repressive regimes should store all their documents, writing, and information (e.g. email addresses and data on compatriots) on a cloud-based service located in a different country. That way, if a laptop is confiscated, there are no incriminating documents on it.
Community news and projects:
Submitted by acohill on Sat, 02/05/2011 - 08:30
It was inevitable that someone would see a business opportunity by providing private search. Starting Page is a search engine that promises to keep your searches private, unlike Google, Bing, and others that build dossiers on what you search for. The search data is sold to third parties and is also used to target ads. I've written recently about how an hour of searching for camping items resulted in weeks of ads about camping stuff.
Submitted by acohill on Thu, 12/16/2010 - 15:15
The Sixth Circuit Court decision on email being protected by the Fourth Amendment contains the fascinating story behind the, uh, "male enhancement" product called "Enzyte" and the infamous Smilin' Bob character who appeared in the annoying late night TV commercials. The entire document runs 98 pages, but pages 4 through 12 describe in detail how a $250 million a year complete scam is set up and run. And yes, if you don't bother to read the decision, the short story is that Enzyte was a scam from beginning to end.
Submitted by acohill on Thu, 12/16/2010 - 14:51
Freedom to Tinker reports that the U.S. Court of Appeals for the Sixth Circuit has ruled that email is protected by the Fourth Amendment. The Fourth Amendment requires a search warrant issued by a judge before law enforcement officials can search premises, and has long been applied to opening sealed paper mail.
Submitted by acohill on Tue, 10/19/2010 - 16:55
The Wall Street Journal has an article about issues with the way third party Facebook apps (e.g. FarmVille, HoldEm Poker, others) are grabbing personal information even though they are not supposed to be doing so. Facebook officials said they are clamping down to ensure that the 500 million Facebook users are protected.
Submitted by acohill on Wed, 09/29/2010 - 17:39
In a story that has been simmering for a while, the New York Times reports that the Feds want to be able to easily wiretap a wide variety of Internet services, including Skype, Facebook,and Blackberry (RIM) communications.
Submitted by acohill on Mon, 09/13/2010 - 11:45
All these location-aware devices we have now with GPS capabilities are turning out to be a boon for crooks. Here is how it works: people go on vacation, take pictures with their location-aware iPhone or Android phone, and upload the picture to Facebook with the exact location conveniently added in. Crooks browse Facebook pages, find someone on vacation a long way from home, and then head over to your house for a leisurely romp through your belongings.
Submitted by acohill on Mon, 07/26/2010 - 10:37
The InterTubes are a a-flutter with articles about Wal-Mart's plans to use RFID smart tags on clothing. The little tags are readable via wireless handheld devices, and the new system will allow Wal-Mart to manage inventory better. Every article I have read, including this reasonably well-balanced one from USA Today, talks about "privacy concerns." But USA Today, near the end of the article, provides the necessary information to understand just how big the privacy threat is: not very big.
Submitted by acohill on Wed, 05/05/2010 - 09:49
Congressman Rick Boucher (D) of Virginia's Ninth District has proposed an Internet privacy bill, which is co-sponsored with Cliff Stearns (R) of Florida. The bill has critics from both the business community and consumer advocates, which suggests it probably strikes the right balance as a place to start. I am constantly amazed at how casually people give up personal information like their birthdate, street address, and other information just to get some "free" service (e.g. Facebook).
Submitted by acohill on Fri, 02/12/2010 - 09:34
The Intertubes have been buzzing for the past couple of days with what is actually a very modest announcement from Google that the company wants to play around with community fiber. Google wants to find out what people do when they have a fast connection, and what kinds of services they might be able to give away or sell if everyone has those kinds of connections.
Submitted by acohill on Thu, 09/24/2009 - 11:08
A ComputerWorld article reports on a study that says social networking sites like Facebook are "leaking" personal information that allow third parties to tie Web browsing habits to specific individuals. The study looked at 12 different social networking sites and was able to determine that 11 of them were intentionally or unintentionally making it possible for third parties to tie your viewing habits to you personally.
Pages