“I am thankful for the strong mentorship, guidance, and support, which is empowering me to follow my dreams and show that you don’t have to be an engineer to be a hacker.”
Archive for 2011/08/04
Randi Zuckerberg: “My goal is to launch my own innovative programming and work with media companies to develop their programming in new, and more social ways. In attacking this challenge, Facebook will clearly be a central element in all of my projects. I plan to demonstrate that ANYONE can do groundbreaking media work on the platform. And to the extent it makes sense for you, I’d be happy to advise Facebook on media projects, ‘Facebook Live’ or other initiatives if it is desired.”Posted: 2011/08/04 in Education / Awareness, Tech Evolution
Cybercrooks exploit interest in Harry Potter ebook site – a variety of scams designed to either defraud, infect or otherwise con would-be victimsPosted: 2011/08/04 in Cybercrime, Education / Awareness
- Cyber-tricksters are offering to pre-register users as well as buying or selling accounts via eBay
- Scammers are punting supposed account access as a “download” via YouTube
- Interest in the Pottermore site is getting abused as part of a search engine poisoning scam designed to trick Potter fans into scareware portals that run bogus scans of surfers’ PCs in an effort to fool them into buying fake anti-virus software
Book release – Free Ride: How the Internet Is Destroying the Culture Business and How the Culture Business Can Fight BackPosted: 2011/08/04 in Copyright, Education / Awareness, File Sharing, Illegal File Sharing
‘On the one hand information wants to be expensive, because it’s so valuable. The right information in the right place just changes your life. On the other hand, information wants to be free, because the cost of getting it out is getting lower and lower all the time. So you have these two fighting against each other.’
So said the influential technologist Stewart Brand at a 1984 hacker convention. Not only did his words evolve into a media business mantra that has shaped the internet as we know it today but the conflict which he predicted has led to a revolution in the way that our culture is disseminated and consumed.
Video of the Keynote conversation “Taking control of the digital challenges” with Robert Levine
US author and business journalist Robert Levine offers some food for thought in this keynote conversation. In his forthcoming book Free Ride – How the Digital Parasites Are Destroying the Culture Business, and How the Culture Business Can Fight Back (Random House) Levine provides an alternative view to the ‘internet-is-free’ discourse and delivers a call-to-action to content owners.
With Layar Vision, digital experiences are launched from visual triggers like magazines, posters and newspapers. Layar Vision uses computer vision techniques to augment objects in the physical worldPosted: 2011/08/04 in Education / Awareness, New Business Models, Tech Evolution
New service will be called Pathé at Home.
Dutch language news article: http://www.emerce.nl/nieuws/path-begint-verhuur-films-via-tv-computer-pads
NSA is looking for a few good hackers – trying to recruit hackers who by definition want to defy authoritiesPosted: 2011/08/04 in Education / Awareness, Public Policy
It doesn’t even take a Gizmodo-style enhance to spot the square of Nicorette gum sitting on The President’s deskPosted: 2011/08/04 in Education / Awareness
The Consumerist reports that someone broke into the Hershey’s server and messed with a recipe on their site. No word on which one, though, and they state there was no indication of consumer info being compromisedPosted: 2011/08/04 in Cybercrime, Education / Awareness
Clearwire, the biggest cheerleaders for WiMax mobile broadband, revealed their intent to support the competing LTE standard as well. Did the 4G wars just end?Posted: 2011/08/04 in Education / Awareness, Mobile tech
Microsoft is courting security experts with a $200,000 cash prize for the person or team who can design the best defensive tactic against hackingPosted: 2011/08/04 in Cybercrime, Education / Awareness
aims to create the “largest online marketing solutions company
“In the future, [new] capabilities could enable a digital personal handler via a device wired into your glasses…[it would see] what you see [and] constantly pull data from the cloud and whisper information to you during the day–telling you who people are, where to buy an item you just saw, or how to adjust your plans when something new comes up,” Intel said in a statement.
A new study by researchers from Copenhagen Business School and the University of Waterloo explores the magnitude of game piracy on public BitTorrent trackers. The researchers tracked 173 new game releases over a three-month period and found that these were downloaded by 12.7 million unique peersPosted: 2011/08/04 in Education / Awareness, Illegal File Sharing, Stats / reports
Senior executives have told Music Week the music industry has been refining its strategy as it followed the case, brought by the Motion Picture Association. The music industry’s strategy is now decided and Music Week understands the BPI will now use the 97A precedent as part of its arsenal against illegal websitesPosted: 2011/08/04 in Copyright, Education / Awareness, Enforcement, Illegal File Sharing, Jurisprudence
The first likely step, which could be just days away, will be to ask ISPs to block some of the biggest illegal websites.
Another day, another Perfect 10 case: just showing copyright infringement no longer means a presumption of irreparable harmPosted: 2011/08/04 in Copyright, Education / Awareness, Jurisprudence
We found a way now to give everybody the ability to extract software out of smartcards. The software recognizes structures on chips, traces the connections between them, and pieces together the algorithms implemented by the circuitsPosted: 2011/08/04 in Education / Awareness
Nohl said the tools are intended to make it easier for software experts to assess the security of chips stored on credit cards and other types of smartcards
Apple just gave the Apple TV the ability to stream past iTunes TV purchases directly from Apple, but that could just be the beginning of a new service called iTunes ReplayPosted: 2011/08/04 in Education / Awareness, New Business Models, Tech Evolution
A researcher at Black Hat has revealed a slew of vulnerabilities in Siemens industrial control systems, including hardcoded passwordsPosted: 2011/08/04 in Education / Awareness, Network Security
“Keep the girls under 13, in fact, I really need to see 12 or younger to know your [sic] a brother,” and “Don’t avoid nudity in previews. I will NOT accept you, if theres [sic] no nudity.”Posted: 2011/08/04 in Cybercrime, Education / Awareness, Enforcement
In addition, the most exclusive area of the site was reserved for members who could provide content that showed children suffering. “If the girl looks totall [sic] comfortable, she’s not in distress, it does NOT belong I [sic] this section.”
“Using sophisticated methods to evade detection by law enforcement, Dreamboard members allegedly used the power and anonymity of the Internet to motivate each other to commit their horrific acts of sexual abuse of minors and trading in child pornography,” announced Attorney General Eric Holder in a speech today. “No matter how savvy online predators think they are, we will find them, dismantle their networks, and bring them to justice.”