Leadership Think ...
Follow
Find tag "Privacy at danger!"
45.5K views | +9 today
Leadership Think Tank
Educational leadership in action
Curated by Aki Puustinen
Your new post is loading...
Rescooped by Aki Puustinen from 21st Century Learning and Teaching
Scoop.it!

Hey, Glasshole: That cool app? It has turned you into a ===> SPY DRONE <===

Hey, Glasshole: That cool app? It has turned you into a ===> SPY DRONE <=== | Leadership Think Tank | Scoop.it
Google Glass spyware can use users as surveillance drones

 

Security researchers have created prototype Google Glass spyware that is capable of snooping on everything the user is looking at without tipping off victims that anything is amiss.

 

Mike Lady and Kim Paterson – graduate researchers at California Polytechnic San Luis Obispo – created an app that takes a picture every 10 seconds a Glass display is active – before uploading the information to a remote server.

 

This all happens in the background without giving the wearer any indication that images from the hi-tech specs are being "live-streamed".


The scary thing for us is that while it’s a policy that you can’t turn off the display when you use the camera, there’s nothing that actually prevents you from doing it,” Paterson told Forbes.



Via Gust MEES
more...
Gust MEES's curator insight, March 25, 9:19 AM


This all happens in the background without giving the wearer any indication that images from the hi-tech specs are being "live-streamed".


The scary thing for us is that while it’s a policy that you can’t turn off the display when you use the camera, there’s nothing that actually prevents you from doing it,” Paterson told Forbes.


Rescooped by Aki Puustinen from 21st Century Learning and Teaching
Scoop.it!

How Thieves Use Social Media To Rob You

How Thieves Use Social Media To Rob You | Leadership Think Tank | Scoop.it
Thinking of tweeting about an upcoming holiday? Don’t. Thinking of sharing a photo of your latest grand purchase? Don’t. Thinking of checking in at the airport before your vacation? Don’t.

Via Gust MEES
more...
Javier M - Axioma WebLab's curator insight, August 1, 2013 6:34 PM

Take note of this info !.

MeeMetICT's curator insight, October 14, 2013 11:04 PM

Met de vakantie voor de deur wel even de moeite om te bekijken.

Carmenne K. Thapliyal's curator insight, October 14, 2013 11:36 PM

An infographic with some important information we can share with students

Rescooped by Aki Puustinen from 21st Century Learning and Teaching
Scoop.it!

Cyber Arms Race: Mikko Hypponen at TEDxBrussels

In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TED...

Via Gust MEES
more...
Rescooped by Aki Puustinen from 21st Century Learning and Teaching
Scoop.it!

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims | Leadership Think Tank | Scoop.it
"Black-box" testing uncovers several ways the NSA could tap the popular service.

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 


Via Gust MEES
more...
Gust MEES's curator insight, June 26, 2013 2:39 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.


                         ===> Nobody Is Perfect!!! <===


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, June 26, 2013 2:42 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, June 26, 2013 2:50 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security