asterisk2a + dau   11

Cyberangriff auf Bundestag: Offenbar auch Rechner von Regierungsmitgliedern betroffen - SPIEGEL ONLINE
[ if they were able to install a trojan/malware/bot - it is most likely to be the case of highly customized targeted phishing attack on peoples email address. could be gov backed. most likely (Israel, China, USA, UK, Russia, ...) New/customized, not recognizable by existing signatures known - thus antivirus useless, only recognizable by looking at logs and co. ] Fachleute halten es sogar für möglich, dass weite Teile der Bundestags-IT komplett neu konfiguriert werden müssen. [...] Sicherheitshalber wurden Ende vergangener Woche Teile des Bundestags-Systems zeitweise heruntergefahren. Darunter fielen offenbar auch Laufwerke des Parlamentarischen Untersuchungsausschusses zur Aufklärung der BND/NSA-Spionageaffäre. <<< [ Frage fuer die BPK wie kompetent sind Bundestagsabgeordnete? Sicherheitstraining? ] // 1 Tag spaeter bit.ly/1IPJmK7 Ermittler vermuten Geheimdienst hinter Cyberangriff &! bit.ly/1LcaCBI Die Bundesregierung zerstört aktiv [...] vertrauen. &! tcrn.ch/1R4xrLu bit.ly/1LpTngO
cyber  war  corporate  espionage  industrial  espionage  cyber  espionage  cyber  crime  cyber  security  cyber  attack  Germany  DAU  phishing  IT  password  security  GroKo  Career  Politicians  Angela  Merkel  trust  confidence  No  Representation  Vorratsdatenspeicherung  surveillance  state  Orwellian  BND  Internet  Privacy  Privacy  corruption  abuse  of  power  apathy  Protest  Kultur  short-term  thinking  short-term  view 
may 2015 by asterisk2a
Men Blaming Jennifer Lawrence & Kate Upon for Nude Pics Leak, Hate NSA Spying - YouTube
http://techcrunch.com/video/samsung-gear-icloud-hacks-and-sarah-goes-to-burning-man/518402327/ - "Samsung Gear, iCloud Hacks And Sarah Goes To Burning Man - September 5, 2014" +++ !!! >>> http://betabeat.com/2014/09/spare-us-the-sanctimony-the-gross-hypocrisy-of-online-media-in-the-nude-photo-leak/ >> via http://www.reddit.com/r/TrueReddit/comments/2ffxoj/spare_us_the_sanctimony_the_gross_hypocrisy_of/ "No one complained about the release of Pam Anderson's wedding sex tape. No one complained about the relase of Scarlett Johansson's pics. People mocked Anthony Weiner, people mocked Hulk Hogan. I mean honestly, mocking? You are not offended for them? You are not hurt, you are really honestly mocking them? But if it suddenly happens to some one you happen to like then its awful and horrible and no good." +++ WORLD NEEDS MORE FEMALE HACKERS - youtu.be/UrsJHB8C36Q +++ wrd.cm/1q8LJiP +++ bit.ly/1wcMZSB +++ !!! bit.ly/1xqBDPb !!!
n00d  Celeb  Trading  Ring  Celebgate  AnonIB  4chan  Reddit  Apple  user  experience  imgur  Celebrity  of  You  culture  gossip  culture  gossip  status  anxiety  status  symbol  social  status  The  Fappening  TheFappening  Sexual  objectification  objectification  darknet  iCloud  rippers  Misogynie  misogyny  feminism  feminist  revenge  porn  society  consent  Privacy  Internet  Privacy  DAU  victim  blame  blamegame  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  engineering  phishing  brute  force  attack  slut  shaming  everyday  sexism  sexism  sexismus  sexualität  Intimate  relationship  hypocrisy  Daily  Mail  News  Corp.  Gawker  Tabloid 
september 2014 by asterisk2a
After celebrity nude leaks, Apple is finally taking security a little more seriously | PandoDaily
Now it seems that Apple is at least attempting to make its efforts to fix obvious security problems with its service a little easier to understand. I’m sure that has more to do with the allegations that it was responsible for the reprehensible leak of stolen nude photographs than with a new sense of responsibility to consumers, but we’ll have to take what we can get. Maybe the lesson will stick and the company will decide to be a little more forthcoming in the future. There is no reasonable expectation of perfect security in modern society, but we can at least strive for transparency from companies like Apple when our privacy is threatened. Better to know that something can’t be kept secure than to think it’s safe and remain ignorant of any threats.
n00d  Celeb  Trading  Ring  Celebgate  AnonIB  4chan  Reddit  Apple  user  experience  imgur  The  Fappening  TheFappening  iCloud  rippers  Privacy  Internet  Privacy  DAU  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  Social  engineering  phishing  brute  force  attack  communication  PR  public  relations  language 
september 2014 by asterisk2a
Fappening: Lawrence, Dunst, Upton - Nacktbilder von Promis - SPIEGEL ONLINE
Schon wieder sind die Frauen schuld. Dabei erklärt sich die Tatsache, dass weniger Männer-Nacktbilder durch das Netz geistern, vermutlich nicht allein dadurch, dass die Herren der Sicherheit von Apple weniger vertraut haben und bessere Schutzsysteme hatten. Sondern durch die Tatsache, dass die nackten Männer kaum jemanden interessieren. Ein nackter Mann ist ein nackter Mann. Ein Bild von einer nackten Frau, das sie angreifbar macht, ist für viele ein Grund, sich daran aufzugeilen und einen Kommentar abzugeben. Und dann ist da noch die große Frage, die über der ganzen Debatte schwebt: Warum nehmen sich Menschen überhaupt nackt auf? Für viele eine klare Sache: Eitelkeit. Entsprechende Kommentare sind von Häme durchdrungen. Sie missachten, dass Frauen nicht zwangsläufig Nacktbilder aufnehmen, um einem Mann einen Gefallen zu tun. Für viele sind sie Ausdruck, dass ihr Körper, ihre Sexualität, ihnen gehört. Sie machen Aufnahmen von sich und für sich.
n00d  Celeb  Trading  Ring  Celebgate  AnonIB  4chan  Reddit  Apple  user  experience  imgur  Celebrity  of  You  culture  gossip  culture  gossip  status  anxiety  status  symbol  social  status  The  Fappening  TheFappening  Sexual  objectification  objectification  darknet  iCloud  rippers  Misogynie  misogyny  feminism  feminist  revenge  porn  society  consent  Privacy  Internet  Privacy  DAU  victim  blame  blamegame  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  engineering  phishing  brute  force  attack  slut  shaming  everyday  sexism  sexism  sexismus  sexualität  Intimate  relationship 
september 2014 by asterisk2a
A Letter To Jennifer Lawrence | TechCrunch
If I and other industry reporters like Mat Honan don’t know how exactly to absolutely protect ourselves, because the targets and tools are always changing, how will people who don’t have our exposure to tech? The onus is on Apple and other tech platforms like Google, Facebook, Amazon and Microsoft to keep their customers — us — safe. Though stolen photos are being shared that have been extracted from Android and Windows Phone backups, too, I’m singling out Apple here because Apple, beyond any other tech company, prides itself on a seamless consumer experience. It’s done a very good job of hiding the technical aspects of its products for the sake of user friendliness: “It just works.” Well, not in this case. +++ !!! http://www.huffingtonpost.com/2014/09/03/seth-green-huff-post_n_5761508.html + huff.to/WbN24c
n00d  Celeb  Trading  Ring  Celebgate  AnonIB  4chan  Reddit  Apple  user  experience  imgur  Celebrity  of  You  culture  gossip  culture  gossip  status  anxiety  status  symbol  social  status  The  Fappening  TheFappening  Sexual  objectification  objectification  darknet  iCloud  rippers  Misogynie  misogyny  feminism  feminist  revenge  porn  society  consent  Privacy  Internet  Privacy  DAU  victim  blame  blamegame  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  engineering  phishing  brute  force  attack  slut  shaming  everyday  sexism  sexism  sexismus 
september 2014 by asterisk2a
The Great Naked Celebrity Photo Leak of 2014 is just the beginning | Roxane Gay | Comment is free | theguardian.com
There will always be another leak, because there is always curiosity in the bodies of nude celebrity women. There is always danger in being an Other. [...] It goes without saying that there aren’t many nude photos of men being released. Men are largely free to bare their bodies as they choose without repercussion, unless, as is the case of Dave Franco with Allison Brie and Justin Verlander with Upton, the man happens to be in a picture with a young woman, collateral damage. [...] BREAKING: beneath their clothes, celebrities are naked. What these people are doing is reminding women that, no matter who they are, they are still women. They are forever vulnerable. [revenge porn, rules are different for girls, all happened without consent, it is a crime, like breaking in into someone's home & stealing personal belongings] + bit.ly/1sYcSTO + bbc.in/1qmjnkU "And it's not fair to blame the victims of crime who may have simply been following the instructions websites" + huff.to/Y9V13m
Celebrity  of  You  n00d  Celeb  Trading  Ring  culture  Celebgate  gossip  culture  gossip  status  anxiety  status  symbol  social  status  The  Fappening  TheFappening  Sexual  objectification  objectification  darknet  4chan  AnonIB  iCloud  rippers  Misogynie  misogyny  feminism  feminist  revenge  porn  society  consent  Privacy  Internet  Privacy  DAU  victim  blame  blamegame  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  engineering  phishing  brute  force  attack  Apple  slut  shaming  everyday  sexism  sexism  sexismus 
september 2014 by asterisk2a
Notes on the Celebrity Data Theft | Hacker News
!!! - https://www.nikcub.com/posts/notes-on-the-celebrity-data-theft/ "In reviewing months worth of forum posts, image board posts, private emails, replies for requests for services, etc. nowhere was the FindMyPhone API brute force technique (revealed publicly and exploited in iBrute) mentioned. This doesn’t mean that it wasn’t used privately by the hackers – but judging by the skill levels involved, the mentions and tutorials around other techniques and some of the bragged about success rates with social engineering, recovery, resets, rats and phishing – it appears that such techniques were not necessary or never discovered. [...] Timestamps, forum posts and other data suggests that the collection was built up over a long period of time. [...] In terms of staying secure the most obvious solutions are to pick a better password, set your security answers to long random strings and enable two-factor authentication. [+] ring-fence your email [private & public & communication]."
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers  DAU 
september 2014 by asterisk2a
Bad news for whistleblowers. Secret is far less secret than you think | PandoDaily
Only DAU thinks Secret or Whisper or any other consumer grade app, on a consumer grade tablet or phone, promising keeping them anonymity, uses these apps to 'blow the whistle.' ahhm troll, hate and gossip or even leak stuff. I thought Silicon Valley ppl are smart. No they just know how to code & design ... "to make the world better" ... sort of. “A court order without probable cause or even a subpoena may be enough for law enforcement or for a civil litigant to demand records.“ Conley went on to say that anonymous app companies need to make sure their backend data practices line up with the advertised purpose of their product: “They need to think through their own process. If you are offering a service that is about providing anonymous communication, then if you are retaining their identity and tying it to their communication, then you are kind of undermining the whole purpose of your service.”
Secret  Whisper  anonymity  Internet  Privacy  DAU  Whistleblower  Troll  Trolls  Haters  Hater  culture  VPN  Tor  cryptography  encryption  PGP  TrueCrypt  Smartphone  mobilephone  Silicon  Valley  lowest  common  denominator  social  science  social  study  civic  society  civil  society  Zivilgesellschaft  gossip  culture  gossip  social  society 
june 2014 by asterisk2a

related tags

4chan  abuse  Angela  AnonIB  anonymity  anxiety  apathy  App  Apple  attack  authentication  AWS  blame  blamegame  BND  brute  bullying  business  Career  Celeb  Celebgate  Celebrity  check-ins  CIA  civic  civil  cloud  Cloudstorage  common  communication  confidence  consent  Corp.  corporate  corruption  crime  Crowley  cryptography  culture  cyber  Daily  darknet  DAU  Dennis  denominator  discovery  Dropbox  encryption  engineering  espionage  everyday  experience  factor  Fappening  FBI  feminism  feminist  force  foursquare  Gawker  Germany  gossip  GroKo  Hacking  Hater  Haters  hypocrisy  iCloud  imgur  industrial  integrity  internet  Intimate  IT  Kultur  language  leak  lowest  Mail  Merkel  Misogynie  misogyny  mobbing  mobilephone  model  n00d  News  No  NSA  objectification  of  online  Orwellian  password  passwords  PGP  phishing  Pivot  Politicians  porn  power  PR  Privacy  Protest  public  Purpose  Reddit  relations  relationship  Representation  revenge  Ring  rippers  S3  scam  science  Search  Secret  security  sexism  sexismus  Sexual  sexualität  shaming  short-term  Silicon  Single  slut  Smartphone  social  society  state  status  Store  study  surveillance  symbol  Tabloid  The  TheFappening  thinking  Tor  Trading  Trend  Troll  Trolls  TrueCrypt  trust  Twitter  two  user  Valley  verification  victim  view  Vorratsdatenspeicherung  VPN  war  Whisper  Whistleblower  Yelp  You  Zivilgesellschaft 

Copy this bookmark:



description:


tags: