asterisk2a + hacking   41

Israeli spies 'watched Russian agents breach Kaspersky software' - BBC News
Israeli spies looked on as Russian hackers breached Kaspersky cyber-security software two years ago, US media report.
The Russians were allegedly attempting to gather data on US intelligence programs, according to the New York Times and Washington Post.
Israeli agents made the discovery after breaching the software themselves.
Kaspersky has said it was neither involved in nor aware of the situation and denies collusion with authorities.
Last month, the US government decided to stop using the Russian firm's software on its computers.
The Israelis are said to have notified the US, which led to the ban on Kaspersky programs.
coldwar  cyber  cold  war  hacking  coldwar20  cyberwar  leak  Wikileaks  Israel  Iran  Russia  USA  European  Union  cable  EU  Germany  spying  Lauschangriff  Angela  Merkel  AngelaMerkel  Security  IT  economic  damage 
october 2017 by asterisk2a
John Whittingdale, the dominatrix, and the papers - BBC Newsnight
more trouble for the Tories, adding to the pile. //&! Should Culture Secretary John Whittingdale go? - BBC Newsnight - //&! Labour calls to curb John Whittingdale's powers after escort relationship - //&! How have we found ourselves in this strange situation where privacy campaigners who have pushed for tighter rules are up in arms because the private life of a single cabinet minister was not reported? - //&! The press are right to tread more warily when deciding whether to publish stories about the private life of public figures -
nasty  party  journalism  journalismus  celebrity  culture  John  Whittingdale  BBC  culture  society  phone  hacking  British  Broadcasting  Company  British  Broadcasting  Corporation  austerity  libraries  Public  Services  Social  Services  George  Osborne  TV  Licensing  Fee  Generationengerechtigkeit  babyboomers  injunction  Royal  Family  Daily  Mail  Tabloid  gossip  gossip  culture  Glossy  Magazine  Leveson  Inquiry  sex  worker  sexuality  BDSM  Newspaper  Industry  pageviews  self-regulation  Ofcom  regulation  regulators  Career  Politicians  No  Representation  Conservative  Tories  Whitehall  Toff  Privileged  Establishment 
april 2016 by asterisk2a
Former BBC chief attacks secret government licence fee deal | Media | The Guardian
[ shifting off another item on the balance sheet (welfare budget) off the balance sheet, every dirty little trick. to achieve his set out agenda. onto another one, the public's, british media landscape. less of it. ] Mark Thompson said it is wrong to force corporation to shoulder cost of ‘social transfer’ to over-75s and that charter renewal talks have been acrimonious [...] Giving his his first interview about the BBC since he left in 2012, after eight years at the helm, Thompson said the broadcaster was having to pay for government policy. “It’s welfare … It’s totally inappropriate to use BBC to support social transfer in this country.” When George Osborne tried to impose the same cost on the BBC during negotiations in 2010, Thompson started writing his resignation letter, along with several BBC Trustees. This July the current director general, Tony Hall, agreed to shoulder the burden in return for relief from other costs.
BBC  British  Broadcasting  Company  George  Osborne  nasty  party  Tories  Conservative  David  Cameron  News  Corp.  newscorp  News  Corporation  Rupert  Murdoch  neoliberalism  neoliberal  trickle-down  economics  austerity  Privatisation  phone  hacking  UK  corporate  state  corporate  media  Lügenpresse  propaganda  populism  neoconservatism  neoconservatives  Daily  Mail  Polarisation  Career  Politicians  No  Representation  constituency  babyboomers  general  election  2015  election  campaign  promises  Manifesto 
december 2015 by asterisk2a
Jon Snow: ‘I would defend the BBC to the death’ | Media | The Guardian
but that some media owners had a negative effect on the industry. “I think there has been a negative pull on the British media and I blame some of the proprietors for that. I still think the BBC is pretty good and I would defend it to the death, even though I have never worked for it.” [...] Asked about press coverage of Jeremy Corbyn, he said some of those writing about the Labour leader were “experiencing some kind of fear”, adding: “I think they may need to see a psychiatrist.” He said the biggest issues facing the UK were housing and inequality between the very rich and very poor, adding: “I don’t think there will be a revolution, but it has all the characteristics of what has led to revolution in the past.” [...] [ on Journalism / Covering human tragedy ] He said that while he tries to remain objective, “sometimes when powerful emotions are in play, this can be very, very hard”.
BBC  phone  hacking  Daily  Mail  News  Corp.  News  Corporation  newscorp  Rupert  Murdoch  Tabloid  British  Broadcasting  Company  Tories  Conservative  Party  David  Cameron  nasty  Toff  Establishment  Privileged  culture  George  Osborne  inequality  Gini  coefficient  austerity  fairness  Generationengerechtigkeit  journalismus  investigative  journalism  journalism  pageviews  business  model  publishing  2.0 
december 2015 by asterisk2a
BBC One - Panorama, The VIP Paedophile Ring: What's the Truth?
wikipedia Jimmy_Savile_sexual_abuse_scandal &! Elm_Guest_House_child_abuse_scandal //&! ExaroNews - - corruption within Police related to VIP Paedophile Ring to be investigated &! - BBC Panorama to plan to smear and discredit survivors of child abuse and media outlets like ExaroNews &! THERE HAVE BEEN LEAKS WITHIN MET to BBC/PANORAMA to make PROGRAM!? &! ExaroNews editor-in-chief declined to be interviewed for Panorama Program, because they were out to debunk the 'VIP Paedophile Ring.' claims also two VIP cases are VIP BBC people. &! - according to them, BBC tries to delay publication of the inquiry into its own failings of Jimmy Savile. Could be (according to sources) so damning that it undermines negotiations of BBC Charter Renewal. //&! Political Correctness of Politicians, Police, Social and Public Services let Rotherham, Rochdale, Derby (& across country) happen. &!
Operation  Midland  pedophilia  Westminster  abuse  of  power  Career  Politicians  British  Empire  Establishment  Privileged  Politics  UK  corruption  bribery  phone  hacking  Met  Police  BBC  British  Broadcasting  Company  Jimmy  Savile  society  Justice  System  Law  &  Justice  Gesellschaft  child  abuse  sexual  harassment  sexual  assault  child  pornography  multiculturalism  Political  Correctness  pedophile 
october 2015 by asterisk2a
U.S. developing sanctions against China over cyberthefts - The Washington Post
[ double standard. probably know that they will be outed come time to have e-mailed trade secrets of other nations big companies to their own national companies, even if it is just for infrastructure or defense contract bids ] The White House is getting ready to issue "unprecedented economic sanctions" against Chinese companies and individuals "who have benefited from their government’s cybertheft of valuable U.S. trade secrets," says the Washington Post. But the Post doesn't explain what those sanctions would be, or why the U.S. is going after individual targets instead of the Chinese government itself. One thing that is clear: Chinese president Xi Jinping is scheduled to visit the U.S. next month.
cyber  war  China  NSA  GCHQ  Five  Eyes  IT  Security  Patent  trade  secret  Europe  Germany  corporate  espionage  cyber  espionage  industrial  espionage  presidency  barackobama  Edward  Snowden  Wikileaks  Julian  Assange  bulk  data  collection  FISA  Court  FISAAA  national  interest  Nationalism  protectionism  Security  False  Flag  on  Terror  smoke  mirror  smoking  gun  Russia  Israel  USA  UK  Courts  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Internet  Privacy  Privacy  military–industrial  Hacking  cyber  attack  cyber  crime  cyber 
september 2015 by asterisk2a
Iain Duncan Smith sets his sights on mentally ill benefit claimants | News | The National
TOO many people with __“common” mental health problems__ are reliant on the state, [DWP] Iain Duncan Smith claimed yesterday. The Minister was speaking ahead of a major shake-up of the ESA benefit. He claimed the system was too “binary” and argued people with mental health problems would benefit from working. The SNP said his shake-up would force more people into hardship. In the speech, which was behind closed doors, IDS made no policy announcements, rather policy intentions. [...] [ putting it into the light of abuse of the 'system' >> ] Two absolutes equating to one perverse incentive[.] “This needs to change – things are rarely that simplistic. [ he already cut ESA warg ] &! "how much work can u do till u get treatment" - so much abt speech not being policy. never does he mention the stretched NHS&GP system especially mental health services. Will outsource assessment (profiteering) with quotas 2 meet, business as usual. &!
Iain  Duncan  Smith  benefits  ESA  JSA  mental  health  mental  illness  sickness  benefit  DWP  stigma  prejudice  public  image  public  perception  PR  spin  doctor  David  Cameron  poverty  trap  poverty  George  Osborne  welfare  state  social  safety  net  child  poverty  Disabled  vulnerable  working  poor  precarious  work  Precariat  NHS  austerity  manufactured  consent  propaganda  populism  corporate  media  corporate  state  neoliberalism  neoliberal  snap  judgement  Conservative  Party  social  contract  Career  Politicians  No  Representation  dogma  ideology  social  tension  social  cohesion  fairness  Generationengerechtigkeit  UK  Toff  Establishment  Privileged  Lügenpresse  mainstream  media  media  conglomerate  News  Corp.  News  Corporation  Rupert  Murdoch  phone  hacking  Westminster  journalismus  investigative  journalism  journalism 
august 2015 by asterisk2a
The Traction Book: 5 Steps To Traction & Business Growth
product distribution is part of start-up failure, find and focus 2-3 great distribution channels - test hypothesis what channels should work - evaluate (measure), why or why not, ... figure out what works, [keep moving. if you stop moving, you will fail]. double down on what works. test, test, test. spend time - 50/50 - marketing/product early on. find a great distribution strategy! traction. have goals determin your action. without a goal you cant score. focus on activities that move you forward towards the goal. // Justin Mares, Co-Author, Traction, Startup Grind Ottawa - &! Startup Metrics Toronto December 2014 - Justin Mares on User Onboarding -
book  Start-Up  lesson  Start-Up  advice  traction  growth  hacking  growth  hacker  viral  coefficient  Net  Promoter  Score  Product/Market  Fit  MVP  Core  Product  Value  Proposition  Value  Proposition  Minimal  Viable  Product  marketing  advertisement  affiliate  marketing  content  marketing  Lean  Start-Up  A/B  Testing  marketing  channel  distribution  strategy  conversion  user  acquisition  PR  public  relations  brand  awareness  user  engagement  user  generated  content  user  churn  customer  retention  customer  acquisition 
july 2015 by asterisk2a
Every Company Is A Media Company: Can Journalists Redefine Their Careers? -SVW
Every company is a media company because they have to, they don't have much choice.  // &! There's far less need to add people, which is good because a people-dependent business doesn't scale through technology, e.g., public relations. The traditional media industry is a people-based business and it usually requires additional people to produce additional media. It's not scalable in the same way as a software-based business, by adding more machines. -
Start-Up  lesson  Start-Up  advice  Signal  vs.  Noise  Newsfeed  attention  span  content  marketing  added  value  growth  hacking  growth  hacker  PR  public  relations  feedback  feedback  loop  communication  community  management  The  Wars  marketing  advertising 
may 2015 by asterisk2a
You Need To Be A Billion Just To Make A Million | TechCrunch
[ especially consumer apps being hit driven business, already, that can go out of fashion as quickly as they came, might be a flash in a pan like Secret & work only on the SV/SF ] Competition in the Valley has started reaching a new peak, with candidates demanding all kinds of accoutrements just to change jobs. But it’s not just recruiting that has become more challenging. Sales, marketing, public relations — essentially every task that a startup has to do is just more difficult today given this cutthroat environment. The only way to respond to the higher threshold has been to raise ever more capital, and earlier as well. We now have the rise of the “instant unicorn” that can raise hundreds of millions of capital in just the first months of a company’s existence. That means companies are already worth billions, before they may have made their first million dollars in revenue or gotten their first million users. That’s the new normal, and founders have to be ready to adapt.
Silicon  Valley  San  Francisco  barriers  to  entry  distortion  NIRP  ZIRP  QE  A  Round  Seed  Round  Angel  Investor  hunt  for  yield  Private  Market  competitive  advantage  ecosystem  burn  rate  runway  MVP  Product/Market  Fit  Start-Up  lesson  Start-Up  advice  unintended  consequences  bubble  speculative  bubbles  speculative  speculation  Venture  Capital  Private  Equity  growth  growth  hacking  growth  hacker  structural  imbalance  Impediments  creative  destruction  Unicorn  competitiveness  competition  competitive  Signal  vs.  Noise  allocation  attention  span  New  York  Start-Up  Scene  Silicon  Alley  HR  human  resources 
may 2015 by asterisk2a
Creating an Organic Growth Machine - HBR
How Companies Can Profit from a “Growth Mindset” [...] “Instead of Output, Think About Effort” - // &! Is Your Growth Strategy Flying Blind? -
growth  hacking  growth  hacker  growth  mindset  Start-Up  lesson  Start-Up  advice 
may 2015 by asterisk2a
Enthusiasm vs. Action — Medium
Everybody wants to know the secret to launching a successful business. And, more often than not, any entrepreneur will have the inner dialogue that goes a little something like this: should I be all out there, enthusiastic, getting the word out? Or should I be nose to the grindstone, pay attention to the details, don’t look up? Enthusiasm or action? The truth is, you absolutely need both. I know a lot of people with massive amounts of enthusiasm, but they can’t execute dick. Then, there’s the other side. People that can execute As on every paper, but without that passion, that bravado or fire, they’re only able to get limited return on that investment of execution. // "We are in the glory days of the introverted entrepreneur. Because of technology, there are so many ways to build a company now, talk to people and make connections in the business world; all without leaving your desk."
Start-Up  lesson  Start-Up  advice  execution  introvert  Social  Media  growth  hacker  growth  hacking  marketing  Net  Promoter  Score  word  of  mouth 
april 2015 by asterisk2a
Apple iOS Hardware Assisted Screenlock Bruteforce | Hacker News
So it cuts power before the iPhone can store that a failed attempt occurred. It's such a simple, stupid, wonderful idea. I love it. Kudos to whoever came up with it.
Hacking  white  hat  hacker  black  hat  hacker  security  NSA  GCHQ  Five  Eyes  cyber  security  Privacy  Internet  Privacy  online  security  IT  Apple  password  security 
march 2015 by asterisk2a
Employee Data Breach The Worst Part Of Sony Hack | TechCrunch
Hackers found a file with Sony usernames and passwords called “Usernames&Passwords.” Sony Director of Information Security Jason Spaltro even gave an interview in 2007 whose whole point was to revel in Sony’s security loopholes: “it’s a valid business decision to accept the risk” of a security breach. “I will not invest $10 million to avoid a possible $1 million loss,” he said at the time. This hack is estimated to cost Sony $100 million after all is said and done. The last one cost the company a cool $171 million. &! &!
Sony  hack  black  hat  hacker  leak  Big  Data  Privacy  Internet  Privacy  cyber  security  security  online  security  password  security  Hacking 
january 2015 by asterisk2a
Amazon: Warum Jeff Bezos Milliarden-Verluste kalt lassen - SPIEGEL ONLINE
Die Management-Grundsätze Bezos' sind kein Geheimnis. Als er seine Unternehmensgründung 1997 an die Börse brachte, schrieb er einen Brief an Investoren, in dem er seine Strategie kurz und bündig darlegte und den er seitdem jedem neuen Geschäftsbericht beilegt. Darin findet sich der zentrale Grundsatz, nachhaltig und langfristig zu investieren - also nicht wegen kurzfristiger Gewinne oder um den Aktienkurs zu befeuern. Ein Kernsatz in dem Brief lautet: "Wir werden anstatt ängstlicher mutige Investitionsentscheidungen treffen, wo immer wir es als ausreichend wahrscheinlich einschätzen, Marktführer zu werden. Einige werden sich auszahlen, andere nicht. Dazugelernt haben werden wir in jedem Fall." Gleich darauf folgt die Klarstellung, dass Bezos künftige Cashflows wichtiger sind als Gewinne der Gegenwart.
Amazon  Jeff  Bezos  ROI  cash  flow  Start-Up  lesson  Start-Up  advice  growth  round  growth  hacker  growth  hacking  investment  business  investment  Marktanteile  customer  acquisition  customer  retention  user  churn  user  acquisition  short-term  thinking  short-term  view  long-term  thinking  long-term  view  Wall  Street  oligopoly  oligopol  profit  maximisation  AWS  Wall-Mart  Google  Microsoft  Alibaba  Rakuten 
december 2014 by asterisk2a
Uber Continues To Bleed Cash In India To Pick Up Market Share | TechCrunch
The U.S. company was a relatively late arrival in India, but it has quickly scaled to cover 11 cities and make India its second largest market. Initially lagging behind a handful of local firms, Uber is making its large pile of funding count with a series of eye-catching (and cash-burning) promotions, the latest of which is free rides for anyone in the country between Wednesday and Sunday. &! - >> "Our Sales and Marketing costs are killing us. [...] Hortonworks [...] $33.4 million in total revenue in the first three quarters of 2014, but its S&M costs were $44.6 million in the same period. New Relic, [...] revenues of $63 million in the year before March 31, with $58 million in sales. [...] Box, $124 million in revenue in the year ending January 31, but $171 million in S&M costs. [...] [ Same with FireEye & SalesForce ] [ Other case; Slack w high Net Promoter Score (Product) & mix of B2B and B2C case. &! from a16z
Uber  burn  rate  freemium  business  model  subscription  model  user  acquisition  user  churn  Square  profit  margin  Start-Up  lesson  Start-Up  advice  Venture  Capital  growth  round  Net  Promoter  Score  gross  margins  SaaS  B2B  growth  hacker  growth  hacking  lifetime  value  cost  of  aquisition 
november 2014 by asterisk2a
A third-party Snapchat client has leaked tens of thousands of user photos | The Verge
Hackers release a giant database of intercepted @Snapchat media collected over a yr; the SnapSave app & web client are possible sources; @4chan users are creating a username-searchable db of 13GB of content in what's been dubbed 'The Snappening' + "[ or Snapsave ] What its users didn't realize was that the site was quietly collecting everything that passed through it, storing incriminating Snapchats on a web server, with the usernames of senders attached. [...] Half of Snapchat's users are teenagers between the ages of 13 and 17." - !+ +! &
The  Snappening  cyber  security  Platform  Internet  Privacy  Privacy  Celebgate  security  online  security  Hacking  cyber  attack  TOS  Snapchat  n00d  Celeb  Trading  Ring  4chan  AnonIB 
october 2014 by asterisk2a
Notes on the Celebrity Data Theft | Hacker News
!!! - "In reviewing months worth of forum posts, image board posts, private emails, replies for requests for services, etc. nowhere was the FindMyPhone API brute force technique (revealed publicly and exploited in iBrute) mentioned. This doesn’t mean that it wasn’t used privately by the hackers – but judging by the skill levels involved, the mentions and tutorials around other techniques and some of the bragged about success rates with social engineering, recovery, resets, rats and phishing – it appears that such techniques were not necessary or never discovered. [...] Timestamps, forum posts and other data suggests that the collection was built up over a long period of time. [...] In terms of staying secure the most obvious solutions are to pick a better password, set your security answers to long random strings and enable two-factor authentication. [+] ring-fence your email [private & public & communication]."
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers  DAU 
september 2014 by asterisk2a
Tone deaf Mt. Gox CEO Mark Karpeles warns the world about the dangers of hackers | PandoDaily
"Recent events show that with appropriate motivation anything can be hacked.Maybe everyone should stop and think about what it means for them" - Karpeles tweet would appear to be a reference to the recent celebrity hacking scandal which has seen nude photos of several female stars published online, with extortion request sent to prevent the release of others. (Ironically, many of these demands were for payment in bitcoin.) Even if it weren’t for Karpeles’ track record with alleged hacking attacks, the tweet would nevertheless have been ill-advised. As many other public figures have learned, any hint at victim-blaming in this instance is sure to draw criticism. Combine this with the fact that Karpeles’ nearly bankrupted thousands of people, and this comment warrants a special kind of outrage.
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers 
september 2014 by asterisk2a
Apple - Press Info - Re: Celebgate / The Fappening / 4Chan / AnonIB / iCloud rippers / n00d Celeb Trading Ring "This statement, which probably had several thousand pairs of lawyer eyeballs on it before it was sent to the press, is slippery. [&] iCloud rippers" || From the Statement: "To protect against this type of attack, we advise all users to always use a strong password and enable two-step verification." + @SwiftOnSecurity "Celebrity photo leak being result of an amalgam of targeted attacks instead of 1 iCloud vulnerability explains inconsistent data and leaks." + @pmarca "Subtext for iCloud hacks: "Security questions" are a bad idea -- too easily guessed, particularly for public figures. Known problem!" + @cdixon "Services that repeatedly ask for passwords on mobile devices encourage weak passwords." + - "I’m talking about the fact that people won’t feel the same way about their phones after this." + down as of recently + "Apple is now attempting to distance its service from any fault in the hacks." + +
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers 
september 2014 by asterisk2a
BBC News - FBI investigates 'Cloud' celebrity picture leaks
Posting of celebrity nude pictures leads to FBI investigation - +++ FBI probes celebrity photo leaks - +++ +++ +++ >> 'If people were no complete script kiddies/amateurs, there will be no forensic trail and no real clear picture of how those pictures got stolen from peoples iCloud and other Cloud Services.' +++ News Corp.'s BSkyB Sky News - +++ - "getting people to use passwords this long [14 chars] is a challenge. "It would be nice if we could get most of the population at least as far as eight characters," +++ "celebrities had weak passwords [+] brute force attack [...] We now need to hear from Apple on whether its engineers think that theory holds water. The other key question that needs answering, says Ferguson, is how the hackers obtained the email addresses they would have needed to gain access to the victims' accounts."
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter 
september 2014 by asterisk2a
Here’s What We Know So Far About The Celebrity Photo Hack | TechCrunch ++ ++ ++ - "@ThatSusanBurke You know what's better then leaked nudes? Earning the trust & respect of another human to the point that they share their body with you." ++ "leaker screenshots suggests no mastermind who broke iCloud but a dude named Tristian with too much time on his hands" & "tl;dr is don't take private photos with an iPhone if you have iCloud on" & "Finding out hard way that "iCloud backup" really means what it says, and deleting from device != deleting from cloud" & "[This attack was not just based on iCloud compromise[/weakness/vulnerability]" & 'Some seem to be from Dropbox and S3 too' & ++ !!!"non-expert user"!!! ++ ++ #Consent ++ Pando ++ "n00d Celeb" Trading Ring on AnonIB: ppl trading&helping hack celeb iCloud accounts et al - ++ - Apple is investigating ++
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  n00d  Celeb  Trading  Ring  AnonIB 
september 2014 by asterisk2a
Secret Update Removes Photo Library Access As It Faces Renewed Claims It Isn’t So Anonymous | TechCrunch "Secret CEO: Well...You're Not ALWAYS Completely Anonymous Or Untraceable On Our App" [...] In fact, since Secret started offering a bounty for hackers that alerted the company about bugs in the app in February, it has learned about and fixed 42 different security holes. The numbers are a clear warning: Secret isn't perfectly secure and the term "anonymous" should be taken with a grain of salt. || - Problem saying you are anonymous when in reality you are building off a phone number and address/contacts book >> " the startup founder revealed this was not the first time he’d dealt with a potential threat to uncovering the names behind Secret confessions. [...] While Secret can continue patching in an arms race against hackers, hackers will almost certainly look for ways around the fixes." || || ||
Secret  anonym  anonymity  anonymous  Platform  corporate  values  personal  values  corporate  culture  spoofing  white  hat  hacker  hacker  Hacking  internet  security  app  security  cyber  security  online  security  cyber  bullying  cyber  mobbing  ethical  machine  ethics  morals  moral  beliefs  Troll  Trolls  Haters  Hater  corporate  governance  CSR  corporate  social  responsibility  Venture  Capital 
august 2014 by asterisk2a
The Down And Dirty History Of TMZ
“There’s no doubt: [Harvey] Levin absolutely changed the way celebrities function today.” TMZ has been responsible for breaking the biggest celebrity scandals of the last 10 years: effectively ending a 30-year career (Mel Gibson), tarnishing golf’s most sacred idol (Tiger Woods), and puncturing the pristine image of celebrity royalty (Solange Knowles attacking Jay Z). But it’s not just celebs: In 2009, it caught a bank spending millions of taxpayer bailout funds on a lavish party (Northern Trust), and, via spin-off TMZSports, instigated the $2 billion sale of an NBA team by applying the same surveillance to a racist owner (Donald Sterling) once reserved for the Hollywood stars and socialites.
TMZ  celebrity  culture  celebrity  gossip  culture  gossip  Tabloid  society  Glossy  Magazine  Internet  Signal  vs.  Noise  beauty  industry  beauty  standard  beauty  personal  values  Daily  Mail  corporate  values  corporate  culture  ethical  beliefs  moral  beliefs  human  progress  human  tragedy  frictionless  friction  phone  hacking  News  Corporation  newscorp  News  Corp.  rupertmurdoch  Rupert  Murdoch  Harvey  Levin  Hollywood  Entertainment  Entertainment  instant  gratification  Music 
july 2014 by asterisk2a
The Tulisa Sting Wasn't Just Classist, It Was Informed by a Racism That Associated Her With Criminality | NOISEY
Yesterday Tulisa walked free from a drug trial that had the potential to destroy her career. It was collapsed by a judge who deemed that the reporter who led the sting had lied at a pre-trial hearing. There was always something trap like about it - a cynical show orchestrated to drag a successful woman through the dirt. [...] || & || || || || Guardian - || || || ||
Tulisa  celebrity  culture  investigative  journalism  journalismus  Tabloid  newscorp  News  Corp.  rupertmurdoch  Rupert  Murdoch  WSJ  phone  hacking  ethics  ethical  beliefs  moral  beliefs  corporate  governance  governance  gossip  culture  personal  values  corporate  culture  corporate  values  corporatism  capitalism  society  civic  life  civic  society  civil  society  western  society  News  Corporation  wallstreetjournal  Daily  Mail  UK  humanity  evil  Don't  be  evil  chav  Brand  ethical  machine  labels  label  judgement  prejudice  bias  stereotype  feminism  feminist  Tulisa  Contostavlos  Hollywood  Entertainment  Industry  Entertainment  Music  Industry 
july 2014 by asterisk2a
Newsnight: Stephen Lawrence detective on allegations of corruption and incompetence - YouTube
... in recent times, lots of really really really dirty stuff has been surfaced regarding the Political Class (most of them coming from the 'upper class', having enjoyed expensive, isolated from the world, private education - mingling mostly amongst them selves #toff [ ]), Police & Metropolitan Police ... MI5 & 6 ... and late GCHQ - enjoying lots of freedoms, Justice System, Press (phone hacking and bribery et al), ... and even the BBC (ie Jimmy Savile and Rolf Harris). +++ another example ::
UK  political  science  history  Police  Politics  Phone  Hacking  bribery  corruption  Class  Career  Politicians  governance  culture  Democratic  Process  democracy  Toff  accountability  oversight  Justice  System  moral  beliefs  ethics  morality  ethical  beliefs 
july 2014 by asterisk2a
Hacker Culture: The Key To Future Prosperity? | TechCrunch
I am advocating for governments in every country to recognize that the health of their economies will be increasingly dependent on whether there is a decently paved path for hackers to start companies. Leaders in both the public and private sectors should be asking questions such as: Are there excellent programs to train potential entrepreneurs and angel investors in my country? Do my country’s most talented hackers have a realistic chance to attend a relatively local, high quality accelerator? Is it easy to incorporate and invest in businesses? Is there reliable internet access in my country?

Nations should consider hackers to be a precious resource. The amount of innovation and global prosperity in the 21st Century will be directly proportional to how well we nurture this resource. What do you think is the best solution to ensure that hackers everywhere have the opportunity to become successful entrepreneurs?
mentoring  venturecapital  economics  prosperity  economic-thought  hacker  Hacking  Entrepreneurship 
march 2012 by asterisk2a
British Tabloid, The News of the World, to Close in Hacking Scandal -
The saga turned yet more disturbing Thursday with suggestions that journalists for the paper had broken into the voicemail not only of a 13-year-old murder victim but also of relatives of soldiers killed in Iraq and Afghanistan, and that the paper had paid tens of thousands of dollars in bribes to police officers for information.
The scandal had been taking a toll on the News Corporation, and driving down its stock price. Some advertisers were fleeing The News of the World, and new doubts emerged about Mr. Murdoch’s proposed $12 billion takeover of the pay-television company British Sky Broadcasting, in which he already owns a large stake. Many legislators have now criticized the deal, and it appears unlikely that the government will decide before the end of the summer whether to let it go ahead.
rupertmurdoch  newscorp  scandal  UK  hacking  2011 
july 2011 by asterisk2a

related tags

&  1%  2.0  4chan  24-hour  A  A/B  abuse  accountability  acquisition  add  added  addiction  advantage  advertisement  advertising  advice  affiliate  affirmative  Alibaba  Alley  allocation  amazon  analytics  Angel  Angela  AngelaMerkel  AnonIB  anonym  anonymity  anonymous  anxiety  app  Apple  aquisition  armsrace  arrocance  Assange  assault  attack  attention  austerity  authentication  awareness  AWS  B2B  babyboomers  barackobama  barriers  BBC  BDSM  be  beauty  beliefs  benefit  benefits  Bezos  bias  Big  black  book  brand  bribery  British  Broadcasting  brute  bubble  bubbles  bulk  bullying  burn  business  cable  Cameron  campaign  Capital  capitalism  Career  Casey  cash  Celeb  Celebgate  celebrity  channel  chav  child  china  churn  civic  civil  class  cloud  Cloudstorage  coefficient  cohesion  cold  coldwar  coldwar20  collection  communication  community  Company  competition  competitive  competitiveness  Complex  conglomerate  consent  consequences  Conservative  constituency  content  Contostavlos  contract  conversion  copyright  Core  Corp.  corporate  Corporation  corporatism  Correctness  corruption  cost  Court  Courts  creation  creative  crime  crony  CSR  culture  customer  cyber  cyberattack  cyberespionage  cybersecurity  cyberwar  cycle  Daily  damage  data  DAU  David  democracy  Democratic  destruction  Disabled  discrimination  distortion  distribution  doctor  dogma  Don't  Dopamine  drm  Dropbox  Duncan  DWP  e-book  e-reader  ebooks  economic  economic-thought  economics  ecosystem  Edward  Ego  election  Empire  encryption  engagement  engineering  Entertainment  Entitlement  Entrepreneurship  entry  Equity  ereader  ESA  Escapeism  espionage  Establishment  ethical  ethics  EU  Europe  European  evil  execution  exploitation  Eyes  factor  fairness  False  Family  FBI  Fee  feedback  feminism  feminist  filter  FISA  FISAAA  Fit  Five  Flag  flow  for  force  FOSS  framing  Francisco  freemium  friction  frictionless  Funnel  future  Gawker  GCHQ  gender  gender-based  general  generated  generation  Generationengerechtigkeit  George  Germany  Gesellschaft  Gini  Glossy  google  gossip  governance  gratification  Greed  gross  growth  gun  hack  hacker  hacking  Hacktivism  Hameron  harassment  Harvey  hat  Hater  Haters  health  history  Hollywood  homescreen  HR  human  humanity  hunt  Iain  iCloud  ideology  illness  image  imbalance  imgur  Impediments  industrial  industry  inequality  injunction  Inquiry  instant  integrity  interest  internet  introvert  investigative  investment  Investor  Iran  Israel  IT  itunes  Jeff  Jimmy  John  journalism  journalismus  JSA  judgement  Julian  Justice  kindle  label  labels  Lauschangriff  Law  lead  leak  Lean  lesson  Leveson  Levin  libraries  Licensing  life  lifetime  long-term  loop  Lügenpresse  machine  Magazine  Mail  mainstream  management  Manifesto  manufactured  margin  margins  Market  marketing  Marktanteile  maximisation  media  mental  mentoring  Merkel  Met  Microsoft  Midland  military–industrial  mindset  Minimal  mirror  Misogynie  misogyny  mobbing  mobile  model  Monarchy  moral  morality  morals  mouth  multiculturalism  Murdoch  music  MVP  n00d  nasty  national  Nationalism  native  Neistat  neoconservatism  neoconservatives  neoliberal  neoliberalism  net  New  News  newscorp  Newsfeed  Newspaper  NHS  NIRP  No  noise  NSA  objectification  of  Ofcom  oligopol  oligopoly  on  online  open  Operation  Orwellian  Osborne  oversight  pageviews  party  password  passwords  Patent  Patriarchy  pedophile  pedophilia  perception  personal  phishing  phone  platform  Polarisation  Police  policing  political  Politicians  politics  pollution  poor  populism  porn  pornography  poverty  power  PR  Precariat  precarious  prejudice  presidency  Principle  Privacy  Private  Privatisation  Privileged  Process  Procrastinating  Product  Product/Market  profit  progress  promises  Promoter  propaganda  Proposition  prosperity  protection  protectionism  public  publishing  QE  Rakuten  rape  rate  Reddit  reframing  regulation  regulators  relations  Representation  resources  responsibility  retention  revenge  Rich  Ring  rippers  ROI  round  Royal  runway  Rupert  rupertmurdoch  Russia  S3  SaaS  safety  Sales  San  Savile  scam  scandal  Scene  Schadenfreude  science  Score  secret  security  Seed  self-regulation  Services  sex  sexual  sexuality  sexualität  shareholder  short-term  sickness  Signal  Silicon  Smith  smoke  smoking  snap  Snapchat  Snappening  Snowden  social  society  Sony  Source  span  speculation  speculative  spin  spoofing  spying  Square  standard  Start-Up  state  status  stereotype  stigma  storytelling  strategy  Street  structural  study  subscription  Super  surveillance  Surveillance-Industrial  System  Tabloid  tension  Terror  Testing  The  TheFappening  thinking  TMZ  to  Toff  Tories  TOS  traction  trade  Trading  tragedy  trap  trickle-down  Troll  Trolls  Tulisa  tv  Twitter  two  Uber  UK  Unicorn  unintended  Union  USA  user  Valley  value  values  Venture  venturecapital  verification  Viable  video  view  viral  Vlog  Vlogging  vs.  vulnerable  Wall  Wall-Mart  wallstreetjournal  war  warfare  Wars  weapon  welfare  western  Westminster  white  Whitehall  Whittingdale  Wikileaks  word  work  worker  working  WSJ  yield  York  You  youtube  ZIRP 

Copy this bookmark: