Categories
-Context 10.2 Computer Security: Reducing Risks 10.3 Security, Privacy, Freedom, and Ethics 7.4 No Secrets: Computers and Privacy 9.1 Inside the Internet

Privacy Protection Quick Fixes

Many people believe that privacy is a thing of the past. It’s true that our networked world makes it harder to keep secrets. But there are many things you can do to protect your privacy online. This Huffington Post article clearly outlines some quick fixes you can make in a few minutes.

Categories
-Updates 10.1 Online Outlaws: Computer Crime 10.2 Computer Security: Reducing Risks 10.3 Security, Privacy, Freedom, and Ethics

Holding Your Files Hostage

ransom-noteMalware makers are always coming up with new ways to exploit innocent computer users. One relatively new breed of malware, ransomware, encrypts files, making them effectively unusable, unless their owners pay ransom to the perpetrators. This short NPR story focuses on this very real threat.

http://www.npr.org/blogs/alltechconsidered/2014/12/08/366849122/ransomware-when-hackers-lock-your-files-to-pay-or-not-to-pay

Categories
-Cross Currents 10.2 Computer Security: Reducing Risks 15.1 Thinking About Thinking Machines 15.5 Question-Answering Machines

The Man Who Lost his Jeopardy Title to a Computer

What’s it like to be the world Jeopardy champion and lose to a computer? Ken Jennings can tell you, and he does in this engaging TED talk. From his unique perspective, he suggests that we can—and must—make a choice about the kind of future we want to have. Which world do you want to live in?
 
More about Watson:

Categories
-Context 10.2 Computer Security: Reducing Risks 9.2 Inside the Web 9.3 Internet Issues: Ethical and Political Dilemmas

How Scam-savvy Are You?

Cyber-scammers are always looking for new ways to get you to reveal valuable personal information. Can you tell the difference between legitimate requests and cyber scams? Take this short quiz to find out. The quiz is a promotion for OpenDNS, a security company, but it’s worth your time even if you’re not shopping for protection. If you’re not able to identify all of the fake sites in the quiz, the feedback page will show you the clues that you missed so you can be more scam-savvy in the future.
opendns.com/phishing-quiz

Categories
-Context 10.1 Online Outlaws: Computer Crime 10.2 Computer Security: Reducing Risks 7.4 No Secrets: Computers and Privacy

How to Avoid a Personal Digital Meltdown

Wired writer Mat Honan recently lost just about everything he had stored on his computer and in the cloud. He literally watched while a malicious hacker wiped out his digital world.
This NPR story suggests five things you can do to avoid his fate.
Mat’s Wired article describes the hacker attack in detail.

Categories
-Context 10.1 Online Outlaws: Computer Crime 10.2 Computer Security: Reducing Risks 10.4 Security and Reliability

Can a Botnet Bring Down the Internet?

For three years a worm called Conficker has been wiggling its way into computers around the world, creating a massive botnet that has the potential to wreak havoc on the Internet. In this chilling NPR interview, author Mark Bowden explains to Fresh Air’s Terry gross how this little-known worm threatens our networks, our livelihoods, and our lives.
npr.org/2011/09/27/140704494/the-worm-that-could-bring-down-the-internet

Categories
-Updates 10.1 Online Outlaws: Computer Crime 10.2 Computer Security: Reducing Risks 9.3 Internet Issues: Ethical and Political Dilemmas

Spy vs. Spy in a Digital World

The war against hackers has become a global war of economics and politics. This in-depth Vanity Fair article takes a penetrating look at the grossly underreported impact of Chinese hackers on the US economy.
Categories
-Multimedia 10.1 Online Outlaws: Computer Crime 10.2 Computer Security: Reducing Risks Chapter 10 Computer Security and Risks

Behind the Front Lines in the Virus Wars

In this TED talk, Mikko Hypponen tells us about–and shows us–a variety of malware species, from the earliest PC viruses to today’s high-tech organized crime menace.
[ted id=1192]

Categories
-Updates 10.2 Computer Security: Reducing Risks 13.2 E-Business 1.0: Intranets, Extranets, and E-Sales 7.0 The Google Guys Search for Tomorrow 8.2 Wireless Network Technology 8.3 Specialized Networks: From GPS to Digital Money

Google Wallet: A Wireless Credit Card in Your Phone?

This summer some consumers will be able to pay for some of their purchases by waving their phones instead of swiping their cards. Google Wallet is an Android App that uses near-field communication technology to send transaction information from phone to merchant terminal. This kind of technology could eventually change the way we do most of our face-to-face shopping.
This New York Times article includes a demo video.