Categories
-Context 10.3 Security, Privacy, Freedom, and Ethics 9.3 Internet Issues: Ethical and Political Dilemmas

Shining a Light on the Dark Net

The Dark NetThere are huge chunks of the Internet that can’t be found with your standard web browser. Criminals, anarchists, and trolls use encryption-enabled browsers to conduct their business anonymously in these dark corners of the net. In this fascinating Fresh Air interview, author Jamie Bartlett talks about his experiences in the dark net.
npr.org/sections/alltechconsidered/2015/06/03/411476653/infiltrating-the-dark-net-where-criminals-trolls-and-extremists-reign

Categories
-Context 10.2 Computer Security: Reducing Risks 10.3 Security, Privacy, Freedom, and Ethics 7.4 No Secrets: Computers and Privacy 9.1 Inside the Internet

Privacy Protection Quick Fixes

Many people believe that privacy is a thing of the past. It’s true that our networked world makes it harder to keep secrets. But there are many things you can do to protect your privacy online. This Huffington Post article clearly outlines some quick fixes you can make in a few minutes.

Categories
-Updates 10.1 Online Outlaws: Computer Crime 10.2 Computer Security: Reducing Risks 10.3 Security, Privacy, Freedom, and Ethics

Holding Your Files Hostage

ransom-noteMalware makers are always coming up with new ways to exploit innocent computer users. One relatively new breed of malware, ransomware, encrypts files, making them effectively unusable, unless their owners pay ransom to the perpetrators. This short NPR story focuses on this very real threat.

http://www.npr.org/blogs/alltechconsidered/2014/12/08/366849122/ransomware-when-hackers-lock-your-files-to-pay-or-not-to-pay

Categories
-Cross Currents 10.3 Security, Privacy, Freedom, and Ethics 10.5 Human Questions for a Computer Age 7.4 No Secrets: Computers and Privacy

Is Privacy History?—Snowden’s Message

Edward SnowdenEdward Snowden made a decision that changed the world. By leaking top secret government documents to the press, he revealed that US surveillance of private and public citizins goes far beyond what most of us had previously imagined. Because of those leaks, people all around the world are asking important questions about the balance between privacy and security in a free society. In a chilling statement to the BBC, Snowden claimed that he’d accomplished his mission by raising those questions. What do you think?
theguardian.com/world/2013/dec/24/edward-snowden-channel-4-christmas-day-message

Categories
-Context 10.3 Security, Privacy, Freedom, and Ethics 10.6 Inventing the Future: Evolving Technology, Evolving Security

Cyber Security: When Does Defense Become Offensive?

In his state of the union message President Obama explained that he was issuing executive orders to deal with cyber threats to government and business. He also encouraged congress to enact legislation. But as this NPR story explains, the problem may require a more aggressive approach that’s complicated by the fact that our information infrastructure is mostly owned by private businesses.
npr.org/2013/02/13/171843046/victims-of-cyberattacks-now-going-on-offense-against-intruders

Categories
-Context 10.2 Computer Security: Reducing Risks 9.2 Inside the Web 9.3 Internet Issues: Ethical and Political Dilemmas

How Scam-savvy Are You?

Cyber-scammers are always looking for new ways to get you to reveal valuable personal information. Can you tell the difference between legitimate requests and cyber scams? Take this short quiz to find out. The quiz is a promotion for OpenDNS, a security company, but it’s worth your time even if you’re not shopping for protection. If you’re not able to identify all of the fake sites in the quiz, the feedback page will show you the clues that you missed so you can be more scam-savvy in the future.
opendns.com/phishing-quiz

Categories
-Context 10.1 Online Outlaws: Computer Crime 10.2 Computer Security: Reducing Risks 7.4 No Secrets: Computers and Privacy

How to Avoid a Personal Digital Meltdown

Wired writer Mat Honan recently lost just about everything he had stored on his computer and in the cloud. He literally watched while a malicious hacker wiped out his digital world.
This NPR story suggests five things you can do to avoid his fate.
Mat’s Wired article describes the hacker attack in detail.

Categories
-Cross Currents 10.4 Security and Reliability 15.6 The Robot Revolution

Another Take on the Classic Sci-Fi Plot

forbes.com/sites/parmyolson/2012/06/14/cyber-security-and-the-rise-of-the-silicon-based-life-form
If we think of digital technology as another life form, how does that change the way we think about, and interact with, that technology? This Forbes editorial suggests that it might improve the way we handle computer security.

Categories
-Context 10.1 Online Outlaws: Computer Crime

No Longer Anonymous?

thedailyshow.com/watch/mon-june-18-2012/parmy-olson
The secret global Internet subculture known as Anonymous has generated plenty of headlines, but most people don’t know much about it. Journalist Parmy Olson’s book, “We Are Anonymous”, reveals how the organization works and how it is evolving. In this light-hearted interview with Jon Stewart on the Daily Show she talks about what she learned writing the book.

Categories
-Context 13.4 E-Commerce Ethics 7.4 No Secrets: Computers and Privacy 9.2 Inside the Web

The Web is Watching You


http://www.ted.com/talks/gary_kovacs_tracking_the_trackers.html

If you think you’re covering your tracks as you explore the web, think again. This TED talk shows how we’re being tracked and suggests what we might need to do about it.