Privacy fears cause more to cover online tracks

"The Pew Research Center report said 86 percent of US Internet users have taken some steps to avoid online surveillance by other people or organizations. 'Our team’s biggest surprise was discovering that many Internet users have tried to conceal their identity or their communications from others,' noted Sara Kiesler. 'It’s not just a small coterie of hackers. Almost everyone has taken some action to avoid surveillance. And despite their knowing that anonymity is virtually impossible, most Internet users think they should be able to avoid surveillance online — they think they should have a right to anonymity for certain things, like hiding posts from certain people or groups.'" Continue reading

Continue ReadingPrivacy fears cause more to cover online tracks

FTC Begins Sanctions Against Insecure Internet-Connected Device Companies

"The FTC is steadily hacking the law to make itself the country’s de facto privacy regulator. In this case, it’s using its right to punish a company for being 'unfair' to consumers. But its power is limited: it can’t fine TRENDnet; it can only require it to notify customers, establish 'a comprehensive security program' — that includes pen testing its products — and agree to 20 years of privacy audits (just like Facebook and Google). If TRENDnet messes up again after this, the FTC can then fine it up to $16,000 per violation (a power it used to fine Google $22.5 million). There may well be more FTC orders to come." Continue reading

Continue ReadingFTC Begins Sanctions Against Insecure Internet-Connected Device Companies

Search Engine Finds Internet-Connected Cameras, Medical Devices, Power Plants

"Shodan crawls the Internet looking for devices, many of which are programmed to answer. It has found cars, fetal heart monitors, office building heating-control systems, water treatment facilities, power plant controls, traffic lights and glucose meters. It’s become a crucial tool for security researchers, academics, law enforcement and hackers looking for devices that shouldn’t be on the Internet or devices that are vulnerable to being hacked. An industry report from Swedish tech company Ericsson estimates that 50 billion devices will be networked by 2020 into an 'Internet of Things.'" Continue reading

Continue ReadingSearch Engine Finds Internet-Connected Cameras, Medical Devices, Power Plants

Own your Identity with BitShares

"Inspired by the protocols behind Bitcoin, we are developing technologies that will help you take control over your identity, finances, and communication while eliminating most any form of identity theft. Invictus Innovations has combined the technologies of Bitcoin, BitMessage, Namecoin, with several new methods to bring the benefits of encryption to the masses. Apple introduced the Macintosh in 1984 with the promise of showing us why 1984 won’t be like ‘1984’. This message has remained close to the heart of Invictus Innovations; we intend to fulfill the promise Apple made thirty years ago." Continue reading

Continue ReadingOwn your Identity with BitShares

Own your Identity with BitShares

"Inspired by the protocols behind Bitcoin, we are developing technologies that will help you take control over your identity, finances, and communication while eliminating most any form of identity theft. Invictus Innovations has combined the technologies of Bitcoin, BitMessage, Namecoin, with several new methods to bring the benefits of encryption to the masses. Apple introduced the Macintosh in 1984 with the promise of showing us why 1984 won’t be like ‘1984’. This message has remained close to the heart of Invictus Innovations; we intend to fulfill the promise Apple made thirty years ago." Continue reading

Continue ReadingOwn your Identity with BitShares

Own your Identity with BitShares

"Inspired by the protocols behind Bitcoin, we are developing technologies that will help you take control over your identity, finances, and communication while eliminating most any form of identity theft. Invictus Innovations has combined the technologies of Bitcoin, BitMessage, Namecoin, with several new methods to bring the benefits of encryption to the masses. Apple introduced the Macintosh in 1984 with the promise of showing us why 1984 won’t be like ‘1984’. This message has remained close to the heart of Invictus Innovations; we intend to fulfill the promise Apple made thirty years ago." Continue reading

Continue ReadingOwn your Identity with BitShares

Own your Identity with BitShares

"Inspired by the protocols behind Bitcoin, we are developing technologies that will help you take control over your identity, finances, and communication while eliminating most any form of identity theft. Invictus Innovations has combined the technologies of Bitcoin, BitMessage, Namecoin, with several new methods to bring the benefits of encryption to the masses. Apple introduced the Macintosh in 1984 with the promise of showing us why 1984 won’t be like ‘1984’. This message has remained close to the heart of Invictus Innovations; we intend to fulfill the promise Apple made thirty years ago." Continue reading

Continue ReadingOwn your Identity with BitShares

Chicago Police Superintendent Says Cops Will Shoot Gun Carrying Citizens

"Chicago police superintendent Garry McCarthy is not happy about the new concealed carry laws in Illinois. And now he is predicting that police will shoot citizens who are lawfully carrying firearms. While every cop has a right to protect himself, this bold statement by McCarthy is obviously meant to intimidate gun owners who choose to exercise their rights. This threat that cops may mistakenly shoot a gun carrying citizen is just another attempt to fight the concealed carry laws that Illinois has long been deprived of. McCarthy would not say what specific training officers will undertake if any. However, he did admit that in the past his department has made mistakes in shooting unarmed civilians." Continue reading

Continue ReadingChicago Police Superintendent Says Cops Will Shoot Gun Carrying Citizens

Pro-Assad hackers target Marine Corps recruiting website

"Pro-Syrian regime hackers posted messages on a US Marine Corps recruiting website on Monday, urging troops to defy orders from President Barack Obama. The hackers showed photos of people in American uniforms holding hand-written signs saying they would not fight for Al-Qaeda in Syria. 'Obama is a traitor who wants to put your lives in danger to rescue al-Qaeda insurgents,' the message read, according to a screenshot from The Wall Street Journal. The US Marine Corps confirmed the intrusion but said the affected site, Marines.com, the official recruitment portal for the Corps, was back to normal." Continue reading

Continue ReadingPro-Assad hackers target Marine Corps recruiting website

Mother, daughter sentenced for Internet scam targeting U.S. military supporters

"A Colorado mother and daughter were sentenced on Wednesday for their roles in a 'Nigerian internet romance scam.' Karen and Tracy Vasseur were convicted of stealing more than $1 million from 374 victims who thought they were sending money to aid members of the U.S. military. Unknown conspirators in Nigeria would establish online relationships with victims via e-mail or social media by sending them fake military documents and personal photographs. After the relationship was established, the purported military member would request large sums of money, ostensibly for satellite phones that would allow them to speak to the victims or travel funds that would allow them to visit." Continue reading

Continue ReadingMother, daughter sentenced for Internet scam targeting U.S. military supporters