Hunton Andrews Kurth LLP
, Lexology; EU Recalls Children’s Smartwatch Over Security Concerns
"The European Commission has issued an EU-wide recall of the Safe-KID-One children’s smartwatch marketed by
ENOX Group over concerns that the device leaves data such as location
history, phone and serial numbers vulnerable to hacking and alteration."
Issues and developments related to ethics, information, and technologies, examined in the ethics and intellectual property graduate courses I teach at the University of Pittsburgh School of Computing and Information. My Bloomsbury book "Ethics, Information, and Technology" will be published in Summer 2025. Kip Currier, PhD, JD
Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts
Tuesday, February 12, 2019
Thursday, October 25, 2018
Hackers Are Breaking into Medical Databases to Protect Patient Data; The Scientist, October 1, 2018
Catherine Offord, The Scientist; Hackers Are Breaking into Medical Databases to Protect Patient Data
"The first few times Ben Sadeghipour hacked into a computer, it was to access the video games on his older brother’s desktop. “He would usually have a password on his computer, and I would try and guess his password,” Sadeghipour tells The Scientist. Sometimes he’d guess right. Other times, he wouldn’t. “So I got into learning about how to get into computers that were password protected,” he says. “At the time, I had no clue that what I was doing was considered hacking.”
The skills he picked up back then would become unexpectedly useful later in life. Sadeghipour now breaks into other people’s computer systems as a profession. He is one of thousands of so-called ethical hackers working for HackerOne, a company that provides services to institutions and businesses looking to test the security of their systems and identify vulnerabilities before criminals do."
"The first few times Ben Sadeghipour hacked into a computer, it was to access the video games on his older brother’s desktop. “He would usually have a password on his computer, and I would try and guess his password,” Sadeghipour tells The Scientist. Sometimes he’d guess right. Other times, he wouldn’t. “So I got into learning about how to get into computers that were password protected,” he says. “At the time, I had no clue that what I was doing was considered hacking.”
The skills he picked up back then would become unexpectedly useful later in life. Sadeghipour now breaks into other people’s computer systems as a profession. He is one of thousands of so-called ethical hackers working for HackerOne, a company that provides services to institutions and businesses looking to test the security of their systems and identify vulnerabilities before criminals do."
Saturday, February 4, 2017
'This is the new reality': Panelists speak for Pitt cyber security institute; Pittsburgh Post-Gazette, 2/3/17
Chris Potter, Pittsburgh Post-Gazette;
'This is the new reality': Panelists speak for Pitt cyber security institute:
[Kip Currier: This was a fascinating and informative panel at the University of Pittsburgh on February 2, 2017, discussing cyberhacking, efforts to identify hackers and hacker-sanctioning actors/nation states, and responses to hacking threats and incidents.
Two comments (which I'll paraphrase below, without benefit of a transcript) by panelist and Russian journalist Andrei Soldatov, stood out for me:
1. Vladimir Putin's Russia has deftly understood and exploited the distinction between "cybersecurity" and "information security" (the West, Soldatov contends, has focused more on the former).
2. Under Stalin, technical training in Soviet universities and technical institutes did not include study of ethics and the humanities (largely relegated to those in medical professions).]
"The precise identity and motivations of the hackers who leaked sensitive Democratic emails during last year’s presidential election may never be known. But they left fingerprints that were familiar to Andrei Soldatov, a journalist who has written about Russia’s security state for the past 20 years.
Two comments (which I'll paraphrase below, without benefit of a transcript) by panelist and Russian journalist Andrei Soldatov, stood out for me:
1. Vladimir Putin's Russia has deftly understood and exploited the distinction between "cybersecurity" and "information security" (the West, Soldatov contends, has focused more on the former).
2. Under Stalin, technical training in Soviet universities and technical institutes did not include study of ethics and the humanities (largely relegated to those in medical professions).]
"The precise identity and motivations of the hackers who leaked sensitive Democratic emails during last year’s presidential election may never be known. But they left fingerprints that were familiar to Andrei Soldatov, a journalist who has written about Russia’s security state for the past 20 years.
Like much of the propaganda back home, Mr. Soldatov said at a University of Pittsburgh panel discussion Thursday, “It’s not about building the positive narrative, it’s about building the negative narrative. … To say everyone is corrupt and no one can be trusted — people will accept this.”
Mr. Soldatov was one of four panelists convened by Pitt’s fledgling Institute of Cyber Law, Policy, and Security and its new director, former U.S. Attorney David Hickton. The discussion drew a few hundred people to the first public event for the center, which focuses on cybercrime and cybersecurity."
Tuesday, August 23, 2016
Cincinnati zoo deletes Twitter and Facebook accounts over Harambe jokes; Guardian, 8/23/16
Elena Cresci, Guardian; Cincinnati zoo deletes Twitter and Facebook accounts over Harambe jokes:
"Cincinnati zoo has deactivated its social accounts after it asked the public to stop making memes about Harambe the gorilla. The animal was shot dead this year after a three-year-old child climbed into his enclosure. Since then, Harambe has turned into a source of humorous content online. Jokes about his memory have spread on all corners of the internet – including the mentions of Cincinnati’s zoo official social media accounts."
Thursday, February 18, 2016
Why Apple Is Right to Challenge an Order to Help the F.B.I.; New York Times, 2/18/16
Editorial Board, New York Times; Why Apple Is Right to Challenge an Order to Help the F.B.I. :
"Even if the government prevails in forcing Apple to help, that will hardly be the end of the story. Experts widely believe that technology companies will eventually build devices that cannot be unlocked by company engineers and programmers without the permission of users. Newer smartphones already have much stronger security features than the iPhone 5c Mr. Farook used. Some officials have proposed that phone and computer makers be required to maintain access or a “back door” to encrypted data on electronic devices. In October, the Obama administration said it would not seek such legislation, but the next president could have a different position. Congress would do great harm by requiring such back doors. Criminals and domestic and foreign intelligence agencies could exploit such features to conduct mass surveillance and steal national and trade secrets. There’s a very good chance that such a law, intended to ease the job of law enforcement, would make private citizens, businesses and the government itself far less secure."
Saturday, March 21, 2015
The case for quitting e-mail; Washington Post, 3/20/15
Anne Applebaum, Washington Post; The case for quitting e-mail:
"What to do? Increasingly, the answer — not just for government officials but for all of us — is going to be: Don’t use e-mail. Or at least don’t use e-mail for anything that you wouldn’t put on a postcard. And maybe don’t use e-mail for anything that you wouldn’t mind seeing published in a newspaper. Although we are used to thinking of e-mail as a “private” form of communication, it’s just become too easy to steal and will only become more so. As a result, these methods have become readily available to all kinds of people, not just those who work for governments. The same is true of bugs and recording devices, many of which are now so cheap, small and portable that they don’t require special investment to install, let alone special espionage training. In London, the Sunday Mirror is on trial for hacking into celebrities’ telephones, repeatedly, over many years. If tabloid journalists can do it, anybody can. Recording a telephone conversation is easy, bugging a restaurant or a hotel room even easier. Public officials are just now waking up to the fact that they live in a world of total surveillance. It won’t be long before the rest of us are going to discover the same thing. Technology may eventually provide solutions, perhaps in the form of user-friendly encrypted e-mail systems, perhaps in the form of new-generation sweepers that can detect the latest bugs. The legal system may eventually catch up, too. But until then, life for anyone who wants to be protected from any kind of prying — from snooping companies, from governments, from media, from ex-spouses — will have to move in the opposite direction and use less technology. If you don’t want to be overheard, it’s not enough anymore to stay away from Facebook: Don’t use e-mail, don’t talk on the phone and do speak in person, preferably outside. Above all, write letters. The postman might read it, but the government, your colleagues and the Sunday Mirror probably won’t."
Subscribe to:
Posts (Atom)