John Lister

Wed
08
Mar
John Lister's picture

Facebook Fails to Take Down Images Exploiting Children

A major news organization says Facebook doesn't do enough to remove images that exploit children. The British Broadcasting Corporation (BBC) says the site removed just 18 out of 100 images that it reported as part of an investigation. The test was ... part of a follow-up to a report last year about people using members-only groups on the site to share inappropriate images of children. At the time, Facebook said it was improving its moderation system. To see if that was the case, the BBC used Facebook's formal reporting button to report 100 images that appeared to breach the site's ... (view more)

Tue
07
Mar
John Lister's picture

Google Gadget Claims Obama Planning Coup

Google's voice activated home assistant gadget has told users that former president Barack Obama is planning a coup. It's an unfortunate quirk of the way the company applies its website techniques to the gadget. Google Home - the company's answer to ... the Amazon Echo - is a small speaker that contains a microphone and a WiFi connection. It's designed to help with a host of activities around the house where voice-based information is quicker or more convenient than using a phone, tablet or computer. Examples include being able to ask for a recipe unit conversion while in the ... (view more)

Thu
02
Mar
John Lister's picture

Twitter Rethinks Abusive Comment Policing

Twitter is cracking down on abusive and personal attacks. It's giving users extra controls while introducing automated checks to pick up on potential abuse. The new rules aren't specifically about what people can post in a normal tweet. Instead, ... they cover posts where the writer deliberately includes somebody else's user name, meaning that other person will see the post as part of their notifications. That helps deal with a loophole in the way Twitter works. For the most part, people only see posts from accounts they've chosen to follow, but the notifications tool includes ... (view more)

Wed
01
Mar
John Lister's picture

'Smart' Toy Database Exposes Child Voice Recordings

Voice messages from parents to children through a 'smart' cuddly toy could be compromised. The security risk is a combination of a flaw by the designers and poor security practices by users. The issue involves CloudPets, a range of $40 toys designed ... to help working parents stay in touch with their kids. The parent can leave a voice message via a phone app at any time and it will then be sent over the Internet and Bluetooth and played back through a speaker in the toy. The child can then press the toy's paw to record and send a reply. The problem is that while delivering messages ... (view more)

Tue
28
Feb
John Lister's picture

Cloudflare Leak Exposes Data from Thousands of Sites

An unfortunate error has led to a massive leak of confidential data online. It's led to calls from users to review their passwords and change the most sensitive ones. The leak involves Cloudflare, which ironically is a security company. It offers a ... service by which it acts a little like a gatekeeper for websites, passing on valid requests for data and blocking those designed to cause disruption. In particular, it combats denial of service attacks (DoS) that aim to bring a website down by sheer weight of incoming traffic - usually bogus traffic. As part of Cloudflare's operations, it ... (view more)

Thu
23
Feb
John Lister's picture

Self-Driving Cars Could Change Insurance Rules

The British government says insurers should have to pay out if a customer's self-driving car crashes, whether or not the human was in control. It's the latest in a series of legal questions raised by the technology. The government has published the ... Vehicle Technology and Aviation Bill and will now try to make it law through the country's parliamentary system. If adopted, the rules would mean the government would legally classify cars as self-driving on a model-by-model basis. With any car that fits into this category, the legally-required insurance policy would have to be set up ... (view more)

Wed
22
Feb
John Lister's picture

Warning: Convincing Chrome 'Font Update' a Trojan

Chrome browser users have been warned to watch out for a sneaky malware attack. The trick involves a bogus on-screen message that claims the user needs to download a missing font. The people responsible are using hacked websites on the WordPress ... platform to operate the scam. They've altered the page so that the text appears to have been corrupted and is made up largely of symbols such as black diamonds and question marks. The page then displays an on-screen message that's carefully designed to look like a genuine Chrome error message, complete with the correct logos, shapes and even ... (view more)

Tue
21
Feb
John Lister's picture

Megaupload Boss Loses Extradition Appeal

Controversial file sharing site owner Kim Dotcom has come another step closer to being extradited to the United States. It comes despite a New Zealand court agreeing with one of Dotcom's key arguments against extradition. Dotcom, who changed his ... name from Kim Schmitz, was the man behind one of the biggest alleged piracy websites, "Megaupload." It was a site where users could upload files, either as a form of back-up, or as a way to share files with other people. Not surprisingly, many users found that Megaupload was an excellent way to illegally share copies of copyrighted music ... (view more)

Thu
16
Feb
Dennis Faas's picture

Report: You can be Tracked Online, even without IP or Cookies

Researchers have found a way to track web users even if they switch web browsers. It could improve security but also weaken online privacy. The researchers at Lehigh University in Pennsylvania were trying to find ways of improving fingerprinting. ... That's a way to attempt to identify an individual user (or at least their computer) without relying on single identifiers such as login details, browser cookies, or an IP address. Instead, fingerprinting involves taking multiple pieces of information provided by a user's browser such as the browser name, it's version, whether they have an ad blocker ... (view more)

Wed
15
Feb
Dennis Faas's picture

IBM's Watson to Tackle Computer Security, Threats

IBM's artificial intelligence system Watson is to lend its hand to security. It will help scour millions of reports to try to learn more about current online threats. The Watson system was originally designed to see if a computer could compete on ... Jeopardy!, the show where contestants are given an answer and have to try to figure out the question. It was considered a challenge for computers because, although they can store a lot of information and process it quickly, they don't always have the human ability to decipher meaning and context. In the event, Watson prevailed against two human ... (view more)

Pages

Subscribe to RSS - John Lister