Do you feel like you can?t go anywhere without big brother watching you these days? A group called Anti Sec claims to have hacked into an FBI agent?s laptop, accessing over 12 million Apple Unique Device Identifiers. So, all of the data was originally picked up by the FBI from Apple devices, like iPhones, iPads and iPods to track your every move.
Small and medium technology businesses are being recruited by MI5 and GCHQ to help develop gadgets to spot and tackle terrorists.
GCHQ was said to be keen to improve its systems for monitoring information on the internet to trace suspects online.
Jonathan Evans, the Director General, said Mi5 was investigating ?cyber compromises? in more than a dozen companies while one major London-based business had lost ?800 million in one attack alone.
?Vulnerabilities in the internet are being exploited aggressively not just by criminals but also by states,? Mr Evans said.
?And the extent of what is going on is astonishing ? with industrial-scale processes involving many thousands of people lying behind both State sponsored cyber espionage and organised cyber crime.
?This is a threat to the integrity, confidentiality and availability of government information but also to business and to academic institutions.?
Earlier today, Nokia announced Lumia 920, which comes with PureView, the same technology which received a decent response for 41 MP Nokia 808 device. During its press event, Nokia gave a look at the new PureView?s main feature: optical image stabilization (OIS). The idea behind this new feature is that it stabilizes the video you?re recording, giving you a more professional look instead of the amateur shaky-cam effect. To demonstrate this technology, Nokia played an impressive ad which show cases a side by side comparison of the video shot without OIS and with OIS. Obviously, the video shot without OIS doesn?t look very good, whereas the video shot with OIS activated looks excellent. Strangely, Nokia faked this PureView ad!
Source: http://theaussiedigger.com/site/2012/09/internet-security-54/
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.