Forgot your password?
typodupeerror
Privacy

New Class of Malware Will Steal Behavior Patterns 73

Posted by Soulskill
from the your-mojo-is-next dept.
KentuckyFC writes "The information within huge, supposedly anonymized data sets can be used to build a detailed picture of an individual's lifestyle and relationships. This data is hugely valuable, which is why many companies already mine the pattern of links in their data to help them build things like recommender systems. Now a group of computer scientists say it is inevitable that a new class of malware will emerge for stealing this behavioral pattern data from social networks. They've analyzed the types of strategies this malware will use to collect information from a real mobile phone database of 800,000 links between 200,000 phones. They point out that the theft of behavioral data can be much more serious than the theft of other personal information. If somebody steals your credit card or computer password, for example, you can just get another card or change your password, thereby limiting the damage. That can't be done with behavioral data, they say. Who would be willing or able to change their real world pattern of person-to-person relationships, friendships and family ties?"
Censorship

Australia's ISPs Speak Out Against Filtering 262

Posted by Soulskill
from the is-it-possible-to-import-an-isp dept.
daria42 writes "The leaders of three of Australia's largest internet service providers — Telstra Media's Justin Milne, iiNet's Michael Malone and Internode's Simon Hackett — have, in video interviews with ZDNet.com.au over the past few months, detailed technical, legal and ethical reasons why ISP-level filtering won't work. Critics of the policy also say that users will have no way to know what's being filtered."
Security

Students Learn To Write Viruses 276

Posted by samzenpus
from the mischief-101 dept.
snocrossgjd writes "In a windowless underground computer lab in California, young men are busy cooking up viruses, spam and other plagues of the computer age. Grant Joy runs a program that surreptitiously records every keystroke on his machine, including user names, passwords, and credit-card numbers. Thomas Fynan floods a bulletin board with huge messages from fake users. Yet Joy and Fynan aren't hackers — they're students in a computer-security class at Sonoma State University. Their professor, George Ledin, has showed them how to penetrate even the best antivirus software."

Memory fault -- brain fried

Working...