Category: Privacy


California Officer Allegedly Stole Nude Photos During Arrest

 

 

 

 

” A California Highway Patrol officer is being investigated for allegedly sending nude photos of a DUI suspect from her cell phone to his personal phone.

  The Contra Costa, Calif., district attorney’s office is investigating Sean Harrington, 35, of Martinez, for a possible felony computer theft charge.

  Harrington is suspected of sending himself six photos of a 23-year-old San Ramon, Calif., woman in a state of undress while she was being booked into Martinez County Jail in August. He allegedly found the photos stored on her iPhone. “

 

UPI

 

 

 

 

 

 

 

 

 

 

About these ads

Civil Liberties Groups Appeal Ruling Over Automatic License Plate Reader Data

 

 

 

 

” The Electronic Frontier Foundation and the ACLU Foundation of Southern California are taking the fight over automatic license plate reader (ALPR) data to the next level by asking the California Court of Appeal to rule that the public has a right to know how Los Angeles cops are tracking their locations.

  ALPRs are cameras mounted to patrol cars and fixed locations, such as light poles, that are able to capture, process, and store the license plates of every vehicle that passes nearby. The Los Angeles Police Department and Los Angeles County Sheriff’s Department together collect close to 3 million license plates each week; these data points could give police an intimate picture of the comings and goings of the entire population over several years. By our estimates, these agencies currently have an average of 61 plate scans for each vehicle registered in Los Angeles County.”

 

EFF has more

 

 

 

 

 

 

 

New York’s Registry Of Mentally Ill People Barred From Having Firearms Draws Heavy Criticism

 

 

 

 

 

 

” A newly created database of New Yorkers deemed too mentally unstable to carry firearms has grown to roughly 34,500 names, a previously undisclosed figure that has raised concerns among some mental health advocates that too many people have been categorized as dangerous.

  The database, established in the aftermath of the mass shooting in 2012 at the Sandy Hook Elementary School in Newtown, Connecticut, and maintained by the state Division of Criminal Justice Services, is the result of the Safe Act. It is an expansive package of gun control measures pushed through by the administration of Gov. Andrew M. Cuomo. The law, better known for its ban on assault weapons, compels licensed mental health professionals in New York to report to the authorities any patient “likely to engage in conduct that would result in serious harm to self or others.

  But the number of entries in the database highlights the difficulty of America’s complicated balancing act between public safety and the right to bear arms when it comes to people with mental health issues.

“ That seems extraordinarily high to me,” said Sam Tsemberis, a former director of New York City’s involuntary hospitalization program for homeless and dangerous people, now the chief executive of Pathways to Housing, which provides housing to the mentally ill. “Assumed dangerousness is a far cry from actual dangerousness.” “

 

Post Gazette

 

With This Tiny Box, You Can Anonymize Everything You Do Online

 

 

 

 

 

 

” No tool in existence protects your anonymity on the Web better than the software Tor, which encrypts Internet traffic and bounces it through random computers around the world. But for guarding anything other than Web browsing, Tor has required a mixture of finicky technical setup and software tweaks. Now routing all your traffic through Tor may be as simple as putting a portable hardware condom on your ethernet cable.

  Today a group of privacy-focused developers plans to launch a Kickstarter campaign for Anonabox. The $45 open-source router automatically directs all data that connects to it by ethernet or Wifi through the Tor network, hiding the user’s IP address and skirting censorship. It’s also small enough to hide two in a pack of cigarettes. Anonabox’s tiny size means users can carry the device with them anywhere, plugging it into an office ethernet cable to do sensitive work or in a cybercafe in China to evade the Great Firewall. The result, if Anonabox fulfills its security promises, is that it could become significantly easier to anonymize all your traffic with Tor—not just Web browsing, but email, instant messaging, filesharing and all the other miscellaneous digital exhaust that your computer leaves behind online.

 

Wired has more

 

 

 

 

 

 

 

 

 

 

 

 

A Dramatic Number Of Teens Just Dropped Facebook

 

 

 

 

” Facebook can’t stay on top forever—not with so many new social apps nipping at its heels, anyway. A new survey of 7,200 U.S. students by research group Piper Jaffray suggests that the social giant is in fact dramatically losing teen users, despite what COO Sheryl Sandberg might want us to believe. In spring 2014, 72 percent of respondents between the ages of 13 and 19 reported that they used Facebook; by fall 2014, that number fell to 45 percent. By all accounts, that’s a massive drop for a company that’s downplayed its waning popularity among the key demographic of younger users for the last year.

  Facebook proper may have fallen from grace, but Facebook-owned Instagram is on the rise among teens. The number of teens using Instagram nudged upward from 69 percent to 76 percent in the same time period while Twitter fell slightly from 63 percent to 59 percent, Google+ dropped considerably from 29 percent to 12 percent and Twitter, Pinterest, and Reddit held steady.”

 

Daily Dot

 

 

 

 

 

 

 

 

 

This Is How The Feds Illegally Obtain Evidence Of A Crime And Lie About It In Court

 

 

 

” The president continues to dispatch his National Security Agency (NSA) spies as if he were a law unto himself, and Congress—which is also being spied upon—has done nothing to protect the right to privacy that the Fourth Amendment was written to ensure. Congress has taken an oath to uphold the Constitution, yet it has failed miserably to do so. But the spying is now so entrenched in government that a sinister and largely unnoticed problem lurks beneath the surface.

  NSA documents released by Edward Snowden show that the feds seriously deceived Congress and the courts in an effort to spy upon all of us and to use the gathered materials in criminal prosecutions, even though they told federal judges they would not. Among the more nefarious procedures the feds have engaged in is something called “parallel reconstruction.” This procedure seeks to hide the true and original source of information about a criminal defendant when it was obtained unlawfully.

  Thus, in order to maintain the facade of spying only for domestic intelligence purposes, and to appear faithful to public and secret promises (the FISA court only sits in secret) that any evidence of criminal behavior inadvertently discovered by NSA spies will not be used in criminal prosecutions, and so as to keep the mechanisms of domestic spying hidden from non-FISA federal judges who are more likely to apply normative interpretations of the Fourth Amendment than their FISA court colleagues, the NSA and the DOJ began the process of parallel reconstruction.

  Parallel reconstruction consists largely of the creation of a false beginning—an untrue one—of the acquisition of evidence. This, of course, is criminal. Lawyers and agents for the NSA and DOJ may no more lawfully lie to federal judges and criminal defense attorneys about the true origins of evidence than may a bank robber who testifies in his own defense claiming to have been at Mass at the time of the robbery.

  While parallel reconstruction is deceptive, unlawful and unconstitutional, I suspect it is but the tip of a dangerous iceberg spawned by the unbridled NSA spying that Bush and Obama have given us. When you mix a lack of fidelity to the plain meaning of the Constitution with a legal fiction, and then add in a drumbeat of fear, enforced secrecy, and billions of unaccounted-for taxpayer dollars, you get a dangerous stew of unintended tyrannical consequences.”

 

Read the whole thing at Reason

 

 

 

 

 

 

 

 

 

 

 

 

How To Delete And Disable Your Google Location History

 

google map 1

 

 

” Google can track your location and show you on Google Maps and Google Earth where you have been recently, which you may find useful, interesting, or invasive. Here’s how to see if you have location history turned on and how to disable it.

  I had location history enabled for Google Maps and didn’t know it. I found it interesting to see which spots Google logged for me over the past week or month, and I don’t plan on disabling the service. It’s nice to know, however, that I can delete portions of my location history or all of it, as well as disable the feature from tracking me in the future.

  To see if you have location history enabled, head to the Google Maps Location history page. Click the gear-icon button to access History settings. Here, you can choose to disable or enable the service.”

 

 

 

 

 

 

” Disabling location history, however, does not remove your past history. If you’d like to erase the locations Google has stored for the past 30 days, head back to the Location history page. The default time period shows location history for the current day, so you may not see any plots on the map.

  Use the pull-down menu below the calendar on the left to show your history, up to 30 days. If you choose a time period in which Google has tracked your location, you’ll see the points where you’ve been on the map. And below the calendar, you’ll see options to delete your history from the time period you have chosen or to delete all history.”

 

 

CNET has all the details

 

 

 

 

 

 

 

 

 

 

Lois Lerner Tries Barging Into Neighbor’s Home To Evade Questions

 

 

 

” Lois Lerner attempted to bust into a neighbor’s home uninvited, in a desperate attempt to avoid answering questions about her involvement in the targeting of conservative groups.

  Jason Mattera, author of the explosive new book CRAPITALISM: Liberals Who Make Millions Swiping Your Tax Dollars, recently caught up with the disgraced former IRS official in her ritzy neighborhood outside Washington, D.C.

  Mattera, who publishes the Daily Surge, asked Lerner if she had any regrets for her role in the ongoing IRS corruption case, and if she wanted to take the opportunity to give a genuine apology to conservatives for using the force of government to harass and single them out.”

The Daily Surge

Justina Pelletier Rushed To Hospital In Connecticut

 

 

 

‘” A teen caught who was caught lengthy custody battle between her family and Massachusetts was rushed to a hospital in Connecticut on Sunday night.

  Justina Pelletier was taken to Yale/New Haven Hospital, according to the Rev. Patrick Mahoney, who was a spokesman for the family while she was in Massachusetts.

” She is in severe pain and having serious GI issues. Please continue in prayer for Justina and the entire Pelletier family,” Mahoney posted on Facebook”

 

WCVB

 

 

 

 

 

 

 

 

 

 

Windows 10 Preview Has A Keylogger To Watch Your Every Move

 

 

 

” This week Microsoft announced the next version of its Operating system, dubbed WIndows 10, providing Windows 10 Technical Preview release under its “Insider Program” in order to collect feedback from users and help shape the final version of the operating system, but something really went WRONG!

Inside Microsoft’s Insider Program you’ll get all the latest Windows preview builds as soon as they’re available. In return, we want to know what you think. You’ll get an easy-to-use app to give us your feedback, which will help guide us along the way.” Microsoft website reads.

  Well, how many of you actually read the “Terms of Service” and “Privacy Policy” documents before downloading the Preview release of Windows 10? I guess none of you, because most computer users have habit of ignoring that lengthy paragraphs and simply click “I Agree” and then “next“, which is not at all a good practise.”
” Do you really know what permissions you have granted to Microsoft by installing Free Windows 10 Technical Preview edition? Of Course, YOU DON’T. Well, guess what, you’ve all but signed away your soul .
 
  If you are unaware of Microsoft’s privacy policy, so now you should pay attention to what the policy says. Microsoft is watching your every move on the latest Windows 10 Technical Preview, Thanks to portions of Microsoft’s privacy policy, which indicates that the technology giant is using keylogger to collect and use users’ data in a variety of astounding ways without the user being aware.”
Hacker News has all the details

New York Next To Pursue Gun Violence Restraining Order Legislation

 

 

 

 

” Only days after California’s precedent setting bill authorizing confiscatory gun seizures from those deemed a risk becoming law, the Empire State may be next to examine the concept.

  A new bill intended for the state Assembly, modeled after California’s AB1014, was debuted this week by a Manhattan Democrat. Like the West Coast law, the first of its kind in the nation, it would set up a framework to deny firearm possession to those believed to be dangerous.

“ So this is a bill that would permit family members or friends or medical professionals or law enforcement or really anyone who’s concerned that somebody having to access to guns poses a serious danger to go to a court and present evidence of that, and if the court were persuaded, they would be able to issue a temporary order preventing the person from acquiring or possessing guns,” Assemblyman Brian Kavanagh, author of the legislation, told WAMC this week.

  Kavanagh’s bill, as detailed in a release from his office, is intended to provide another tool in society’s toolbox to prevent gun violence. The avenue to implement the so-called gun violence restraining order would be the court system, who, upon being presented with a petition that contends an individual’s possession of guns in their current state could pose a general danger, could authorize an order to confiscate the firearms involved.”

 

 

Given the left-wing proclivities of the New York court system , one can only imagine the “preponderance of evidence” that will be needed to deprive a “suspected threat” of his/her rights to due process and the concept of “innocent until proven guilty” . This is yet another example of the rule of law being turned on it’s ear and all of us peons being guilty until we can prove otherwise . Read it and weep 

     We have entered the age of the “thought police” . Now we will be prosecuted/persecuted , like hate crimes , based on  perceptions and not on our actions … Land Of Liberty ? DOA …

 

 

 

 

 

 

 

 

ComputerCOP: The Dubious ‘Internet Safety Software’ That Hundreds Of Police Agencies Have Distributed To Families

 

 

 

 

 

 

” For years, local law enforcement agencies around the country have told parents that installing ComputerCOP software is the “first step” in protecting their children online.

 Police chiefs, sheriffs, and district attorneys have handed out hundreds of thousands of copies of the disc to families for free at schools, libraries, and community events, usually as a part of an “Internet Safety” outreach initiative. The packaging typically features the agency’s official seal and the chief’s portrait, with a signed message warning of the “dark and dangerous off-ramps” of the Internet.

  As official as it looks, ComputerCOP is actually just spyware, generally bought in bulk from a New York company that appears to do nothing but market this software to local government agencies.

  The way ComputerCOP works is neither safe nor secure. It isn’t particularly effective either, except for generating positive PR for the law enforcement agencies distributing it. As security software goes, we observed a product with a keystroke-capturing function, also called a “keylogger,” that could place a family’s personal information at extreme risk by transmitting what a user types over the Internet to third-party servers without encryption. That means many versions of ComputerCOP leave children (and their parents, guests, friends, and anyone using the affected computer) exposed to the same predators, identity thieves, and bullies that police claim the software protects against.”

 

 

Read the entire , exhaustively comprehensive dissection of this “child protecting” scam at EFF 

 

 

 

 

 

 

 

 

 

 

 

“Party At The NSA” (Party In The U.S.A. By Miley Cyrus Parody) By Chocolate Ghost House

 

 

 

 

 

 

This video came out over a year ago but is no less relevant today … HT/LaughRight

What Instagram, Twitter, and Jelly Indicate About The Future Of Ello

 

 

 

 

” Two weeks ago almost no one had heard of Ello. But that was two weeks ago. September 24th, BetaBeat referred to Ello as the mysterious social network. September 25th, TechCrunch declared that Ello was blowing up. September 26th, The Daily Beast said the service’s problems far outweigh the benefits. September 28th, Ello experienced its first DDoS attack. September 29th, The Washington Post called Ello hopelessly, irredeemably naive.

  We were curious how much truth lay in all the hype. But other than claims that Ello was adding 3,000-4,000 new users per hour , there wasn’t much data about the rising star. So we decided to get our own. To conduct this research, we pulled Ello directly from the site — all post, follower, and following data is publicly available to all users — and collected a sample size of nearly 160,000 Ello users. Next, we loaded the raw data into RJMetrics for analysis. “

Read the entire analysis at RJ Metrics

JPMorgan Says Data Breach Affected 76 Million Households

 

 

Data Breaches

 

 

 

” JPMorgan Chase & Co. (JPM), the biggest U.S. bank, said a previously disclosed data breach affected 76 million households and 7 million small businesses.

  Customer names, addresses, phone numbers and e-mail addresses were taken, the New York-based bank said today in a regulatory filing. Hackers also obtained internal data identifying customers by category, such as whether they are clients of the private-bank, mortgage, auto or credit-card divisions, said a person briefed on the matter.

  The breach affected anyone who visited the company’s websites, including Chase.com, or used its mobile app, said the person, who requested anonymity because that information wasn’t publicly disclosed. Some of those affected by the incursion are former clients of JPMorgan, which currently has 65 million customers and reaches half of all U.S. households, the person said. “

 

Bloomberg

 

 

 

 

 

 

 

 

 

 

Iowa Troopers Steal $100,000 In Poker Winnings From Two Players Driving Through The State

 

 

 

 

 

” The Des Moines Register highlights an Iowa forfeiture case, the subject of a federal lawsuit filed this week, in which state troopers took $100,000 in winnings from two California poker players traveling through the state on their way back from a World Series of Poker event in Joliet, Illinois. The case illustrates several of the themes I discussed in a recent column explaining how cops became highway robbers:

  Cops can always find an excuse to stop you. On the morning of April 15, 2013, Trooper Justin Simmons, who is part of an “interdiction team” that looks for contraband and money to seize, pulled over William Davis and John Newmer­zhycky, who were traveling west on Interstate 80 in a rental car, a red Nissan Altima. Simmons later said he had received a vague tip from “an Illinois law enforcement officer” to be on the lookout for a red car, but he did not know why. Obviously that did not rise to the level of reasonable suspicion, which Simmons needed to stop the car. So instead he claimed that he pulled Davis and Newmer­zhycky over because Newmer­zhycky, who was driving, failed to signal as he passed a black SUV. But as can be seen in the video recorded by Simmons’ dashcam (starting around the 00:28 mark), Newmer­zhycky did signal. In the absence of such contrary evidence, cops are free to invent minor traffic infractions to justify a stop they want to conduct for other reasons. Although it does not condone such prevarication, the Supreme Court has said any valid legal reason makes a stop constitutional, even if it’s a pretext for a more ambitious investigation. The Register reports that its “review of 22,000 warnings and citations given by the [interdiction] teams from 2008 to 2012 showed that 86 percent went to non-Iowans.” Because Iowans are much better drivers, of course. “

 

Continue reading at Reason

 

 

 

 

 

 

 

 

 

 

 

New Jersey Man Accused Of Shooting Down Neighbor’s Remote Control Drone

 

 

 

” A New Jersey man was arrested after police say he shot down a neighbor’s remote control drone.

According to investigators, officers with the Lower Township Police Department were called to a home in the 1000 block of Seashore Road on September 26th to investigate the report by a resident that his remote control helicopter (drone) was shot down.

  Investigators say the resident was taking aerial photographs of his friend’s home, which is under construction.

  While doing so, the resident told police he heard several gunshots as he simultaneously lost control of the drone.

  After retrieving the drone, the resident observed multiple holes in it that were consistent with a shotgun blast.”

 

CBS Philly

 

 

 

 

 

 

 

 

 

 

 

Extremists To Have Facebook And Twitter Vetted By Anti-Terror Police

 

 

 

 

 

 

” Extremists will have to get posts on Facebook and Twitter approved in advance by the police under sweeping rules planned by the Conservatives.

  They will also be barred from speaking at public events if they represent a threat to “the functioning of democracy”, under the new Extremist Disruption Orders.

  Theresa May, the Home Secretary, will lay out plans to allow judges to ban people from broadcasting or protesting in certain places, as well as associating with specific people.

  The plans — to be brought in if the Conservatives win the election in May — are part of a wide-ranging set of rules to strengthen the Government’s counter-terrorism strategy.

  The announcement at the annual party conference in Birmingham will come as the Conservatives position themselves as the party toughest on the terror threat.”

 

 

   Paging George Orwell … Who’s extremist and who gets to decide ? This is not a winning strategy for a liberty-loving party to advance … Read more at the Telegraph

 

 

 

 

 

 

 

 

 

 

 

 

Gov. Brown Signs Bill Telling College Kids Where, When To Have Sex

 

 

 

 

 

 

” California Gov. Jerry Brown affixed his signature to SB 967—the “Yes Means Yes” affirmative consent bill—which will require colleges to police their students’ sex lives.

  Some congrats are in order, I suppose? To collectivist feminists, doomsayers of the “rape is an ever-worsening epidemic” variety, and other puritans: Your so-called progressivism has restored Victorian Era prudishness to its former place as a guiding moral compass. Well done, liberals.

  The law instructs colleges to define consensual sex under strict terms brilliantly thought up by the California legislature. It also requires university administrators to investigate accusations of sexual assault under a set of terrible procedures that short-change victims by denying them fundamental due process rights. The law specifically establishes the “preponderance of evidence” standard, which mandates convictions for accused students deemed 50.1 percent likely to be guilty by the campus judiciary body.”

 

Read the rest at Reason

 

 

 

 

 

 

 

 

 

 

‘Anti-Facebook’ Social Network Gets Viral Surge

 

 

 

 

 

” In a matter of days, the new social network Ello, described as the “anti-Facebook” for its stand on privacy and advertising, has become perhaps the hottest ticket on the Internet.

  Created last year as a “private” social network, Ello (www.ello.co) recently opened its doors on an invitation-only basis.

  Because of the limited supply and strong demand, the invitations have been selling on eBay at prices up to $500. Some reports said Ello is getting up to 35,000 requests per hour as a result of a viral surge in the past week.

  Ello appears to have caught on with its simple message which seems to take aim at frustrations of Facebook users.  

” Ello doesn’t sell ads. Nor do we sell data about you to third parties,” the company says.”

 

Read more and see our previous story here

 

 

 

 

 

 

 

 

 

 

 

 

—-

FBI Not Happy With Apple & Google’s Encryption Policy

 

 

 

 

” Users might have praised the technology companies for efforts to encrypt their latest devices that would prevent law enforcement agencies’ hands on users’ private data, but the FBI is not at all happy with Apple and Google right now.
 
  The Federal Bureau of Investigation director, James Comey, said Thursday he was “very concerned” over Apple and Google using stronger or full encryption in their Smartphones and Tablets that makes it impossible for law enforcement to collar criminals.
  According to Comey, the Silicon Valley tech giants are “marketing something expressly to allow people to place themselves above the law.”

There will come a day – well it comes every day in this business – when it will matter a great, great deal to the lives of people of all kinds that we be able to with judicial authorization gain access to a kidnapper’s or a terrorist or a criminal’s device,” Comey told reporters.

I just want to make sure we have a good conversation in this country before that day comes. I’d hate to have people look at me and say, ‘Well how come you can’t save this kid,’ ‘How come you can’t do this thing.’” “

Hacker News

Drones Deployed By Tax Inspectors Near Buenos Aires Found 200 Mansions And 100 Swimming Pools That Hadn’t Been Declared

 

 

 

” The Argentine government has used drones to catch out wealthy tax evaders who had not declared mansions and swimming pools.

  Unmanned aircraft were dispatched over an upper class area of Buenos Aires and discovered 200 homes and 100 pools that had not been detailed on returns.

  Tax officials said the drones took pictures of luxury houses standing on lots registered as empty.

  The evasions found by the drones amounted to missing tax payments of more than $2 million and owners of the properties have been warned they now face large fines.

  The unregistered mansions and pools were found in an area about 10 miles south of the city and, according to the tax agency, they appeared to be large and constructed with “premium materials”. “

 

 

The Telegraph has much more

 

 

 

 

 

 

 

 

 

 

The Great Facebook Exodus Begins

 

 

Ello Home Page

 

 

 

 

” A little known independent social network might be having its big moment. As the debate around Facebook’s naming policy rages on, a growing swath of Facebook users appear to be jumping ship into a smaller, social lifeboat of sorts. It’s invite-only, anti-ads, and it’s called Ello.

  Short of Google+—distrusted by many thanks to a similar recently reversed “real name” policy—no single social network could withstand a mass influx of Facebook’s 1.32 billion monthly active users. But if this week’s rumblings are any indication, disenchanted Facebook users could look to smaller, independent social networks like Ello for their next move. 

  After seeing chatter about Ello in my own social circles, I reached out to Paul Budnitz, creator of this buzzy new anti-Facebook. Budnitz is the founder of designer toy maker Kidrobot and also owns and operates Budnitz Bicycles. I explained what I’d observed in my own social circles (my 1,000+ Facebook friends admittedly skew toward LGBTQ identities) to see if users from what some are calling Facebook’s “queer mass exodus” had started showing up on his own social experiment.

Why Ello? And why now? “

 

 

From Ello’s About page:

 

 

” What is Ello?

Ello is a simple, beautiful, and ad-free social network created by a small group of artists and designers.

  We originally built Ello as a private social network. Over time, so many people wanted to join Ello that we built a public version of Ello for everyone to use.

Ad Free

Ello doesn’t sell ads. Nor do we sell data about you to third parties.

  Virtually every other social network is run by advertisers. Behind the scenes they employ armies of ad salesmen and data miners to record every move you make. Data about you is then auctioned off to advertisers and data brokers. You’re the product that’s being bought and sold.

  Collecting and selling your personal data, reading your posts to your friends, and mapping your social connections for profit is both creepy and unethical. Under the guise of offering a “free” service, users pay a high price in intrusive advertising and lack of privacy.

We also think ads are tacky, that they insult our intelligence and that we’re better without them.

Read more about our no-ad policy here.

Support Ello

Ello is completely free to use.

  We occasionally offer special features to our users. If we create a special feature that you really like, you may choose to support Ello by paying a very small amount of money to add that feature to your Ello account.

  You never have to pay anything, and you can keep using Ello forever, for free. By choosing to buy a feature now and then for a very small amount of money you support our work and help us make Ello better and better.

Privacy

  When you use Ello we collect some information related to your visit. This information helps us understand in a general way how people are using Ello, so we can make our social network better.

  Unlike virtually every other social network, on Ello you can opt out of information sharing. Read How Ello Uses Information to learn how.

Join Ello

  Ello is currently invitation-only. To join Ello, you need to know someone that is already on the network. Alternatively, you can request an invitation by visiting the Ello Home Page.”

 

 

 

Read more at The Daily Dot and visit Ello’s site here

 

 

 

 

 

 

 

 

 

 

New ‘Bash’ Software Bug May Pose Bigger Threat Than ‘Heartbleed’

 

 

 

 

” A newly discovered security bug in a widely used piece of Linux software, known as “Bash,” could pose a bigger threat to computer users than the “Heartbleed” bug that surfaced in April, cyber experts warned on Wednesday.

  Bash is the software used to control the command prompt on many Unix computers. Hackers can exploit a bug in Bash to take complete control of a targeted system, security experts said.

  The Department of Homeland Security’s United States Computer Emergency Readiness Team, or US-CERT, issued an alert saying the vulnerability affected Unix-based operating systems including Linux and Apple Inc’s (AAPL.O) Mac OS X.

  The “Heartbleed” bug allowed hackers to spy on computers but not take control of them, according to Dan Guido, chief executive of a cybersecurity firm Trail of Bits.”

 

Reuters

 

For those who are interested here are some links to further stories about the newly discovered cyber-threat …

 

The Switchboard: Meet Shell Shock, the security bug experts say is worsethan Heartbleed

Bash Security Bug is Worse than Heartbleed

‘Worse than Heartbleed:’ Shellshock bash bug blasts OS X systems

‘Bigger than Heartbleed’ Shellshock flaw leaves OS X

Worse than Heartbleed? Today’s Bash bug could be

 

 

 

 

 

 

 

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 6,735 other followers