Geeks Are the New Guardians of Our Civil Liberties

from Mashable! by MIT Technology Review

Now is a good time to re-set your Twitter password and disable Java in your browser

from Boing Boing by Xeni Jardin

Twitter says that it was hacked and 250,000 users may have been compromised

from The Next Web by Ken Yeung

Three Things Students Can Do Now to Promote Open Access

from EFF.org Updates by Adi Kamdar
The open access movement is a long-standing campaign in the world of research to make scholarly works freely available and reusable. One of its fundamental premises is that the progress of knowledge and culture happens scholarly works of all kinds are widely shared, not hidden in ivory towers built with paywalls and shorn by harsh legal regimes.

Safer Internet Day: How we help you stay secure online

from The Official Google Blog by Emily Wood
Technology can sometimes be complicated, but you shouldn?t have to be a computer scientist or security expert to stay safe online. Protecting our users is one of our top priorities at Google. Whether it?s creating easy-to-use tools to help you manage your information online or fighting the bad guys behind the scenes, we?re constantly investing to make Google the best service you can rely on, with security and privacy features that are on 24-7 and working for you.

Rebooting Computer Crime Law Part 2: Protect Tinkerers, Security Researchers, Innovators, and Privacy Seekers

from EFF.org Updates by Cindy Cohn and Marcia Hofmann
In the wake of social justice activist Aaron Swartz?s tragic death, Internet users around the country are taking a hard look at the Computer Fraud and Abuse Act (CFAA), the federal anti-hacking law. As we?ve noted, the CFAA has lots of problems. In this three-part series, we’ll explain these problems in detail and why they need to be fixed.

The Creepy Side of Facebook Graph Search

from MediaShift
The new Facebook Graph Search, currently in beta and only available to some, is a powerful search engine capable of revealing and uncovering incredibly detailed information about you, your friends and total strangers. It allows you to search for fun facts like “Former actors who are currently employed as waiters,” “Which games do Dutch Defense Ministry employees like to play?” (Battlefield and Call of Duty) and “People who like Lance Armstrong, who like steroids and who like fairy tales.”

Who Really Owns Your Photos in Social Media? (Updated 2013 Edition)

from MediaShift
A recent U.S. court decision clarified that media organizations cannot assume that photos shared via Twitter are rights-free, to be used as though they were in the public domain.

 

 

Assange to run for Australian senate: WikiLeaks

from Hurriyet Daily News
WikiLeaks founder Julian Assange will run for a seat in the Australian Senate during this year’s elections.

Build a Better Password: Secrets to Protecting Your Identity

from Background Check

2013: The Year of Responsive Web Design

from social media vb by thezenagency
With the continued growth of smartphone and tablet usage, will 2013 be the year that we see many websites adapt to responsive design technology? Take another look at responsive web design.

Facebook Graph Search: Privacy Control You Still Don’t Have

from EFF.org Updates by Adi Kamdar
Facebook’s Graph Search has certainly caused quite a stir since it was first announced two weeks ago. We wrote earlier about how Graph Search, still in beta, presents new privacy problems by making shared information discoverable when previously it was hard?if not impossible?to find at a large scale. We also put out a call to action?and even created a handy how-to guide?urging people to reassess their privacy settings.

Google latest FCC filing reveals details about its Google Glass project

from The Next Web by Ken Yeung

Congress Will Battle Over Internet Privacy in 2013

from EFF.org Updates by Mark M. Jaycox
Last year, we saw more battles in Congress over Internet freedom than we have in many years as user protests stopped two dangerous bills, the censorship-oriented SOPA, and the privacy-invasive Cybersecurity Act of 2012. But Congress ended the year by ramming through a domestic spying bill and weakening the Video Privacy Protection Act.

Kim Dotcom: Mega Search Engines Have to Play by the Rules

from TorrentFreak by Ernesto

Yesterday a flurry of bogus DMCA notices made thousands of Mega files unavailable to the public. The actions appeared to be targeted specifically at Mega search engine Mega-Search.me.

Cloud Tech Job Descriptions for 2013

from Daily Bits by noemi

Tagged in: , , , , , , , , , , , ,

%d bloggers like this: