Yahoo Secretly Scanned Customer Emails for US intelligence Source - CNBC by REUTERS, October 4th 2016 Yahoo last year secretly built a custom software program to search all of its customers' incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter. The company complied with a classified U.S. government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said two former employees and a third person apprised of the events. #NBCFail: NBC blames Twitter for complaint that led to journalist Guy Adams having Twitter account suspended after complaining about London 2012 Olympics coverage - Americas - World The site claims I broke its rules because I included Zenkel’s work email address in a Tweet posted on Friday, when America had been forced to watch the opening ceremony on time-delay. “The man responsible for NBC pretending the Olympics haven't started yet is Gary Zenkel,” it read. “Tell him what u think!”
Second Chinese Firm in a Week Found Hiding Backdoor in Firmware of Android Devices Security researchers have discovered that third-party firmware included with over 2.8 million low-end Android smartphones allows attackers to compromise Over-the-Air (OTA) update operations and execute commands on the target's phone with root privileges. Mobile experts from Anubis Networks discovered the problem this week. This is the second issue of its kind that came to light this week after researchers from Kryptowire discovered a similar secret backdoor in the firmware of Chinese firm Shanghai Adups Technology Co.
#NBCFail: Backlash as Twitter locks out reporter Guy Adams - Americas - World Guy Adams, this newspaper's Los Angeles correspondent, was removed from the social networking site on the day that he wrote a news story detailing widespread public complaints about the network's coverage of the London Games. According to Twitter, he was suspended for a message posted during the Opening Ceremony, when NBC prevented viewers of America from watching live coverage, so that the network could screen the occasion during an evening prime-time slot coveted by advertisers. "The man responsible for NBC pretending the Olympics haven't started yet is Gary Zenkel," wrote Mr Adams.
How Eduardo Saverin Sold Facebook Ads in 2004 The knock on Facebook is often that it doesn’t have its ad strategy figured out. That might be, but the company courted advertisers pretty much from the get-go. As captured in “The Social Network,” Facebook’s then-CFO Eduardo Saverin was in New York City right after the launch of TheFacebook, as it was then called, to sell ads. One of those who met with Saverin in April 2004 saved Facebook’s first media kit, which was provided to Digiday. Who Is Running Phony Cell Phone Towers Around The United States? <img class="full-width" style="" typeof="foaf:Image" alt="" data-smsrc="<a pearltreesdevid="PTD454" rel="nofollow" href=" class="vglnk"><span pearltreesdevid="PTD455">http</span><span pearltreesdevid="PTD457">://</span><span pearltreesdevid="PTD459">www</span><span pearltreesdevid="PTD461">.</span><span pearltreesdevid="PTD463">popsci</span><span pearltreesdevid="PTD465">.</span><span pearltreesdevid="PTD467">com</span><span pearltreesdevid="PTD469">/</span><span pearltreesdevid="PTD471">sites</span><span pearltreesdevid="PTD473">/</span><span pearltreesdevid="PTD475">popsci</span><span pearltreesdevid="PTD477">.
The Internet a Decade Later [INFOGRAPHIC] Remember in 2002, when computers like the Apple iMac G4 were the sleekest on the market? Internet users were just starting to use high-speed broadband access, instead of that slow dial-up. Gone were the days of waiting. We could download a whole song in 10 minutes! Fast forward to 2012: Computers are even more polished, and the Internet is faster. Ten years ago, Internet usage was more of a leisure — today, it's practically as important as water or oxygen.
A Whistleblower Just Exposed How the Government Spies on Your Cell Phone By Derrick Broze The release of a secret U.S. government catalog of cell phone surveillance devices has revealed the names and abilities of dozens of surveillance tools previously unknown to the public. The catalog shines a light on well-known devices like the Stingray and DRT box, as well as new names like Cellbrite, Yellowstone, Blackfin, Maximus, Stargrazer, and Cyberhawk. The Intercept reports: Within the catalogue, the NSA is listed as the vendor of one device, while another was developed for use by the CIA, and another was developed for a special forces requirement.
problem solving 2 Concept Mapping A particularly good way to organize information about a problem or subject is to construct a "concept map." Construction of concept maps helps us pull together information we already know about a subject and understand new information as we learn. Concept maps consist of nodes and labeled lines. Figure 1 Node is the name for important terms or concepts. Fight for Internet speech ratchets up Text smaller Text bigger The popularity of new homes of only 500 square feet, 500-million-year-old bacteria and Barack Obama telling those with successful businesses, “You didn’t build that.” Those are just a few among the topics of discussion now at Free Dominion, a Canadian version of Free Republic in the U.S. where Internet users talk about, well, just about everything. Now website organizers are trying to raise a few thousand dollars to pursue arguments in a court case that would solidify the foundation for Internet free speech in Canada, a case they won at the trial court level but saw reversed on appeal because the judges wanted to address “a number of public interest and legal issues.” The operators of the Free Dominion website are asking supporters for help in raising an estimated $14,000 they need right away for the fight.
Worst Anti-Privacy Bill Since the PATRIOT Act, Passes Hidden in a Budget Bill and Media is SILENT By Jay Syrmopoulos On Friday, Congress passed a $1.15 trillion omnibus spending package to continue funding the federal government, which included an already defeated, and extremely controversial cyber security bill, that was inserted into the spending package as a means of assuring its passage. In spite of this massive revelation and horrific blow to privacy, the mainstream media remains mum.