Tag: social

Apr 30

LivingSocial Hacked: 50 Million Users Exposed – Slashdot

LivingSocial Hacked: 50 Million Users Exposed – Slashdot.

Apr 29

50,000,000 usernames and passwords lost as LivingSocial “special offers” site hacked | Naked Security

50,000,000 usernames and passwords lost as LivingSocial “special offers” site hacked | Naked Security.

Jan 31

The Seventh International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies

============== UBICOMM 2013 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

UBICOMM 2013, The Seventh International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies

September 29 – October 3, 2013 – Porto, Portugal

General page: http://www.iaria.org/conferences2013/UBICOMM13.html

Call for Papers: http://www.iaria.org/conferences2013/CfPUBICOMM13.html

– regular papers

– short papers (work in progress)

– posters

Submission page: http://www.iaria.org/conferences2013/SubmitUBICOMM13.html

Submission deadline: March 30, 2013

Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Print proceedings will be available via Curran Associates, Inc.: http://www.proceedings.com/9769.html

Articles will be archived in the free access ThinkMind Digital Library: http://www.thinkmind.org

Please note the Poster and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.
All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

UBICOMM 2013 Topics (topics and submission details: see CfP on the site)

Fundamentals

Semantics of ubiquity; Ubiquitous knowledge; Knowledge discovery mechanisms; Profiling ubiquitous environments; Ubiquitous technologies for education, learning, and training

Mobility

Ubiquitous computing; Wearable computing; Mobile computing; Nomadic computing; Mobile commerce; Mobile learning

Information Ubiquity

Ubiquitous information appliances; Information retrieval and filtering; Context awareness; Control of ubiquitous data; Data management and processing; Data replication, migration and dissemination; Ubiquitous computing and Internet of Things

Ubiquitous Multimedia Systems and Processing

Multimedia content recognition, indexing and search; Mobile graphics, games and entertainment; Ubiquitous multimedia applications and systems; Streaming mobile multimedia; Mobile media management; Multimedia ubiquitous platforms; Multimedia Indexing and Compression; Image and Signal Processing; Virtual reality in ubiquitous systems

Wireless Technologies

Bluetooth; 802.11.x; 802.15.x; ZigBee; WiMax

Web Services

Web 2.0; Semantic web; Web services; Ontology; Web Services evolution; Web Services applications

Ubiquitous networks

Ubiquitous networks; Network management; Network performance evaluation; Networks and technology convergence; Internet access in ubiquitous systems; Ubiquitous mesh, ad hoc and sensor networks; RFID; Reconfigurability and personalization of ubiquitous networks

Ubiquitous devices and operative systems

Design of devices for ubiquitous systems; Mobile devices; Wearable devices; Embedded systems; Operative systems for ubiquitous devices; Real-time operating systems and scheduling

Ubiquitous mobile services and protocols

Frameworks, architectures, and languages for ubiquitous services; Queries, transactions and workflows in mobile and ubiquitous Networks; Algorithms for ubiquitous systems; SLA/QoS in ubiquitous services; Ontology based services; Location-based services; Protocols and interaction mechanisms for ubiquitous services; Mobile services and service convergence; Service discovery mechanisms; Tracking in ubiquitous environments; Measurement, control, and management of ubiquitous services; Design and development of ubiquitous services; Wireless/mobile service delivery

Ubiquitous software and security

Ambient components; Agent technologies; Software for spontaneous interoperation; Dependability guarantees; Security; Key Management and Authentication; Trust; Privacy; Fault-tolerance; Multimedia Information Security

Collaborative ubiquitous systems

Cooperative networks for ubiquitous systems; Cooperative applications for ubiquitous networks; Handheld and wearable systems for interaction in collaborative groups and communities; Ad hoc collaboration in ubiquitous computing environments; Awareness of collaboration and of work environment; Inherently mobile collaborative work

Users, applications, and business models

Mobile user interfaces; Ubiquitous user-generated content (weblogs, wikis, etc.); Mobile and ubiquitous computing support for collaborative learning; User modeling and personalization; Context- and location-aware applications; Toolkits, testbeds, development environments; Tools and techniques for designing, implementing, & evaluating ubiquitous systems; Constructing, deploying and prototyping of ubiquitous applications; Evaluation of user models for ubiquitous environments; On-line analytical techniques; Human-computer interaction in ubiquitous computing environments; Ubiquitous e-Development (business, science, health, etc.); Case Studies; Emerging industrial/business/scientific ubiquitous scenarios; Ambient intelligence; Social issues and implications of ubiquitous system

Committee: http://www.iaria.org/conferences2013/ComUBICOMM13.html

Jan 17

How to reverse a social engineering attack :D

Petit cours de Social Engineering | Korben.

Dec 10

Piratage de téléphone portable, simple comme un clic

Pour rappel, le NFC c’est ce que proposent certaines cartes bancaires, de transports urbains, … Vous mettez votre carte à quelques centimètres de la borne de lecture, et votre paiement est effectué. Seulement, à la Direction Centrale du Renseignement Intérieur, les “tests” ont permis de mettre la main sur les informations via une distance de… 15 mètres. Soit juste 500 fois plus de distance qu’annoncée par le mode d’emploi proposée avec la carte. Quand on sait que 84% des entreprises annoncent être victimes de vol d’information et les attaques virales et ciblées concernent 88% d’entre elles. 78% des directeurs de sécurité indiquent être exposés au risque humain et 55% à l’usurpation d’identité et l’attaque par ingénierie sociale, voilà qui n’est pas fait pour rassurer.

via Piratage de téléphone portable, simple comme un clic

Sep 25

For Your Eyes Only: Privacy, Empowerment and Technology in the Context of Online Social Networks.

For Your Eyes Only: Privacy, Empowerment and Technology in the Context of Online Social Networks.

International Conference on Privacy, Empowerment and Technology in the context of Online Social Networks

29  and 30 of November, 2012

http://www.foryoureyesonly.be <http://www.foryoureyesonly.be/>

Venue: The Egg, Barastraat 175, Brussels, Belgium

We warmly welcome you at the “For Your Eyes Only” International Conference on Privacy, Empowerment and Technology in the context of Online Social Networks in Brussels on 29. and 30. November 2012.

In the last decade, Online Social Networks started to play an increasingly important role in our communications. User privacy and security are two of the friction points that emerge when communications get mediated in Online Social Networks (OSNs). At the For Your Eyes Only Conference, young and senior academics will convene to discuss privacy and security in Online Social Networks. This will be a discussion that crosses disciplinary boundaries as well as those of communities of practice. We will approach the issues raised from legal, technical, social, and economic perspectives, and, will discuss consequences of our findings for regulation, education and systems design in six panels.

Specifically, on the first conference day participants will focus on the privacy pitfalls for social media users. These include the commodification of their personal data, uninformed consent strategies, the right to privacy, the protection of personal data and the (absence of a) right to be forgotten. Opportunities and risks related to minors on OSNs will also be discussed from various perspectives. For each topic, regulatory challenges will be identified.

On the second day of the conference socio-technical solutions as well as the responsibilization of users with respect to privacy are central to the debate. Participants will discuss how privacy and security can be integrated into design from the early conception of systems, look at nudging as a design strategy, and present concrete proposals for improving the privacy and security infrastructures of online social networks.

We expect an audience of academics, public organizations, companies, members of NGO’s as well as governments, artists, activists, designers and developers. Together we aspire to generate visions for Online Social Networks in which privacy, security, and other user rights, needs and practices are accommodated.

The entrance fee is €89 for both days, or €49 for a single day.

We are offering a limited number of scholarships to cover conference registration for those prospective participants (especially developers, activists and artists) without sufficient institutional or financial support. If you wish to apply for one of these, please describe your project and affiliations (500-700 words). Allocation to these strictly limited places will be based on the quality of the project description and the scholarships will be distributed on a first-come-first-serve basis. Please contact Seda Gürses at info@foryoureyesonly.be <mailto:info@foryoureyesonly.be> for further details.

The conference is organized by the interdisciplinary research consortia EMSOC [http://emsoc.be <http://emsoc.be/>] and SPION [http://www.spion.me <http://www.spion.me/>]. They are both IWT Strategic Basic Research projects and are involved in IBBT research groups. This conference is an event also associated with the Unlike Us network [http://networkcultures.org/wpmu/unlikeus/].

Aug 20

View from the IT desk: Securing social networking in the workplace | Naked Security

View from the IT desk: Securing social networking in the workplace | Naked Security.

Aug 14

ACCESS 2013 : The International Congress on Advances in Citizen, Cyberspace & Environment Safety and Security 2013

 

ACCESS 2013 : The International Congress on Advances in Citizen, Cyberspace & Environment Safety and Security 2013

Link: http://www.accesscongress.org
When Jun 5, 2013 – Jun 7, 2013
Where Singapore
Submission Deadline Oct 15, 2012
Notification Due Nov 19, 2012
Final Version Due Jan 7, 2013
Categories    research   informatics   environment   security

Call For Papers

The ACCESS Congress 2013 seeks for original research papers in the following areas, but are not limited to the domains listed below. The submission topics are divided into 4 domains:

(A) Human Safety & Security

Ageing
Stroke
Healthcare & Wellness
Pandemic Management
Infectious Diseases
Low Fertility
Human Performance

(B) Environment Safety &Security

Energy Sustainability
Food & Water
Climate Change
Building Infrastructures
Biodiversity
Disaster Management

(C) Information Safety & Security

Cloud Security
Social Media
Mobile Security
Electronic Crimes
Online Child Pornography

(D) Homeland Safety & Security

Sensors Systems
Microsystem Technologies
Geo-spatial
Transport & Logistics
Analytics & Intelligence
Immigrants and Social Issues

ACCESS 2013 : The International Congress on Advances in Citizen, Cyberspace & Environment Safety and Security 2013.

Aug 11

How social engineering tricked Wal-Mart into handing over sensitive information | Naked Security

How social engineering tricked Wal-Mart into handing over sensitive information | Naked Security.

Jun 11

CALL FOR PAPERS: IEEE-AESS Conference in Europe about Space and Satellite Communications : Security and Privacy Special Track

=================================
CALL FOR PAPERS
Security and Privacy Special Track
IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL)
Rome, Italy, October 2-5, 2012
http://estel-sec.dti.unimi.it/
=================================
The special track on Security and Privacy of the ESTEL Conference aims at providing a
forum for discussing security and privacy issues that need to be investigated for
providing advanced services, architectures, and technologies for space and satellite
applications.  In this context, it is of utmost importance to ensure proper protection to
such complex systems, or systems-of-systems, to ensure security, privacy, and availability
of the infrastructure as well as of resources and information it provides and
manages. These aspects concern both the specific satellite application and infrastructure
as well as the base stations and land data servers and communications that serve them,
touching then the different areas with ICT.  The problem is far from trivial, due to the
criticality and the social impact of the applications and services relying on this global
infrastructure, as well as the complexity given by the co-existence and co-operation of,
possibly heterogeneous, component systems. Topics of interest include, but are not limited
to:
– Access Control
– Applied Cryptography for Space Applications
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Homeland Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Organizational Security Policies
– Peer-to-Peer Security
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Satellite-based Disaster Recovery
– Satellite Network Security
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Satellite Surveillance
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security Patterns
– Security in e-Healthcare
– Security Issues of Satellite Communications
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security
SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been published or that are
simultaneously submitted to a journal or a conference with proceedings. Submitted papers
must be formatted according to the IEEE Conference proceedings format, available at
http://www.ieee.org/publications_standards/publications/authors/authors_journals.html.
Submissions should be at most 6 pages. Submissions are to be made to the submission
web site at https://www.easychair.org/conferences/?conf=estelsec2012. Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection without consideration of their
merits. Papers must be received by the deadline of July 20, 2012 (11:59 p.m. American Samoa time).
All accepted papers will be published in the conference proceedings. Authors of accepted papers
must guarantee that their papers will be presented at the conference. A one-day registration
option will be made available to special session attendees.
IMPORTANT DATES
Paper submission due: July 20, 2012 (11:59 p.m. American Samoa time)
Notification to authors: August 25, 2012
Camera ready due: September 5, 2012
SPECIAL TRACK PROGRAM CHAIR
Pierangela Samarati
Universita’ degli Studi di Milano, Italy
PROGRAM COMMITTEE
tba
This call for papers and additional information about the conference
can be found at http://estel-sec.dti.unimi.it/