Posts Tagged ‘google’

Surveillance: I Spy With My Little Eye Some Potlikker Pie

Tuesday, February 3rd, 2009

Do any of you really think that there is a single place on earth that cannot be looked down upon from satellites too high in the sky to see with the naked eye? Google continues their march to know all and see all…


Iowa’s Fields of Digital Dreams

Saturday, August 23rd, 2008

I knew that Microsoft was planning to build a large data storage facility in Iowa, but I was a little surprised to see that they will virtually be neighbors with me!


Revisiting Online Medical Information Storage Houses Points To Consistent Need For *1* Federal Privacy Law

Thursday, April 17th, 2008

Last fall I blogged about Microsoft’s HealthVault, “Why Would You Trust Microsoft To Store Your Sensitive Health Information?
It didn’t take long before Google got in on the game.
Today an interesting story ran in the New York Times, “Warning on Storage of Health Records” that also points out the concerns with having huge amounts of health information stored in some mega-multi-services-products types of monolith company. The issues are the same for any organization storing such information, though; but putting health information in the same corporate systems that contain the records of billions of people really open up quite a Pandora’s box of privacy breach possibilities.
Here are some excerpts from the news story that make some good points…


Iowa Student Gets Internship from Google for Reporting Security Flaw: More Proof Vendors Need Stronger Security Checking For Their Products

Saturday, May 5th, 2007

Last night while my sons and I were watching the news it was reported that in Davenport, Iowa a St. Ambrose University student, David Bloom, found a security flaw in early December when he was using the Google Docs and Spreadsheets program.


Keyloggers + Social Engineering = Identity Theft: Fraudsters Exploit Human Frailties with Seductive Messages

Friday, April 27th, 2007

Fraudsters and cybercriminals continue to find creative ways to exploit technology and human weakness to facilitate their crimes. Another new exploit they are using is hijacking popular Google search terms, typically targeting bank sites, and then inserting HTML into the legitimate response pages to get end-users to provide personally identifiable information (PII), typically website user IDs and passwords, often in conjunction with keyloggers they download to the victims’ computers.