Apr 13 2009

Family makes Facebook plea for girl's return – Globe and Mail


Globe and Mail

Family makes Facebook plea for girl's return
Globe and Mail
The family of a missing eight-year-old girl in Southwestern Ontario is pleading with possible abductors to contact them directly on a cellphone number they posted yesterday on the social networking website Facebook.
Ground search for Tori ends Toronto Star
Canine teams scour riverbanks in search for missing Ontario girl CBC.ca
CTV.ca – Globe and Mail – Toronto Star – Toronto Star
all 560 news articles  Langue : Français
Share

Apr 13 2009

Family makes Facebook plea for girl's return – Globe and Mail


Canoe.ca

Family makes Facebook plea for girl's return
Globe and Mail
The family of a missing eight-year-old girl in Southwestern Ontario is pleading with possible abductors to contact them directly on a cellphone number they posted yesterday on the social networking website Facebook.
Police call off ground search for missing Ont. girl Canada.com
Police call off ground search for Ontario girl CBC.ca
Toronto Sun – London Free Press – The Canadian Press – CHQR
all 506 news articles  Langue : Français
Share

Apr 13 2009

Family makes Facebook plea for girl's return – Globe and Mail


CTV British Columbia

Family makes Facebook plea for girl's return
Globe and Mail
The family of a missing eight-year-old girl in Southwestern Ontario is pleading with possible abductors to contact them directly on a cellphone number they posted yesterday on the social networking website Facebook.
Hundreds attend vigil for missing Ont. girl CTV.ca
Mother pleads for return London Free Press
Toronto Star – CBC.ca – Canada.com – The Canadian Press
all 397 news articles  Langue : Français
Share

Apr 12 2009

NSA has access to Windows Mobile smartphones

“National Security Agency has access to both stand-alone systems and networks running Microsoft products”

Share

Apr 12 2009

Twitter Gets Slammed By the StalkDaily XSS Worm

CurtMonash writes “Twitter was hit Saturday by a worm that caused victims’ accounts to tweet favorably about the StalkDaily website. Infection occurred when one went to the profile page of a compromised account, and was largely spread by the kind of follower spam more commonly used by multi-level marketers. Apparently the worm was an XSS attack, exploiting a vulnerability created in a recent Twitter update that introduced support for OAuth, and it was created by the 17-year-old owner of the StalkDaily website. More information can be found in the comment thread to a Network World post I put up detailing the attack, or in the post itself. By evening, Twitter claimed to have closed the security hole.”

Read more of this story at Slashdot.

Share

Apr 11 2009

Spam Replacing Postal Junk Mail?

TheOtherChimeraTwin writes “I’ve been getting spam from mainstream companies that I do business with, which is odd because I didn’t give those companies my email address. It is doubly strange because the address they are using is a special-purpose one that I wouldn’t give out to any business. Apparently knotice.com (‘Direct Digital Marketing Solutions’) and postalconnect.net aka emsnetwork.net (an Equifax Marketing Service Product with the ironic name ‘Permission!’) are somehow collecting email addresses and connecting them with postal addresses, allowing companies to send email instead of postal mail. Has anyone else encountered this slimy practice or know how they are harvesting email addresses?”

Read more of this story at Slashdot.

Share

Apr 11 2009

Sharing Lives As Stories On the Web

blackbearnh writes “Jeff Holden spent a decade at Amazon, where he was involved as Senior Vice President of Consumer Websites with the recommendation engine, Amazon Prime, and the product review system. He’s left now, and has started Pelago, a company that wants to help mobile users turn their lives into stories they can share on the web. Among the interesting effects he discusses in this interview for O’Reilly Radar is that users of their product, Whrrl, have talked about changing their lives to make more interesting stories. Holden also talks about some of the work he did at Amazon, privacy issues that arise when social networking starts to become ubiquitous, and why he thinks the Apple App Store review system is seriously broken. ‘One of the things that happens with an iPhone is when you uninstall an app, it asks you to rate it. And it defaults to one-star. … The problem is … there’s no kind of qualification. Anybody just downloads it and checks it out or doesn’t check it out, right? And I think a number of people run it and they see that you have to sign in and they just delete it. And you get a one-star rating out of those experiences.'”

Read more of this story at Slashdot.

Share

Apr 10 2009

EU may force wireless carriers to allow VoIP on cellphones

The European Union (EU) is preparing binding guidelines for wireless carriers to allow VoIP services such as Skype to run over their cellular network. EU Telecoms Commissioner Viviane Reding stated that there “action” should be taken against carriers that use their market power to block “innovative services.”

Share

Apr 10 2009

Slashdot Mentioned In Virginia Terrorism Report

megamerican alerted us to a leaked document (PDF) from a Virginia Fusion Center titled “2009 Virginia Terrorism Threat Assessment.” The document is marked as “Law Enforcement Sensitive,” not to be shown to public. Citizens for Legitimate Government has a write-up. Slashdot gets a mention on page 45 — not as a terrorist organization itself, but as one of the places that member of Anonymous may hang out: “A ‘loose coalition of Internet denizens,’ Anonymous consists largely of users from multiple internet sites such as 4chan, 711chan, 420chan, Something Awful, Fark, Encyclopedia Dramatica, Slashdot, IRC channels, and YouTube. Other social networking sites are also utilized to mobilize physical protests. … Anonymous is of interest not only because of the sentiments expressed by affiliates and their potential for physical protest, but because they have innovated the use of e-protests and mobilization. Given the lack of a unifying creed, this movement has the potential to inspire lone wolf behavior in the cyber realms.” According to the report, cell phones and digital music players have been used to transfer plans related to criminal activity, and therefore presumably could be grounds for suspicion. Podcasting is also suspicious.

Read more of this story at Slashdot.

Share

Apr 9 2009

Cisco Buys Tidal Software for 105M $

Cisco Systems Inc. announced on Thursday it was buying Tidal Software Inc. for 105 million dollars in a move aimed at enhancing the US networking giant’s next-generation data centers.

Share