#AceNewsGroup says to All its Readers “Thank You for 1000 Likes on Our Posts”


WP Like Button#AceNewsGroup says today marks another milestone for our group and it is all thanks to you the readers kind support and all your likes, as we have reached 1000 and we could not do it without your support.

So all l can say is a great big thank you from the Ace News GroupThanks in all languages   

 

Enhanced by Zemanta

“Thought Your Facebook Friends List was Private? Think Again!”


"Facebook Friends Lists Vulnerability"#AceSecurityNews says thought you “Facebook Friends List” was private not according to the latest news from security company “Quotium”  is that a flaw can leave your friends list open to attack.

With attacks being on the rise, Facebook is often targeted by hackers for the information it possesses. Users rely on Facebook to maintain their privacy to the best of Facebook’s ability.

FB responded that: “If you don’t have friends on Facebook and send a friend request to someone who’s chosen to hide their complete friend list from their timeline, you may see some friend suggestions that are also friends of theirs. But you have no way of knowing if the suggestions you see represent someone’s complete friend list.” However, research of this issue has shown that most of the friends list, often hundreds of friends, is available to the attacker. In any case, even a partial friends list is a violation of user-chosen privacy controls.

Since this vulnerability renders the privacy control to hide friend’s lists from other users irrelevant, we hope Facebook will change its mind and this flaw will be addressed.

Thanks goes to Irene Abezgauz, VP Product Management at Quotium and Seeker Research Centre Leader who is credited with the discovery of this vulnerability.

The Hidden Security Watchers – Waiting In The Wings


The seal of the U.S. National Security Agency....

The seal of the U.S. National Security Agency. The first use was in September 1966, replacing an older seal which was used briefly. For more information, see here and here. (Photo credit: Wikipedia)

Long before we ever heard of the NSA in our local news, or security issues were a problem, this organisation was working away in the background monitoring our communication! This article of which l have copied and pasted just a small segment of 4 long pages, explains in fine detail, how it brings into being suspect comments by political leaders, that we only ever cared about you, the citizen’s security! In fact it makes a complete farce of some of the recent denials by the NSA themselves! This simple 3 paragraphs says all there is about, how we were being monitored!  The fact they can convince a large percentage of the population of America is is for their own good, and people like Edward #Snowden and  Julian #Assange  are our enemy and that this government are our political friends, my thought is ” With Friends Like That Who Needs To Worry About Our Enemies” as our enemies maybe really be our only friends ,at the end of days!

So read this with due consideration that what maybe true, what could be true and what may not even be true at all!

After the agency’s orders were publicized by several newspapers and magazines, the N.S.A. decided to pull in its horns. Inman, the N.S.A.’s director, told a House committee that the two orders exemplified ”not a faulty law but inadequate Government attention to its application.” He characterized the agency’s handling of the voice-scrambling equipment as a ”well-meaning attempt to hold the line that had clearly already been passed by.”

A few years before, the director of the National Science Foundation, Richard C. Atkinson, and Inman had begun privately discussing whether the role of the spy agency in supervising cryptographic research should be expanded. The precise outcome of the talks remains murky, but the N.S.A. apparently won the debate. Today, the National Science Foundation routinely allows the N.S.A. to review any request for the funding of cryptographic research. The N.S.A. also has begun providing financial support for related unclassified civilian research. The first recipients of such support were two Stanford professors of electrical engineering, John T. Gill 3d, and Martin E. Hellman, a code expert who for many years had been sharply critical of the N.S.A.

”Five years ago, I was very much on the opposite side of the fence from N.S.A.,” said Hellman. ”I wouldn’t say I have been co-opted. As a result of them being more friendly and coming part way, I felt I should be more friendly. I guess I am now the first guinea pig.”

Full Read at: http://www.nytimes.com/1983/03/27/magazine/the-silent-power-of-the-nsa.html?

Judge orders Google to comply with FBI’s secret NSL demands | Politics and Law – CNET News


A federal judge has ruled that Google must comply with the FBI’s warrantless requests for confidential user data, despite the search company’s arguments that the secret demands are illegal.

CNET has learned that U.S. District Judge Susan Illston in San Francisco rejected Google’s request to modify or throw out 19 so-called National Security Letters, a warrantless electronic data-gathering technique used by the FBI that does not need a judge’s approval. Her ruling came after a pair of top FBI officials, including an assistant director, submitted classified affidavits.

The litigation taking place behind closed doors in Illston’s courtroom — a closed-to-the-public hearing was held on May 10 — could set new ground rules curbing the FBI’s warrantless access to information that Internet and other companies hold on behalf of their users. The FBI issued 192,499 of the demands from 2003 to 2006, and 97 percent of NSLs include a mandatory gag order.

via Judge orders Google to comply with FBI’s secret NSL demands | Politics and Law – CNET News.

When Is The Truth Not Stranger Than Fiction!


To answer this question should simply be when it is not a lie! Of course that sounds to simple for words! The real truth is stranger than fiction, and its how the story goes, and fiction is made up to convince us it is the truth! When in fact it is a story made up by the writer, whose sole intention is to be a best seller, and make money! The fact is the real truth is neither a best seller or used to make money, but neither is it fiction, just a shame politicians in this world prefer fiction to the real truth!

Posted from WordPress for BlackBerry.

Slavery By Another Name


Ace News Group:

I was reading today on my news feed about the same thing happening in modern-day Hong Kong, and how domestics have their wages taken from them, by their so-called employers. This being in the name of being allowed to have a job! Will try to find the link to the post and add it to my comment!
Thanks for a great post and video will download and watch it in full on my desktop.
Kindest regards,
Ian {Editor}
Ace News Group

Originally posted on I Love History...and Research:

 

Slavery by Another Name

“Slavery by Another Name is a 90-minute documentary that challenges one of Americans’ most cherished assumptions: the belief that slavery in this country ended with the Emancipation Proclamation. The film tells how even as chattel slavery came to an end in the South in 1865, thousands of African Americans were pulled back into forced labor with shocking force and brutality. It was a system in which men, often guilty of no crime at all, were arrested, compelled to work without pay, repeatedly bought and sold, and coerced to do the bidding of masters. Tolerated by both the North and South, forced labor lasted well into the 20th century.

For most Americans this is entirely new history. Slavery by Another Name gives voice to the largely forgotten victims and perpetrators of forced labor and features their descendants living today.”

View original 10 more words

Can We Trust Facebook With Our Personal Details


Image representing Datalogix as depicted in Cr...

Image via CrunchBase

Facebook on Tuesday made a pointed pitch to Madison Avenue: We know how to get your messages to real people, nearly one billion of them, because we know exactly who they are and whom they trust.

Somini Sengupta of The New York Times, writes that Sheryl Sandberg, the company’s chief operating officersought to assure the industry that Facebook was single-mindedly focused on proving the promise of advertising on its platform.

Facebook’s bread and butter is advertising, and it needs to prove to Madison Avenue that money spent on Facebook will yield measurable results. Facebook, Ms. Sandberg said at a conference, can transform how marketers reach their audience because Facebook knows exactly who is in that audience.

These days, Facebook is pushing stronger than ever at targeted advertising. It is using not only the data it has from its roughly 955 million users worldwide, it is matching that with the trail of data consumers leave as they shop online and offline – and using it to analyze what kinds of advertisements work best on Facebook.

It is a gamble. Facebook also must persuade users to trust the social network with their personal information, writes Ms. Sengupta. Facebook’s new forays reveal the rich trail of data that consumers can leave, often unwittingly, every time they buy groceries with a loyalty card or when they longingly eye a pair of shoes online. All of that data can trickle back to Facebook: With nearly a billion users, the company can find those consumers when they log on to Facebook and direct tailored ads to them.

In an experiment that stirred some controversy, Facebook linked arms with Datalogix, a data-mining company, to glean what individual shoppers buy at offline stores. Datalogix says it gets this information from loyalty card data and other sources.

Facebook can find those shoppers on its own platform if they have a Facebook account. It can then serve them advertisements based on their purchase history. Facebook calls the results promising: Shoppers who are shown advertisements on their Facebook page are spending more at the cash register.

Facebook says it is not sharing its user data with third parties. It also says it makes personal information anonymous by hashing the data, though security researchers have questioned the effectiveness of such tactics.