Model and celebrity Charlotte Dawson death

Model and famous person Charlotte Dawson, who had long fought the battle against depression, was found deceased in her Sydney apartment on Saturday.

Ms Dawson, 47, who in her book Air Kiss & Tell detailed her the past of depression, saying she was often visited by the “depression bogeyman”, is believed to have hanged herself in her luxury Woolloomooloo apartment. The estate manager, who was due to take her apartment to auction on Saturday, raised the alarm and the building doorman found her body. Apparently friends were concerned after she hadn’t tweeted for 19 hours.

Since losing her role on Australia’s Next peak Model it is believed that she was struggling monetarily. Her ex-husband, Scott Miller, who she said was the ‘love of her life’, had newly done an interview with Channel 9’s 60 minutes, talking about the role his drug addiction had played in the downfall of their wedding.

Social media had played a huge part in Ms Dawson’s life, and cyberbullying via Twitter led to her being hospitalised after an attempted suicide in 2012. Kate Carnell, chief executive of Beyond Blue said that bullying via social media can be a major factor in triggering mental health issues. She told ABC News Online, “Because people can bully anonymously, it makes it additional likely and it makes it more dangerous.”

The Federal Government has managed to get Google, Facebook, Yahoo and Microsoft to agree to guidelines when handling complaints about hateful material on social media. It is also considering a scheme which would make the civil prosecution of cyberbullying simpler.

That Charlotte Dawson was driven to take her own life is indeed sad information, that her ‘friends’ have taken to social media to express their grief, the extremely platform said to be responsible for her demise, is even sadder.

Charlotte, herself a prolific tweeter and instagramer, has fought a very public battle with cyberbullies. And when her demons became too much for her to bear, it appears her lack of social media activity is what alerted her ‘friends’ that there was something incorrect.

Australian television star Charlotte Dawson dead

Sydney’s The Sunday Telegraph newspaper reported that she was found hanged. In 2012, she was admitted to a Sydney hospital later than a suicide attempt following an ongoing tirade of abuse on Twitter. She had taken medicine tablets with wine and tweeted: “you win” in a suicide note to her cyber tormentors.

She later made fighting bullying her individual mission, waging an anti-bullying media campaign on TV and radio and in newspapers and magazines as well as her beloved Twitter. Her efforts and high public profile on the problem were recognized by the National Rugby League, a main Australian football association, which final year made her an anti-bullying ambassador.

The NRL’s One-Community campaign is an extension of its zero-tolerance policy toward racial abuse in football. Dawson revealed in her 2012 autobiography “Air Kiss & Tell” that she was often visited by the “depression bogeyman.”

She had long graced the pages of women’s gossip magazines and scenes in reality TV shows. Her modeling career had taken her to Italy, Britain and Germany during the 1980s. New Zealand Prime Minister John Key tweeted he was “surprised and saddened” by the news of her death.

The Sun-Herald newspaper in Sydney reported Sunday that her body was found only minutes before her luxury waterside apartment was due to be sold at auction. The tragedy was discovered the day after the birthday of her former companion, Scott Miller, an Australian Olympic silver medal-winning swimmer who became addicted to the drug ice and accrued several convictions for criminal drug and firearm possession.

Dawson professed her enduring love for Miller and sadness at his fall from grace ahead of Australian “60 Minutes” broadcasting an exclusive talk with him on Feb. 16. Kate Carnell, chief executive of Beyond Blue, a not-for-profit business promoting depression awareness, criticized Twitter for failing to sign up to an Australian government complaint-handling program designed to eliminate hateful material from social media sites.

Facebook, Google, Yahoo and Microsoft signed up to the project final year. “There’s lots additional work that citizens like Twitter need to do,” Carnell told The Sun-Herald.

Actor Jackie Chan dead 2014

News of actor Jackie Chan’s death spread quickly earlier this week causing concern among fans across the world. However the February 2014 report has now been confirmed as a complete hoax and just the latest in a string of fake celebrity death reports. Thankfully, the actor best known for his roles in Shanghai Noon, Rush Hour or Police Story is alive and well.

Rumors of the actor’s alleged demise gained traction on Sunday after a ‘R.I.P. Jackie Chan’ Facebook page attracted nearly one million of ‘likes’. Those who read the ‘About’ page were given a believable account of the actor’s passing.

Hundreds of fans immediately started writing their messages of condolence on the Facebook page, expressing their sadness that the talented 59-year-old actor was dead. And as usual, Twittersphere was frenzied over the death hoax.

Where as some trusting fans believed the post, others were immediately skeptical of the report, perhaps learning their lesson from the huge amount of fake death reports emerging about celebrities over recent months. Some pointed out that the news had not been carried on any major network, indicating that it was a fake report, as the death of an actor of Jackie Chan’s stature would be major news across networks.

A recent poll conducted for the Celebrity Post shows that a large majority (73%) of respondents think those Jackie Chan death rumors are not funny anymore.

On Monday (February 17) the actor’s reps officially confirmed that Jackie Chan is not dead. “He joins the long list of celebrities who have been victimized by this hoax. He’s still alive and well, stop believing what you see on the Internet,” they said.

Some fans have expressed anger at the fake report saying it was reckless, distressing and hurtful to fans of the much loved actor. Others say this shows his extreme popularity across the globe.

Actor Will Smith dead 2014

Information of actor Will Smith’s death spread quickly earlier this week causing concern among fans across the world. However the February 2014 report has now been confirmed as a complete hoax and now the newest in a string of fake celebrity death reports.

Thankfully, the actor best known for his roles in The Pursuit of Happyness, Men in Black or The Fresh Prince of Bel-Air is alive and well.

Hundreds of fans directly started writing their messages of condolence on the Facebook page, expressing their sorrow that the talented 45-year-old actor and rapper was dead. And as normal, Twittersphere was frenzied over the death hoax.

Where as some trusting fans believed the post, others were immediately skeptical of the statement, perhaps learning their lesson from the large amount of fake death reports emerging about celebrities over recent months.

Some pointed out that the information had not been carried on any main American system, indicating that it was a fake information, as the death of an actor of Will Smith’s stature would be major news across networks.

A fresh poll conducted for the Celebrity Post shows that a large majority (80%) of respondents think those Will Smith death rumors are not funny any longer.

On Thursday (February 13) the actor’s reps officially confirmed that Will Smith is not dead. “He joins the long list of celebrities who have been victimized by this hoax. He’s still alive and well, stop believing what you see on the Internet,” they said.

A few fans have expressed anger at the fake information saying it was reckless, distressing and hurtful to fans of the much loved actor. Others say this shows his extreme popularity across the world.

Credit and debit card fraud targets US hotel visitors

White Lodging, the company behind a number of of the hotels in the US chains Hilton, Marriott, Sheraton and Westin, has been leaking thousands of guests’ credit and debit card information throughout much of 2013.

safety journalist Brian Krebs reports hearing from banking business sources in January regarding a pattern of fraud on cards used at the hotels from about 23 March 2013 up until the end of 2013.

The fraud popped up in exact hotels located in the US cities of Austin, in Texas; Chicago, in Illinois; Denver, in Colorado; Los Angeles, in California; Louisville, in Kentucky; and Tampa, in Florida.

The common denominator, it turns out, is that all of the affected hotels in those locations contain businesses run by White Lodging Services Corporation, which owns, develops and/or manages premium hotel brands.

Krebs’s sources said that it was mostly the restaurants, gift shops and other businesses that White Lodging runs within some of the hotels that were targeted, as opposed to the front desk computers that verify guests in and out.

That means that the only Marriott guests who should be affected are those who used their cards at gift shops and restaurants, Krebs notes.

Marriott issued a statement saying that “one of its franchisees has experienced unusual fraud patterns in connection with its systems that process credit card transactions at a number of hotels across a range of brands, including some Marriott-branded hotels.”

Sophos’s Chester Wisniewski and Numaan Huq have been tracking malware behind rigged PoS systems for more than three years and are on the brink of presenting their research at this year’s RSA Conference.

Marriott mentioned fraud “at a number of hotels across a range of brands”, which makes it sound similar to we still might well hear of other hotel brands serviced by White Lodging having been targeted.

So if you’ve been in a hotel, paid for something in a hotel restaurant or gift shop, bought crafting supplies, or fundamentally touched any sliver of plastic in your wallet or purse at all whatsoever to buy so much as a gumball, keep an eye out for funky charges on your report.

Spy agencies are slurping individual data from spongy cell phone apps

The US’ National safety Agency (NSA) and its UK counterpart, GCHQ, have been honing their data-slurping technologies to suck up anything they can get from leaky smartphones, the protector reported on Tuesday.

Beyond device details, data shared over the internet by iOS and Android apps can include personal information such as age, gender, and location, while some apps share even more responsive user information, such as sexual first choice or whether a given user might be a swinger.

The Guardian, relying on top-secret documents handed over by whistleblower Edward Snowden, says that the spy guys are increasing capabilities to milk this private information from apps as innocuous as the insanely popular Angry Birds game.

Reporting in partnership with the New York Times and Pro Publica, they revealed that the NSA and GCHQ have “common tools” ready to throw against iPhone, Android and other phone platforms.

The agencies also apparently think of Google Maps as a gold mine. The Guardian reports that one project involved intercepting Google Maps queries from smartphones to collect large volumes of location data.

The documents suggest that, depending on how much information a user has provided in his or her profile on a given app, the organization could collect “almost every key detail of a user’s life”, the protector reports: home country, current location (through geolocation), age, gender, zip code, marital status – options included “single”, “married”, “divorced”, “swinger” and more – income, ethnicity, sexual orientation, education level, and amount of children.

Given how popular Angry Birds is, and given that the secret documents use it as a case study, some articles have hung Angry Birds in their headlinery – that’s like finery, but with headlines instead of undies.

But Angry Birds shouldn’t be singled out as being in any way subverted or corrupted by the NSA or GCHQ.

Angry Birds is, after all, just one of thousands of mobile apps, none of which has been indicted as complicit with, or data-raked by, the NSA or GCHQ – rather, the spying agencies are, as news reports say, simply tapping data as it flies across the network.

It’s easy to see why: it’s a heck of a lot more fun to have apps spill your beans, since in switch over we get linked to communities or get shiny doo-dads. All we have to do is fill out profiles with stuff they actually don’t, really, need – birthdates, marital status, etc.

We can take back a large chunk of our privacy simply by refusing to hand over data, whether it’s given in a profile or beamed out when we have WiFi and/or geolocation turned on.

Cinching our data waistbands can be done with three simple steps, outlined by Naked safety in the Privacy Plan Diet.

If you can live without “discover My iPad” or other such geolocation-dependent goodies, you can keep a lot of your data out of the hands of spies, marketers or other data busybodies.

But beyond information knowingly handed over in profiles, phone apps have a nasty habit of distribution more data than users may realize.

Sometimes the holes come from software bugs, but then again, sometimes data leakage is an unintended effect of users’ own, deliberate actions, such as:

Twitter users having geolocation turned on, using the word “home” in their tweets and, Presto! thereby potentially handing a nosy small function their home address.

Soldiers snapping photos that smartphones then mechanically geotag, giving the enemy their coordinates.

Beyond bugs and deliberate leakage from probably-inattentive users is yet another category: apps that silently gulp data in the environment while they’re doing innocent-seeming things in the foreground, such as being a flashlight or a mobile phone app for kids.

Law enforcement in US, China, India, Romania work together to arrest hackers-for-hire

US China India Romania flagsLaw enforcement in four countries have managed to work together to take down a number of hackers-for-hire, all accused of operating websites present to break into email financial statement for a fee.

Arrests were made over the last week in the US, China, India and Romania, with customers of hacking services also picked up in the US, making a total of eleven arrests all told.

The target of the corresponding leap was a cluster of websites offering bespoke hacking services, mainly breaking into email and social networking sites for a variable fee. It’s not clear whether there was any connection between the sites or their operators, other than their public business model.

In the US, the FBI filed charges against five people, the main targets being two men from Arkansas idea to be behind the needapassword.com site.

The site is thought to have been involved in breaching over 6,000 email accounts. The men could face up to five-years jail time if found blameworthy.

The additional three defendants are accused of being customers of hacking sites. Two paid just over $1,000, while the third, from California, is alleged to have handed over more than $20,000 to a Chinese hacking site.

The Feds did not disclose whether this was the same site operated by Ying “Brent” Liu, who was picked up by Beijing police in link with another email hacking website, hiretohack.net, linked to around 300 account compromises. Local reports claim Liu “confessed all through examination”.

In the intervening time in India another man was under arrest, described by local law enforcement reports as only “a Pune based private person” but named by the FBI as Amit Tiwari and linked to two websites connected to over 900 email account breaches.

Lastly, Romanian police have picked up and charged four people regarding six unlike websites which may have been behind around 1,600 further account break-ins.

All in all it seems like a pretty successful operation, made all the more impressive by the complexities of international cybercrime law and the difficulties involved in coordinating action connecting several law enforcement agencies, all operating under different legal codes.

Cybercrime and law blogger Gary Warner called the cooperative effort “unparalleled” and a “great sign” of tough times to come for cybercrooks.

As well as given that details and screenshots of many of the sites involved, Warner also speculates that the Romanian haul may include the notorious celebrity-hacker known as Guccifer, before now thought to have been picked up last week.

Cybercrime is a worldwide problem and requires worldwide measures to combat it. As we’ve seen several times recently, the cyber cops of the world seem to be doing an ever superior job of working together, pooling information and assets and coordinating cases across borders to good result.

Hand and computer. Image courtesy of ShutterstockWe’re also seeing ever more action on the legal side of things, with countries from Pakistan to Nigeria effective on or finishing new laws to deal with cybercrime.

If President Goodluck Jonathan gets his way, the Nigerian proposal may even include the death sentence for cases involving dangerous transportation or loss of life, according to local information.

It’s significant for those drafting and favorable these laws to take into account the global nature of cybercrime, and make sure their local laws enable teamwork and collaboration with legal systems and enforcement agencies around the world.

So, it might be best to steer clear of punishments some might think a little great.

On a brighter note, if the trends demonstrated in the hackers-for-hire case continue, we could one day end up with a properly organized set of laws covering digital crimes all over the world, and a set of enforcement agencies to back them up, all working in unity.

Brad Pitt death hoax spreads on Facebook

News of actor Brad Pitt’s death extends quickly earlier this week cause concern among fans across the world. However the August 2013 report has now been established as a complete hoax and just the latest in a string of false celebrity death reports.

A rumor of the actor’s supposed gained traction on Monday after a ‘R.I.P. Brad Pitt’ Facebook page involved almost one million of ‘likes’. Those who read the ‘About’ page were given a credible account of the American actor’s passing:

    “At about 11 a.m. ET on Monday (August 05, 2013), our beloved actor Brad Pitt passed away. Brad Pitt was born on December 18, 1963 in Shawnee. He will be missed but not forgotten. Please show your sympathy and pity by commenting on and liking this page.”

Hundreds of fans right away started writing their messages of condolence on the Facebook page, expressing their sorrow that the gifted 49-year-old actor and producer was dead. And as usual, Twitter sphere was frenzied over the bereavement hoax.

Whereas some trusting fans thought the post, others were right away skeptical of the report, perhaps learning their lesson from the vast amount of false death reports rising about celebrities over recent months. Some pointed out that the news had not been approved on any major American network, representing that it was a fake report, as the death of an actor of Brad Pitt’s stature would be main news across networks.

Brad Pitt Death Hoax Dismissed Since Actor Is ‘Alive and Well’

On Tuesday (August 06) the actor’s reps formally confirmed that Brad Pitt is not dead. “He joins the long list of celebrities who have been mistreated by this hoax. He’s still alive and well, stop believe what you see on the Internet,” they said.

Some fans have expressed anger at the fake report saying it was reckless, distressing and hurtful to fans of the much loved actor. Others say this shows his extreme popularity across the globe.

Uncool cyberpunk held responsible for unrevealing swimwear images of musician Victoria Justice

United states musician Victoria Rights is not satisfied that someone (she places blame on a hacker) has released swimwear pictures of her onto the world wide web.

I’ve never observed of Victoria Rights, which may mean that the 20-year-old musician isn’t focusing on my particular market, but she is clearly popular enough to create statements when she statements that the pictures released of her were thieved by a cyberpunk.

Media who protected the tale described the released pictures as “semi-racy… but nothing of the R-rated wide range, displaying Victoria completely dressed but in a showering suit”.


Clearly, however, Rights – who has her own display on Nickelodeon known as “Victorious” – was not entertained and is looking for, err, justice.

    Coughing & taking is NOT COOL. #RespectPeoplesPersonalProperty #Karma

And she is right, of course, hacking into somebody’s personal records and taking pictures is *not* cool. And it’s even less cool for sites to take the thieved pictures and to post them on the net.

And yet it seems to keep on occurring, and the sites appear to get away with it scot-free.

For example, we’ve seen “news” sites posting romantic pictures of  celebrity spam news like  Scarlett Johansson, Mila Kunis, Christina Aguilera, and many other superstars in the last without any obvious repercussions.

Although online hackers can get severe charges for obtaining superstar records and taking pictures, we don’t listen to anything about the rumors sites that voluntarily went community with the thieved content.

Ashton Kutcher’s Twitter hacked with pro-SSL graffiti

Celebrity Ashton kutcher, perhaps best known to many people as Mr Demi Moore, seems to have had his Tweets consideration affected while he joined the brainbox TED Meeting in Lengthy Seaside, Florida. And the doubt has to be that a deficiency of SSL protection was responsible.

Messages published to Ashley Kutcher’s ‘aplusk’ consideration, which were distributed to his more than 6.4


Ashton, you’ve been Punk’d. This consideration is not protected. Guy, where’s my SSL?

and

P.S. This is for those younger demonstrators all over the globe who are entitled to not to have their Facebook or myspace & Tweets records affected like this. #SSL

Tools such as Firesheep make it kid’s perform for anybody seated near to you to leap onto your Facebook or myspace or Tweets period if you’re using unencrypted WiFi without an SSL relationship, for example at a free WiFi hot spot.

Wouldn’t it be great if Tweets pressured the use of HTTPS at all times? Clearly whoever affected into Ashley Kutcher’s Tweets consideration seems the same.

The vulnerable Tweets and Facebook or myspace records of some superstars provide a very attractive focus on for cybercriminals who may wish to propagate their risky or spam news hyperlinks to an incredible number of supporters. We should just be thankful that on this event the crack seems to have taken place to advertise better attention of the need for better protection, rather than with more harmful purpose.

Other star sound system at the TED conference consist of Windows Invoice Gateways, artist Bobby McFerrin, film maker Morgan Spurlock, artist Jerr Mraz and bigwigs from the Honda Engine Organization and Coke. Let’s wish they’re more cautious if they choose to accessibility their public networking records from the conference.