Legal & Security

17 October 2008

Cyber security threats grow in sophistication, subtlety and power Network World

The annual report from Georgia Tech Information Security Center identifies five evolving cyber security threats, and the news is not good.

Read full article

16 October 2008

Hackers could target mobile phones, security experts warn Daily Telegraph

Internet hackers are moving their attention to mobile phones and could harness thousands of devices to dial up premium rate numbers, security researchers have warned.

Read full article

UK security services want personal data from sites like Facebook The Guardian

The British government is drawing up plans to give the police and security and intelligence agencies new powers to access personal data held by internet services, including social network sites such as Facebook and Bebo and gaming networks.

Read full article

Storm over UK's Big Brother database The Independent

Early plans to create a giant "Big Brother" database holding information about every phone call, email and internet visit made in the UK were last night condemned by the Government's own terrorism watchdog.

Read full article

15 October 2008

Storm Botnet May Finally Be Over Dark Reading

The infamous botnet has been inactive for nearly a month, which researchers say may signal the demise of Storm as we know it - as well as that of the super-sized botnet

Read full article

German court: Google Image thumbnails infringe on copyright ars technica

As much as people complain about the challenges of balancing copyrights and fair use in the US, overseas courts have been happy to provide examples that remind us that some aspects of US copyright law are actually fairly liberal. The latest such reminder comes courtesy of a case in Germany that revisits an issue that appears settled in the US: the right of image search services to create thumbnails from copyrighted works to display with the search results. The German courts have now determined that this is not OK in Germany, where Google has just lost two copyright suits over image thumbnails.

Read full article

14 October 2008

Exclusive: Inside Account of U.S. Eavesdropping on Americans ABC News

Despite pledges by President George W. Bush and American intelligence officials to the contrary, hundreds of US citizens overseas have been eavesdropped on as they called friends and family back home, according to two former military intercept operators who worked at the giant National Security Agency (NSA) center in Fort Gordon, Georgia.

Read full article

11 October 2008

Cyberscams exploit consumers' financial unease USA Today

The rippling financial crisis has sent consumers scurrying to the Internet for answers and advice. Online fraudsters are right behind, devising ways to steal personal information.

Read full article

US Air Force to place cyber operations under Space Command NextGov

The Air Force says it will back off its ambitious plan to set up a separate command for cyber space and has opted to place those operations within an existing organization.

Read full article

10 October 2008

US Air Force pursues Cyber Command again NextGov

Top Air Force leadership has decided to pursue forming Cyber Command to defend Defense Department networks and to launch cyberattacks against foes after putting the project on hold in August.

Read full article

Cybercrime: An online game of cat and mouse Sydney Morning Herald

Fraudsters require anonymity to stay out of jail, but in the cat-and-mouse world of financial security the good guys often live in the shadows too.

Read full article

Hacker's list of online accounts spooks users Sydney Morning Herald

When Australian web users learned from the Herald that details of their online accounts had been posted on a hacker's website for all to see, they were suspicious, then alarmed, then furious at the hacker who compromised their identities.

Read full article

Inside the hackers' den Sydney Morning Herald

Hunched over a computer terminal in his pyjamas, "Frank" makes more money than a small-time drug dealer without ever having to worry about being caught or even leaving the house.

Read full article

IBM, Secret Service, others study identity/cybercrime issues Computerworld

Center for Applied Identity Management Research organization teams experts in criminal justice, financial crime, biometrics, cybercrime and cyberdefense, data protection, homeland security and national defense.

Read full article

Security matters: Cybercrime will need company co-operation Financial Times

March was a worrying month for Dan Kaminsky. The security researcher suddenly realised the internet was inherently broken. It wasn't just slightly wonky, or coming loose at the hinges. The underlying design was kaput and if he didn't get it fixed quickly and quietly, no one would be able to rely on it any more.

Read full article

09 October 2008

uk: Lords to debate gov't progress on internet security ZDNet

The House of Lords will debate personal internet security on Friday, with the aim of assessing the progress the government has made on protecting the public.

Read full article

Clickjacking: Net game turns PC into undercover surveillance zombie The Register

Underscoring the severity of a new class of vulnerability known as clickjacking, a blogger has created a proof-of-concept game that uses a PC's video cam and microphone to secretly spy on the player.

Read full article

08 October 2008

Facebook, MySpace and LinkedIn new spam sources The Age

Facebook, MySpace and LinkedIn are being blamed for a boom in sophisticated email scams in which criminals mining the information on social networking sites to create personalised attacks.

Read full article

au: Privacy lags in technology rush Sydney Morning Herald

The federal minister in charge of privacy, John Faulkner, has warned that personal information posted on social networking websites can linger forever "like an ill-considered tattoo".

Read full article

Kiwi academic to co-chair APAC security forum Computerworld

A global e-business and security certification organisation is warning that the many commercial applications being produced across the globe are creating new opportunities for malicious attacks on commercial and government institutions.

Read full article

06 October 2008

British government will spy on every call and email Sunday Times

Ministers are considering spending up to £12 billion on a database to monitor and store the internet browsing habits, e-mail and telephone records of everyone in Britain.

Read full article

04 October 2008

EBay shoppers using PayPal get better protection Daily Telegraph

EBay shoppers are to receive full refunds for faulty or non-existent goods bought on the site after a long campaign against the payment service PayPal.

Read full article

British spies take war on terror into cyberspace The Independent

Britain's security agencies are fighting a covert war in cyberspace against extremist Islamist internet sites as part of a new anti-terrorist strategy, senior Whitehall officials have revealed.

Read full article

Cyber crime on the rise in Australia ABC 7.30 Report

Buying goods or services on the internet has become common practice for many Australians, but some cyber consumers have become victims to rogue sellers who fail to deliver. How common is online fraud and what are Australian authorities doing about it?

Read full article

03 October 2008

US Senate bill sets guidelines for cybersecurity center CNET

A new authorization bill would give the White House more oversight of the Homeland Security Department's much-beleaguered cybersecurity efforts.

Read full article

Registrar Solutions