Legal & Security

04 June 2009

US grapples with how to retaliate in cyber attacks Washington Post

In the murky world of computer espionage, the U.S. faces hard choices on how to retaliate when government or privately owned networks come under cyber attack, senior military and intelligence officials said Tuesday.

Read full article

Opting out of targeted ads too hard, US privacy advocates say Computerworld

The online advertising industry and U.S. policy makers need to give online users more control over the collection of personal data and surfing habits beyond the traditional opt-out approach, some privacy advocates said today.

Read full article

US telecoms fight claims of illegal spying Financial Times

A US federal judge on Wednesday dismissed lawsuits accusing telecommunications companies of illegally spying on Americans, citing a controversial law granting those companies retroactive immunity.

Read full article

03 June 2009

Arizona man arrested over live internet rape The Guardian

Police in Arizona have arrested a 20-year-old man over allegations that he raped a woman live on the internet.

Read full article

Google Is Top Tracker of Surfers in Study New York Times

When asked about online privacy, most people say they want more information about how they are being tracked and more control over how their personal information is used. Those consumer expectations are rarely in line with the data collection practices of Internet companies, which often collect information about their users not only on their own sites, but also when those users visit other sites across the Web.

Read full article

31 May 2009

Contractors Vie for Plum Work, Hacking for the United States New York Times

The government's urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts.

Read full article

The Misunderstandings of Ownership - Can You Copyright a Tweet (in the US)? Can You Copyright a Tweet

I'm all for people being passionate about what they believe. That's true even if I disagree. But, there's a point where you have to ask yourself if you have the proper basis for your belief. Our systems of thought all flow from somewhere, but we really should step back and evaluate the basis of our passion a bit more objectively.

Read full article

30 May 2009

Obama Outlines Coordinated Cyber-Security Plan New York Times

President Obama declared Friday that the country's disparate efforts to "deter, prevent, detect and defend" against cyberattacks would now be run out of the White House, but he also promised that he would bar the federal government from regular monitoring of "private-sector networks" and the Internet traffic that has become the backbone of American communications.

Read full article

Pentagon Plans New Arm to Wage Wars in Cyberspace New York Times

The Pentagon plans to create a new military command for cyberspace, administration officials said Thursday, stepping up preparations by the armed forces to conduct both offensive and defensive computer warfare.

Read full article

Experts: Gumblar attack is alive, worse than Conficker CNET

The Web site compromise attack known as Gumblar has added new domain names that are downloading malware onto unsuspecting computers, stealing FTP credentials to compromise more sites, and tampering with Web traffic, a security firm said on Thursday.

Read full article

Craigslist chief Jim Buckmaster: we're the victim of a witch-hunt The Guardian

Classified advertising website Craigslist has been the victim of a "witch-hunt" by self-interested politicians and the hypocritical media, according to the man in charge of the company.

Read full article

29 May 2009

EBay has 'no legal duty' to protect others' trade marks, says UK High Court OUT-LAW News

Online auction site eBay has "no legal duty" to protect other companies' trade marks or stop its sellers from infringing them, the High Court has said.

Read full article

Obama Cybersecurity Review Due Friday National Journal

White House Press Secretary Robert Gibbs told reporters Tuesday the results of the Obama administration's 60-day review of the federal government's cybersecurity posture will be released Friday.

Read full article

More Than 80% Of Phishing Attacks Use Hijacked, Legitimate Websites Dark Reading

New research from the Anti-Phishing Working Group shows how phishers are better covering their tracks -- and what to do when phishers compromise your Website

Read full article

27 May 2009

Obama Set to Create A Cybersecurity Czar With Broad Mandate Washington Post

President Obama is expected to announce late this week that he will create a "cyber czar," a senior White House official who will have broad authority to develop strategy to protect the nation's government-run and private computer networks, according to people who have been briefed on the plan.

Read full article

26 May 2009

Clickjacking: Hijacking clicks on the Internet CNET

What if you reached to grab a newspaper out of a news stand and you found a rock in your hand instead? How about opening the front door to a grocery store and ending up on a boat?

Read full article

US Judge Backs Craigslist in South Carolina Case Wall Street Journal

A federal judge on Friday blocked South Carolina's attorney general from making any move to prosecute Craigslist Inc. executives for ads that lead to prostitution arrests while the company pursues a lawsuit against the state.

Read full article

Unlikely Allies Say U.K. Libel Laws Limit Speech New York Times

The American Civil Liberties Union may not often see eye-to-eye with the American Center for Democracy, a research group with neoconservative credentials. But the two organizations are united on at least one thing: their distaste for British libel laws, which they say are being exploited to suppress free speech in Britain and beyond.

Read full article

24 May 2009

In Germany, widespread spying is back, this time electronically by corporations Los Angeles Times

Hundreds of thousands of employees have had their mobile phone, e-mail and computer records secretly searched. Companies say they did it to expose misconduct.

Read full article

23 May 2009

Cybersecurity Groups Launch "Chain of Trust" Initiative to Combat Malware Center for Democracy and Technology

[news release] Three of the world's leading cybersecurity groups today launched a new initiative to combat malicious software (malware) by establishing a "Chain of Trust" among all organizations and individuals that play a role in securing the Internet.

Read full article

EBay win against L'Oreal in UK High Court Computerworld

EBay Inc. cannot be held legally accountable for the sale of fake L'Oreal goods, including perfumes and face creams, on its Web site, according to a decision in the U.K. High Court.

Read full article

'Gumblar' PC virus targets Google users, warn experts The Guardian

A computer virus that targets Google users is mutating rapidly, turning it into what some are calling the biggest threat to online security today.

Read full article

22 May 2009

English cricket calls for tough new laws on ticket touts The Guardian

The England and Wales Cricket Board has called for tough new laws against ticket touts, after private investigators employed by the board tracked down more than 1,900 "black market" tickets for the ICC World Twenty20 made available through internet sites such as eBay.

Read full article

Conficker still infecting 50,000 PCs per day Computerworld

The Conficker worm is still infecting systems at a brisk rate and continues to snag computers in Fortune 1000 companies, according to security researchers.

Read full article

Websites 'keeping deleted photos' BBC News

User photographs can still be found on many social networking sites even after people have deleted them, Cambridge University researchers have said.

Read full article

Registrar Solutions