Legal & Security

04 November 2008

They've Got Your Number: Book Review New York Times

Maybe you're the kind of person who doesn't believe that the kind of person you are can be deduced by an algorithm and expressed through shorthand categorizations like "urban youth" or "hearth keeper." Maybe I'd agree with you, and maybe we're right. But the kind of people -- "crack mathematicians, computer scientists and engineers" -- whom Stephen Baker writes about in "The Numerati" clearly see things differently. In fact, they probably regard such skepticism as more fodder for the math-driven identity formulas they've created to satisfy the consumer-product companies and politicians who hire them.

Read full article

03 November 2008

Hackonomics: Crime still pays for identity thieves-just a little less than it once did Newsweek

Your personal identity isn't worth quite as much as it used to be -- at least to thieves willing to swipe it.

Read full article

02 November 2008

Trojan virus steals banking info BBC

The details of about 500,000 online bank accounts and credit and debit cards have been stolen by a virus described as "one of the most advanced pieces of crimeware ever created".

Read full article

01 November 2008

Cyberattacks target UK's national infrastructure ZDNet

Sustained cyber-espionage attacks are being waged on companies that play a key role in the Britain's national infrastructure, a UK cyber-defence chief has warned.

Read full article

31 October 2008

Antiviral 'Scareware' Just One More Intruder New York Times

How much money can criminals make scaring naïve computer users? Try $5 million a year.

Read full article

Don't Be Dragooned Into the Botnet Army PC World

A favorite multipurpose weapon of online thieves is growing larger and more powerful, according to those who combat the threat.

Read full article

Search engine cache does not infringe copyright, rules US court OUT-LAW News

A court has ruled that Yahoo! and Microsoft had an implied licence to copy and display pages from a website because the operator of that site knew how the search engines' opt-out procedures worked but chose to ignore them.

Read full article

The cyberstalker's handbook: How stalkers operate, and what you can do to protect yourself TechRadar UK

It's tempting to feel that you're anonymous online, protected from potential cyberstalkers by cryptic user names and website privacy settings. But is that really true? How easy is it for a malicious person to track someone down, based solely on personal information they've made available?

Read full article

Economic Crisis May Be Boon For Cybercriminals, Experts Say Dark Reading

One industry sector is actually happy about the current state of the global economy: cybercriminals.

Read full article

Cybercrime wave sweeping Britain BBC

Cybercrime in the UK rose by more than 9% in 2007, according to a new report. Online identity firm Garlik's cybercrime report claims that more than 3.5 million online crimes were committed in the UK last year.

Read full article

30 October 2008

Linking to defamatory material is not the same as publishing it, says Canadian court OUT-LAW News

The publisher of a link to defamatory material does not have any liability for that defamation, a Canadian court has ruled. Liability could only exist if the link publisher made any statement relating to the defamatory material itself, the court said.

Read full article

29 October 2008

Belgian ISP wins reprieve in copyright infringement filtering case OUT-LAW News

A Belgian internet service provider that had been ordered by the courts to filter out copyright-infringing material from its network has won a court reprieve. It will not have to pay the €750,000 in fines that have built up over the past year.

Read full article

Twitter for terrorists: U.S. Army report lays out terror scenarios Computerworld

Terrorists could use Twitter to communicate with terrorist cells to plan, coordinate attacks

Read full article

Alarm raised on teenage hackers BBC

Increasing numbers of teenagers are starting to dabble in hi-tech crime, say experts.

Read full article

28 October 2008

Microsoft Combats Cybercrime in Nigeria PC World

Paradigm Initiative Nigeria and Microsoft have partnered to educate the country's youth on cybercrime and to provide opportunities for them to use their computer skills positively.

Read full article

27 October 2008

Courts put real value on virtual crimes vnunet

A pair of recent criminal cases are placing new value on virtual world actions. Courts in Japan and Europe have decided that damage to property in online worlds warrants real-world legal punishments.

Read full article

Japanes woman arrested for killing virtual husband in Maple Story The Times

A Japanese piano teacher has been arrested for the murder of her virtual husband after an abrupt but messy online divorce.

Read full article

us: Does Child Porn Fight Thraten Privacy? PC World

... Now his successor, Attorney General Andrew Cuomo, has found a new evil to fight in order to make a name for himself: child pornography. If we are to believe the headlines, child pornography is the most prevalent crime committed online, and it seems Cuomo believes selling, trading, or downloading child pornography online is one of the biggest problems online. He has focused his attention on curtailing Internet users' access to newsgroups and pushing ISPs to take more responsibility for users' illegal activities.

Read full article

Suicide of South Korean actress fuels Internet debate Los Angeles Times

The government wants to toughen the punishment for cyber-insulters, who are cited as a factor in the death of Choi Jin-sil. But some say free speech is at stake.

Read full article

25 October 2008

uk: Surveillance - Data with destiny The Guardian

"Which side is he on?" Gordon Brown taunted David Cameron in another effective performance on the financial crisis at prime minister's questions yesterday. The same question, though, must now be asked directly of Mr Brown as the battle between liberty and the power of the state prepares to take another major turning. This new battle is summed up in two recent speeches. The first was delivered last week by the home secretary Jacqui Smith, who outlined plans for a potentially vast new state database that will contain details of every phone call, text message and internet visit made by every person in this country for all time. The new database, said Ms Smith, would be an essential part of the government's revised anti-terrorist strategy. Communications data of this kind is the lifeblood of 95% of serious crime prosecutions and of almost all security service operations in recent years, she said, but it must now be carried further to allow government to store the details of internet communications, including social networking sites.

Read full article

24 October 2008

uk: Hoon defends giant database plans BBC

Transport Secretary Geoff Hoon has said the government is prepared to go "quite a long way" with civil liberties to "stop terrorists killing people". He was responding to criticism of plans for a database of mobile and web records, saying it was needed because terrorists used such communications.

Read full article

23 October 2008

Cyber-attack theory as al-Qaida websites close The Guardian

Websites being used to disseminate propaganda by al-Qaida appear to have come under systematic cyber-attack, forcing the closure of three for well over a month and fuelling speculation that governments are targeting them in a shadowy new front in the "war on terror".

Read full article

A Robot Network Seeks to Enlist Your Computer New York Times

In a windowless room on Microsoft's campus here, T. J. Campana, a cybercrime investigator, connects an unprotected computer running an early version of Windows XP to the Internet. In about 30 seconds the computer is "owned."

Read full article

Dutch teens convicted of virtual theft The Age

A Dutch court has convicted two teenagers of theft for stealing virtual items in a computer game and sentenced them to community service.

Read full article

The Growing Security Concerns... Don't Have Nightmares by Bill Thompson Circle ID

Anyone concerned about the security of their computers and the data held on them might sleep a little uneasily tonight.

Read full article

Registrar Solutions