Legal & Security

20 September 2008

FBI on the trail of hackers after Palin's emails made public The Guardian

FBI officials and secret service investigators were trying yesterday to track down hackers who broke into an email account belonging to US vice-presidential candidate Sarah Palin.

Read full article

19 September 2008

Critics: Homeland Security unprepared for cyberthreats CNET

When politicians got together six years ago and decided to glue together a medley of federal agencies to create the U.S. Department of Homeland Security, one of the justifications was a better focus on cybersecurity.

Read full article

Anti-abortion groups to buy ads on Google The Times

Religious groups had accused the search giant of breaching equality laws by banning ads which criticised abortion

Read full article

18 September 2008

Cybercriminals use celebrity names to lure victims Reuters

Looking for information about Brad Pitt or Beyonce on the Web? It could be risky. An internet security firm has dubbed the actor and singer the most dangerous celebrities to search for on the Internet because cybercriminals use their names to lure victims.

Read full article

UK government responds on Phorm BBC

The government has outlined how a controversial online ad system can be rolled out in the UK. In response to EU questions about its legality, it said that it was happy Phorm conformed to EU data laws.

Read full article

17 September 2008

US focusing cybersecurity on backdoors in tech products Network World

As part of a comprehensive cybersecurity push, the U.S. government will focus on improving its network defense capabilities and on revamping acquisition rules to protect against malicious code installed during the manufacturing process of electronic devices.

Read full article

16 September 2008

Do ISPs pose a bigger online privacy threat than Google? Computerworld

The increased monitoring and profiling of Internet users by companies such as Google Inc. and its DoubleClick online advertising subsidiary is widely seen as one of the biggest threats to online privacy. But in reality, said university professor Paul Ohm, the potential for the same kind of activities by ISPs poses a much greater privacy risk.

Read full article

U.N. Agency Eyes Curbs On Internet Anonymity CNET

A United Nations agency is quietly drafting technical standards, proposed by the Chinese government, to define methods of tracing the original source of Internet communications and potentially curbing the ability of users to remain anonymous.

Read full article

14 September 2008

Hackers infiltrate Large Hadron Collider systems and mock IT security Daily Telegraph

Hackers have mounted an attack on the Large Hadron Collider, raising concerns about the security of the biggest experiment in the world as it passes an important new milestone.

Read full article

13 September 2008

eu: Playing a dangerous game with data The Guardian

Thanks to a collapsed ceiling in its Strasbourg chamber, the European parliament will have to stay in Brussels for its plenary session later this month. Yet it would be fanciful to imagine that the respite offered to MEPs from their exhausting high-carbon commute will make them more clear-headed than normal when crafting legislation. For many of them appear intent on using the occasion to mount an ill-conceived attack on civil liberties.

Read full article

12 September 2008

USAF: Cyberspace represents a fifth, costly, realm of warfare Computerworld

Once the USAF Cyber Command was effectively put on ice recently, coverage of the US military's approach to network warfare and defence also went away. The existing infrastructure and systems that had been in place prior to the attempted set up of Cyber Command still continue to operate and the head of US Strategic Command, General Kevin Chilton, recently spoke about a range of the issues being faced in operating the US military's lesser-classified networks.

Read full article

Japan tops world in attack traffic, Akamai reports Network World

What Japan lacks in geographic size, it more than makes up for in Internet attack traffic. Japan accounted for 30 percent of all attack traffic monitored worldwide for the second quarter of 2008, according to a new study issued by content delivery network provider Akamai.

Read full article

Internet drug trafficking skyrockets, experts warn The Age

Drug trafficking on the web has soared as Internet use has become commonplace, presenting far more challenges and dangers than traditional trafficking, experts warned at a conference in Stockholm that wrapped up Wednesday.

Read full article

Brussels in 'frightening' grab for personal information Daily Telegraph

Civil liberties and privacy are being eroded at a "breathtaking" rate by European Union governments, according to a report.

Read full article

11 September 2008

U.S. May Be Preparing Antitrust Suit in Google-Yahoo Partnership New York Times

The US justice department has hired a top Washington lawyer to head up a possible antitrust investigation into the activities of Google.

Read full article

10 September 2008

Threat From DNS Bug Isn't Over, Experts Say Dark Reading

The Domain Name Server design flaw that threatened the entire Internet earlier this year has mostly been patched, but the threat is far from over, experts say.

Read full article

us: Massive Takedown of Anti-Scientology Videos on YouTube Electronic Frontiers Foundation

Over a period of twelve hours, between this Thursday night and Friday morning, American Rights Counsel LLC sent out over 4000 DMCA takedown notices to YouTube, all making copyright infringement claims against videos with content critical of the Church of Scientology.

Read full article

Dealing With I.S.P. Snooping New York Times

Even though Congress has growled loudly enough to get Internet service providers to back off their plans to sell information about their customers' Web surfing to advertising companies, one prominent legal expert argues that the law governing the issue should still be made tougher.

Read full article

Google Tightens Data Retention Policy - Again New York Times

Under pressure from regulators, policymakers and privacy advocates around the world, Google said late Monday that it would further tighten its data retention policy. In its official blog, the company said it would "anonymize" search records after 9 months, rather than the current 18 months.

Read full article

09 September 2008

Pentagon debates development of offensive cyberspace capabilities Los Angeles Times

The current emphasis is on intelligence gathering and defending U.S. electronic security, but some officials think the military should know how to attack other nations' computer systems.

Read full article

Cyber Crime - Time to Stop Nigeria's Dominance Daily Trust

Nigeria ranks third among the cyber crime committing countries in the world, according to a 2007 internet crime report released by the Internet Crime Complaint Centre (IC3), which puts the country alongside the US, UK and Romania among the top ten countries where internet crimes are perpetrated.

Read full article

06 September 2008

Experts call for united global action against cyber attacks The Age

The world has to unite against the growing menace of cyber terrorism, IT experts said Thursday, evoking a recent "cyber war" against Georgia as the latest example of the threat.

Read full article

05 September 2008

Online identity theft: What can be done? OECD Observer

Like in any activity, protecting people's identity online is vital for the future of the Internet economy. What can be done?

Read full article

04 September 2008

Beijing ticket conmen ready to run same scam in London The Times

Fraudsters are planning to exploit the public's newfound enthusiasm for the Olympic Games in London three years before tickets go on sale.

Read full article

02 September 2008

Georgia hacking stirs fears of cyber militias Reuters

Attacks that hit Georgian Web sites after Russian tanks rolled across the border have U.S. officials concerned that independent "cyber militias" will play a growing role on the electronic battlefield.

Read full article

Registrar Solutions