Legal & Security

18 January 2009

Tricky Windows Worm Wallops Millions Washington Post

A sneaky computer worm that uses a virtual Swiss army knife of attack techniques has infected millions of Microsoft Windows PCs, and appears to be spreading at a fairly rapid pace, security experts warn.

Read full article

17 January 2009

us: Intelligence Court Rules Wiretapping Power Legal New York Times

A federal intelligence court, in a rare public opinion, issued a major ruling validating the power of the president and Congress to wiretap international phone calls and intercept e-mail messages without a specific court order, even when Americans' private communications may be involved.

Read full article

us: Advertisers collaborate on privacy principles for behavioural ads OUT-LAW News

Advertisers and agencies in the US have promised to create a code of practice to allay fears about increasingly intrusive forms of online advertising. Four major advertising trade associations said that they will work together on self-regulation.

Read full article

16 January 2009

German Chatroom Addict on Trial for Two Murders Der Spiegel

A German man who met around 150 women in Internet chat rooms went on trial in Germany on Wednesday charged with murdering two of them. Dubbed "Germany's First Internet Murderer" in the press, he has confessed to the killings, but denies he's a serial killer.

Read full article

Judge Orders Search of Bush Administration Appointees' E-Mails Washington Post

With Bush administration White House aides on their way out the door in coming days, a federal judge this morning ordered the president's executive office to undertake a comprehensive search for millions of senior appointees' e-mails that have been inaccessible and possibly missing since 2005.

Read full article

15 January 2009

Gaza crisis spills onto the web BBC

A propaganda war is being waged on the internet between supporters of the Israeli and Palestinian sides in the current conflict in the Gaza Strip.

Read full article

NZ Police use Facebook to catch bungling burglar The Times

Police in New Zealand have made their first "Facebook arrest" after placing CCTV footage of a burglar removing his balaclava during the burglary on the social networking site.

Read full article

Cyber-thieves plant virus on Paris Hilton's website Daily Telegraph

Paris Hilton, the hotel heiress, has fallen prey to cyber-thieves who hacked into her website and infected it with a virus to steal her fans' identities.

Read full article

Genius who wasted $1bn? My son Gary McKinnon was just looking for ET The Times

If you believe the Pentagon and Nasa, Janis Sharp is the mother of an evil genius. Her son is Gary McKinnon, the Briton accused of the biggest hacking operation in US military history, and whose $1 billion wrecking spree through cyberspace - he says it was a quest to uncover evidence of alien life forms - has left his family in their own twilight zone.

Read full article

Groups file FTC complaint over cell phone privacy Computerworld

You may not know it yet, but your cell phone is becoming the new battleground in the war between consumer rights groups and the behavioral advertising community.

Read full article

Online Privacy Decisions Confront Obama Washington Post

President-elect Barack Obama is about to face his first tests on consumer privacy, with questions about how much personal information Internet companies should be able to collect about consumers, how long they should keep that data, and whether they should use it to serve ads to Web surfers.

Read full article

13 January 2009

Nasa hacker Gary McKinnon could be tried in Britain Daily Telegraph

Gary McKinnon, the British hacker accused of breaking into the Pentagon and Nasa computer systems, could be tried in Britain to prevent his extradition to the US.

Read full article

12 January 2009

Why Technology Won't Prevent Identity Wall Street Journal

Impersonation isn't new. In 1556, a Frenchman was executed for impersonating Martin Guerre and this week hackers impersonated Barack Obama on Twitter. It's not even unique to humans: mockingbirds, Viceroy butterflies, and the brown octopus all use impersonation as a survival strategy. For people, detecting impersonation is a hard problem for three reasons: we need to verify the identity of people we don't know, we interact with people through "narrow" communications channels like the telephone and Internet, and we want computerized systems to do the verification for us.

Read full article

11 January 2009

UK e-mail law 'attack on rights' BBC

Rules forcing internet companies to keep details of every e-mail sent in the UK are a waste of money and an attack on civil liberties, say critics.

Read full article

10 January 2009

MI5: Internet phone services a risk to national security Computerworld

Internet telephone services pose a serious threat to Britain's security, the head of MI5 said.

Read full article

Canadian model wants Google to ID blogger she says defamed her Canoe

[Canadian Press] A Canadian model is taking Google to court in an attempt identify an anonymous blogger she says has been using the company's Blogger service to defame her.

Read full article

09 January 2009

US security braced for 'cybergeddon' The Age

[AFP] Cyber attacks pose the greatest threat to the US after nuclear war and weapons of mass destruction - and they are increasingly hard to prevent, FBI experts said Tuesday.

Read full article

Social networks link terrorists Network World

[IDG] A new breed of terrorists are using online forums to recruit people who align themselves with the mission of Al Qaeda, creating global networks of would-be terrorists who pose a growing threat, a senior cyberterrorist researcher warned this week.

Read full article

Report: Phishing A Low-Paying, Low-Skills Job Dark Reading

Most experts agree that phishing has become more automated, sophisticated, and widespread. But that doesn't mean all phishers make big bucks, according to a recently published report.

Read full article

Aussie pair in $4m Nigerian scam Sydney Morning Herald

Two Queenslanders have been charged over recruiting people to a Nigerian scam which netted the fraudsters more than $4.3 million.

Read full article

07 January 2009

Despite Economy, Security Spending To Increase In 2009 Dark Reading

Despite a troubled economy, both large and small enterprises are poised to spend a higher percentage of their IT budgets on security in 2009, a major research firm said today.

Read full article

British Police 'encouraged' to hack more BBC

The Home Office has signed up to an EU strategy against cybercrime that "encourages" police across Europe to remotely access personal computers.

Read full article

06 January 2009

Twitter and Facebook hit by phishing attacks The Observer

Twitter users have become used to giving their Twitter passwords to other sites, and now they've been hit with a phishing attack

Read full article

05 January 2009

British police set to step up warrantless hacking of home PCs Sunday Times

The Home Office has quietly adopted a new plan to allow police across Britain routinely to hack into people's personal computers without a warrant.

Read full article

04 January 2009

Cyber ID theft concern as 'space faking' soars Sun Herald

The growing trend of online "space faking", where users masquerade as other people, has reignited concerns about the safety and security of social networking sites.

Read full article

Registrar Solutions