Legal & Security

04 March 2014

Report Calls for Better Backstops to Protect Power Grid From Cyberattacks New York Times

Despite rising anxiety over the possibility of a cyberattack on the power grid, the industry and government are not set up well to counter the threat, according to a report produced by leading energy security experts. Companies are reluctant to share information with one other, a critical step in reducing vulnerability, because they are afraid of being accused of failing to comply with cybersecurity rules, committing antitrust violations or giving away proprietary information, the report found.

Read full article

28 February 2014

FTC: Identity theft is the plague of the US Network World

The Federal Trade Commission today issued its annual look at what consumers in the United States are complaining about the most.

Read full article

25 February 2014

Syria War Stirs New U.S. Debate on Cyberattacks New York Times

Not long after the uprising in Syria turned bloody, late in the spring of 2011, the Pentagon and the National Security Agency developed a battle plan that featured a sophisticated cyberattack on the Syrian military and President Bashar al-Assad's command structure.

Read full article

24 February 2014

Cyber-security: Law-abiding hackers are helping businesses to fight off the bad guys The Economist

Andrew Whitaker has made a career out of breaking into things. A "white hat" hacker in techie jargon, Mr Whitaker leads a team of security specialists at Knowledge Consulting Group who spend their days trying to worm their way into clients' computer systems to see how vulnerable they are to cyber-criminals, spies and other nefarious "black hats". The team's record is both impressive and alarming. Some of the firm's clients are utilities, and Mr Whitaker and his colleagues often target software that controls critical infrastructure, such as water and power supplies. "We're getting in pretty much every single time," he says.

Read full article

Energy Sector a Prime Target for Cyberattacks CSO

Any government that wants to set priorities for cybersecurity should probably put its energy infrastructure close to the top.

Read full article

22 February 2014

South Korea to develop Stuxnet-like cyberweapons BBC News

South Korea is to develop cyber-attack tools in an attempt to damage North Korean nuclear facilities.

Read full article

Security failings in home routers exposed BBC News

Serious security failings in home routers are getting more attention from both attackers and researchers.

Read full article

20 February 2014

Kim Dotcom to appeal against verdict that New Zealand raid was legal The Guardian

The Megaupload founder Kim Dotcom, who is fighting extradition from New Zealand to the US on internet piracy charges, has said he will appeal against a court ruling that a raid on his mansion was legal.

Read full article

19 February 2014

NZ's Dotcom raid legal, FBI taking evidence not Stuff

Police raids on Kim Dotcom's mansion in 2012 have been declared legal, but FBI removal of electronic information seized in the search was an unauthorised breach, the Court of Appeal has found.

Read full article

17 February 2014

Reporting From the Web's Underbelly New York Times

In the last year, Eastern European cybercriminals have stolen Brian Krebs's identity a half dozen times, brought down his website, included his name and some unpleasant epithets in their malware code, sent fecal matter and heroin to his doorstep, and called a SWAT team to his home just as his mother was arriving for dinner.

Read full article

14 February 2014

Linking to a website doesn't infringe copyright, Europe's Court of Justice says PC World

The owner of a website does not require authorization of the copyright holder to link to freely accessible copyright works on another site, even if Internet users get the impression that the work is appearing on the site that contains the link, the Court of Justice of the European Union (CJEU) said Thursday.

Read full article

Cyber-thieves 'grab video of victims' to steal bank cash BBC News

Cyber-thieves are increasingly grabbing video of how victims use their computer, to better steal from online bank accounts, a security firm reveals.

Read full article

12 February 2014

Survey: Online trolls are 'everyday sadists' CNN

If you've ever complained that the trolls junking up online comment sections are a bunch of sadistic psychopaths, you might be onto something.

Read full article

Huge hack 'ugly sign of future' for internet threats BBC News

A massive attack that exploited a key vulnerability in the infrastructure of the internet is the "start of ugly things to come", it has been warned.

Read full article

08 February 2014

U.S. warns of cybersecurity, privacy threats at Sochi Olympics Reuters

The United States on Friday issued a fresh travel alert for Americans attending the Sochi Winter Olympics, citing cybersecurity threats and warning them to have "no expectation of privacy" using Russian communications networks.

Read full article

02 February 2014

Lawyers for Lavabit founder: judges may dismiss civil liberties concerns The Observer

Civil rights lawyers expressed concern this week that judges reviewing the contempt of court case brought against Lavabit, an email service that was used by the National Security Agency leaker Edward Snowden, were dismissing privacy concerns raised by the case as a "red herring" that had been "blown out of proportion".

Read full article

25 January 2014

FBI warns retailers to prepare for more cyber-attacks The Guardian

The FBI has warned US retailers to prepare for further cyber-attacks after discovering about 20 hacking cases in the past year that involved the same kind of malicious software used against Target Corp in the holiday shopping season.

Read full article

'Revenge porn' website former owner Hunter Moore arrested BBC News

US authorities have arrested two men in California for hacking email accounts and stealing nude photos to post on a so-called "revenge porn" website.

Read full article

Is your fridge sending spam? Not so fast CNET

The security world lit up with news of the first instance of an Internet-connected appliance participating in a botnet. Our fears of Skynet made real had come to pass: not only was your fridge keeping your half-eaten tin of Spam cold, it was sending your e-mail account fresh digital spam at the same time.

Read full article

German court orders Google to block Max Mosley sex party pics Computerworld

A German court has ordered Google to block its search results in Germany linking to photos of former Formula One chief Max Mosley at a sex party.

Read full article

24 January 2014

Computer security: Spam in the fridge - When the internet of things misbehaves The Economist

"The internet of things" is one of the buzziest bits of jargon around in consumer electronics. The idea is to put computers in all kinds of products -- televisions, washing machines, thermostats, refrigerators -- that have not, traditionally, been computerised, and then connect those products to the internet.

Read full article

23 January 2014

U.S. Court: Bloggers Are Journalists The Atlantic

One of the great questions of our time came closer to resolution last week, when a federal court ruled that bloggers are journalists -- at least when it comes to their First Amendment rights.

Read full article

Analysts blame faults in 'Great firewall' for China web outage Financial Times

A high-level malfunction in China's internet architecture put as many as two-thirds of the country's domain websites out of action for several hours this week, hackers and analysts said, though a report on government media blamed the outages on a large-scale cyber attack.

Read full article

18 January 2014

Connected TVs, fridge help launch global cyberattack CNN

It's bad enough that we have to fear identity thieves who are trying to scam us with malicious messages sent from PCs.

Read full article

08 January 2014

2013 was the year of cybersecurity Washington Post

Cybersecurity came up so many times in 2013 that it was easy to miss how quickly and completely it became a central feature of how we think about U.S. foreign policy and national security. Partly, this was an inevitable result of technology becoming more pervasive. And partly it was just an extension of things that had begun in earlier years, such as the U.S. use of cyberattacks on the Iranian nuclear program, which started in 2010.

Read full article

Registrar Solutions