Legal & Security

19 April 2014

Heartbleed Highlights a Contradiction in the Web New York Times

The Heartbleed bug that made news last week drew attention to one of the least understood elements of the Internet: Much of the invisible backbone of websites from Google to Amazon to the Federal Bureau of Investigation was built by volunteer programmers in what is known as the open-source community.

Read full article

It's simple: criminalize revenge porn, or let men punish women they don't like The Guardian

Parting from someone you love is never easy. It often means watching the affection and intimacy you once shared turn into bitterness and resentment. It often means sorting out who sees the children when, who lives where, and who gets what.

Read full article

18 April 2014

Just how safe is the Internet of Things? Business Spectator

A disgruntled job applicant hacks into Maroochydore's sewerage system, releasing a lethal stink across the town. Political pranksters hack into a Sydney road traffic sign and tweak it to display a less than pleasant missive to the government.

Read full article

17 April 2014

NZ High Court: Kim Dotcom Can Have His Cars, Millions in Cash Returned TorrentFreak

The High Court in New Zealand today ruled that police may not keep possession of assets seized in a 2012 raid on Kim Dotcom's mansion. This means that a potential appeal aside, Dotcom may soon be reunited with millions of dollars in cash, his luxury car collection, artwork, and other assets seized by the authorities.

Read full article

Study Finds No Evidence of Heartbleed Attacks Before the Bug Was Exposed New York Times

Ever since the Heartbleed bug was exposed last week, the question everyone has been asking is: Did anyone exploit it before a Google researcher first discovered it?

Read full article

16 April 2014

Heartbleed fallout may 'slow' browsing speeds BBC News

The struggle to fix problems caused by the Heartbleed bug may slow browsing speeds, warns analysis firm Netcraft.

Read full article

Heartbleed makes 50m Android phones vulnerable, data shows The Guardian

At least 4m Android smartphones in the US, and tens of millions worldwide, could be exploited by a version of the "Heartbleed" security flaw, data provided to the Guardian shows.

Read full article

14 April 2014

US government warns of Heartbleed bug danger BBC News

The US government has warned that it believes hackers are trying to make use of the Heartbleed bug.

Read full article

Online business and security: A flaw in popular internet-security software could have serious consequences for all sorts of business The Economist

The Heartbleed bug sounds like a nasty coronary condition. But it is in fact a software flaw that has left up to two-thirds of the world's websites vulnerable to attack by hackers. "This is potentially the most dangerous bug that we have seen for a long, long time," says James Beeson, the chief information security officer of GE Capital Americas, an arm of GE. Since its existence was revealed on April 7th by researchers at Codenomicon, a security outfit, and Google, countless companies around the world that rely on the internet for part or all of their business have been scrambling to fix the flaw.

Read full article

13 April 2014

Half a million widely trusted websites vulnerable to Heartbleed bug Netcraft

A serious overrun vulnerability in the OpenSSL cryptographic library affects around 17% of SSL web servers which use certificates issued by trusted certificate authorities. Already commonly known as the Heartbleed bug, a missing bounds check in the handling of the TLS heartbeat extension can allow remote attackers to view up to 64 kilobytes of memory on an affected server. This could allow attackers to retrieve private keys and ultimately decrypt the server's encrypted traffic or even impersonate the server.

Read full article

Heartbleed Bug: What Can You Do? Krebs On Security

In the wake of widespread media coverage of the Internet security debacle known as the Heartbleed bug, many readers are understandably anxious to know what they can do to protect themselves. Here's a short primer.

Read full article

11 April 2014

Security Flaw Could Reach Beyond Websites to Digital Devices, Experts Say New York Times

When the Heartbleed bug was disclosed on Monday, the attention focused on the fallout for major Internet companies like Yahoo and Amazon. But security experts said the potential for harm could extend much further, to the guts of the Internet and the many devices that connect to it.

Read full article

'Heartbleed' computer bug threat spreads to firewalls and beyond Reuters

Hackers could crack email systems, security firewalls and possibly mobile phones through the "Heartbleed" computer bug, according to security experts who warned on Thursday that the risks extended beyond just Internet Web servers.

Read full article

Heartbleed bug creates confusion on internet BBC News

Computers vulnerable to the Heartbleed bug are actively being targeted online, say security experts.

Read full article

10 April 2014

Which sites have patched the Heartbleed bug CNET

The Heartbleed bug is serious. Disclosed less than two days ago, the Heartbleed bug has sent sites and services across the Internet into patch mode.

Read full article

More Than A Half-Million Servers Exposed To Heartbleed Flaw Dark Reading

The newly exposed Heartbleed bug plaguing some 17 percent of SSL-secured websites as well as various VPN products has caused a massive case of Internet heartburn over the past 48 hours as companies rushed to confirm their exposure and lock down their SSL/TLS software. But just how bad is it?

Read full article

Q. and A. on Heartbleed: A Flaw Missed by the Masses New York Times

This week, security researchers publicized a significant security flaw, named Heartbleed, which could expose the personal information that people plug into websites, like passwords and credit card numbers.

Read full article

09 April 2014

'Heartbleed' bug puts encryption at risk for hundreds of thousands of servers The Guardian

Hundreds of thousands of web and email servers worldwide have a software flaw that lets attackers steal the cryptographic keys used to secure online commerce and web connections, experts say.

Read full article

New Era of 'Mega Breaches' Signals Bigger Payouts and Shifting Behavior for Cybercriminals Symantec

After lurking in the shadows for the first ten months of 2013, cybercriminals unleashed the most damaging series of cyberattacks in history. Symantec's Internet Security Threat Report (ISTR), Volume 19, shows a significant shift in cybercriminal behavior, revealing the bad guys are plotting for months before pulling off huge heists - instead of executing quick hits with smaller rewards.

Read full article

08 April 2014

Hackers Lurking in Vents and Soda Machines New York Times

They came in through the Chinese takeout menu. Unable to breach the computer network at a big oil company, hackers infected with malware the online menu of a Chinese restaurant that was popular with employees. When the workers browsed the menu, they inadvertently downloaded code that gave the attackers a foothold in the business's vast computer network.

Read full article

07 April 2014

U.S. Tries Candor to Assure China on Cyberattacks New York Times

In the months before Defense Secretary Chuck Hagel's arrival in Beijing on Monday, the Obama administration quietly held an extraordinary briefing for the Chinese military leadership on a subject officials have rarely discussed in public: the Pentagon's emerging doctrine for defending against cyberattacks against the United States -- and for using its cybertechnology against adversaries, including the Chinese.

Read full article

06 April 2014

Tech Start-Ups Are Targets of Ransom Cyberattacks New York Times

Scott Heiferman and Gary Burns had less than four minutes to decide whether to pay up or go down.

Read full article

04 April 2014

Cyberespionage, Not Cyber Terror, is the Major Threat, Former NSA Director Says Threat Post

The list of threats on the Internet is long and getting longer each day. Cybercrime, nation-state attackers, cyber espionage and hacktivists all threaten the security and stability of the network and its users in one way or another. But the one threat that some experts have warned about for years and has never emerged is cyber terrorism, a former top U.S. intelligence official said.

Read full article

02 April 2014

WiFi routers could be exploited for huge internet attacks in UK – study The Guardian

As many as 24m routers across the world can be used by cybercriminals to launch massive attacks on internet infrastructure, while simultaneously disrupting home connections and costing communications companies dearly.

Read full article

30 March 2014

Google: 80% of news organisations are targeted by state hackers The Guardian

More than four-fifths of the world's top media organisations, including the Guardian, have been the target of likely state sponsored hacking attacks, according to research from two Google security engineers.

Read full article

Registrar Solutions