40 MB Presentation in PDF format: http://securityevaluators.com/files/papers/cyberwar.pdf
Archive for 2010/08/09
A mobile application that enables disabled people to make a phone call to a desired contact on their phone’s address book solely using their brain activity.
The results from 511 respondents (polled in July 2010) to our latest monthly survey have revealed that UK broadband customers are growing more knowledgeable about their ISP speeds. Some 90.8% claimed to know the “advertised” rate of their internet connection and 86.4% even knew the real-world (speedtest estimate) performance too; but what they receive does not make them happy
The IRIS router supports network services for voice, video and data communications, helping enable government agencies, military units and allied forces to communicate with one another using IP and existing ground equipment. This offers several enhancements over conventional satellite technology and eliminates the need to send data to and from an extra ground station, which can be expensive and time-consuming
Phillies Star Victorino Joins AT&T ‘Texting Can Wait’ Program to Encourage Teens Not To Text While DrivingPosted: 2010/08/09 in Education / Awareness
The latest survey conducted by CREDANT Technologies, a provider of endpoint data protection solutions, finds that more than half of the workers vacationing overseas remain in contact with the corporate data, which in turn, will increase the risk of corporate security
The iPad’s potential as a personal video device is handicapped pretty severely by the limited file formats it supports. CineXPlayer, the latest app to sneak past the App Store approval squad, helpfully plays Xvid videos with zero conversion required
We’d gotten a peak at AT&T’s U-Verse Mobile app earlier this year, but it’s now officially available for iPhone and BlackBerry Torch owners. You can set your DVR, sure, but you can also download shows to watch on your device
The payments-themed campaign is enticing users into clicking on on a malicious link which attempts to exploit client-side vulnerabilities targeting Java, Acrobat Reader etc. in between loading a scareware-serving page (antivirus_24.exe), tricking users into thinking they’re infected with malware.
A report Monday on TechCrunch suggests that, complementing its purchase last week of social-app manufacturer Slide, Google has made another social-networking buy: a virtual currency software company called Jambool. The start-up manufactures a product called Social Gold, which lets other sites build virtual-currency infrastructures
Discovery Channel Forcing Deadliest Catch Fan Site Offline; Claims Embedding Official Videos InfringesPosted: 2010/08/09 in Education / Awareness, Enforcement, Illegal File Sharing
Access Copyright Wants $45 From Every University Student For Copying & Even Linking To Copyright WorksPosted: 2010/08/09 in Copyright, Education / Awareness, New Business Models
We have a natural right to exclude others from our private possessions, to prevent others copying or using them, but that doesn’t mean we can control others in the use of their own property, which includes what we sell or give to them
As expected, Google and Verizon have unveiled their own version of net neutrality enforcement for the consideration of Congress. It includes big exemptions for wireless broadband and “additional or differentiated services.” What does that mean? Your guess is as good as ours
What Google-Verizon means for you
Raids last week in Manchester have closed down a pirate DVD factory and a major distribution warehouse, seizing discs with a total street value of over £65,000.
FACT and Manchester City Council Trading Standards officers raided a house in East Road, Longsight, M12 on Tuesday 3rd August after receiving intelligence that counterfeit goods were being stored there. The officers discovered a distribution centre for counterfeit goods, with piles of bogus music and film DVDs in three bedrooms.
They seized 17,000 discs of films such as The Sorcerer’s Apprentice, the Last Airbender and Despicable Me that have not yet gone on UK cinema release, as well as Inception which is currently showing in cinemas. None of these films are legally available yet on DVD.
A total of 77,000 printed colour inlay cards and 5,000 empty plastic DVD sleeves were also discovered.
A 46-year-old male and a 45-year-old female were arrested and released on bail while investigations are carried out
price includes three free months of access to the FLO TV mobile programming service
Kroes also said that hurdles remain to entrepreneurship in Europe, including a lack of venture capital, among other issues
Artists make music; BMI representatives handle money.
The BBC lost laptops and mobiles worth a total of £241,019 in the past two years
Dutch media are reporting that an official of a Dutch government agency called Agentschap Telecom tried to infiltrate a webforum to try and find out the identity of an infamous Dutch radio pirate.
However, visitors to that forum were able to find out the personal details of that ‘anonymous’ government official.
To control the damage, a colleague of the government official then went to visit what appears to have been a random member of the forum in an attempt to have the post containing the personal details removed.
That forum member was amazed at this request and instead, posted a video of the visit on the internet: http://www.youtube.com/watch?v=pyPqIU2F_i0 (Dutch language). The person who was visited and who recorded and posted this movie is commenting in this video that he is not impressed by these or future activities of this official since he has spent 24 months in prison already.
Dutch language article: http://www.geenstijl.nl/mt/archieven/2010/08/online_falen_met_agentschap_te.html
One of the many arguments against allowing patents for software (alongside the principle argument that software is made up of algorithms, which are essentially mathematics, which is pure knowledge and hence is not patentable) is the fact that software is anyway covered by copyright law. This means that others cannot simply copy your code, just as a novelist cannot simply copy large chunks of someone else’s writing. But whether copyright law prevents others from copying the underlying ideas of that code by re-implementing them independently is another matter