Archive for 2010/08/24
Greg Day, Director of Security Strategy - EMEA at McAfee has been interviewed by Dutch news website NU.nl.
He stated that:
- Anti-virus companies, security companies and mobile operators have to work together to protect mobile devices against data loss and malware.
- Anti-virus software needs to be integrated in mobile platforms and services. A cooperation with providers would be ideal in that regard (e.g. educating customers and arranging for the relevant software updates).
- Private and corporate data need to be segregated.
- Security of corporate data needs to mature properly.
- It’s a pity that things oftentimes have to go wrong first before proper measures are being taken.
Dutch language article: http://www.nu.nl/gadgets/2318544/antivirusbedrijven-en-providers-moeten-samenwerken.html
Dutch media are reporting that hosting provider LeaseWeb is going to cooperate with specialists to monitor and fight cybercriminals on LeaseWeb’s infrastructure. Organizations involved in fighting malware, child abuse and phishing will be offered dedicated servers and bandwidth within the provider’s network.
This will enable LeaseWeb to block malicious and hacked websites in an earlier stage.
Two organizations are already cooperating: the Zeus Tracker project (IP address and domain block list) and the Dutch company Quarantaine Net (famous for blocking, filtering and graduated response type of services implemented on networks of universities and other organizations).
“As one of the twenty largest hosting providers of the world, we have the responsibility to ensure a clean and safe internet. We will not be able to check everything within our network, but by close cooperation with security specialists we can act proactively and take down contaminated websites much sooner” Alex de Joode, Chief Security Officer of Leaseweb stated.
Dutch language article: http://security.nl/artikel/34247/1/LeaseWeb_gaat_cybercriminelen_monitoren.html
Friday, August 20, 2010, between 7:00 and 8:00 a.m. CEST, the premises of one of Perfect Privacy’s administrators were searched by the authorities. The administrator is listed as the contact person for Perfect Privacy’s servers in Erfurt, Germany. The house search warrant is based on the suspicion that unknown suspects had routed illegal communications over the privacy servers in Erfurt. The servers have so far not been confiscated. We decided, however, to disable all services (OpenVPN, PPTP VPN, L2TP/IPSec VPN, SOCKS5, SQUID) in Erfurt temporarily in order to give those of our members, who have elevated security needs, time to read this announcement and to evaluate the risks. It is not known to us whether the authorities initiated measures such as telecommunication monitoring in Erfurt.
Proponents of digital education take note
45 percent said they had already tried to exploit vulnerabilities in the cloud. Although only 12 percent admitted to hacking into cloud systems for the money, that’s still a significant percentage to ponder for companies moving to the cloud
The service doesn’t work in stealth mode. In fact, kids have to agree to be monitored. But once a kid does agree, the parents get to see what the child posts and who their kid’s online friends are.
The United States needs to become “far more aggressive in protecting our intellectual property,” meaning beginning “tough realistic conversations with the nation of China, which routinely pirates our intellectual property with no consequences.”
a monstrous 13,280 x 9,184 pixels
Miscommunication, Indifference, Politics, Conspiracy
. Michael Scott points us to a new research paper from law professor Hannibal Travis, that tries to look at the actual economic impact of Google’s book scanning on publishers, and finds that the falling sky claims from publishers and critics simply isn’t supported by the evidence
Wau Holland Foundation, a library in Australia, a foundation in France, a newspaper in Sweden, two tax-exempt charitable organizations in the U.S., eBayInc.’s PayPal, Peter Sunde’s Flattr.com and Moneybookers, a system based in the U.K.
Pervasive secrecy corrupts as an essential protector of those who want control and manipulate the citzenry and subjects. Those who advocate secrecy always justify it by claims of threats that require secrecy to prevent or fight.
In truth, secrecy protects and empowers those who use it and weakens those for whom it is invoked to protect. Secrecy hides privilege, incompetence and deception of those who depend on it and who would be disempowered without it.
Much more: http://cryptome.org/0002/wsj-secrecy.htm
The demand for rich content is ever increasing, putting increased pressure on the service provider’s network and testing its ability to perform while keeping up with competitors. Customers have little patience for those providers who cannot meet expectations, driving the convergence of the network layer with the services layer to deliver Quality of Service (QoS) in the overall experience.
Those attending this webinar will learn how Service Brokers are increasingly recognized as a superior way to deploy and manage disparate new and existing applications in any network, regardless of the service provider. They will also learn how Service Brokers address the challenges of today’s networks.
Webinar attendees will also gain value from breaking down the role of the service broker, the architecture and the functionality, and will examine real deployment scenarios.
A free webinar, Service Brokers: Exploring the Next Generation Application to Network Connectivity Alternative, scheduled for Wednesday, September 1, 2010 10:00 AM EDT/ 9:00 AM CDT / 7:00 AM PDT, is designed to demonstrate how the Service Broker can deliver next generation applications for the network connectivity alternative.
The value of information included in this event is worth investigating. Register today!
The “check-in” gives you an option to check in to a location. Another feature called “Here Now” lets anyone who has checked in to a place see who else has done the same.
This partnership aims to support the investigative efforts of the U.S. Federal Bureau of Investigation, as well as state and local law enforcement agencies, to tackle organized jewelry crime through greater information sharing, company officials said
Though access providers, some argue, should be prohibited from prioritizing bits, there has been no suggestion at all that application providers do not themselves have the right to do so.
That is the service Akamai provides, and you would not find evidence that policy advocates believe Akamai, or content delivery networks, are at issue in the current network neutrality discussions
Elizabeth Bowles, president of Aristotle, Inc., has been elected as the president of the Wireless Internet Service Provider Association (WISPA)
According to researchers at SNL Kagan, the multichannel video entertainment market, which basically has grown in virtually unbroken fashion for decades, appears to have suffered its first-ever decline in the second quarter of 2010.
RIAA President Cary Sherman said the 1998 Digital Millennium Copyright Act contains loopholes that allow broadband providers and Web companies to turn a blind eye to customers’ unlawful activities without suffering any legal consequences.
“The DMCA isn’t working for content people at all,” he said at the Technology Policy Institute’s Aspen Forum here. “You cannot monitor all the infringements on the Internet. It’s simply not possible. We don’t have the ability to search all the places infringing content appears, such as cyberlockers like [file-hosting firm] RapidShare.”
Sony can detect the software ID the jailbreak program uses, and ban your PS3 remotely
Game developer Zynga hired Snoop Dogg to blow up a 4-ton armored truck in the Nevada desert, while it was live-streamed to Ustream. It pulled in more viewers than TV broadcasts attract. The Office and 30 Rock pull in around 2 million viewers per episode, placing Snoop’s live-stream last Thursday with over 2 million live-views right next to them on the ladder. Fo’ shizzle.
ACS:Law, believed to be the most complained about law firm in its field, has been referred to the Solicitors Disciplinary Tribunal. This is the second time in front of the tribunal for principal Andrew Crossley
Owners of Samsung Blu-ray players have been discovering that the latest firmware update means that movies from Warner Bros. and Universal don’t play.
It really is amazing how confused various governments are in an internet age where it’s easy for lots of people to make little bits of money on the side
Insider’s View: How Grandstanding State Attorneys General Make Life Miserable For Law Abiding Tech CompaniesPosted: 2010/08/24 in Education / Awareness, Public Policy
It’s as if every AG running for higher office has taken a page out of the playbook of Eliot Spitzer who used this strategy for years to get him headlines that took him right into the NY governor’s mansion (which, of course, he then left due to a different sort of headline a few years later…)