The Deutsche Bundesrepublik’s Federation of Consumer Organizations (FCO) is suing the US social network in the High Court in Berlin, over data protection issues. It seems to date, Facebook have not treated the matter seriously enough and have done little to mollify the concerns of the Germans.
Archive for 2010/12/01
Police across China have solved 180 cyber attack cases and arrested more than 460 suspects as of the end of November, figures from the Ministry of Public Security show.
Also, 14 websites had been closed for allegedly providing hacker software, training hackers and organizing attacks, according to a statement released Tuesday by the ministry.
For EA, that growth is largely being driven by downloadable content, which Brown said has grown an estimated 55 percent annually since fiscal 2009. The vast majority of that growth has come from EA’s internal franchises rather than acquisitions like Playfish, Brown said.
Mohamad Majed was doing two things you aren’t: unlocking thousands at a time, and allegedly funneling the profits to Hezbollah
Earlier this year, cyberlocker service RapidShare was ordered by a court to remove nearly 150 electronic books from its archives and prevent users from re-uploading them by implementing a filter. According to the publishers who brought the case, RapidShare quickly breached the injunction. Today, the Regional Court of Hamburg agreed and hit the file-hosting company with a 150,000 euro fine.
While Google may be sincere in it’s motto not to be evil, by their sheer size, and let’s not forget the incredible usefulness of their services, they have certainly developed a lot of power. And power, as philosophers say, tends towards generating more power without much regard for others, a thorough visitation by the EC antitrust bodies seems appropriate and even long overdue.
Only one day after Wikileaks moved to Amazon’s cloud hosting service to evade a DDoS attack, the site has been forced to return to its previous Swedish hosting provider. Amazon discontinued service to Wikileaks in response to pressure from critics, including prominent members of congress.
The one-day event will offer an intensive download of roundtable sessions and presentations on the changing state of content piracy in today’s world of ubiquitous entertainment. Studio, video game, music and publishing executives will find out about the newest business strategies to minimize risk and maximize profits.
“The entertainment industry’s treasure — its content — is being plundered by pirates of all kinds,” says Conference Co-Chair Richard Atkinson. “In today’s digital world, we are under siege by organized crime, anonymous hackers, recalcitrant cyberlockers, and even our own customers. This Summit will identify the threats and provide new ways for our industry go on the offense — taking down or frustrating pirates and even, at times, capitalizing on piracy consumption.”
How does it work? It’s based on your browser changing the color of links you’ve already clicked on. A script on the site exploits a Web privacy leak to quickly check and see whether your browser reveals that the links to a host of other porn sites have been assigned the color “purple,” meaning you’ve clicked them before.
Less than three per cent of IPv4 address space is still to be allocated, after two huge chunks were given to American and European ISPs.
Huawei, the giant Chinese telecoms manufacturer, has deleted claims on its own website and by its staff that it is involved in a partnership with PhormPosted: 2010/12/01 in Education / Awareness, New Business Models, Online advertising, Tech Evolution
Nonetheless, the pair are working together, and Phorm is also integrating its behavioural advertising technology with Cisco routing gear as it courts ISPs outside the UK.
FBI investigators have named a 23-year-old Russian as a prime suspect behind the operation of the infamous 500,000 Mega-D botnet, blamed for an estimated one in three spam emails prior to a take-down operation early last year.
Peter Sunde of Pirate Bay fame has had it. Now that the US government is ordering domain names of copyright infringers to be removed from the global DNS, Sunde has sounded a call to arms to create a new Domain Name System to help pirates remain masters of their domainPosted: 2010/12/01 in Education / Awareness, New Business Models, Tech Evolution
Sandvine Announces Media Optimization Solutions With Three Partners: Mobixell, Ortiva Wireless and VantrixPosted: 2010/12/01 in Bandwidth Management, Education / Awareness, Filtering, New Business Models, Tech Evolution
Sandvine’s traffic redirection technology provides a flexible and reliable way for wireless service providers to deploy media optimization in their networks.
Real-time optimization and smart caching capabilities conserve network resources while at the same time enhancing the video delivery experience for subscribers.
Operators can integrate Sandvine’s media optimization solution with other network policies (based on conditions such as time of day, subscriber tier, bill state, and client device) to create tiered service plans tailored to meet consumers’ needs. For example, subscribers that want to enjoy movies on their state-of-the-art mobile devices anywhere, anytime, could opt to subscribe to a service plan that optimizes that experience.
Kindsight Inc. and Phorm Inc., are pitching deep packet inspection services as a way for Internet service providers to claim a share of the lucrative online ad marketPosted: 2010/12/01 in Bandwidth Management, Education / Awareness, Filtering
say they protect people’s privacy with steps that include obtaining their consent. They also say they don’t use the full power of the technology, and refrain from reading email and analyzing sensitive online activities
Defense Secretary Robert Gates: “The fact is, governments deal with the United States because it’s in their interest, not because they like us, not because they trust us, and not because they believe we can keep secrets.”Posted: 2010/12/01 in Education / Awareness, Privacy / Data Protection, Public Policy
“Is this embarrassing? Yes. Is it awkward? Yes,” Gates continued. “Consequences for U.S. foreign policy? I think fairly modest.”
Although the recording industry can ask Web sites to remove material deemed to infringe on copyrights, no such law exists for national security purposesPosted: 2010/12/01 in Blocking, Education / Awareness, Legislation, Public Policy
The government is more restricted in its ability to target Web sites when they are domestically based, in part because of First Amendment protections, said a government official familiar with cyber policy
Bank of America Corp.’s stock dropped nearly more than 3% Tuesday on speculation that website WikiLeaks would soon release internal documents.
A Red Notice is kind of international wanted poster seeking the provisional arrest of a fugitive, with an eye towards extradition to the nation that issued the underlying arrest warrant. Interpol transmits the notices to its 188 member countries, including the U.K., where Assange is believed to be located. Interpol has no authority to compel a subject’s arrest. It issued 5,020 Red Notice last year for a variety of crimes.