According to the 2011 CyberSecurity Watch Survey conducted by CSO magazine, security breaches caused by once-trusted employees and contractors account for one in five attacks across all industry sectors. Moreover, the consequences of such events can be significant: Insider security breaches are more costly than those by outside hackers, according to one-third of the survey’s respondents
Archive for 2011/02/23
Sony Forming Anti-Piracy Program – the company is getting serious about PlayStation 3 software piracyPosted: 2011/02/23 in Education / Awareness, Enforcement
Samsung has announced a range of televisions that will push live TV from screen to a Galaxy mobile devicePosted: 2011/02/23 in Education / Awareness, New Business Models, Tech Evolution
It’s not your imagination. Movies are getting worse as the years go on and someone has proof—complete with an explanation
Graphic designer Eileen Lopez has put together this very helpful chart, which shows the best-selling games of all time in the United StatesPosted: 2011/02/23 in Education / Awareness, Stats / reports
And this is the crux of it. As it happens, the value-engineering mindset that’s so crucial to profitability as a commodity trader is fatal as a purveyor of experiencesPosted: 2011/02/23 in Education / Awareness
What Facebook did, with a policy that requires proper names and the initial restriction of access based on proven university or company affiliation, was bring the idea of “real identity” to the mainstream InternetPosted: 2011/02/23 in Education / Awareness, Privacy / Data Protection, Public Policy
Revolving Door Between Gov’t And Industry Continues: Pharma Lawyer Goes To USPTO As Gov’t Financial Regulator Goes To Wall St.Posted: 2011/02/23 in Education / Awareness, Public Policy
Copyright is supposed to be about incentives to create. But it’s generally been twisted into a tool for control against “stuff we don’t like”Posted: 2011/02/23 in Copyright, Education / Awareness
If 99% of works created are not due to copyright incentives, by the very argument of the copyright maximalists, copyright should be deemed worthless
In general if anonymous is after you it is because you are just annoying enough to make going after you a priority for the world hacking communityPosted: 2011/02/23 in Education / Awareness
This analysis uses real-time data from the 110 Internet providers around the world to identify possible ongoing Internet traffic manipulation in Middle East countries with active protest movements. More details on our data collection infrastructure and methodology are available in our recent academic paper
Libya has received hundreds of millions of dollars’ worth of arms from the European Union, with Italy and Malta emerging as the bloc’s top exporters, according to a report doing the rounds in BrusselsPosted: 2011/02/23 in Education / Awareness, Public Policy, Stats / reports
Oracle has claimed that Google derived its Android code from the specifications for “hundreds” of Oracle’s copyrighted Java files, and that at least eight Android files are actually decompiled Oracle object codePosted: 2011/02/23 in Copyright, Education / Awareness, Google, Litigation
Facebook users have been subjected to another round of clickjacking attacks that force them to authorize actions they had no intention of approvingPosted: 2011/02/23 in Cybercrime, Education / Awareness
Police are investigating a security breach at a London university medical school that resulted in users getting a stream of obscene and defamatory emailsPosted: 2011/02/23 in Cybercrime, Education / Awareness, Enforcement
Ivi’s business model was simple: grab over-the-air TV signals from Seattle, Chicago, Los Angeles, and New York, then retransmit them to paying Internet customers. A judge today shut it down
The Federal Trade Commission has acknowledged the complaints about kids making too many in-app purchases in iOS games, and says it will look into Apple’s marketing to make sure children aren’t being taken advantage ofPosted: 2011/02/23 in Education / Awareness, New Business Models, Public Policy
“The fascists from rabobank where investing in the arms industry(the arms that they are investing is also going to the police, military in the Netherlands, Egypt, Greece, Israel, Libya, Algeria and other country’s).
Rabobank calls this justifies action, and we also get Shell, ING, ABN-Amro, Randstad. All these mentioned fascists company’s of the system are paramount in their view that they justify the action.
The attacks on Rabobank justify what we call action! Future attacks on Shell, ING, ABN-Amro, Randstad these companies accountable!
In Egypt, Tunisia, Algeria, Libya, the above mentioned companies and / or subsidiaries that have been attacked by splinter cells called the Fire. A truth that is not released by the representatives of the syteem. This shows our strong international solidarity.
Attacks we are claiming:
• June 2010- setting the tower in fire in Utrecht(Netherlands)
• October 2010- setting the tower in fire in Utrecht(Netherlands)
• February 2011-setting the tower in fire and attacks on the website of Rabobank in Utrecht(Netherlands)”
Dutch RABO bank to file criminal complaint having suffered cyber attack, Dutch National Cyber Security Center coming up and call to address problems caused by data encryption
The main idea behind our latest brainchild – the animated political comedy on iPhone platform – is to deliver to iPhone users the most important news in the most entertaining formatPosted: 2011/02/23 in Education / Awareness, New Business Models
ZeusiLeaks – WikiLeaks on automated stealth mode. Whereas WikiLeaks depends on defecting individuals consciously “leaking” sensitive data, ZeusiLeaks works without the traitor’s consent or awarenessPosted: 2011/02/23 in Education / Awareness, Network Security, Privacy / Data Protection, Tech Evolution
Named after the Zeus Trojan, a keystroke logger, ZeusiLeaks and its botnet “leaks” sensitive information silently in the background to a network of “Zeus operators,” or underground data brokers. Beyond bank passwords and one-time hit’s, the accumulation of “casual data,” such as from fleeting messages exchanged via social networking websites, add up to some very coherent information. Automated analysis of words sent via these trivial online messages can significantly undermine an organization’s data secrecy.