Archive for 2012/10/15
Cops need license to hack in order to be able to:
1. Fight distribution of child abuse images online, for example via the TOR network;
2. Disable botnets;
3. Quickly intercept and store data that would otherwise be highly volatile or difficult to access (due to encryption);
4. Thwart cyber threats and attacks from exotic locations.
Dutch language news article:
Google have, in reality, been perfecting their technique for manipulating search results since as far back as 2004, all under the guise of “providing a better search experience”Posted: 2012/10/15 in Education / Awareness, Google, Stats / reports, Tech Evolution
Attackers could exploit to sabotage or steal sensitive data from operators of solar arrays that generate electricity in homes and businessesPosted: 2012/10/15 in Cybercrime, Education / Awareness, Network Security, Privacy / Data Protection, Stats / reports
Congressman warns FTC: Leave Google alone. Says antitrust action against Google “defies all logic” (Doesn’t Read Foreign Newspapers)Posted: 2012/10/15 in Education / Awareness, Enforcement, Google, Public Policy, Stats / reports
Regulator About Google: Combining personal data on such a large scale creates high risks to the privacy of users (Facebook WILL be next)Posted: 2012/10/15 in Education / Awareness, Enforcement, Google, New Business Models, Privacy / Data Protection, Public Policy, Stats / reports, Tech Evolution
The regulators’ letter said: “Combining personal data on such a large scale creates high risks to the privacy of users.”
“Therefore, Google should modify its practices when combining data across services for these purposes,” the letter said. It was signed by 24 of EU’s 27 data regulators plus those of Croatia and Liechtenstein.
Google declined to comment.
Google and other large internet groups like Facebook provide free services to consumers and earn money from selling ads that they say are more closely targeted than traditional TV or radio campaigns.
“They may be prepared to test the legal position in Europe to see what they can get away with.”
The tussle with the EU over data privacy comes at a delicate time for Google.
Europe’s antitrust authorities are also examining the company’s business model to see if it uses its clout in search advertising to favor its own services over competitors’ offerings. Google is in talks with EU regulators on the case, and could offer concessions.
French data protection commissioner’s ruling that web giant must separate user data could have global impact, say sources
While games usually leak online early, in the case of the long-awaited Halo 4 the time between online debut and official launch is pretty large at just about three weeks. Of course, it’s inevitable that games will be pirated but what some people should understand is that games companies’ are within their rights to do something about it. Microsoft have, and for some pirating idiots their punishment is well-deserved.
There are now more wireless subscriptions in the USA than there are citizens, according to the latest data from The Wireless Association (CTIA).
The Association’s latest count of all things wireless, The Semi-Annual Wireless Industry Survey, (PDF) covers July 2011 to June 2012, and found:
- 321.7 million wireless subscriber connections, a figure that represents 101 percent penetration. In June 2011 there were 306 million subscriptions;(5 percent increase).
- A 37% increase in smartphone numbers, with 130.8 million smartphones or wireless-capable PDAs now active, up from 95.8 million in June 2011;
- 300.4 million active data-capable devices, up from 278.3 million in June 2011;
- 21.6 million wWireless-enabled tablets, laptops and modems, up 42 per cent from the 15.2 million in June 2011.
CTIA data also suggests the devices listed above collectively consumed 1.16 trillion megabytes of data over the year to June 2012, up 104 per cent compared to the 568 billion megabytes summoned over the airways in the previous twelve months.
Forbes Asia officially released its China Rich List on Monday, and although the Top 100 is dominated by those who have made their fortune from real estate, the growing influence of the web on Chinese society is clear to see.
Dutch language news article:
Last week, I got tipped-off that the parts of the MSD network were completely exposed to the public. You could go into any WINZ office and use their self-service kiosks to access their corporate networkPosted: 2012/10/15 in Education / Awareness, Network Security, Privacy / Data Protection, Public Policy, Stats / reports
These locked-down kiosks are provided so you could look for jobs online, send off CVs etc. They’ve had some basic features disabled, which supposedly meant that you couldn’t just open up File Manager and poke around the machine. However, by just using the Open File dialogue in Microsoft Office, you could map any unsecured computer on the network, and then open up any accessible file.
The Ministry of Social Development is calling in independent security experts to conduct an investigation into the serious security breach uncovered yesterday. What has occurred is simply unacceptable. An independent review is being initiated so I can understand how this happened and whether further action must be taken to safeguard client information. The terms of reference for the review will be drafted within the next 48 hours and I’ve asked for an interim report to be completed within two weeks.
In the face of increasing threats and a lack of protection from law enforcement, businesses may have to think about using ‘active self-defence’ strategiesPosted: 2012/10/15 in Cybercrime, Education / Awareness, Enforcement, Network Security, New Business Models, Privacy / Data Protection, Public Policy, Stats / reports
Experts speaking at RSA Conference Europe warned businesses that criminals were getting past standard security defences, and due to lack of skill and numbers, law enforcement might not offer the required protection.
Instead, businesses were advised to think about adopting legal and technological solutions to find ways of actively fighting back against hackers. This could involve for example, hacking and inserting code on a criminal botnet to find out the source of the attack.
It took longer than most but O2 (BE Broadband) has now finally implemented a network-wide block (censorship) that prevents its customers from accessing the NewzBin2 (NewzBin) website, which London’s High Court last year deemed to be responsible for facilitating internet piracy (copyright infringement).
The move follows a related court order in 2011 that initially only required BT to block access to NewzBin2 under Section 97A of the Copyright, Designs and Patents Act 1988 (here). This was later extended to all of the markets largest broadband ISPs and The Pirate Bay soon followed.
Further blocks against more websites are expected to follow in the future as Rights Holders prepare new court orders and the government continues to debate the possibility of a new Comms Bill voluntary code for tackling the worst offenders.
In any other circumstance this would be sexual assault