Internet security consultant urges government to fund more net police.
By Pia Akerman
'.......THE government's decision to delay legislation for a mandatory internet filter should prompt a complete reassessment. And according to industryÂ figures, the controversial policy should be dumped. Internet security consultant Phil Kernick yesterday called instead for resources to be spent on moreÂ police to fight child pornography, the main reason behind the proposed filter....'
The ongoing war against cybercrime
By Summer Suleiman
'.......Atlanta, Georgia (CNN) -- Like most college students, Jake McCoy had to apply for several loans to pay for his education. After a rigorous check ofÂ his credit, he secured the loans and has been paying them back since graduating from Baylor University in May 2006.......'Â
Top Network Security Specialist Offers Techniques For Enhanced Security
'.......In a time when everyone is managing and controlling much of their life from a smart phone or laptop, consumers should be more aware of the securityÂ risks accompanying such conveniences. Often times, many of the devices people use are connected on a single network. It is important to realize that theÂ infrastructure these networks rely on is often full of holes.......'Â
Searching for World Cup info? Beware scam results spreading 'scareware'
By Jorgen Wouters
'....As the 2010 World Cup reaches its climax this weekend, hundreds of millions of football fans are busy scouring the Web for news on the globe's biggestÂ sporting event -- and cyber-criminals are waiting for them to make one wrong click. Security experts had been predicting a bonanza for online scammers in theÂ months leading up to the tournament, and they haven't been disappointed....'Â
The Pirate Bay hacked through multiple SQL injections
By Dancho Danchev
'....The video produced by the group, shows the user names of uploaders, associated emails and IP addresses, reasons for getting banned, including detailedÂ logs of their activities on the tracker. Strangely enough, the Pirate Bay appears to have a special â€œList 100 newest users with GMailâ€ feature, next to theÂ searchable database of emails......'Â
A gang of international hackers got busted in Pakistan
'....Itâ€™s not hard to track down a hacker, you just need to have a little knowledge; there are tons of ways to trace them an example can be seen @Â Propakistani Tracks Hacking Attempts, Attackers got Exposed post. The reason we are behind is lack of proper knowledge.......'Â
Cyber Security Challenge UK
'....The UKâ€™s first Cyber Security Challenge â€“ the hunt for future UK cyber security professionals â€“ will officially open on the 26th July. The CyberÂ Security Challenge is a programme of national online games and face-to-face competitions that will test the cyber security abilities of individuals and teamsÂ from every walk of life. ......'Â
Schoolboys Nick Webber and Ryan Thomas â€˜ran Â£8m online fraud networkâ€™
By David Kolle
'....Details of more than 65,000 bank accounts hacked from personal computers worldwide were allegedly sold on an internet site, leading to at least Â£8Â million ($14.9 million) being stolen from the accounts.......'Â
Fault disrupts Seacom internet cable to East Africa
'....The firm said it had been working since the fault was first reported on the 5 July to find alternative methods to route internet traffic, includingÂ alternative cables."These restoration solutions are now being actively implemented."......'Â
Cisco warns attendees that the Cisco Live database was hacked
By Larry Chaffin
'.... myself it just proves a point. Cisco used to be about routing, switching and security. Now it is about trying to make a copy of the iPad, videoÂ everywhere and CTOs who seem to Twitter all day long. I feel as Cisco has become a marketing machine that twists and turns words to make a good pitch to theÂ Cisco faithful, thinking they have to be into everything. But as I tell my customers around the world, â€œit is better to do five things really freaking wellÂ than to do 20 things average.â€ Cisco has lost their way with their base, but maybe this embarrassing security problem will make them re-focus again on theÂ things that made them great......'Â
Managing by Influence
'....Another aspect is to consider is the tapes which are running inside your team memberâ€™s head. Because of previous past experiences, positives orÂ negatives, your team member hears voices or â€œtapesâ€ that will affect your initiative, positively or negatively: â€œthis will never workâ€, â€œweâ€™ve tried thisÂ beforeâ€ , â€œthis is a fad, if I wait long enough, it will go awayâ€. These are examples of tapes that are hard-wired in peopleâ€™s mind. As a leader, it is veryÂ important that you are aware of these tapes. Â .......'Â
The Death of Internet Anonymity
Anthony M. Freed
'....The Financial Times reported that "the creation of a system for identity management that would allow citizens to use additional authenticationÂ techniques, such as physical tokens or modules on mobile phones, to verify who they are before buying things online or accessing such sensitive informationÂ as health or banking records."......'Â
U.S. Plans Cyber Shield for Utilities, Companies
By SIOBHAN GORMAN
'....Defense contractor Raytheon Corp. recently won a classified contract for the initial phase of the surveillance effort valued at up to $100 million, saidÂ a person familiar with the project. An NSA spokeswoman said the agency had no information to provide on the program. A Raytheon spokesman declined toÂ comment.......'
Make cybersecurity a priority
By Tom Ridge
Despite the events of 9-11, many of us have a quiet confidence that we will never, personally, come face to face with our enemies or be the victim ofÂ terrorism. While on some level that may be true, we are r esponsible for our own security and, specifically, our personal cybersecurity. The cyberthreats weÂ as Americans face today are complicated and complex. Those who wish to do us harm -- whether as nations or cybercriminals -- can digitally "invade" via theÂ Internet. And many experts believe our next major attack could occur on the cyber battlefield.Â
Social gaming the 'next big thing' in advertising
By Lara SinclairÂ
'....THE rise of social gaming emerged as a significant theme in advertising at the Cannes International Advertising Festival. As social network companiesÂ continue to chase revenue streams, Naveen Selvadurai, the chief of Foursquare, and Mark Zuckerberg, the head of Facebook, were in Cannes and said thatÂ technology which could create new ties with advertisers would be the next big thing. According to Selvadurai, who addressed the Ted@Cannes conference,Â establishing competitive activities on Foursquare's social network, like going to the gym or calorie-counting between friends, can help modify humanÂ behaviour.....'
US government rescinds 'leave internet alone' policyÂ
By Kieren McCarthyÂ
'.....The US governmentâ€™s policy of leaving the Internet alone is over, according to Obamaâ€™s top official at the Department of Commerce. Instead, anÂ â€œInternet Policy 3.0â€ approach will see policy discussions between government agencies, foreign governments, and key Internet constituencies,according toÂ Assistant Secretary Larry Strickling, with those discussions covering issues such as privacy, child protection, cybersecurity, copyright protection, andÂ Internet governance.....'
Security - policies, processes and people | How much is good enough?
By Andrew Buss, Freeform DynamicsÂ
URL :Â http://www.theregister.co.uk/2010/06/29/policies_processes_people/
'.....Workshop The problem with building foolproof systems, so the saying goes, is that the world seems to generate a better class of fool. This seems to beÂ particularly true with systems charged with managing security.In the inseparable troika of policies, process and people, getting to grips with the first twoÂ is (almost) easy as long as they are allocated sufficient time. But even if policies and process are done right, it is the people that provide theÂ unpredictable, inventive and zany behaviour that is enough to turn any security managerâ€™s hair white.
50 arrested in smartphone spyware dragnet
By Dan Goodin in San Francisco
'.....Romanian authorities have arrested 50 individuals accused of using off-the-shelf software to monitor cellphone communications of their spouses,Â competitors, and others, according to news reports.The Romanian Directorate for Investigating Organized Crime and Terrorism also arrested Dan Nicolae Oproiu,Â a 30-year-old IT specialist who allegedly sold the spyware for as much as $580 over the internet. Officials claim his software was available for handsetsÂ running the iPhone, Blackberry, Symbian, and Windows Mobile operating systems, and came in Light, Pro, and Pro-X versions that offered varying levels ofÂ services......'
Lewis: U.S. not in a cyber war
By David Perera
'....The United States is not in a cyber war and cyber war likely will never occur independently of a physical armed conflict, said James Andrew Lewis,Â director of the Center for Strategic and International Studies' technology and public policy program. There is cyber conflict, consisting of crime andÂ espionage, but a war in which an enemy attacks U.S. data and physical infrastructure for political effect doesn't currently exist, Lewis said in preparedÂ remarks delivered May 13 to the China Institutes of Contemporary International Relations.....'
Cybercrime getting more sophisticatedÂ
'.....Cybercrime is fast maturing as a profession, with criminals using new techniques to bring their malware to market, and even â€œproductisingâ€ malware â€“Â complete with toolkits, advanced features, and services â€“ that they sell or hire to other criminals for a profit. Thatâ€™s according to Microsoftâ€™s latestÂ Security Intelligence Report (SIR) which gleans data collected from approximately 500 million computers worldwide to provide intelligence on global onlineÂ threats.....'
Soca chief in cyber crime call to arms
by Phil Muncaster
'....Serious Organised Crime Agency (Soca) chair Sir Ian Andrews used the Homeland & Border Security conference in London today to warn the securityÂ community that it underestimates cyber crime at its peril......'
Cyberwar: War in the fifth domain
by The Economist
'......AT THE height of the cold war, in June 1982, an American early-warning satellite detected a large blast in Siberia. A missile being fired? A nuclearÂ test? It was, it seems, an explosion on a Soviet gas pipeline. The cause was a malfunction in the computer-control system that Soviet spies had stolen from aÂ firm in Canada.....'
Cybersecurity awareness gets a NICE start
by Suzanne KubotaÂ
'....When President Obama announced his intention to "initiate a national awareness and education campaign to promote cybersecurity" all he had to do wasÂ look north to Gaithersburg. Â The National Institute of Standards and Technology was already familiar with the Comprehensive National Cybersecurity InitiativeÂ of President Bush, focusing on cybersecurity training and awareness in the federal government....'