October 31, 2012 | By Cindy Cohn and Julie Samuels Megaupload and the Government’s Attack on Cloud Computing Yesterday, EFF, on behalf of its client Kyle Goodwin, filed a brief proposing a process for the Court in the Megaupload case… Read More ›
Cyber Security
U.S. Army Sponsored Artificial Intelligence Surveillance System Attempts to Predict The Future
10/29/2012 @ 5:12AM |4,088 views In something that looks straight out of the CBS show “Person of Interest“, the science website Phsy.org is reporting on a potentially important breakthrough from researchers at Carnegie Mellon. In research sponsored by… Read More ›
Researchers caught espionage malware mastermind on webcam: linked Russian Official Security Agencies
Posted by Mohit Kumar on 10/30/2012 09:02:00 AM | In march 2011 CERT-Georgia has Discovered Cyber Espionage Attack Incident on country of Georgia. Advanced Malicious Software was Collecting Sensitive, Confidential Information about Georgian and American Security Documents and then uploading… Read More ›
Titan Supercomputer Debuts: Computer Churns Through More Than 20,000 Trillion Calculations Each Second
Oak Ridge National Laboratory is home to Titan, the world’s most powerful supercomputer for open science with a theoretical peak performance exceeding 20 petaflops (quadrillion calculations per second). That kind of computational capability—almost unimaginable—is on par with each of the… Read More ›
Critical infrastructure managing software vulnerable to Unauthorized access
Posted by Mohit Kumar on 10/25/2012 08:57:00 AM | Reid Wightman from security firm ioActive reported that there is an undocumented backdoor available in CoDeSys software that actually used to manage equipment in power plants, military environments, and nautical ships…. Read More ›
Anonymous going to lauch wikileaks like project called TYLER
Posted by Mohit Kumar on 10/23/2012 10:42:00 AM | International hacker group Anonymous is going to create a WikiLeaks competitor scandalous leak portal called Tyler, for the publication of secret information from governments of various countries. One of the group’s… Read More ›
Stingrays: The Biggest Technological Threat to Cell Phone Privacy You Don’t Know About
October 22, 2012 | By Hanni Fakhoury and Trevor Timm On Friday, EFF and the ACLU submitted an amicus brief in United States v. Rigmaiden, a closely-followed case that has enormous consequences for individuals’ Fourth Amendment rights in their home… Read More ›
Seen a threatening Tweet? Alert the Secret Service
By Laura J. NelsonOctober 24, 2012, 2:54 p.m. Twitter users sent more than 6.5 million Tweets during the third presidential debate Monday – and a few of them were death threats against President Obama and Republican presidential nominee Mitt Romney…. Read More ›
Study Reveals Impact of Public DNS Services; Researchers Develop Tool to Help
Oct 25, 2012 11:00 AM A new study by Northwestern University researchers has revealed that public DNS services could actually slow down users’ web-surfing experience. As a result, researchers have developed a solution to help avoid such an impact: a… Read More ›
After snagging $4.6B contract, Lockheed plans ‘cyber kill chain’ for Global Information Grid
Oct. 22, 2012 – 07:10PM | By DEBRA WERNER SAN FRANCISCO — The Defense Department’s day-to-day operations are linked in a vast, international in-house data communications network called the Global Information Grid. Seven million people — uniformed members of… Read More ›
Dutch Government Proposes Cyberattacks Against… Everyone
October 22, 2012 | By Eva Galperin and Katitza Rodriguez and Peter Eckersley Last week, the Dutch Minister of Safety and Justice asked the Parliament of the Netherlands1 to pass a law allowing police to obtain warrants to do the… Read More ›
Cyberbullying only rarely the sole factor identified in teen suicides
Contact: Debbie Jacobson djacobson@aap.org 847-434-7084 American Academy of Pediatrics NEW ORLEANS – Cyberbullying – the use of the Internet, phones or other technologies to repeatedly harass or mistreat peers – is often linked with teen suicide in media reports. However,… Read More ›
Robots That Perceive the World Like Humans
ScienceDaily (Oct. 18, 2012) — Perceive first, act afterwards.The architecture of most of today’s robots is underpinned by this control strategy. The eSMCs project has set itself the aim of changing the paradigm and generating more dynamic computer models in… Read More ›
Facebook blocks Swiss newspaper for publishing nude photo
By Agence France-Presse Friday, October 19, 2012 15:16 EDT Topics: facebook ♦ Gustave Courbet ♦ Tribune de Geneve The Swiss daily Tribune de Geneve said Friday it had its Facebook account blocked by the social networking giant after publishing an… Read More ›
Millions affected after cyber attack on HSBC
HSBC’s websites across the world have been hit by one of the largest cyber attacks to strike a bank in an attack that left millions of customers without access to online services. An unknown group launched a so-called “denial of… Read More ›
Japan Takes Action Against Complex Cyber Threats
Oct. 9, 2012 – 11:46AM | By PAUL KALLENDER UMEZU | In the year since a sophisticated cyber attack on Japan’s largest military contractor unleashed a flood of revelations about the vulnerability of the country’s most sensitive technical data,… Read More ›
The Internet of Things will transform our everyday: Objects in the home or office will “converse”, understand each other, and share information
Contact: Heikki Ailisto heikki.ailisto@vtt.fi 358-207-222-233 VTT Technical Research Centre of Finland Internet of Things is the next ICT disruption Information technology and electronics are becoming entwined with our everyday lives in industry, the service sector, transport, logistics, health care, housing,… Read More ›
Four men, all in their 20s, will face ‘urgent trial’ over allegations they insulted King Hamad on personal Twitter accounts
Bahrain charges four men with insulting king Reuters in Dubi guardian.co.uk, Thursday 18 October 2012 07.45 EDT An anti-government protester steps on a torn poster of King Hamad during protests in Manama in March 2011. Photograph: James Lawler Duggan/AFP/Getty Images Bahraini… Read More ›
Wireless meters tell snoopers when you are not home: CRIMINALS no longer need to stake out a home or a business
18 October 2012 by Jim Giles Magazine issue 2887. Subscribe and save CRIMINALS no longer need to stake out a home or a business to monitor the inhabitants’ comings and goings. Now they can simply pick up wireless signals broadcast… Read More ›
Twitter blocks German neo-Nazi account in world first
By Agence France-Presse Thursday, October 18, 2012 7:10 EDT Micro-blogging site Twitter said Thursday it had blocked a neo-Nazi group’s account at the request of German police in what it called a global first for the company. In a move… Read More ›
France anti-racism groups target Twitter for anti-Semitic content
12:13 PM 10/17/2012 Twitter may be under legal fire for a series of recent tweets which are deemed anti-Semitic by Jewish organizations in France. A top trending French-language hashtag recently has been #unbonjuif, which in English means “a good Jew.”… Read More ›
Meet the Flame virus’s mean little sibling
Posted By John Reed Monday, October 15, 2012 – 10:33 AM So it looks like the Flame and Gauss viruses that infected thousands of computers in the Middle East with advanced spyware over the last few years were merely meant… Read More ›
Did the Pentagon just take over America’s cybersecurity?
Ready Player One It was bound to happen. The Senate fumbles and the House proffers only magical solutions for cybersecurity. The task of improving cybersecurity reverts to the executive branch, but the Department of Homeland Security does not inspire confidence…. Read More ›
SOPA the computer virus terrorizes file-sharers
Published: 12 October, 2012, 20:37 SOPA is back – now as a computer virus Security experts are cautioning computer users that they could be targeted by a malicious SOPA “ransomware” virus that rekindles the witch-hunt targeting information sharing introduced… Read More ›
Anti-Islam film prompts Saudi call for net censorship body
Saudi Arabia has called for a new international body to censor the internet, in the wake of the anti-Islam YouTube clip that recently sparked violence in the Middle East. The US consulate in Benghazi in flames after the attack that… Read More ›
Anonymous vows revenge after WikiLeaks launches ‘filthy’ paywall
By Stephen C. Webster Friday, October 12, 2012 10:13 EDT Topics: Anonymous ♦ julian assange ♦ Wikileaks Nameless hackers with the online protest movement “Anonymous” have turned on longtime ally WikiLeaks for deploying a paywall on its website that blocks… Read More ›
U.S. energy companies victims of potentially destructive cyber intrusions: The secretary said that a coordinated attack on enough critical infrastructure could be a “cyber Pearl Harbor”
Posted By John ReedThursday, October 11, 2012 – 8:56 PM Foreign actors are probing the networks of key American companies in an attempt to gain control of industrial facilities and transportation systems, Defense Secretary Leon Panetta revealed tonight. “We know… Read More ›
‘Hacking’ alleged ahead of Bumi showdown
Indonesian backers behind the FTSE 250’s troubled coal group Bumi have stoked tensions prior to Thursday’s board meeting by alleging phones and emails have been hacked. Bumi is investigating ‘potential financial irregularities’ at Bumi Resources By Emma Rowley 5:46PM BST… Read More ›
Mysterious Algorithm Generates 4% of Stock Trading Activity
Tuesday, 09 October 2012 A single mysterious computer program that placed orders — and then subsequently canceled them — made up 4 percent of all quote traffic in the U.S. stock market last week, according to the top tracker of… Read More ›
Could CAPTCHAs get any more annoying? New PC test asks web users to take the ‘correct’ moral stance on civil rights issues
Examples drawn from breaches of United Nations Universal Declaration of Human Rights Users must choose the one answer out of three that shows compassion and empathy By Damien Gayle PUBLISHED:09:06 EST, 9 October 2012| UPDATED:09:06 EST, 9 October 2012 A… Read More ›
We do not need an internet overlord: ITU is holding a meeting in December to decide whether it – and by implication, the United Nations – should take over the internet.
9 October 2012 Chris Berg The internet should be kept free, not turned into a geopolitical plaything controlled by the United Nations, says Chris Berg. At first glance, the United Nations’ International Telecommunications Union (ITU) seems benign. The agency helps… Read More ›
Huawei, ZTE Give China Opportunity to Spy, Report Says: provides “special network services” to an entity the former employee believes is an“elite cyber-warfare unit” within the Chinese army
By Eric Engleman on October 07, 2012 Huawei Technologies Co. and ZTE Corp. (000063), China’s two largest phone-equipment makers, provide opportunities for Chinese intelligence services to tamper with U.S. telecommunications networks for spying, according to a congressional report to be… Read More ›
More dodgy stats misleading the child protection debate
Last month we detailedhow one of the key statistics being relied upon by campaigners calling for ‘default blocking’ of some internet content was based upon one very dubious survey in a single school. This kind of deliberately misleading scaremongering undermines… Read More ›
Philippines appeals to hackers to cease attacks
By Agence France-Presse Saturday, October 6, 2012 19:00 EDT Topics: Abigail Valte ♦ Benigno Aquino ♦ philippines Hackers incensed by the Philippines’ controversial cybercrime law have attacked government sites that deliver emergency information during natural disasters, an official said Saturday…. Read More ›
U.S. Needs Offensive Weapons in Cyberwar: General
Oct. 4, 2012 – 08:06PM | By AGENCE FRANCE-PRESSE WASHINGTON — The United States needs to develop offensive weapons in cyberspace as part of its effort to protect the nation from cyber attacks, a senior military official said Oct…. Read More ›
Researcher: wave of cyber attacks to target U.S. banks
By Agence France-Presse Friday, October 5, 2012 17:30 EDT Topics: cyber attacks ♦ RSA ♦ Trojan attacks As many as 30 US banking firms are expected to be targeted in a wave of cyber attacks as part of “a large-scale… Read More ›