Posts Tagged internet

Islamists Call For Death Of Bloggers

This was posted to Slashdot on Feb. 25th:

“Days after the killing of leftist blogger Thaba Baba, mosques throughout Bangladesh called for a popular uprising to demand the killing of other bloggers who had held a rally calling for the death of Jama’at-e-Islami leaders convicted of war crimes. This happens in an atmosphere of ongoing tension between Left and Right, with the leftist government threatening to outlaw rightist parties while the right uses violence to quiet selected enemies.”

, , , , ,

No Comments

Data Mining Surveillance Software Secretly Built By Raytheon

From The Sydney Morning Herald:

Raytheon says it has not sold the software – named Riot, or Rapid Information Overlay Technology – to any clients. But the Massachusetts-based company has acknowledged the technology was shared with US government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analysing “trillions of entities” from cyberspace.

, , , , ,

No Comments

Cyber Crime Ring Dismantled

The FBI and its international law enforcement partners have dismantled an international cyber crime ring linked to the Butterfly Botnet, which steals computer users’ credit card, bank account, and other personal identifiable information. Details

, , , , ,

No Comments

Google Accidentally Transmits Self-Destruct Code to Army of Chrome Browsers

From: Wired Enterprise

Google’s Gmail service went down for about 20 minutes on Monday. That was annoying, but not exactly unprecedented. These sorts of outages happen all the time. What was strange is that the Gmail outage coincided with widespread reports that Google’s Chrome browser was also crashing.

Late Monday, Google engineer Tim Steele confirmed what developers had been suspecting. The crashes were affecting Chrome users who were using another Google web service known as Sync, and that Sync and other Google services — presumably Gmail too — were clobbered Monday when Google misconfigured its load-balancing servers.

more

, , , , , ,

No Comments

Israel Cyber Security Summit

From Defense Update:

Since the creation of cyberspace and the internet Israeli security experts and scientists have positioned the country at the forefront of cyber defense, developing everything from the basic building blocks of network security, data encryption and information protection to integrated system providing monitoring, simulation and rapid response in the event of cyber attacks. The Israeli government has recently established a national cyber center, with the goals to coordinate the research, development, legislation and preparedness among the academy, private and public sector, to enhance the protection and minimize vulnerability of the country’s commercial, industrial and public sector to hacking, cyber crime and cyber attacks.

, , , ,

No Comments

DefenseAuctions.com

Could this site be the eBay of gun sales? Here’s hoping its successful.

Defense Auctions

, ,

No Comments

Computer Virus: Reveton Ransomware

Reveton Ransomware

A new Internet virus is holding computers hostage across the United States and beyond.
– FBI, This Week

, , , , , , , ,

No Comments

New Malware Goes After Financial Information

CNET reports on the new Gauss malware tool:

Gauss has unique characteristics relative to other malware. Kaspersky said it found Gauss following the discovery of Flame. The International Telecommunications Union has started an effort to identify emerging cyberthreats and mitigate them before they spread.

, , , , , , ,

No Comments

Iranian hackers obtain fraudulent HTTPS certificates

From: EFF

Iranian hackers obtain fraudulent HTTPS certificates: How close to a Web security meltdown did we get?

On March 15th, an HTTPS/TLS Certificate Authority (CA) was tricked into issuing fraudulent certificates that posed a dire risk to Internet security. Based on currently available information, the incident got close to – but was not quite – an Internet-wide security meltdown. These events show why we urgently need to start reinforcing the system that is currently used to authenticate and identify secure websites and email systems.

more

 

 

, , , , , , ,

No Comments

China and its Double-edged Cyber-sword

China and its Double-edged Cyber-sword is republished with permission of STRATFOR.

By Sean Noonan

A recent batch of WikiLeaks cables led Der Spiegel and The New York Times to print front-page stories on China’s cyber-espionage capabilities Dec. 4 and 5. While China’s offensive capabilities on the Internet are widely recognized, the country is discovering the other edge of the sword.

China is no doubt facing a paradox as it tries to manipulate and confront the growing capabilities of Internet users. Recent arrests of Chinese hackers and People’s Liberation Army (PLA) pronouncements suggest that China fears that its own computer experts, nationalist hackers and social media could turn against the government. While the exact cause of Beijing’s new focus on network security is unclear, it comes at a time when other countries are developing their own defenses against cyber attacks and hot topics like Stuxnet and WikiLeaks are generating new concerns about Internet security.

One of the U.S. State Department cables released by WikiLeaks focuses on the Chinese-based cyber attack on Google’s servers that became public in January 2010. According to a State Department source mentioned in one of the cables, Li Changchun, the fifth highest-ranking member of the Communist Party of China (CPC) and head of the Party’s Propaganda Department, was concerned about the information he could find on himself through Google’s search engine. He also reportedly ordered the attack on Google. This is single-source information, and since the cables WikiLeaks released do not include the U.S. intelligence community’s actual analysis of the source, we cannot vouch for its accuracy. What it does appear to verify, however, is that Beijing is regularly debating the opportunities and threats presented by the Internet. Read the rest of this entry »

, , , , ,

No Comments

The Great Radio Spectrum Famine

Mobile broadband is consuming the available radio spectrum. Serving up more won’t be easy.

Read the full article here…

http://spectrum.ieee.org/telecom/wireless/the-great-radio-spectrum-famine/1

, ,

No Comments

Electronic Frontier Foundation Needs Your Support!

Dear Friend of Digital Freedom,

In 1990, the Electronic Frontier Foundation (EFF) took an unprecedented stand for technology users’ civil liberties by suing the Secret Service for seizing and damaging Steve Jackson Games’ computers. Twenty years later, EFF remains passionately engaged in protecting civil liberties at the forefront of technology. In 2010, EFF rose to meet new challenges and secured new freedoms for users everywhere.

In 2010:

Innovation

EFF won the exemption that made it legal to “jailbreak” smartphones to unlock their full potential;

Transparency

EFF taught users how to take control of their privacy on social networks;

Fair Use

EFF made it possible – for the first time in history – for artists and educators to excerpt from DVDs without fear of breaking the law;

Free Speech

EFF defended political bloggers and peer-to-peer users from copyright “trolls” bullying them into bogus legal settlements;

Privacy

EFF conducted groundbreaking research on privacy and security, and used the findings to lobby for improved user protections; and

Free Speech icon

EFF collaborated with local groups throughout the world to advance privacy and free expression through technology.

These victories were only possible thanks to donations from individuals like you. Charity Navigator, a leading evaluator of non-profit efficiency, has given EFF its highest rating — we make each and every contribution count in the fight for freedom on the electronic frontier.

Choose to support digital freedom and secure your civil liberties today with a year-end gift to EFF.

Donate Today!

, , ,

No Comments