Close

Articles Posted in Cybersecurity

Updated:

WikiLeaks Does Not Know The Source of Leaked Data

WikiLeaks’ chief claims his organization doesn’t know who sent it some 91,000 secret U.S. military documents, telling journalists that the website is set up to hide the source of its data from those who receive it. Editor-in-chief Julian Assange says the added layer of secrecy helps protect the site’s sources…

Updated:

NSA Cyber-security Program Details Revealed

In response to a report in the Wall Street Journal, the National Security Agency revealed some information about its plans for “Perfect Citizen,” which it described as a research and engineering effort around vulnerability assessment and capabilities development. The National Security Agency revealed some information about the nature of its…

Updated:

AT&T Discloses Breach of iPad Owner Data

AT&T Inc. acknowledged Wednesday that a security hole in its website had exposed iPad users’ email addresses, a breach that highlights how corporations still have problems protecting private information. A small group of computer experts that calls itself Goatse Security claimed responsibility for the intrusion, saying the group had exploited…

Updated:

The FTC Supports Increased Security in the “Cloud” for the FCC’s Broadband Plan

The Federal Trade Commission (FTC) recently filed a series of comment letters with the Federal Communications Commission (FCC) supporting that agency’s consideration of privacy and data security in the development of its Broadband Plan. The first of these letters,[1] dated December 9, 2009, highlights the extent to which federal agencies,…

Updated:

Google to share cyber-attack data

WASHINGTON – Internet search firm Google Inc. is finalizing a deal that would let the U.S. National Security Agency help it investigate a corporate espionage attack that may have originated in China, the Washington Post reported yesterday. The aim of the investigation is to better defend Google, the world’s largest…

Updated:

Google May Leave Chinese Market

The ongoing conflict between Google and China escalated earlier this month as Google announced it had discovered that the hacking of its servers had originated from the Chinese government. The hacking code used was traced to China’s territory, but not to the Chinese government, which, not surprisingly, denies any connection…

Updated:

Twitter resets passwords after phishing attack

Twitter reset passwords for an unknown number of users on Tuesday whose accounts appeared to have been compromised via phishing. “As part of Twitter’s ongoing security efforts, we reset passwords for a small number of accounts that we believe may have been compromised offsite,” the company said in a statement.…

Updated:

Internet pirates find ‘bulletproof’ havens for illegal file sharing

Internet pirates are moving away from safe havens such as Sweden to new territories that include China and Ukraine, as they try to avoid prosecution for illegal file sharing, according to experts. For several years, piracy groups that run services allowing music, video and software to be illegally shared online…

Contact Us