WASHINGTON ,— Invasion of privacy in the Internet age. Expanding the reach of law enforcement to snoop on e-mail traffic or on Web surfing. Those are among the criticisms being aimed at the FBI as it tries to update a key surveillance law. With its proposed amendment, is the Obama…
Articles Posted in Cybersecurity
WikiLeaks Does Not Know The Source of Leaked Data
WikiLeaks’ chief claims his organization doesn’t know who sent it some 91,000 secret U.S. military documents, telling journalists that the website is set up to hide the source of its data from those who receive it. Editor-in-chief Julian Assange says the added layer of secrecy helps protect the site’s sources…
NSA Cyber-security Program Details Revealed
In response to a report in the Wall Street Journal, the National Security Agency revealed some information about its plans for “Perfect Citizen,” which it described as a research and engineering effort around vulnerability assessment and capabilities development. The National Security Agency revealed some information about the nature of its…
Cyber-Security Insurance
Many Companies Continue to Ignore the Issue (Pittsburgh Post-Gazette, 22 June 2010) – After a year of high-tech breaches at some of the nation’s biggest companies, a provision in a Senate bill calls on the White House to encourage a market for cybersecurity insurance to protect businesses from debilitating costs…
AT&T Discloses Breach of iPad Owner Data
AT&T Inc. acknowledged Wednesday that a security hole in its website had exposed iPad users’ email addresses, a breach that highlights how corporations still have problems protecting private information. A small group of computer experts that calls itself Goatse Security claimed responsibility for the intrusion, saying the group had exploited…
The FTC Supports Increased Security in the “Cloud” for the FCC’s Broadband Plan
The Federal Trade Commission (FTC) recently filed a series of comment letters with the Federal Communications Commission (FCC) supporting that agency’s consideration of privacy and data security in the development of its Broadband Plan. The first of these letters,[1] dated December 9, 2009, highlights the extent to which federal agencies,…
Google to share cyber-attack data
WASHINGTON – Internet search firm Google Inc. is finalizing a deal that would let the U.S. National Security Agency help it investigate a corporate espionage attack that may have originated in China, the Washington Post reported yesterday. The aim of the investigation is to better defend Google, the world’s largest…
Google May Leave Chinese Market
The ongoing conflict between Google and China escalated earlier this month as Google announced it had discovered that the hacking of its servers had originated from the Chinese government. The hacking code used was traced to China’s territory, but not to the Chinese government, which, not surprisingly, denies any connection…
Twitter resets passwords after phishing attack
Twitter reset passwords for an unknown number of users on Tuesday whose accounts appeared to have been compromised via phishing. “As part of Twitter’s ongoing security efforts, we reset passwords for a small number of accounts that we believe may have been compromised offsite,” the company said in a statement.…
Internet pirates find ‘bulletproof’ havens for illegal file sharing
Internet pirates are moving away from safe havens such as Sweden to new territories that include China and Ukraine, as they try to avoid prosecution for illegal file sharing, according to experts. For several years, piracy groups that run services allowing music, video and software to be illegally shared online…