Microsoft’s President Brad Smith has a blog post discussing what to do now that the US-EU safe-harbor agreement has collapsed .
Last October, I broke the story about the NSA’s top secret program to inject packets into the Internet backbone: QUANTUM. Specifically, I wrote about how QUANTUMINSERT injects packets into existing Internet connections to redirect a user to an NSA web server codenamed FOXACID to infect the user’s computer. Since then, we’ve learned a lot more about how QUANTUM works , and general details of many other QUANTUM programs .
Cybercrime: Protecting the Individual and Small Businesses Online – — 5 retweets 3 favorites
“Papers published on Hackney Councils website have inadvertently revealed the personal data of a number of residents, an investigation by the Hackney Citizen has found. Among the personal details discovered were the names, addresses, email addresses and mobile phone numbers of more than thirty residents who had been in touch with the council recently about licensing decisions. The data featured in documents which had been partially redacted, but redaction had not always been done correctly, allowing personal details to be accessed by anyone who viewed the papers….”
“CNET web site has published a news on a secret National Security Agency program named Perfect Citizen that is targeting on large-scale the control systems inside utilities, including power grid and gas pipeline controllers, with the purpose to discover security vulnerabilities. The program was revealed by new documents from EPIC (the Electronic Privacy Information Center), the purpose is the exploration of national utilities to discover security vulnerabilities that could be exploited to attack US infrastructure. The Perfect Citizen documentation, according CNET, is composed of 190 pages and it has been obtained by EPIC in respect of Freedom of Information Act….”
“Greek police have arrested a man on suspicion of stealing the personal data of roughly two thirds of the country's population, police officials in Athens said on Tuesday. The 35-year old computer programmer was also suspected of attempting to sell the 9 million files containing identification card data, addresses, tax ID numbers and license plate numbers.
“Security Researcher Morgan Marquis-Boire describes analysis performed on malicious software used to compromise a high profile dissident residing in the United Arab Emirates.
“Cybercrime is now listed as one of the top threats in today's economy, largely contributed by the increased reliance on information and internet technologies, said Datuk Dr Halim Shafie, Chairman of Telekom Malaysia Bhd (TM). Speaking at the TM Cyber Security Seminar here, he also said it was important to understand that cyber threats are not always external, in many instances breaches happen from the inside.”Now, with an ubiquity of networks, cloud computing and big data analytics capability, the concern for cyber threats is magnified. Indeed, cybercrime is on the increase, with Cyber Security Malaysia reporting a 117 per cent rise from 2010 to 2011, he added….”
“While Southeast Asian governments are enhancing the delivery of online services for the benefit of their citizens, they are also instituting tougher internet regulations which many analysts believe could be used to curtail media freedom. This post is a summary of recent Global Voices articles which discussed several controversial internet regulation policies in the region.