Rosinstrument.com: Internet censorship, security and privacy news tracking
RSS 2.0

Internet censorship, security and privacy news tracking
by Rosinstrument.com, last modified date: Wednesday, 29-Mar-2017 05:11:46 EDT




Tue Mar 28 08:23, 2017 GMT
After her web-savvy talk of ‘necessary hashtags’ and a ‘back door’ to WhatsApp messages, Home Secretary Amber Rudd has come under fire over a ‘rushed-through’ consultation on changes to government spying powers. Read the full article The post Amber Rudd slammed for ‘rushed through’ consultation on Snoopers’ Charter changes (Left Foot Forward) appeared first on Index on Censorship .
Amber Rudd slammed for ‘rushed through’ consultation on Snoopers’ Charter changes (Left Foot Forward)
Wed Mar 29 01:23, 2017 GMT
Santa Rosa Press Democrat Lobbying by Santa Rosa's Sonic.net fails to halt bill that weakens Internet privacy Santa Rosa Press Democrat Major internet service providers scored a victory Tuesday when the U.S. House narrowly voted to repeal privacy rules designed to protect the browsing history of their customers. The measure, which passed by a 215-205 vote, will repeal a rule issued by ... and more »
Lobbying by Santa Rosa's Sonic.net fails to halt bill that weakens Internet privacy - Santa Rosa Press Democrat
Wed Mar 29 04:15, 2017 GMT
Valley News Congress Unravels Internet Privacy Rules Valley News Internet security experts also predicted a wide range of other potential effect, from lenders using data to act on loan applications to criminal finding a sweet new collection of data to hack . “We believe today's misguided vote will unleash even more ... and more »
Congress Unravels Internet Privacy Rules - Valley News
Wed Mar 29 03:49, 2017 GMT
Fortune Congress Voted to Roll Back Internet Privacy Rules. Now People Are Looking to VPNs Fortune The vote by the U.S. Congress to repeal rules that limit how internet service providers can use customer data has generated renewed interest in an old internet technology: virtual private networks, or VPNs. VPNs cloak a customer's web-surfing history ... and more »
Congress Voted to Roll Back Internet Privacy Rules. Now People Are Looking to VPNs - Fortune
Tue Mar 28 23:30, 2017 GMT
Reuters Congress turns back the clock on internet privacy Reuters The Republican-led House joined the Senate in reversing an Obama-era rule that forced internet service providers to get customer permission performing compiling and selling web browsing data. Press CTRL+C (Windows), CMD+C (Mac), or long-press the ...
Congress turns back the clock on internet privacy - Reuters
Tue Mar 28 23:39, 2017 GMT
ATTN (blog) Congress Makes Decision on Internet Privacy Rule ATTN (blog) The House passed a resolution to repeal a Federal Communication Committee (FCC) rule that protects your internet data on Tuesday — and now it's on its way to President Donald Trump's desk. The 2016 rule was meant to give consumers a say in how ISPs ...
Congress Makes Decision on Internet Privacy Rule - ATTN (blog)
Tue Mar 28 22:11, 2017 GMT
NPR Congress Overturns Internet Privacy Regulation NPR The House of Representatives has gone along with the Senate and voted 215-205 to overturn a yet-to-take-effect regulation that would have required Internet service providers — like Comcast, Verizon and Charter — to get consumers' permission before ... Congress just killed your Internet privacy protections CNNMoney The House just voted to wipe out the FCC's landmark Internet privacy protections Washington Post Congress just voted to strip away FCC rules that protected your internet privacy Recode CNET  - The Hill  - Congress.gov  - Ars Technica all 294 news articles »
Congress Overturns Internet Privacy Regulation - NPR
Tue Mar 28 23:40, 2017 GMT
SC's Mignon Clyburn scolds GOP for unwinding internet privacy rules Island Packet Federal Communication Commission Chairman Tom Wheeler, center, joins hands with FCC Commissioners Mignon Clyburn, left, and Jessica Rosenworcel before the start of their open hearing and vote on net neutrality, in Washington, Feb. 26, 2015. and more »
SC's Mignon Clyburn scolds GOP for unwinding internet privacy rules - Island Packet
Tue Mar 28 22:14, 2017 GMT
The Verge Show Notes: Congress just sold your internet privacy out from under you The Verge Before every episode of The Vergecast I sit down, read through a bunch of news, and take a bunch of notes. It's one of the most enjoyable parts of my week, and I started thinking it might be fun to do every day on the site. So, every chance I can, I'm ... and more »
Show Notes: Congress just sold your internet privacy out from under you - The Verge
Mon Mar 27 20:17, 2017 GMT
Digital Rights Group Plans to Publicize Lawmakers who Oppose Internet Privacy Rules Nextgov A digital rights advocacy group that has launched unconventional public relations campaigns to defeat controversial internet legislation in the past plans to purchase billboards publicizing which lawmakers voted to remove new internet privacy rules ...
Digital Rights Group Plans to Publicize Lawmakers who Oppose Internet Privacy Rules - Nextgov
Tue Mar 28 23:08, 2017 GMT
As Congress Repeals Internet Privacy Rules, Putting Your Options In Perspective NET Website President Trump is expected to sign into law a decision by Congress to overturn new privacy rules for Internet service providers. Passed by the Federal Communications Commission in October, the rules never went into effect. If they had, it would have ... and more »
As Congress Repeals Internet Privacy Rules, Putting Your Options In Perspective - NET Website
Tue Mar 28 21:30, 2017 GMT
CNET House pulls the plug on internet privacy rules CNET Broadband providers won't have to get your permission before sharing your web browsing history and other personal data with marketers thanks to a vote Tuesday on Capitol Hill. Republicans in the US House of Representatives approved a resolution that ... Congress votes to roll back internet privacy protection Yahoo Finance VPNs Won't Save You from Congress' Internet Privacy Giveaway WIRED Internet privacy at stake in new vote WCSH6.com Deadline  - WTSP 10 News  - Congress.gov  - EFF all 217 news articles »
House pulls the plug on internet privacy rules - CNET
Tue Mar 28 22:09, 2017 GMT
CNNMoney Congress just killed your Internet privacy protections CNNMoney Opponents of the privacy rules argued it would place an undue burden on broadband providers while leaving large Internet companies like Facebook (FB, Tech30) and Google (GOOGL, Tech30) free to collect user data without asking permission. and more »
Congress just killed your Internet privacy protections - CNNMoney
Tue Mar 28 21:32, 2017 GMT
Washington Times Donald Trump to sign bill rolling back Internet privacy protections ... Washington Times The White House said Tuesday that President Trump will sign a rollback of Internet privacy rules that would allow broadband companies to sell their customers ... House votes this week to undo Obama-era EPA and Internet privacy ... Washington Examiner all 2 news articles »
Donald Trump to sign bill rolling back Internet privacy protections ... - Washington Times
Tue Mar 28 21:58, 2017 GMT
House to kill Obama-era FCC Internet privacy rules Washington Examiner The resolution was created under the Congressional Review Act, a law that lets Congress block recently enacted rules if both the House and Senate pass a resolution opposing those rules. The Senate voted last week to kill the FCC rule, and today's House ... and more »
House to kill Obama-era FCC Internet privacy rules - Washington Examiner
Mon Mar 27 18:37, 2017 GMT
Skip to the tl;dr This is the second entry in a blog series on using Java cryptography securely.  The first entry  provided an overview and covered some architectural details, using stronger algorithms and some debugging tips . This entry covers Cryptographically Secure Pseudo-Random Number Generators. This blog series should serve as a one-stop resource for anyone who needs to implement a crypto-system in Java. My goal is for it to be a complimentary, security-focused addition to the JCA Reference Guide.  There are various steps in cryptography that call for the use of random numbers. Generating a nonce, initialization vector or cryptographic keying materials all require a random number. The security of basic cryptographic elements largely depends on the underlying random number generator (RNG) that was used. An RNG that is suitable for cryptographic usage is called a Cryptographically Secure Pseudo-Random Number Generator (CSPRNG). The strength of a cryptographic system depends heavily on the properties of these CSPRNGs. Depending on how the generated pseudo-random data is applied, a CSPRNG might need to exhibit some (or all) of these properties: It appears random Its value is unpredictable in advance It cannot be reliably reproduced after generation In Java 8, the  SecureRandom  class provides CSPRNG functionality. The most OS-agnostic way to generate pseudo-random data that is suitable for general cryptographic use is to rely on the OS implementation's defaults, and never to explicitly seed it (i.e., don't use the setSeed method before a call to next* methods). This is done as below: //returns an unseeded instance of default RNG algorithm based on most preferred provider from list of providers configured in java.security // On Unix like system, NativePRNG algorithm, configured with seeding from non-blocking entropy source, is returned. // On Windows, SHA1PRNG algorithm, which can be self-seeded or explicitly seeded is returned. SecureRandom secRan = new SecureRandom(); byte[] ranBytes = new bytes[20]; secRan.nextBytes(ranBytes); // since, there is no setSeed method called before a call to next* method, self-seeding occurs Note:  This recommendation has the additional advantage of keeping code portable across operating systems, and will provide a secure randomizer if self-seeded. If you want complete assurance of randomness for a given operating system, I would suggest explicitly using the " Windows-PRNG " algorithm for Windows environments (using the getInstance method) and " NativePRNG " for Unix-like environments. Note that these options carry the downside of making code not easily portable. This is explained in detail later in this post. On Windows, the default implementation will return the SHA1PRNG algorithm (assuming default configuration of java.security). If explicitly seeded, this provides randomness, directly proportional to the source of entropy provided by the initial seeding. It's most secure to rely on upon OS-specific implementations to provide seeding. Providing a low-entropy predictable source could easily lead to generating predictable pseudo-random data, which is inappropriate for any cryptographic applications. The following are  anti-patterns  on a Windows OS and should be strictly avoided: // ANTI-PATTERN, do not copy-paste // On windows, default constructor would pick SHA1PRNG algorithm. SecureRandom random1 = new SecureRandom() ; // unseeded random object random1.setSeed(System.currentTimeMillis() % 1000); // seeding explicitly before next* methods, using low entropy source of seeding random1.nextBytes(new byte[20]); byte[] b = "123".getBytes() ; SecureRandom random2 = new SecureRandom(b) ; // seeding with a static byte array SecureRandom random4 = SecureRandom.getInstance("SHA1PRNG") ; random4.setSeed(123); // SHA1PRNG should never be initially explicitly seeded. On a Unix-like OS, the following are  anti-patterns  and should be strictly avoided: // ANTI-PATTERN, do not copy-paste // Explicitly requesting SHA1PRNG and not relying on default implementation chosen SecureRandom secRan = SecureRandom.getInstance("SHA1PRNG") ; secRan.setSeed(12345) ; // explicitly seeding SHA1PRNG algorithm. As a developer, you should be aware of what is going on behind the scenes and make sure your applications always generate cryptographically secure random numbers, regardless of other aspects like OS dependencies, default configurations (in java.security files) and seeding sources. So, while designing any CSPRNG, remember the following: Don't ever use Math.random There is nothing random about  Math.random . It doesn't provide cryptographically secure random numbers. It generates random values deterministically, but its output is still considered vastly insecure. Want to see for yourself? This blog post [3] , explains how simple it is to crack the linear congruential PRNG from which Math.random derives. Sources of entropy A real-world CSPRNG is composed of three things: 1) a CSPRNG algorithm (such as NativePRNG, Windows-PRNG, SHA1PRNG, etc.), 2) a source of randomness, at least during initial seeding and 3) a pseudo-random output. The task of generating a pseudo-random output from a predictable seed using a given algorithm is fairly straightforward. All of the algorithms provided by the Java providers are cryptographically secure [5][6]  too. Thus, the strength of a CSPRNG is directly proportional to the source of entropy used for seeding it (and re-seeding it). We can safely conclude that the security of a crypto-system depends on configuring the highest level of entropy for seeding a CSPRNG algorithm. The most practical, unpredictable and nearly computationally continuous source of randomness is attained by letting the underlying operating system pool random events into a system file, which can then be used for seeding. In Unix-like systems, the  file://dev/random  and  file://dev/urandom  files are continuously updated with random external OS-dependent events. In most operating systems, the entropy pool used for seeding a randomizer comes in one of these two forms: Blocking:  blocks your application until it finds sufficient entropy in its entropy pool. In Unix-like systems, this comes from  file://dev/random Non-Blocking:   doesn't block the application, and works with whatever is available in your OS's entropy pool. In Unix-like systems, it comes from  file://dev/urandom Cryptographers tends to be pessimistic about their entropy sources but for most purposes using a non-blocking source of entropy seeding should suffice [8] . All providers and algorithms the Java provides are cryptographically secured [5][6]  as long as they are initially seeded with the highest-entropy source possible. The recommended code sample above takes care of this by providing a default implementation that is seeded from a non-blocking entropy pool.  However, if you need to use these numbers in an application that requires the absolute highest level of entropy or to avoid a security code review argument, you might need to make some precise configurations.  There are a few ways that you can choose between these two pools in your application:  Configuring the  securerandom.source ( default is /dev/urandom )  property in the java.security config file. #Chosen algorithm would be seeded with a blocking entropy pool securerandom.source=file:/dev/random or #Chosen algorithm would be seeded with a non-blocking entropy pool securerandom.source=file:/dev/urandom Passing the System property  java.security.egd  to your application's command line. #Blocking entropy pool would be used by SecureRandom in MainClass % java -Djava.security.egd=file:/dev/random MainClass or #Non-Blocking entropy pool would be used by SecureRandom in MainClass % java -Djava.security.egd=file:/dev/urandom MainClass Using the  SecureRandom.getInstance(algo)  method and explicitly specifying an algorithm. In Unix-like OSes,  NativePRNG  and  NativePRNGNonBlocking  algorithms are seeded with non-blocking entropy pools, and the  NativePRNGBlocking  algorithm is seeded with a blocking source of entropy. // On Unix like OS, NativePRNG algorithm, is being returned, which is self-seeded with non-blocking (file://dev/urandom) source of entropy. SecureRandom nativePrng = SecureRandom.getInstance("NativePRNG"); or // On Unix like OS, NativePRNGBlocking algorithm, is being returned, which is self-seeded with blocking (file://dev/random) source of entropy. SecureRandom nativePrngNon = SecureRandom.getInstance("NativePRNGBlocking"); SecureRandom.getInstanceStrong  method (available since Java 8). When this method is used, it picks up the algorithm or algorithm/provider configuration in  securerandom.strongAlgorithms  java.security config. By default, it is configured to use non-blocking. // Algorithm used, is based on what is configured in securerandom.strongAlgorithms property of java.security config file. By default it's configured to use blocking algorithm. SecureRandom strongRNG = SecureRandom.getInstanceStrong() ; On Unix-like system, securerandom.strongAlgorithm is configured as: #This is a comma-separated list of algorithm and/or algorithm:provider entries. securerandom.strongAlgorithms=NativePRNGBlocking:SUN This means that SecureRandom.getInstanceStrong will return a NativePRNGBlocking implementation provided by SUN provider. SecureRandom randomizer should always be self-seeded In Java, the  SecureRandom  class provides the functionality of a CSPRNG. You can request the default implementation by using its constructor, or ask for a specific algorithm by using its getInstance method. The CSPRNG algorithm chosen and how this algorithm is seeded vary between different operating systems and selected implementations, which are in turn based on the provider order in java.security configuration files. To give you an idea of how complicated this gets, refer to the  CheckSecureRandomConfig.java  program, which lists observations of various permutations and combinations, all of which play an important role in the strength of your randomizer. We can see from  CheckSecureRandomConfig.java  that regardless of which approach you take (constructor or getInstance method), the randomizer object returned will be seeded by the configured securerandom.source in the java.security configuration file, and this source is considered safe. However, there is an exception to this rule. While using SHA1PRNG and explicitly seeding the randomizer object initially, the randomness of the pseudo-random data generated is directly proportional to the explicit source of entropy. On Unix-like operating systems, default implementations, securerandom.source value and provider order will give us self-seeded randomizer objects using the NativePRNG algorithm, which is perfectly safe. However, while on Windows, the default implementation returned is always SHA1PRNG. If it's explicitly seeded, it's dangerously un-random. Thus, on Windows, explicitly ask for the Windows-PRNG algorithm. No matter what, stay away from poorly documented SHA1PRNG algorithms. Java provides an option for explicitly seeding a secure randomizer. It's used mainly when you need to re-seed a randomizer object (to supplement existing seeding), but never for initial seeding. There are various situations in which a re-seeding is mandatory, for example, generating nonces, Initialization Vectors (IVs) and so on. On Windows, the most secure way to create a randomizer object would be: SecureRandom secRan = SecureRandom.getInstance("Windows-PRNG") ; // Default constructor would have returned insecure SHA1PRNG algorithm, so make an explicit call. byte[] b = new byte[NO_OF_RANDOM_BYTES] ; secRan.nextBytes(b); On Unix-like systems, the most secure way would be: SecureRandom secRan = new SecureRandom() ; // In Unix like systems, default constructor uses NativePRNG, seeded by securerandom.source property byte[] b = new byte[NO_OF_RANDOM_BYTES] ; secRan.nextBytes(b); Due to OS dependencies, differences in the way that operating systems gather randomness, and obviously the importance of using the correct entropy source in a CSPRNG algorithm, I would highly encourage everyone to run " CheckSecureRandomConfig.java " on your target systems. This can double-check the algorithm used, and how the randomizer is seeded ( file:/dev/urandom  (or  file:/dev/random  if needed). Run this code a few times to make sure that the same data is not generated across multiple calls (as would occur with a static explicit seeding). Such output would immediately prove a low entropy source for pseudo-random data. I only wish that Java would have taken some responsibility for security, as  python  does at the start of its modules, and alert its users. A recent incident that illustrates how using a weak random number generator could compromise the security of a system is the attack against the Hacker News website. The attack is explained  here ,with precise technical details described  here . To summarize; account thefts on this site took place due to the use of a CSPRNG seeded with time in milliseconds, a week entropy source. This  SecuredAESUsage  code example shows how to use SecureRandom in the most secure manner for generating an Initialization Vector.  Note on impacts of virtualization on sources of randomness: In a virtual environment, the entropy pool is being shared between different instances. Situations have been observed [7]  in which the co-existence and sharing of entropy pools leads to problems. In the case of a non-blocking pool, the pool can be drained out, leading to low entropy. For blocking pools, if all VM instances are started at the same time, they can block each other, effectively leading to a Denial of Service conditions or at best, longer start times. Such scenarios are observed by bitcoin miners, and AWS tomcat users as well. This situation might become more acute when full snapshots are taken that also clone the randomness pool. It adds to the problem of low entropy, since a virtual machine has limited hardware sources into an OS' randomness pool (for example, no keyboard, mouse, etc.). Currently, however there are no widely popular solutions to such behaviors, and I would recommend continuing with my suggestion above. This should still provide you with computationally secure randomness. Just keep in mind that if you observe this behavior in your applications, you can troubleshoot this further. tl;dr: To keep code portable, use OS defaults with OS-specific self-seeding. On Windows, explicitly seeding could lead to dangerously predictable data. Don't ever use Math.random for any cryptographic needs. Use non-blocking sources of entropy seeding over blocking, unless you're absolutely sure that your application needs the highest level of entropy. Never, ever explicitly seed a SHA1PRNG algorithm. In Windows, SHA1PRNG is the default implementation used. The preferred algorithms on Windows and Unix-like OSes are, respectively, "Windows-PRNG" and "NativePRNG". Always double-check your randomizer configurations. The most important details are the algorithm used, the seeding source for the algorithm, the way the algorithm is seeded (i.e., self-seeded or explicitly seeded) and whether the output generated is sufficiently random. In virtualized environments circumstances can lead to low entropy for non-blocking pools of entropy and delayed starts or deadlock for blocking pools of entropy.  Reference: Java SecureRandom updates as of April 2016:  https://www.cigital.com/blog/proper-use-of-javas-securerandom/ CSPRNG Wikipedia:  https://en.wikipedia.org/wiki/Cryptographically_secure_pseudorandom_number_generator Cracking Random Number Generators - James Roper  https://jazzy.id.au/2010/09/20/cracking_random_number_generators_part_1.html Use /dev/urandom for CSPRNG seeding  http://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/ NIST Recommendation for Random Bit Generator Constructions :  http://csrc.nist.gov/publications/drafts/800-90/sp800_90c_second_draft.pdf Recommendation for the entropy sources used for random bit generation:  http://csrc.nist.gov/publications/drafts/800-90/sp800-90b_second_draft.pdf Challenges with Randomness In Multi-tenant Linux container platforms:  https://content.pivotal.io/blog/challenges-with-randomness-in-multi-tenant-linux-container-platforms Professor D.J.Bernstein comments on /dev/random vs /dev/urandom arguments:  https://gist.github.com/tarcieri/6347417
Cryptographically Secure Pseudo-Random Number Generator (CSPRNG)
Tue Mar 28 17:09, 2017 GMT
WIRED Lawmakers Face Intense Lobbying Ahead Of Internet Privacy Vote Deadline Opponents and supporters of the FCC's broadband privacy rules are furiously lobbying the House of Representatives today as lawmakers prepare to vote this afternoon on a bill that could all but kill the initiative. ... The Silicon Valley supported ... VPNs Won't Save You from Congress' Internet Privacy Giveaway WIRED Internet privacy at stake in new vote WCSH6.com The House votes today on stripping away your internet privacy ExtremeTech CBS News  - Computerworld  - Congress.gov  - EFF all 183 news articles »
Lawmakers Face Intense Lobbying Ahead Of Internet Privacy Vote - Deadline
Tue Mar 28 18:14, 2017 GMT
Common Dreams Right to Internet Privacy Under Threat as Debate Reaches House Floor Common Dreams 34, a Congressional Review Act (CRA) resolution to repeal the Federal Communications Commission's (FCC) privacy provision, which required that providers such as Comcast, AT&T, and Verizon get users' permission before collecting or selling sensitive ...
Right to Internet Privacy Under Threat as Debate Reaches House Floor - Common Dreams
Tue Mar 28 18:54, 2017 GMT
WASHINGTON (Reuters) - The White House said on Tuesday that the Trump administration strongly supports a bill to repeal regulations requiring internet service providers to do more to protect customers' privacy than websites like Alphabet Inc's Google or Facebook Inc.
White House backs repeal of broadband privacy rules
Tue Mar 28 17:19, 2017 GMT
When the RIAA targeted CDN provider Cloudflare with an injunction to block access to a known pirate site, the company objected. Cloudflare argued that the DMCA shielded the company from the broad blocking requirements. However, a Florida federal court has now ruled that the DMCA doesn't apply in this case, opening the door to widespread anti-piracy filtering. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
DMCA Doesn’t Shield Cloudflare From Anti-Piracy Injunctions, Court Rules
Tue Mar 28 17:13, 2017 GMT
Washington Post Your Internet privacy could be in trouble. Here's how to protect yourself. Washington Post March 24, 2017 12:56 PM EDT - The Senate has voted to repeal an FCC ruling that protects your Internet privacy and data from ISPs. Here's all the steps you can take to protect yourself. (Jhaan Elker / The Washington Post). March 24, 2017 12:56 PM EDT ...
Your Internet privacy could be in trouble. Here's how to protect yourself. - Washington Post
Tue Mar 28 15:49, 2017 GMT
News3LV MONEY MATTERS: House expected to block Obama-era internet privacy rules News3LV If it passes and is signed by president Trump, as is widely expected, the resolution would get rid of privacy rules that make it harder for internet providers to sell consumer data. Supporters say the rules place tougher restrictions on internet ...
MONEY MATTERS: House expected to block Obama-era internet privacy rules - News3LV
Tue Mar 28 11:44, 2017 GMT
Technical.ly Brooklyn Why that controversial internet privacy bill would be good for Wilmington ISP WhyFly Technical.ly Brooklyn Why that controversial internet privacy bill would be good for Wilmington ISP WhyFly. The internet service provider says it would brand itself as a company that would not sell user data. Why that controversial internet privacy bill would be good for ...
Why that controversial internet privacy bill would be good for Wilmington ISP WhyFly - Technical.ly Brooklyn
Tue Mar 28 11:07, 2017 GMT
WIRED VPNs Won't Save You from Congress' Internet Privacy Giveaway WIRED The House of Representatives is set to vote as early as today on a resolution that would reverse Obama-era regulations preventing internet service providers from selling your web browsing history on the open market. Those rules, passed ... Many ...
VPNs Won't Save You from Congress' Internet Privacy Giveaway - WIRED
Tue Mar 28 11:07, 2017 GMT
For his one-man protests, Ildar Dadin was sent to prison where he was tortured, before his conviction was quashed in February 2017 The post #IndexAwards2017: Ildar Dadin courageously defends the right to protest in Russia appeared first on Index on Censorship .
#IndexAwards2017: Ildar Dadin courageously defends the right to protest in Russia
Tue Mar 28 08:54, 2017 GMT
What was supposed to be a celebration for Freedom Day in Belarus turned into the mass arrest of hundreds of protesters questioning the two decade-long rule of President Alexander Lukashenko, often dubbed “Europe’s last dictator” for its autocratic regime. Read the full article The post Europe’s ‘last dictator’ Alexander Lukashenko cracks the whip on opposition in Belarus (International Business Times) appeared first on Index on Censorship .
Europe’s ‘last dictator’ Alexander Lukashenko cracks the whip on opposition in Belarus (International Business Times)
Tue Mar 28 08:12, 2017 GMT
A cartoonist for the daily Cumhuriyet shares his take on life in Turkey under emergency rule. The post Semih Poroy: Life under emergency rule appeared first on Index on Censorship .
Semih Poroy: Life under emergency rule
Mon Mar 27 08:54, 2017 GMT
International freedom of speech campaigners have penned an appeal to Kazakhstan’s President Nursultan Nazarbayev to guarantee the safety of jailed journalist Zhanbolat Mamay and to ensure an impartial investigation into his case. Read the full article The post Kazakhstan: Campaigners Appeal to Nazarbayev Over Journalist’s Case (EurasiaNet) appeared first on Index on Censorship .
Kazakhstan: Campaigners Appeal to Nazarbayev Over Journalist’s Case (EurasiaNet)
Tue Mar 28 07:39, 2017 GMT
Index on Censorship joins with the Civic Solidarity Platform to condemn Belarus' crackdown on peaceful protesters. The post Belarus: Civic solidarity movement condemns mass detentions and police violence appeared first on Index on Censorship .
Belarus: Civic solidarity movement condemns mass detentions and police violence
Tue Mar 28 06:54, 2017 GMT
What to Look For in the House Internet Privacy Debate Hightech Forum The primary factual issue remains the same: those who like the FCC's current regulations believe Internet Service Providers have a broader and deeper view of the Internet than do the large, distributed, highly intrusive tracker networks that record and ...
What to Look For in the House Internet Privacy Debate - Hightech Forum
Mon Mar 27 11:49, 2017 GMT
Irish Tech News Internet privacy will be non-existent by 2025 experts claim Irish Tech News Internet privacy means the right of having privacy when storing, sharing, and receiving or sending information online that is of personal nature. Internet privacy is a very broad ... Find out more about internet security by visiting vpn trends. He can ...
Internet privacy will be non-existent by 2025 experts claim - Irish Tech News
Tue Mar 28 00:11, 2017 GMT
VILNIUS/TAIPEI (Reuters) - Taiwan-based electronics manufacturer Quanta Computer Inc has acknowledged that its name was used as part of an email fraud scheme that bilked two U.S.-based internet companies out of more than $100 million.
Taiwan company says name used in $100 million email fraud
Mon Mar 27 22:56, 2017 GMT
The Slate Online Internet users face diminished privacy The Slate Online Republicans hit a roadblock last week with repealing and replacing the Affordable Care Act, but they are making progress in deconstructing broad internet privacy protection policies that were created under former President Barack Obama's administration. and more »
Internet users face diminished privacy - The Slate Online
Mon Mar 27 21:43, 2017 GMT
CBS News Internet privacy bill vote coming in the House CBS News Last week, the Senate voted to overturn FCC rules that would protect the privacy of your web browsing history, and the House will soon be voting on the same measure. Here's what it means: if the House vote goes the same way, internet service providers ... Why Congress should act now on internet privacy The Hill (blog) Senate votes to undo internet privacy regulations PBS NewsHour Sen. Chuck Schumer urges House to save internet privacy from bad Senate bill New York Daily News Walla Walla Union-Bulletin  - FOX 61  - Congress.gov  - Ars Technica all 133 news articles »
Internet privacy bill vote coming in the House - CBS News
Mon Mar 27 22:17, 2017 GMT
CBS San Francisco Bay Area States Take Up Internet Privacy As Trump Looks To Roll Back Rules CBS San Francisco Bay Area Edelson said the important thing for consumers to know about internet privacy is that it's all about consent. “The laws don't say that companies can't collect information. All they say is that they have to disclose it and get consent before collecting ... House Expected To Vote On Rolling Back Internet Privacy Rules Tomorrow Consumerist all 2 news articles »
States Take Up Internet Privacy As Trump Looks To Roll Back Rules - CBS San Francisco Bay Area
Mon Mar 27 17:56, 2017 GMT
Men's Journal Politicians Have Voted to Fundamentally Alter Basic Internet Privacy Men's Journal The rule used to be that internet service providers had to get a consumer's explicit consent before sharing or selling their web history to third parties like advertisers. In what can only be perceived as a drastic sea change in how ISPs may harness ...
Politicians Have Voted to Fundamentally Alter Basic Internet Privacy - Men's Journal
Mon Mar 27 19:43, 2017 GMT
Washington Examiner House votes this week to undo Obama-era EPA and Internet privacy regs Washington Examiner Fresh off their failure to pass a bill to repeal and replace Obamacare, Republicans this week will return to legislation repealing Obama-era regulations and will vote on a bill the GOP believes will help end the politicization of the Environmental ...
House votes this week to undo Obama-era EPA and Internet privacy regs - Washington Examiner
Mon Mar 27 16:15, 2017 GMT
The Hill (blog) Why Congress should act now on internet privacy The Hill (blog) For a generation, the Internet's success has relied on the commonsense principle of making things easy for consumers. From the smartphone to streaming video services, experience shows that consumers respond enthusiastically and in droves when given ... Senate votes to undo internet privacy regulations PBS NewsHour Sen. Chuck Schumer urges House to save internet privacy from bad Senate bill New York Daily News Internet privacy concerns are real for Americans Walla Walla Union-Bulletin FOX 61  - New York Post  - Congress.gov  - Ars Technica all 118 news articles »
Why Congress should act now on internet privacy - The Hill (blog)
Mon Mar 27 17:10, 2017 GMT
Consumerist House Expected To Vote On Rolling Back Internet Privacy Rules Tomorrow Consumerist If you like having any control over what your internet service provider does with the personal data it has on you, we've got some bad news: The House of Representatives is expected to vote tomorrow to reverse the FCC rules that limit what the Comcasts, ...
House Expected To Vote On Rolling Back Internet Privacy Rules Tomorrow - Consumerist
Mon Mar 27 12:45, 2017 GMT
Congress moves to strike internet privacy rules Springfield Business Journal Republican senators on Thursday narrowly voted to dismantle internet privacy protections put into place during the Obama administration. The 50-48 vote made mostly along party lines is expected to be mirrored in the House this week, followed by a ... and more »
Congress moves to strike internet privacy rules - Springfield Business Journal
Sun Mar 26 22:26, 2017 GMT
If Congress Kills FCC Privacy Rules, 'Little' Would Protect Consumers From Providers NPR The Senate overturned Obama-era internet privacy rules. Electronic Frontier Foundation's Jeremy Gillula says the measure would make it easier for companies to share online activity without permission. MICHEL MARTIN, HOST: Now we're going to take a ...
If Congress Kills FCC Privacy Rules, 'Little' Would Protect Consumers From Providers - NPR
Mon Mar 27 16:03, 2017 GMT
Hundreds of protests were detained during a weekend of anti-government protests in Belarus. The post Belarus: Crackdown sweeping journalists and human rights defenders into detention appeared first on Index on Censorship .
Belarus: Crackdown sweeping journalists and human rights defenders into detention
Mon Mar 27 12:39, 2017 GMT
Mashable Lack of consumer choice means internet providers will be able to spy on customers without fear Mashable Dane Jasper is cofounder and CEO of Sonic, the largest independent internet service provider in Northern California. Last week Senate Republicans voted to abolish vital internet privacy rules created by the Federal Communications Commission. Lobbyists ... and more »
Lack of consumer choice means internet providers will be able to spy on customers without fear - Mashable
Mon Mar 27 10:53, 2017 GMT
iNews London attack fuels internet privacy controversy Sentinel & Enterprise LONDON -- Westminster Bridge attacker Khalid Masood sent a WhatsApp message that cannot be accessed because it was encrypted by the popular messaging service, a top British security official said Sunday. British press reports suggest Masood used the ... WhatsApp must be accessible to authorities, says Amber Rudd The Guardian WhatsApp accused of giving terrorists 'a secret place to hide' as it refuses to hand over London attacker's messages Telegraph.co.uk Ministers slam internet giants such as Google and Facebook for 'disgusting' failure to block extremist content ... Daily Mail iNews all 238 news articles »
London attack fuels internet privacy controversy - Sentinel & Enterprise
Mon Mar 27 11:45, 2017 GMT
The mother of Özkan Mayda, an Antalya-based photojournalist for the Zaman daily, shares her son's story. The post Memnune Mayda: “Our only child is definitely not a traitor” appeared first on Index on Censorship .
Memnune Mayda: “Our only child is definitely not a traitor”
Mon Mar 27 11:23, 2017 GMT
For exposing the realities of life in the Occupied Territories, Breaking the Silence has faced a barrage of attacks from the government The post #IndexAwards2017: Breaking the Silence brings Hebron to Tel Aviv appeared first on Index on Censorship .
#IndexAwards2017: Breaking the Silence brings Hebron to Tel Aviv
Mon Mar 27 11:11, 2017 GMT
Encrypted communication tools are used by investigative journalists and reporters under fire, as well as businesses and governments, to have safe conversations and to report on difficult and often dangerous situations. Attempts by the UK government to create a backdoor into these services would potentially put lives at risk by making the systems far less […] The post Weakening encryption would harm journalists appeared first on Index on Censorship .
Weakening encryption would harm journalists
Mon Mar 27 11:35, 2017 GMT
Another security-versus-privacy war erupts following last week's attack in Westminster.
Politician calls for access to Westminster attacker's WhatsApp messages - CNET
Mon Mar 27 11:02, 2017 GMT
The post Belarus must immediately free and drop all charges against protesters appeared first on Index on Censorship .
Belarus must immediately free and drop all charges against protesters
Sun Mar 26 23:30, 2017 GMT
New York Times Push for Internet Privacy Rules Moves to Statehouses New York Times Online privacy is the rare issue that draws together legislators from the left and the far right. At the state level, anyway, some of the progress has come from a marriage between progressive Democrats and libertarian-minded Republicans, who see ... Senate votes to undo internet privacy regulations PBS NewsHour Senate votes to kill internet privacy protections FOX 61 Consumer groups worry as internet privacy rules face the axe The Hill New York Post  - Salt Lake Tribune all 66 news articles »
Push for Internet Privacy Rules Moves to Statehouses - New York Times
Sun Mar 26 21:09, 2017 GMT
PBS NewsHour Senate votes to undo internet privacy regulations PBS NewsHour The Senate voted on March 23 to overturn internet privacy rules created to prevent providers like Comcast, Verizon and AT&T from sharing users' personal information or selling it without permission. While the House has yet to vote on the issue, the ... Senate votes to kill internet privacy protections FOX 61 Consumer groups worry as internet privacy rules face the axe The Hill Schumer bashes legislation that would kill internet privacy New York Post Salt Lake Tribune  - NBC Bay Area  - Ars Technica all 64 news articles »
Senate votes to undo internet privacy regulations - PBS NewsHour
Sun Mar 26 19:21, 2017 GMT
Why Internet Providers Are Celebrating Friday's Privacy Rule Rollback Fortune On Friday, the Senate blocked the implementation of rules that would have restricted internet service providers like Comcast and Verizon's ability to monetize users' internet browsing history and other data. This doesn't in itself mark a sea change ... and more »
Why Internet Providers Are Celebrating Friday's Privacy Rule Rollback - Fortune
Sun Mar 26 12:00, 2017 GMT
FOX 61 Consumer groups worry as internet privacy rules face the axe The Hill Republicans are close to killing off Obama-era privacy rules on internet service providers, a move that critics warn could have major implications for customers' personal information. The rules approved by the Federal ... “The FTC has a long track ... Senate votes to kill internet privacy protections FOX 61 Senate Passes Bill That Will Loosen Internet Privacy Rules Mediaite Senate quietly votes to overturn internet privacy laws which protects personal information The Independent Alaska Dispatch News  - Autostraddle  - CNBC all 46 news articles »
Consumer groups worry as internet privacy rules face the axe - The Hill
Sat Mar 25 17:00, 2017 GMT
The Verge A VPN can stop internet companies from selling your data — but it's not a magic bullet The Verge But the tool isn't a magic privacy bullet — in fact, experts can't even agree on a great VPN service, beyond one you make yourself. While a huge number of companies provide VPNs, many have potential security flaws or could put your data at risk. It's ...
A VPN can stop internet companies from selling your data — but it's not a magic bullet - The Verge
Sat Mar 25 23:01, 2017 GMT
NBC Bay Area As the Senate Moves In on Internet Privacy , How Can You Keep Your Searches Private? NBC Bay Area The Senate passed a joint resolution on Thursday, barring the Federal Communications Commission from enforcing rules passed last year that would ban internet , cable, and mobile providers from selling your data without your consent, NBC News reported. and more »
As the Senate Moves In on Internet Privacy, How Can You Keep Your Searches Private? - NBC Bay Area
Sat Mar 25 18:23, 2017 GMT
Mediaite Senate Passes Bill That Will Loosen Internet Privacy Rules Mediaite Given all the hubbub over the American Health Care Act and SCOTUS nominee Neil Gorsuch this week, it was easy to miss a polarizing piece of legislation currently making it's way through the Senate. On Thursday, the Senate passed a bill that would ... Alaska's big telecoms say they won't sell consumer data after Senate internet privacy vote Alaska Dispatch News The Republican Push to Gut Internet Privacy Rules (and What You Can Do About It) Explained Autostraddle Senate was right to block FCC's broadband privacy rules The Hill (blog) all 29 news articles »
Senate Passes Bill That Will Loosen Internet Privacy Rules - Mediaite
Sat Mar 25 15:15, 2017 GMT
Autostraddle The Republican Push to Gut Internet Privacy Rules (and What You Can Do About It) Explained Autostraddle This week, the United States Senate (led by Republicans) voted to rollback Obama-Era privacy regulations that protected consumers from their own internet service providers. The bill rolls back Federal Communications Commission (FCC) rules that prohibit ... and more »
The Republican Push to Gut Internet Privacy Rules (and What You Can Do About It) Explained - Autostraddle
Sat Mar 25 03:01, 2017 GMT
Alaska Dispatch News Alaska's big telecoms say they won't sell consumer data after Senate internet privacy vote Alaska Dispatch News Consumer privacy advocates are concerned after the U.S. Senate on Thursday passed a resolution that will roll back privacy rules the Federal Communications Commission approved last year, but the two largest Alaska-based telecommunications companies ...
Alaska's big telecoms say they won't sell consumer data after Senate internet privacy vote - Alaska Dispatch News
Thu Mar 23 21:37, 2017 GMT
Milwaukee Journal Sentinel Congress takes first step to overturn Internet privacy rules Milwaukee Journal Sentinel He also echoed the concerns of many consumer advocates that nullifying the privacy rules would make it easier for ISPs to sell consumer data to marketers. Flake, who proposed the review of the rules, and Sen. John Thune, R-S.D., noted that the FCC ...
Congress takes first step to overturn Internet privacy rules - Milwaukee Journal Sentinel
Fri Mar 24 21:56, 2017 GMT
Bloomberg BNA VIDEO: Internet Privacy , Senate Hearings and Drones on the Hill Wrap – March 24 Bloomberg BNA Senate Republicans took a swipe at Obama-era Federal Communications Commission-issued privacy rules March 23, voting to undo them using the Congressional Review Act. If that effort ultimately succeeds, broadband providers like Verizon ...
VIDEO: Internet Privacy, Senate Hearings and Drones on the Hill Wrap – March 24 - Bloomberg BNA
Thu Mar 23 22:53, 2017 GMT
New York Post Senate votes to kill privacy rules guarding your online info ABC News In this photo taken Jan. 11, 2011, the Verizon logo is displayed in New York. The Republican-led Senate moved Thursday, March 23, 2017, to undo Obama-era regulations that would have forced internet service providers like Comcast and Verizon to ask ... Americans one step closer to losing control of their browser history New York Post all 2 news articles »
Senate votes to kill privacy rules guarding your online info - ABC News
Fri Mar 24 19:21, 2017 GMT
The Libertarian Republic Opinion: You're (P)ISPing Me Off! Internet Privacy Legislation Explained The Libertarian Republic It's time to talk about privacy again. This time it's not about who you marry, the NSA, what guns you own or what candidate you support. Rather, this time it's about Internet Privacy and private companies' ability to use your browsing data. The way it ... and more »
Opinion: You're (P)ISPing Me Off! Internet Privacy Legislation Explained - The Libertarian Republic
Fri Mar 24 16:03, 2017 GMT
PCWorld Three privacy tools that block your Internet provider from tracking you PCWorld Three privacy tools that block your Internet provider from tracking you. The government may soon allow your ISP to sell your ... The action has yet to pass the House, but if it does, it means anyone concerned about privacy will have to protect ... and more »
Three privacy tools that block your Internet provider from tracking you - PCWorld
Fri Mar 24 15:51, 2017 GMT
New York Times Tech Roundup: A Senate Vote Is Not the Final Word on Internet Privacy New York Times Credit Todd Heisler/The New York Times. Those rules meant to protect the privacy of your internet activity that you may have heard about? Never mind. In a 50-48 vote mostly along party lines on Thursday, the Senate moved to strip consumer privacy rules ... Senate votes to kill internet privacy protections fox6now.com Republicans Are Hellbent on Killing Off Internet Privacy Protections. Why? Mother Jones US Senate votes to overturn Internet privacy rules & block any future ones 9 to 5 Mac CNNMoney  - NPR  - Congress.gov  - Reuters all 242 news articles »
Tech Roundup: A Senate Vote Is Not the Final Word on Internet Privacy - New York Times
Fri Mar 24 17:16, 2017 GMT
Towleroad Walt Cessna, Gloria Gaynor, Chris Pratt, Internet Privacy , Oregon, Zayn, NYC Gay Men's Chorus: HOT LINKS Towleroad Screen Shot 2017-03-24 at 1.00.41 PM RIP. Walt Cessna. “Walt was a stunning presence – funny, smiling and charming, often with a vocabulary entirely of his own. He was a true creative – a compelling artist in every sense. His honed craft ranged from ... and more »
Walt Cessna, Gloria Gaynor, Chris Pratt, Internet Privacy, Oregon, Zayn, NYC Gay Men's Chorus: HOT LINKS - Towleroad
Fri Mar 24 16:46, 2017 GMT
fox6now.com Senate votes to kill internet privacy protections fox6now.com Republicans claimed the regulations went too far and unnecessarily burdened internet companies, and the industry lauded the move to overturn them. “Our industry remains committed to offering services that protect the privacy and security of the ... US Senate votes to overturn Internet privacy rules & block any future ones 9 to 5 Mac Congress Moves to Strike Internet Privacy Rules From Obama Era New York Times US Senate Votes To Repeal Obama-Era Internet Privacy Rules NPR Washington Post  - CNNMoney  - Congress.gov  - Reuters all 239 news articles »
Senate votes to kill internet privacy protections - fox6now.com
Thu Mar 23 20:46, 2017 GMT
As March comes to a close, so too does Women’s History Month . Unfortunately, it doesn’t seem that we’ll be putting an end to the ongoing battle for gender equality in the workplace any time soon – and we’re finding that this is especially true in cybersecurity. So true, in fact, that new research shows women make up only 11 percent of the information security workforce. This number has remained stagnant since 2013, and is particularly stunning given that the cybersecurity workforce gap is expected to reach 1.8 million by 2022. On March 15, Veracode teamed up with the Center for Cyber Safety and Education™ (the Center), the Executive Women’s Forum on Information Security, Risk Management & Privacy (EWF), (ISC) 2 , as well as other industry leaders, to release the biennial 2017 Global Information Security Workforce Study: Women in Cybersecurity . At a glance, additional key takeaways from the Women in Cybersecurity report include: Women have higher levels of education than men, with 51 percent holding a master’s degree or higher, compared to 45 percent of men. Fewer women hold positions of authority (director level or above) compared to men. Women working in cybersecurity have a more varied educational background than men contributing to the diverse set of skills they can potentially bring to the industry. On average, women in the information security industry earn a lower annual salary than their male counterparts. Fifty-one percent of women in the cybersecurity industry in North America, Latin America and the UK have experienced some form of discrimination, compared to only 15 percent of men. Women who have higher levels of access to sponsorship and leadership programs report feeling valued in their role and are more likely to be successful. Needless to say that the findings of the research, which was conducted by Frost & Sullivan, are discouraging. In some cases it feels a lot like we’re taking two steps forward and one step back. For example, women who are in upper level management roles saw the pay gap close slightly, from $6,020 in 2015 to $4,540 in 2017; while women in non-managerial roles saw the gap slightly widen, from $4,310 in 2015 to $5,000 in 2017. And somehow, in 2017, we still have a discrimination problem – whether an employee is experiencing discrimination because of their gender, ethnicity or other factors. In cybersecurity, 51 percent of all women have experienced discrimination, and that only increases the higher she climbs on the corporate ladder. Indeed, 57 percent of female middle managers/directors, 65 percent of executives and 67 percent of C-level executives report having been discriminated against. There is a lot to unpack and to be highly concerned about. But there is also a little glimmer of something that gives me hope, and that’s what the study uncovered about how and why women feel valuable in the workplace. And what kind of Millennial would I be if I didn’t bring it all back to the well-being of my own generation in the workforce? Hear me out. Millennials are taking on security positions with those cybersecurity degrees they’re earning (52 percent of women under the age of 29), and organizations are constantly trying to figure out the best way to work with and maintain Millennial talent ( at last check , one-in-three American workers are a Millennial). The Women in Cybersecurity report backs up recent findings from Deloitte that mentorship/sponsorship, non-technical skill development and leadership training go a long way to making women feel valued in the workplace. According to the  2016 Deloitte Millennial Survey , 63 percent of millennials think their leadership skills aren’t being fully developed, and those keeping their employer in their five-year plan are twice as likely to have a mentor (68 percent). In my career, I’ve worked for and with some of the smartest, strongest and most passionate female leaders. In the last three months, I’ve watched these women and women all over the world come together to fight for equality and to protect those who may be at risk. That glimmer of hope that I spoke of comes from the fact that I know that women can – and do – support other women. They can and do lift one another up so high that absolutely anything is possible. Women in cybersecurity can and do mentor and support other women in their field of interest. We just need to make sure that men are on board, paying it forward, too. Read the 2017 Global Information Security Workforce Study .
New Research: In 2017, Women Still Only Make Up 11 Percent of the Cybersecurity Workforce
Fri Mar 24 12:44, 2017 GMT
Web browsers could be blocked from accessing sites caught up in a row over basic security tools.
Google and Symantec clash on website security checks
Fri Mar 24 13:55, 2017 GMT
Washington Post How a Senate vote could harm your Internet privacy Washington Post March 24, 2017 9:38 AM EDT - Senate lawmakers voted on March 23 to repeal a historic set of rules that protect consumers' online data from their Internet providers. The vote now heads to the House. (Jhaan Elker / The Washington Post). March 24, 2017 9 ...
How a Senate vote could harm your Internet privacy - Washington Post
Fri Mar 24 10:07, 2017 GMT
COPENHAGEN (Reuters) - Danish electronic payments provider Nets will cooperate with anti-money laundering software developer Chainalysis to help banks validate bitcoin transactions and comply with regulations, Nets said on Friday.
Nets partners with blockchain analysis firm to fight dirty bitcoins
Fri Mar 24 10:33, 2017 GMT
OZY Senate Overturns Obama-Era Internet Privacy Rules OZY Your (online) life is not your own. Senate Republicans voted to strike down privacy regulations governing internet service providers like Comcast, Verizon and AT&T. Without the rules, which opponents call bureaucratic overreach, such companies would no ...
Senate Overturns Obama-Era Internet Privacy Rules - OZY
Fri Mar 24 10:40, 2017 GMT
A man extorted cash from 20th Century Fox & Dreamworks after he obtained a leaked copy of their upcoming movie The Boss Baby. The studios were told to pay a bitcoin ransom to avoid the animated comedy leaking onto the Internet before its March 31 premiere. After an amount was paid by 20th Century Fox, a man was arrested and is now in custody. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
20th Century Fox & Dreamworks Blackmailed Over The Boss Baby Leak
Fri Mar 24 05:53, 2017 GMT
German justice minister proposes internet censorship legislation World Socialist Web Site Under the pretext of combatting “fake news” and “hate speech” on the internet , Justice Minister Heiko Maas (Social Democratic Party, SPD) is planning a massive attack on free speech. On March 14, Maas presented a draft of a so-called network ... and more »
German justice minister proposes internet censorship legislation - World Socialist Web Site
Fri Mar 24 03:33, 2017 GMT
Daily Beast Senate Votes to Scrap Obama-Era Internet Privacy Rules Daily Beast Senate lawmakers have voted to repeal Obama-era privacy regulations that would bar internet service providers from selling people's personal information and browsing habits. The rules, which have not yet taken effect, were approved last year, despite ... and more »
Senate Votes to Scrap Obama-Era Internet Privacy Rules - Daily Beast
Thu Mar 23 19:55, 2017 GMT
New York Times Congress Moves to Strike Internet Privacy Rules From Obama Era New York Times WASHINGTON — Republican lawmakers moved to dismantle landmark internet privacy protections for individuals on Thursday, the first decisive strike against telecommunications and technology regulations created during the Obama administration and a ... US Senate Votes To Repeal Obama-Era Internet Privacy Rules NPR The Senate just voted to undo landmark rules covering your Internet privacy Washington Post Senate Republicans Just Voted to Kill Internet Privacy Vanity Fair CNNMoney  - CBS News  - Huffington Post  - Congress.gov all 144 news articles »
Congress Moves to Strike Internet Privacy Rules From Obama Era - New York Times
Thu Mar 23 19:27, 2017 GMT
NPR US Senate Votes To Repeal Obama-Era Internet Privacy Rules NPR But a big telecom matter found its way into the schedule: privacy rules for Internet service providers. In a party-line 50-48 vote Thursday, senators approved a resolution to undo sweeping privacy rules adopted by the Obama-era Federal Communications ... The Senate just voted to undo landmark rules covering your Internet privacy Washington Post Congress Moves to Strike Internet Privacy Rules From Obama Era New York Times Senate Republicans Just Voted to Kill Internet Privacy Vanity Fair CNNMoney  - CBS News  - The Hill  - Congress.gov all 139 news articles »
US Senate Votes To Repeal Obama-Era Internet Privacy Rules - NPR
Thu Mar 23 15:31, 2017 GMT
Doing security well is hard work, but it should never block useful functionality for your customers. If security interferes with key software capabilities, the security must be tweaked. The answer should never be to abandon the functionality and certainly not to abandon the security. And yet two instances from this month suggest that is exactly what is happening. Let's start with election fraud. As we've noted, the potential for election cyber attacks is real and dangerous . French election officials seem to agree—which is good. But their decision was to halt cyber-voting for overseas citizens, rather than try and fix the security —which is horrible. If they had decided to abandon overseas electronic voting because of a lack of interest or that it was too expensive, it would be a very different situation. But they appear to be saying that their citizens want it. The security, however, seemed like a lot of work so they opted to surrender. Had they said that they were temporarily suspending the program while security teams put in place protections that would have been good. Alas, that's not what appears to be happening. A few days after Reuters noted the French election decision, I received a copy of an e-mail from an IT security official with a major company. The note was a follow-up to a series of notes to employees detailing problems with the web site. The site kept crashing. Turns out, according to the memo, the problem was that the company's own security scans overtaxed the Web servers. In effect, the company Denial of Service attacked itself. That can happen. The problem is what the company did next. It halted the security testing. The note did not say that it was suspending the testing temporarily while the software was tweaked. No, it just halted the security testing, which presumably was put in place to act as protection. No one ever said that security is supposed to be especially easy, but it is essential. Entities that abandon customer-desired functionality to sidestep security threats—like France did—or abandon security defenses to enable better functionality—as did this major company—are equally wrong. The reason corporate security is so challenging is that it is constantly in the middle of the battle between functionality and safety. It's easy to make a site or a building completely safe if you need not worry about people being able to use it. It's just as easy to make access and functionality super easy, if you're willing to have no meaningful security. The corporate world we live in, though, requires both and therefore forces security and functionality to constantly battle. That's the way it should be. Authentication has to put some level of burden on legitimate users to protect those same users. On the flip side, security must understand that the instant they start blocking functionality is when they have gone too far. I did a story recently about GRC strategies and was struck by the wisdom of one former government CISO. He had tried preventing unauthorized downloads so that he could better secure his data assets. Users rebelled. "I started asking people ‘Why are you using a cloud provider?’ Their answer was that they just had to get their jobs done," the former CISO said. "Users are like water: They will find the fastest way around something if you’re in the way." That's exactly right. But that absolutely does not mean that security has the right to give up, any more than business units have the right to surrender to security. Both must co-exist. If security and LOB managers find the tug-of-war distasteful, they probably have struck the right balance.
Striking the Right Balance Between Security and Functionality
Thu Mar 23 17:50, 2017 GMT
WASHINGTON (Reuters) - The U.S. Senate on Thursday voted narrowly to repeal regulations requiring internet service providers to do more to protect customers' privacy than websites like Alphabet Inc's Google or Facebook Inc .
U.S. Senate votes to overturn Obama broadband privacy rules
Thu Mar 23 10:45, 2017 GMT
The technology behind bitcoin is one of the internet's most promising new developments. Here's how businesses can use it to streamline operations and create new opportunities.
Executive's guide to implementing blockchain technology
Thu Mar 23 17:31, 2017 GMT
Washington Post The Senate just voted to undo landmark rules covering your Internet privacy Washington Post "Our industry remains committed to offering services that protect the privacy and security of the personal information of our customers," said NCTA — The Internet and Television Association, a trade group representing major cable providers. "We ... Senate votes to block internet privacy regulations The Hill Senate Republicans Are Preparing to Kill Internet Privacy Vanity Fair The Senate Prepares to Send Internet Privacy Down a Black Hole WIRED BuzzFeed News  - The Verge  - Tribune-Review  - Congress.gov all 65 news articles »
The Senate just voted to undo landmark rules covering your Internet privacy - Washington Post
Thu Mar 23 13:13, 2017 GMT
USA TODAY Congress vote may overturn Internet privacy rules USA TODAY The FCC gained jurisdiction of consumer privacy on broadband networks after 2015's passage of net neutrality or Open Internet rules that designated ISPs as "common carriers," akin to traditional phone service. There are some advantages to the having ... Senate Republicans Are Preparing to Kill Internet Privacy Vanity Fair The Senate Prepares to Send Internet Privacy Down a Black Hole WIRED Congress is poised to undo landmark rules covering your Internet privacy Washington Post The Hill  - Tribune-Review  - International Business Times all 38 news articles »
Congress vote may overturn Internet privacy rules - USA TODAY
Thu Mar 23 13:15, 2017 GMT
Vanity Fair Senate Republicans Are Preparing to Kill Internet Privacy Vanity Fair From health-care coverage to environmental protections, Republicans are moving quickly to erase Barack Obama's presidential legacy. The latest Obama-era policy on the chopping block may be guidelines protecting consumer Internet privacy . The Senate Prepares to Send Internet Privacy Down a Black Hole WIRED Overnight Tech: Senate moving to kill FCC's internet privacy rules | Bill Gates pushes for foreign aid | Verizon, AT ... The Hill Senate eyes repeal of internet privacy regulations enacted during Obama administration Tribune-Review International Business Times  - Recode  - Reuters all 34 news articles »
Senate Republicans Are Preparing to Kill Internet Privacy - Vanity Fair
Thu Mar 23 12:28, 2017 GMT
Hungary's very own merry pranksters have gone from street performers to a principled voice against intolerance The post #IndexAwards2017: Hungary’s Two-tailed Dog Party are beyond a joke appeared first on Index on Censorship .
#IndexAwards2017: Hungary’s Two-tailed Dog Party are beyond a joke
Thu Mar 23 09:50, 2017 GMT
Organisations have written to the president of Belarus to demand an end to recent wave of detentions of journalists, activists and opposition figures. The post Belarus: Wave of detentions must end appeared first on Index on Censorship .
Belarus: Wave of detentions must end
Wed Mar 22 23:53, 2017 GMT
ConsumerAffairs Illinois considers far-reaching internet privacy measures ConsumerAffairs Illinois is considering far-reaching internet privacy measures that would give consumers the right to know what data is being gathered and who has it. and more »
Illinois considers far-reaching internet privacy measures - ConsumerAffairs
Wed Mar 22 17:20, 2017 GMT
If you're hit by ransomware, you're presented with a difficult choice. Do you pay the ransom and hope the crooks follow through and return your ransomed data and files? Or do you refuse to pay, and say goodbye to that data forever? Tech companies including Microsoft, Google, Apple and Samsung are facing a similar dilemma, after WikiLeaks published information allegedly showing that the CIA possesses hacking tools that can be used to exploit vulnerabilities in the products of those companies. As Motherboard reported, WikiLeaks approached those companies with an offer to share technical details about the CIA's "Vault 7" hacking tools, but only if the companies meet WikiLeaks demands. That sounds a lot like holding files to ransom. Now, we don't know the full details of the alleged vulnerabilities. Are these zero-days that can be exploited today? How old are the vulnerabilities? Has the CIA, or anyone else, used this information? WikiLeaks also demanded that the companies patch the vulnerabilities within 90 days. Would WikiLeaks expose the information when the 90 days run out? The lack of answers to these questions makes it difficult to assess the gravity of the situation. But it could be the start of an ugly trend, if others follow WikiLeaks' lead and hold back information about vulnerabilities in a vendor's products in order to blackmail them.  The issue of vulnerability disclosures has been a controversial one for some time. Even Google, whose Project Zero research team has discovered scores of vulnerabilities in a wide range of products, has courted controversy with its policy of giving vendors 90 days to respond to a vulnerability before going public. Just last month, Project Zero released details of a critical remote code execution vulnerability in the Windows Graphics Component GDI library before Microsoft had released a patch. Project Zero gave Microsoft exactly 90 days and then automatically "derestricted" details of the vulnerability, on February 14. (Microsoft only issued a patch on March 14, a full month later). Again last month, Google exposed another Microsoft vulnerability, in Edge browser and Internet Explorer , before Microsoft had released a patch. Microsoft has repeatedly stated that it does not agree with Google's disclosure policy and believes in "coordinated" vulnerability disclosure. Chris Eng, Veracode's VP of security research, agrees with Microsoft on this one. "A common fallacy is that, if the bug is easy to exploit, it must be easy to fix. While a flat 90-day policy may sound reasonable on the surface, it fails to account for the complexity of the vulnerability," Chris said. "How straightforward is the fix? Does it need to be backported to many different versions of the product? Does it affect multiple products or codebases? Is it a design flaw that can't be reasonably fixed, only mitigated against?" It is reasonable to expect the vendor to maintain an open line of communication with bug finders. But only the vendor can evaluate and recommend a remediation timeframe, Chris said. ISO, the International Standards Organization, has made recommendations ( ISO/IEC 29147 ) about vulnerability disclosure that may help companies craft policies about responding to disclosures. What about bug bounty programs, which reward legitimate researchers who work with the vendor? Unfortunately, you can't count on security researchers to do the right thing and give vendors time to fix problems before releasing information about a vulnerability in their software products. Even companies with a generous bug bounty program may have trouble getting researchers to play by the rules. And although bug bounty programs and responsible disclosure policies can help mitigate some bugs that have made it into production, it's more of a band-aid approach to security that can leave software vendors and their customers dangerously exposed. As we discovered in our research report on bug bounty programs , the vast majority of IT decision-makers we surveyed (77 percent) said companies rely on bug bounty programs too much. More than 90 percent said they believe "most" flaws discovered through a bug bounty program could have been prevented by security assessments and developer training. And more than half (59 percent) said they believe it's more cost effective to fix bugs identified in testing than through a bug bounty program.   We think those survey respondents are mostly right – according to the National Institute of Standards and Technology, it is 30 times more expensive to fix a security vulnerability in post-production than in the architecture and design stages, and 6 times more expensive than in the development stage . There's a saying that an ounce of prevention is worth more than a pound of cure. In the ransomware analogy mentioned at the top of this post, backing up your files means you won't have to pay a ransom. Prevention is a better policy for securing software, too. Test early and often during development, and fix the flaws you find. You don't want to count on the kindness of strangers. Download the Research Report: Bug Bounties Are Not a Quick Fix .cta {background-color:#8fbc48; width: 95%; margin: 15px auto 15px auto; padding:15px 0px 15px 0px; border:solid 1px #000; text-align:center;} .cta a{color:#fff; font-size: 20px; font-weight: 800; font-family: "Gotham SSm A","Gotham SSm B",Helvetica,Arial,sans-serif;} .cta a:hover{color:#eee;}
WikiLeaks, Vault 7, and Vulnerability Disclosure: Is It Blackmail?
Thu Mar 23 00:17, 2017 GMT
Internet censorship , Hollywood style The Boston Globe You would think the First Amendment is a bulletproof defense against censorship of the Internet . But then you are not reckoning with the awesome political power of the Screen Actors Guild. The union representing Hollywood stars and role players somehow ...
Internet censorship, Hollywood style - The Boston Globe
Thu Mar 23 00:28, 2017 GMT
Hackers demand $75,000 in bitcoin by April 7 in exchange for not resetting account credentials, Motherboard reports.
Apple reportedly target of shakedown over iCloud accounts - CNET
Wed Mar 22 21:32, 2017 GMT
Senators could vote as early as today to not only reverse the Obama-era FCC's action but block the agency from passing similar rules in the future. The post The Senate Prepares to Send Internet Privacy Down a Black Hole appeared first on WIRED .
The Senate Prepares to Send Internet Privacy Down a Black Hole
Wed Mar 22 20:32, 2017 GMT
WASHINGTON (Reuters) - The U.S. Senate on Wednesday will take up a measure to repeal regulations adopted by the Obama administration to subject internet service providers to stricter scrutiny than websites like Alphabet Inc's Google or Facebook Inc to protect customers' private data.
Senate to take up broadband privacy repeal: spokesman
Wed Mar 22 17:51, 2017 GMT
WIRED Congress Is About To Give Away Your Online Privacy WIRED Congress is poised to roll back FCC privacy protections in a way that could seriously compromise our online lives. The protections require internet service providers to secure consumer data and obtain consumers' consent before mining and selling it. 24 senators introducing bill to kill FCC Internet privacy rules received a combined $2.29M from industry PACs The Sociable Internet horrors if congress repeals FCC privacy protections VPNCompare (blog) all 28 news articles »
Congress Is About To Give Away Your Online Privacy - WIRED
Wed Mar 22 15:07, 2017 GMT
The victims were a social network and an "internet-related services" company, according to the feds.
This $100M email scam tripped up two big US tech companies - CNET
Wed Mar 22 13:15, 2017 GMT
The technology underlying bitcoin could fuel powerful systems for forecasting the future—and create a digital feed for facts. The post Forget Bitcoin. The Blockchain Could Reveal What’s True Today and Tomorrow appeared first on WIRED .
Forget Bitcoin. The Blockchain Could Reveal What’s True Today and Tomorrow
Wed Mar 22 12:22, 2017 GMT
Bahrain’s decision to file charges against Ebrahim Sharif underscores the country’s tactical use of judicial harassment to suppress freedom of speech. Ebrahim Sharif, the former secretary-general of the secular opposition group National Democratic Action Society (Wa’ad), was charged with “inciting racial hatred against the regime” under article 165 of Bahrain’s penal code. The alleged offenses […] The post Bahrain: Opposition figure faces charges for free speech appeared first on Index on Censorship .
Bahrain: Opposition figure faces charges for free speech
Wed Mar 22 11:33, 2017 GMT
The Angolan rapper has been beaten, censored and imprisoned for his art and his activism, but goes on undetered The post #IndexAwards2017: Luaty Beirão singing against the Angolan regime appeared first on Index on Censorship .
#IndexAwards2017: Luaty Beirão singing against the Angolan regime
Wed Mar 22 09:33, 2017 GMT
WJXT Jacksonville Maintaining privacy in the Internet of Things WJXT Jacksonville (CNN) - A recent WikiLeaks document dump, purportedly from the CIA, claimed that the agency can hack smart TVs and place them in "fake-off" mode, allowing an owner's private conversations to be recorded and sent to a covert server. Although many were ...
Maintaining privacy in the Internet of Things - WJXT Jacksonville
Wed Mar 22 10:02, 2017 GMT
The Pirate Bay and several other pirate sites are unavailable again in many parts of the world, due to a new blockade from Internet backbone provider Cogent. The site's IP-addresses, which are owned by CDN provider Cloudflare, have been blackholed, in what appears to be another case of over-blocking. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Internet Backbone Cogent Blocks Cloudflare’s New ‘Pirate Site’ IP-addresses
Wed Mar 22 08:19, 2017 GMT
Colombian writer Gabriel García Márquez, who died on 17 April, wrote this piece on the evolution of journalism for Index on Censorship magazine in 1997. The post The best job in the world: Gabriel García Márquez on journalism appeared first on Index on Censorship .
The best job in the world: Gabriel García Márquez on journalism
Tue Mar 21 07:29, 2017 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout the European Union and neighbouring countries. The post Mapping Media Freedom: Five journalists detained in Belarus after covering protest against unemployment tax appeared first on Index on Censorship .
Mapping Media Freedom: Five journalists detained in Belarus after covering protest against unemployment tax
Tue Mar 21 12:02, 2017 GMT
Despite persecution for his work, Rebel Pepper continues to satirise the Chinese state from a life in exile The post #IndexAwards 2017: Chinese cartoonist Rebel Pepper refuses to put down his pen appeared first on Index on Censorship .
#IndexAwards 2017: Chinese cartoonist Rebel Pepper refuses to put down his pen
Tue Mar 21 11:07, 2017 GMT
FRANKFURT/AMSTERDAM (Reuters) - Google and its sister company Jigsaw, are stepping up efforts to help keep elections free of online interference after helping to defend one of two important voter information websites that came under cyber attack during last week's Dutch national election.
Google sister company Jigsaw offers free security tools to election groups
Tue Mar 21 11:00, 2017 GMT
Google and Jigsaw are helping protect elections from DDoS attacks and more. The post A Cybersecurity Arsenal That'll Help ‘Protect Your Election’ appeared first on WIRED .
A Cybersecurity Arsenal That’ll Help ‘Protect Your Election’
Tue Mar 21 09:38, 2017 GMT
By now, most UK Internet users have gotten used to pirate sites being blocked by their ISPs. Internet providers have been ordered to block a wide variety of torrent, direct download and streaming portals that offer copyright-infringing content. The full list uf URLs, which includes several reverse proxies, has now swelled to more than 3,800 according to one of the ISPs involved. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
UK’s Piracy Blocklist Now Exceeds 3,800 URLs
Mon Mar 20 10:58, 2017 GMT
ZDNet Internet of Things security : What happens when every device is smart and you don't even know it? ZDNet So if we don't build security and privacy in to our designs from the very first whiteboard, we're going to leave ourselves with a problem." Not only that, but as IoT devices become more and more common, people will start to ignore them. "The reality of ... 6 Hot Internet of Things (IoT) Security Technologies Forbes Stop doing this one thing to your gadgets - It's a major privacy risk! Komando A New Wave of IoT Security Threats Are Coming — Here's How to Mitigate Them BizTech Magazine all 25 news articles »
Internet of Things security: What happens when every device is smart and you don't even know it? - ZDNet
Tue Mar 21 00:11, 2017 GMT
Not all cyber-attacks are about theft, some seek to undermine the trust placed in data and documents.
Fake data
Mon Mar 20 18:14, 2017 GMT
Advox (press release) (blog) 'Those who tortured him [should] tell us the truth': Tunisian Commission Hears Net Freedom Testimonies From ... Advox (press release) (blog) ... to abuses by the Ben Ali regime for expressing themselves online or accessing banned content, testified about the dictatorship's violations against freedom of expression and the right to privacy on the internet before Tunisia's Truth and Dignity ... and more »
'Those who tortured him [should] tell us the truth': Tunisian Commission Hears Net Freedom Testimonies From ... - Advox (press release) (blog)
Mon Mar 20 13:24, 2017 GMT
Network World Possibly the worst mass invasion of internet privacy ever Network World The request asks for “name(s), address(es), telephone number(s), dates of birth, Social Security numbers, email addresses, payment information, account information, IP addresses, and MAC addresses of the person(s) who requested/completed the search.". Police get search warrant for everyone who Googled Edina resident's name Minneapolis Star Tribune Police get warrant for entire Minnesota city's Google searches in wire fraud case ExtremeTech all 44 news articles »
Possibly the worst mass invasion of internet privacy ever - Network World
Mon Mar 20 11:47, 2017 GMT
The Malaysian artist’s depiction of the country’s prime minister as an evil clown saw him face possible jail time. The post #IndexAwards2017: Fahmi Reza will continue to use art as a weapon against corruption appeared first on Index on Censorship .
#IndexAwards2017: Fahmi Reza will continue to use art as a weapon against corruption
Mon Mar 20 10:42, 2017 GMT
A cartoonist for the daily Cumhuriyet shares his take on Turkey on the international stage. The post Semih Poroy: Turkey’s place in the world appeared first on Index on Censorship .
Semih Poroy: Turkey’s place in the world
Sun Mar 19 09:07, 2017 GMT
An internet security expert says a cyber arms race has just begun – and the big players might surprise you Business Insider Mikko Hypponen, a cyber security expert told Business Insider: "I believe we are right now seeing the beginning of the next arms race. This time it's going to be a cyber arms race. "Cyber attacks are, well they are, effective, they are affordable, and ... and more »
An internet security expert says a cyber arms race has just begun – and the big players might surprise you - Business Insider
Sun Mar 19 02:04, 2017 GMT
FRANKFURT (Reuters) - Germany has raised its alert level against cyber attacks to "heightened readiness" ahead of parliamentary elections, saying government websites are already subjected to daily assault, newspaper Welt am Sonntag said.
German cybersecurity watchdog raises attack alert level: paper
Fri Mar 17 22:02, 2017 GMT
Just a friendly reminder that phishing scams which spoof the boss and request W-2 tax data on employees are intensifying as tax time nears. The latest victim shows that even cybersecurity experts can fall prey to these increasingly sophisticated attacks. On Thursday, March 16, the CEO of Defense Point Security, LLP -- a Virginia company that bills itself as "the choice provider of cyber security services to the federal government" -- told all employees that their W-2 tax data was handed directly to fraudsters after someone inside the company got caught in a phisher's net.
Govt. Cybersecurity Contractor Hit in W-2 Phishing Scam
Fri Mar 17 18:01, 2017 GMT
BADEN-BADEN, Germany (Reuters) - The world's biggest economies will pledge to jointly fight cyber attacks on the global banking system, one of the biggest coordinated efforts yet to protect lenders since an $81 million heist of the Bangladesh central bank's account last year.
G20 to jointly fight bank sector hacking
Fri Mar 17 13:28, 2017 GMT
Linux.com (blog) Bruce Schneier on New Security Threats from the Internet of Things Linux.com (blog) Security expert Bruce Schneier says we're creating an Internet that senses, thinks, and acts, which is is the classic definition of a robot. “I contend that ... Linux.com: What are some of the new security and privacy risks specifically associated with ...
Bruce Schneier on New Security Threats from the Internet of Things - Linux.com (blog)
Fri Mar 17 10:27, 2017 GMT
Many universities pay lip service to freedom of speech on campus, but actions often tell a different story The post Is free speech in jeopardy on UK campuses? appeared first on Index on Censorship .
Is free speech in jeopardy on UK campuses?
Wed Mar 15 08:34, 2017 GMT
“Media freedom and pluralism are fundamental rights enshrined in Article 11 of the EU Charter of Fundamental Rights. However, the EU has no general powers to intervene with Member States in the area of fundamental rights” European Commission Vice-President Andrus Ansip said when replying to a question by Maltese MEP David Casa regarding the garnishee […] The post Garnishee orders: Media freedom is a fundamental right but EU ‘has no power to intervene’ (Malta Independent) appeared first on Index on Censorship .
Garnishee orders: Media freedom is a fundamental right but EU ‘has no power to intervene’ (Malta Independent)
Thu Mar 16 19:08, 2017 GMT
The popular scrapbooking site hasn't been accessible in China for the past seven days, according to monitoring site GreatFire.org.
Pinterest is now blocked by China's Great Firewall - CNET
Thu Mar 16 16:01, 2017 GMT
This is the third entry in a blog series that looks at each stage of an application security program’s maturity and outlines your next steps as you move toward an advanced program. We typically see organizations fall within one of these four stages of application security: Reactive Baseline Expanded Advanced If you are in the expanded application security stage, you’ve made significant progress embedding security into the software development lifecycle (SDLC) . You probably use several assessment techniques, and have multiple touch points in the SDLC where security assessments are conducted. This is certainly a solid application security program that significantly reduces your organization’s risk at the application layer. However, with the shift to DevOps, developers are looking for more autonomy and shunning any processes that slow them down. These trends are requiring some tweaks to the expanded program to move it to the advanced stage. How do you move to an advanced application security program that gels with a DevOps model? It’s time to start fully integrating automated testing into the SDLC, measuring and refining your program, and making sure you’re covering third-party applications and code. Integration and automation To keep up with the speed of development in a DevOps world, AppSec solutions have to be able to: Scan code quickly, without significant configuration Integrate security assessments into the same APIs that are used for development In addition, emerging solutions allow developers to assess smaller sections of code in progress, rather than waiting to assess only completed applications. For instance, Veracode Developer Sandbox lets development teams test and fix code between releases without triggering a failed policy compliance report to the security team, and Veracode Greenlight gives developers secure coding feedback in seconds, privately in their IDE, so they can fix issues before they even commit the code. Third-party applications and code Another consequence of the increased development speed: the reliance on third-party apps and code. And this externally sourced code is increasingly becoming the target of choice for cyberattackers because it’s typically insufficiently secure, and it gives them more bang for their buck — they can target hundreds to thousands of companies with a single exploit . To address third-party application vulnerabilities, consider an application security solution that: Works directly with your software supply chain — on your behalf — to assess and remediate suppliers’ code Ensures third-party code adheres to your security policies before you implement it To manage vulnerabilities in open source components, make sure you have an inventory of all components in use and their locations. Often, when major vulnerabilities in open source components are disclosed, companies struggle to respond because they don’t know which of their applications contain components, or even which components they are using. Application security solutions are increasingly enabling complete visibility into all of the components development teams are using, as well as the versions being used. Runtime protection The reality is that time to market often trumps security, and apps are deployed with vulnerabilities. Prepare for this scenario by adding runtime protection to your application security mix. Runtime protection technology identifies and blocks application security threats in real time. This technology enables applications to “self-protect” by reconfiguring automatically, without human intervention, in response to certain conditions. Making the case with metrics To take your program to the next level, it’s time to start measuring it against KPIs, and reporting on the results. Based on the results, you can tweak your existing goals or policies. In addition, your KPI reporting will prove that your program is making a positive impact, and ease the process of getting additional buy-in and support. Get details on these steps, and all the steps involved in building an application security program – including tips and advice from someone’s who’s been there – in our new guide, From Ad Hoc to Advanced Application Security: Your Path to a Mature AppSec Program .
Your Next Steps if Your AppSec Program Is in the Expanded Stage
Thu Mar 16 15:29, 2017 GMT
Using the prism of Shakespeare, this event explores how the arts allow for greater freedom of speech in our societies in the UK and US today The post Power of the arts: from propaganda to free speech appeared first on Index on Censorship .
Power of the arts: from propaganda to free speech
Thu Mar 16 14:43, 2017 GMT
A country’s leadership sets the tone, but can also penetrate the very fabric of the public’s existence igniting a metamorphosis that creates political clones The post Ece Temelkuran: What will become of Erdogan’s little clones when he’s gone? appeared first on Index on Censorship .
Ece Temelkuran: What will become of Erdogan’s little clones when he’s gone?
Thu Mar 16 12:04, 2017 GMT
Travel trade organisation Abta says a cyber attack on its website may have affected about 43,000 people.
Abta website hit by cyber attack
Thu Mar 16 11:00, 2017 GMT
Next month, Blockchain Capital will build a new venture capital fund using a bitcoin-like digital token instead of dollars The post The Initial Coin Offering, the Bitcoin-y Stock That's Not Stock—But Definitely a Big Deal appeared first on WIRED .
The Initial Coin Offering, the Bitcoin-y Stock That’s Not Stock—But Definitely a Big Deal
Thu Mar 16 04:09, 2017 GMT
KFOX El Paso Carpe Diem: home internet security KFOX El Paso The best step you can take to your protect your privacy , is to change the default password on any home device that is connected to the internet . All these items come with a default password that Gamwell said most people choose to ignore out of laziness.
Carpe Diem: home internet security - KFOX El Paso
Thu Mar 16 04:11, 2017 GMT
WASHINGTON (Reuters) - Wednesday's indictments in the United States of four people in a 2014 cyber attack on Yahoo Inc provides the clearest details yet on what some U.S. officials say is a symbiotic relationship between Moscow's security services and private Russian hackers.
Yahoo cyber indictment shows Kremlin, hackers working hand-in-hand
Thu Mar 16 00:49, 2017 GMT
The U.S. Justice Department today unsealed indictments against four men accused of hacking into a half-billion Yahoo email accounts. Two of the men named in the indictments worked for a unit of the Russian Federal Security Service (FSB) that serves as the FBI's point of contact in Moscow on cybercrime cases. Here's a look at the accused, starting with a 22-year-old who apparently did not try to hide his tracks. According to a press release put out by the Justice Department, among those indicted was Karim Baratov (a.k.a. Kay, Karim Taloverov), a Canadian and Kazakh national who lives in Canada. Baratov is accused of being hired by the two FSB officer defendants in this case -- Dmitry Dokuchaev, 33, and Igor Sushchin, 43 -- to hack into the email accounts of thousands of individuals. According to a press release put out by the Justice Department, among those indicted was Karim Baratov (a.k.a. Kay, Karim Taloverov), a Canadian and Kazakh national who lives in Canada. Baratov is accused of being hired by the two FSB officer defendants in this case -- Dmitry Dokuchaev, 33, and Igor Sushchin, 43 -- to hack into the email accounts of thousands of individuals.
Four Men Charged With Hacking 500M Yahoo Accounts
Wed Mar 15 22:27, 2017 GMT
BOSTON (Reuters) - A North Korean hacking group known as Lazarus was likely behind a recent cyber campaign targeting organizations in 31 countries, following high-profile attacks on Bangladesh Bank, Sony and South Korea, cyber security firm Symantec Corp said on Wednesday.
North Korean hacking group behind recent attacks on banks: Symantec
Wed Mar 15 15:41, 2017 GMT
Mark Twain famously said, "truth is stranger than fiction." I doubt even he could invent the strange events that unfold daily in our newsfeeds. In the realm of cybersecurity, however, breaches and vulnerabilities are becoming so frequent as to be predictable. Nevertheless, some of the most notable breaches of the past year were shocking in their details. Look at the unexpected outcome of the U.S. presidential election, and the alleged cyberattacks by Russia. Beyond hacked emails and "fake news," at least two states had their voter databases breached , most likely through a  SQL injection  vulnerability, a disturbingly common web application security failure. Many of the most bizarre breaches can be attributed to application-layer attacks, including last year's hack of the online hookup community Adult FriendFinder , with millions of users' credentials ending up for sale on the Dark Web. Stranger still, application security vulnerabilities allowed attackers to compromise the SCADA systems of a water utility through a public payment application. The attackers were able to mess with the control system to change the level of chemicals in the water, although the breach was caught in time to prevent potentially devastating consequences, according to the Verizon Data Breach Digest . Then there was the story of the Mirai botnet , a collection of compromised Internet of Things devices used in a super-powerful DDoS attack that temporarily knocked several major websites offline. Mirai's masters built such a powerful botnet by exploiting hardcoded passwords in 1.5 million webcams . These and other strange but true application security failures that caught our eye in the past year are the subject of this infographic . If you think of other strange AppSec failures that we missed, use the comments section to add to this list. And learn more about the application security challenges and frustrations developers struggle with in our developer survey report .  
Strange But True Application Security Failures [INFOGRAPHIC]
Wed Mar 15 16:00, 2017 GMT
snopes.com Senate Bill Would Roll Back FCC Oversight of Internet Privacy snopes.com According to the FCC's rules, “sensitive customer personal information” includes not only Social Security numbers, financial and health-related data, but web browsing history, content of users' online communications, and “the functional equivalents of ... Advertisers urge Congress to roll back internet privacy rule The Hill The US Senate is Looking to Remove Internet Privacy Protection Rules News4C Trump And Congress Complain About Surveillance, But Want to Enable Spying By Internet Companies ACLU (blog) Ars Technica all 18 news articles »
Senate Bill Would Roll Back FCC Oversight of Internet Privacy - snopes.com
Wed Mar 15 14:05, 2017 GMT
Beyond the Script, part of the BBC Arabic Festival, invites speakers to question what we cannot talk about. The post Beyond the Script: Policy, censorship and physical boundaries appeared first on Index on Censorship .
Beyond the Script: Policy, censorship and physical boundaries
Wed Mar 15 11:27, 2017 GMT
News4C The US Senate is Looking to Remove Internet Privacy Protection Rules News4C We live in the age of technology and internet , and everyone we know is surfing the web. What not everyone might know though is that their internet service providers store their browsing history. This means that their privacy is always at stake ...
The US Senate is Looking to Remove Internet Privacy Protection Rules - News4C
Wed Mar 15 10:47, 2017 GMT
Index on Censorship, PEN International, ARTICLE 19 and 65 organisations are deeply concerned by the continuous deterioration of freedom of expression and media freedom in Turkey The post Turkey’s deteriorating freedom of expression and media freedom appeared first on Index on Censorship .
Turkey’s deteriorating freedom of expression and media freedom
Wed Mar 15 02:00, 2017 GMT
Top 5 Predictions About the Future of Internet Privacy Business 2 Community Some argue that security triumphs privacy . Others argue that people have an undeniable right to lead private lives and that governments must not interfere with that. Regardless of where one might stand on the issue, however, one thing is clear ...
Top 5 Predictions About the Future of Internet Privacy - Business 2 Community
Wed Mar 15 09:36, 2017 GMT
Danish journalist Flemming Rose delivered a lecture on 9 March 2017 as part of Censorship Awareness Week at Wellesley College. The post Flemming Rose: Censorship and self-censorship in the 21st century appeared first on Index on Censorship .
Flemming Rose: Censorship and self-censorship in the 21st century
Tue Mar 14 18:03, 2017 GMT
In the summer 2016 issue of Index on Censorship magazine award-winning journalist Lindsey Hilsum asks if reporters should still be heading to warzones. The post Lindsey Hilsum: The danger of reporting behind the lines appeared first on Index on Censorship .
Lindsey Hilsum: The danger of reporting behind the lines
Tue Mar 14 10:39, 2017 GMT
National Cyber Security Centre and National Crime Agency warn more must be done to secure critical service from threat of IoT hacks.
The internet of botnets and ransomware on your TV: Here come your next big security headaches
Tue Mar 14 08:21, 2017 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout the European Union and neighbouring countries. The post Mapping Media Freedom: Spanish journalists harassed by Podemos officials appeared first on Index on Censorship .
Mapping Media Freedom: Spanish journalists harassed by Podemos officials
Tue Mar 14 07:54, 2017 GMT
NCA director says a rising number of gadgets are being hacked to launch cyber attacks.
Your gadgets could help 'launch a cyber attack'
Tue Mar 14 07:45, 2017 GMT
The new piracy blocking injunction obtained by the UK's Premier League is groundbreaking on several levels, court papers have revealed. Not only did the football outfit work closely with Sky, BT and Virgin, - who all have a vested interest, but the ISPs also monitored traffic from 'pirate' servers requested by their customers. Live blocking of streams will be possible too, with no immediate court oversight. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
New UK ‘Kodi’ Piracy Blocking Injunction is a Pretty Scary Beast
Tue Mar 14 03:59, 2017 GMT
KFOX El Paso Motivation Monday: home internet security KFOX El Paso What you really need to be worried about, Gamwell said, is the multibillion-dollar criminal industry that exists solely to violate your privacy and pillage your finances by accessing your personal information. And all it takes, to do that is hacking ...
Motivation Monday: home internet security - KFOX El Paso
Mon Mar 13 17:10, 2017 GMT
The Hill Advertisers urge Congress to roll back internet privacy rule The Hill The privacy rules approved under former Democratic Commissioner Tom Wheeler have sparked controversy. They require internet service providers to obtain permission from consumers before using sensitive data for marketing purposes. But Republicans ... Congress may overturn Obama internet privacy rules Reuters Internet Privacy Rules Repeal Surfaces in House InsideSources ACLU Responds To Flake Resolution On Internet Privacy Regulations KJZZ Legal Reader (blog)  - Business Insider  - Jeff Flake all 155 news articles »
Advertisers urge Congress to roll back internet privacy rule - The Hill
Mon Mar 13 16:02, 2017 GMT
The trial of jailed Bahraini human rights activist Nabeel Rajab on charges of spreading "rumours and false news" was deferred for a second time on 7 March until 16 April. The post Bahrain: Nabeel Rajab trial postponed until 16 April appeared first on Index on Censorship .
Bahrain: Nabeel Rajab trial postponed until 16 April
Mon Mar 13 14:04, 2017 GMT
The Hill Week ahead in tech: GOP takes aim at internet privacy rules The Hill The FCC's privacy rules were approved under then-Chairman Tom Wheeler, a Democrat, in October, and bar internet service providers from collecting "sensitive" consumer data like browsing information and app usage data without their customers' express ... Senate Committee Questions FCC Commissioners on Broadcast TV Repacking, Internet Privacy Lexology (registration) Net neutrality DOA? Here's what's next for the internet CNET all 14 news articles »
Week ahead in tech: GOP takes aim at internet privacy rules - The Hill
Mon Mar 13 10:47, 2017 GMT
Lexology (registration) Senate Committee Questions FCC Commissioners on Broadcast TV Repacking, Internet Privacy Lexology (registration) Ranking committee member Bill Nelson (D-FL) countered that Pai's recent actions on broadband privacy have weakened consumer privacy protections, transparency and data security . Thune also reminded the FCC's commissioners and, particularly, Clyburn ... and more »
Senate Committee Questions FCC Commissioners on Broadcast TV Repacking, Internet Privacy - Lexology (registration)
Sun Mar 12 13:45, 2017 GMT
The spy agency says cyber-attacks could threaten the democratic process in the UK.
GCHQ warns politicians about Russian hacking threat
Mon Mar 13 07:34, 2017 GMT
South China Morning Post China's internet censorship under fire at 'two sessions' South China Morning Post Two proposals by CPPCC delegates at panel meetings – one which was subsequently censored and another which went unreported on the mainland – have urged the loosening of internet controls and many advisers and lawmakers have spoken out against ... and more »
China's internet censorship under fire at 'two sessions' - South China Morning Post
Sun Mar 12 17:41, 2017 GMT
LONDON (Reuters) - A British intelligence agency has told political parties to protect themselves against potential cyber attacks, citing allegations that Russian hackers tried to influence last year's U.S. presidential election.
UK political parties warned of Russian hacking threat: report
Fri Mar 10 23:15, 2017 GMT
U.S. News & World Report Congress May Overturn Obama Internet Privacy Rules U.S. News & World Report WASHINGTON (Reuters) - Republicans in the U.S. Congress are moving to repeal regulations adopted by the Obama administration in October that would have subjected internet service providers to stricter scrutiny than websites to protect customers ... Internet Privacy Rules Repeal Surfaces in House InsideSources Congress May Overturn Obama-Era Rules on Internet Privacy TIME ACLU Responds To Flake Resolution On Internet Privacy Regulations KJZZ Legal Reader (blog)  - Yahoo Finance  - The Verge  - Federal Communications Commission all 109 news articles »
Congress May Overturn Obama Internet Privacy Rules - U.S. News & World Report
Fri Mar 10 18:39, 2017 GMT
Mashable Internet security company launches a perfume line to promote cybersecurity Mashable Kaspersky is a company that creates software to protect homes and businesses from viruses and internet threats and now they will also be making perfume. The company is partnered with Scarlett London, a well-known fashion and lifestyle blogger based in ...
Internet security company launches a perfume line to promote cybersecurity - Mashable
Fri Mar 10 14:35, 2017 GMT
InsideSources Internet Privacy Rules Repeal Surfaces in House InsideSources Republicans in both chambers of Congress are moving ahead with a permanent privacy rules repeal for internet providers passed by the Federal Communications Commission. The House of Representatives introduced late Wednesday its proposal to wipe ... Congress May Overturn Obama-Era Rules on Internet Privacy TIME ACLU Responds To Flake Resolution On Internet Privacy Regulations KJZZ Interest Groups Asks Congress to Remove Internet Privacy Rules Legal Reader (blog) Silicon UK  - Yahoo Finance  - CNET  - Federal Communications Commission all 100 news articles »
Internet Privacy Rules Repeal Surfaces in House - InsideSources
Fri Mar 10 16:22, 2017 GMT
LONDON (Reuters) - Britain's 6 billion pounds ($7.3 billion) terrorism reinsurance fund hopes to extend its cover to include cyber attacks on property, chief executive Julian Enoizi said.
UK terrorism reinsurance fund hopes to include cyber: CEO
Fri Mar 10 12:41, 2017 GMT
Privacy advocates protest as German deputies make it easier to install public video surveillance.
Germany surveillance: Security trumps privacy as video bill passed
Wed Mar 8 10:37, 2017 GMT
Cancelled in 2015, a play about the radicalisation of young Muslims has now been published. It’s challenging, gloriously authentic and prompts grownup debate. So who is brave enough to put it on? Read the full article The post Shut down but not silenced: Isis play Homegrown demands to be staged (The Guardian) appeared first on Index on Censorship .
Shut down but not silenced: Isis play Homegrown demands to be staged (The Guardian)
Tue Mar 7 10:36, 2017 GMT
Murder, assault and imprisonment are among the “growing spectrum of threats” faced by journalists in Europe, according to Index on Censorship. Read the full article The post Murder, assault and imprisonment among ‘growing spectrum of threats’ facing journalists in Europe (Press Gazette) appeared first on Index on Censorship .
Murder, assault and imprisonment among ‘growing spectrum of threats’ facing journalists in Europe (Press Gazette)
Tue Mar 7 10:25, 2017 GMT
Bush Theatre artistic director Madani Younis has claimed a play about radicalisation cancelled by the National Youth Theatre was “absolutely censored”. Read the full article The post Madani Younis: Radical Islam play ‘was censored’ (The Stage) appeared first on Index on Censorship .
Madani Younis: Radical Islam play ‘was censored’ (The Stage)
Fri Mar 10 10:06, 2017 GMT
The decision by prosecutors in Viborg to charge a man with blasphemy for burning a Koran shocked Danes. The post Jacob Mchangama: Denmark’s revived blasphemy ban appeared first on Index on Censorship .
Jacob Mchangama: Denmark’s revived blasphemy ban
Fri Mar 10 07:44, 2017 GMT
The Premier League has obtained a new High Court injunction that will enable it to block streams delivered to the public via Kodi and similar devices. While blocking orders are extremely commonplace, it appears that this particular one might seek to block high-level sources of streaming content, before it's able to cascade down to the masses. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Premier League Obtains Intriguing Injunction to Tackle Pirate Streams
Thu Mar 9 19:28, 2017 GMT
If you haven't heard of it by now, you should sit up and pay attention to "Struts-Shock." That's what Veracode is calling a critical vulnerability just identified in the Apache Struts 2 library, which attackers are actively exploiting . We're cautioning customers and anyone else using the vulnerable Struts 2 component due to the severity of the bug, and because it is widespread in Java applications and is easy to exploit with available tools. Although the Apache Foundation issued a patch for the Struts-Shock vulnerability on Monday, March 6 (see security bulletin S2-045 ), many affected organizations may be exposed if they do not know which of their applications are using vulnerable versions of the library. According to an analysis of Veracode scans over the past 18 months, 68 percent of Java applications using the Struts 2 library have a version that is vulnerable to Struts-Shock. Struts-Shock is a Remote Code Execution (RCE) vulnerability, also referred to as command injection. A command injection vulnerability allows an attacker to send HTTP requests to an impacted web application, and execute commands of their choosing on the server. "A typical Struts-Shock attack would be to install command and control software on the server in order to join the server to a botnet," Veracode CTO Chris Wysopal said. "Another typical attack would be to use the server as a stepping stone to further penetrate the network the vulnerable server is part of." Any Java application using the vulnerable Struts 2 package, which includes Struts 2.3.5 - 2.3.31, and Struts 2.5 - Struts 2.5.10, is vulnerable. "Exploits are not dependent on any class or codepath. An attacker can trigger the vulnerable code with a crafted web request," Chris said. All Apache Struts 2 developers and customers should update to version 2.3.32 or 2.5.10.1 as soon as possible. Systemic risk Open source components such as Apache Struts 2 are a vital part of software development – it just doesn't make sense for fast-moving development shops to reinvent the wheel whenever they need to use existing functionality. However, the lack of visibility into the use of open source components represents a systemic risk to applications, organizations, and the digital economy as a whole. "Despite the risk, most third-party and open source components do not undergo the same level of security scrutiny as custom-developed software," Chris said. "Developers use pre-existing components to get functionality 'for free,' and are often unaware of the complete bill of goods that make up the code they use." Compounding the risk, it can be difficult and costly for companies with multiple code repositories to pinpoint all the applications where a risky component is used. The widespread use of components makes them an ideal target for cybercriminals. Cybercriminals can create one exploit targeting a known vulnerability, and because companies are ill-equipped to respond to vulnerability disclosures in third-party components, attackers have an enormous range of potential victims to attack. This is why vulnerabilities in open source code, such as Heartbleed, are so dangerous. Java vulnerabilities like Struts-Shock are particularly concerning because Java is so widely used. Of all the enterprise and vendor-written applications Veracode tested for our recent State of Software Security report, about half were written in Java. And a shockingly high number of those applications – 97 percent – had at least one component with a known vulnerability. Unfortunately, that means vulnerabilities like Struts-Shock are far from rare. Stamping them out requires an ongoing and systematic effort. We're offering a free whitepaper describing strategies for reducing open source and third-party component risk. Contact us to learn more about how Veracode can help you reduce application risk from vulnerable open source components. If you are a Veracode customer Veracode security consultants and account managers are actively reaching out to help customers identify and update vulnerable applications.
Don't Get Zapped by the Struts-Shock Vulnerability Affecting Apache Struts 2
Tue Mar 7 23:26, 2017 GMT
The Verge Republicans introduce resolution to kill FCC's internet privacy rules The Verge Republicans took the first step toward reversing the Federal Communication Commission's internet privacy rules today, with 25 senators introducing legislation that would reverse the rules and forbid the commission from passing anything similar to them ... Congress is Trying to Roll Back Internet Privacy Protections As You Read This EFF Internet privacy rules are flawed Miami Herald Industry groups push Congress to roll back internet privacy rules The Hill InsideSources  - Washington Examiner  - ACLU (blog)  - Federal Communications Commission all 94 news articles »
Republicans introduce resolution to kill FCC's internet privacy rules - The Verge
Wed Mar 1 23:10, 2017 GMT
Los Angeles Times FCC Votes to Block New Internet Privacy Rule ConsumerReports.org The FCC's new chairman, Ajit Pai, announced last week that he planned to block implementation of the data security rule in order to reconcile it with how the Federal Trade Commission regulates other parts of the internet . All of the new broadband ... New FCC Chairman Begins Attacks on Internet Privacy EFF FCC halts Internet privacy rule that imposes data security requirements on broadband providers Los Angeles Times FCC votes to block internet privacy rule The Hill Wall Street Journal (subscription)  - The Verge  - E-Commerce Times all 169 news articles »
FCC Votes to Block New Internet Privacy Rule - ConsumerReports.org
Thu Mar 9 14:05, 2017 GMT
ACLU Responds To Flake Resolution On Internet Privacy Regulations KJZZ Now, Flake and 34 co-sponsors are supporting a Congressional resolution intended to block the FCC's proposed regulatory expansion on internet service providers. Steve Kilar is with the Arizona ACLU and is concerned. “Action with Congressional approval ...
ACLU Responds To Flake Resolution On Internet Privacy Regulations - KJZZ
Wed Mar 8 19:03, 2017 GMT
Morning Consult Pai: FCC Required to Ensure Internet Privacy Even Without Agency Rules Morning Consult Federal Communications Commission Chairman Ajit Pai said Wednesday that even if the agency's internet service provider privacy rules are undone, the FCC would still be obligated by communications law to protect consumer information. It's the first time ... New FCC Chairman Defends Changes to Internet Privacy Rules Wall Street Journal (subscription) Senate Dems grill FCC chairman The Hill 5 things Ajit Pai said during his first Senate hearing as FCC chairman The Verge Axios all 114 news articles »
Pai: FCC Required to Ensure Internet Privacy Even Without Agency Rules - Morning Consult
Thu Mar 9 10:08, 2017 GMT
The Index-award winning journalist Zaina Erhaim was due to travel to the USA this month along with three other Syrian women to screen their documentary series, Syria’s Rebellious Women The post Zaina Erhaim: “No one is left in Aleppo” appeared first on Index on Censorship .
Zaina Erhaim: “No one is left in Aleppo”
Thu Mar 9 02:24, 2017 GMT
TIME Congress May Overturn Obama-Era Rules on Internet Privacy TIME Republicans in the U.S. Congress are moving to repeal regulations adopted by the Obama administration in October that would have subjected internet service providers to stricter scrutiny than websites to protect customers' private data. Senator Jeff ... and more »
Congress May Overturn Obama-Era Rules on Internet Privacy - TIME
Wed Mar 8 23:28, 2017 GMT
WASHINGTON (Reuters) - Republicans in the U.S. Congress are moving to repeal regulations adopted by the Obama administration in October that would have subjected internet service providers to stricter scrutiny than websites to protect customers' private data.
Congress may overturn Obama internet privacy rules
Wed Mar 8 22:51, 2017 GMT
NEW YORK (Reuters) - Investors are betting market regulators will approve what would be the first U.S. exchange-traded fund to track the price of bitcoin.
Investors chained to bitcoin bets as U.S. ETF decision looms
Wed Mar 8 13:00, 2017 GMT
CNET The battle for online privacy : What you need to know CNET In the latest move, Republican Senator Jeff Flake of Arizona introduced a resolution late Tuesday that would kill rules the FCC passed in October to regulate consumer privacy for internet service providers. The bill, which has 21 Republican sponsors ... GOP senators' new bill would let ISPs sell your Web browsing data Ars Technica Senate Resolution Would Let Internet Providers Sell Your Information Without Consent LawNewz all 11 news articles »
The battle for online privacy: What you need to know - CNET
Wed Mar 8 18:12, 2017 GMT
CNET New FCC Chairman Defends Changes to Internet Privacy Rules Wall Street Journal (subscription) WASHINGTON—Federal Communications Commission Chairman Ajit Pai defended his partial rollback of Obama-era internet privacy rules at a hearing Wednesday, saying consumers would remain protected by federal law. But Democrats warned his efforts ... Sen. Flake's Resolution Will Eliminate Unnecessary FCC Internet Privacy Regulations, Says CTA Yahoo Finance The battle for online privacy : What you need to know CNET GOP senators' new bill would let ISPs sell your Web browsing data Ars Technica The Hill  - Common Dreams  - Morning Consult all 85 news articles »
New FCC Chairman Defends Changes to Internet Privacy Rules - Wall Street Journal (subscription)
Wed Mar 8 15:48, 2017 GMT
CNET Sen. Flake's Resolution Will Eliminate Unnecessary FCC Internet Privacy Regulations, Says CTA Yahoo Finance “Late last year, and over many objections, the FCC adopted privacy rules for broadband and telecommunications services related to its broader Open Internet Order. While these rules apply only to internet service providers, they could establish a ... The battle for online privacy : What you need to know CNET GOP senators' new bill would let ISPs sell your Web browsing data Ars Technica Overnight Tech: Trump nominates FCC chief to new term | WikiLeaks dumps CIA docs | GOP bill would roll back ... The Hill Common Dreams  - Morning Consult  - The Verge all 77 news articles »
Sen. Flake's Resolution Will Eliminate Unnecessary FCC Internet Privacy Regulations, Says CTA - Yahoo Finance
Tue Mar 7 23:59, 2017 GMT
EFF Congress is Trying to Roll Back Internet Privacy Protections As You Read This EFF But it appears some members of Congress didn't get the message, because they're trying to roll back the FCC's privacy rules right now without having anything concrete ready to replace them. We're talking here about basic requirements, like getting your ... Industry groups push Congress to roll back internet privacy rules The Hill Republicans introduce resolution to kill FCC's internet privacy rules The Verge Congress: Don't Let Internet Providers Sell Our Data to the Highest Bidder ACLU (blog) ZDNet  - The Boston Globe  - Morning Consult  - Federal Communications Commission all 84 news articles »
Congress is Trying to Roll Back Internet Privacy Protections As You Read This - EFF
Wed Mar 8 00:07, 2017 GMT
Internet privacy rules are flawed Miami Herald The administration and Congress must fix the confusing and costly rules that govern internet privacy . Consumers deserve to know what information about their online behavior is being tracked, and businesses, especially small and diverse firms, need ...
Internet privacy rules are flawed - Miami Herald
Tue Mar 7 21:44, 2017 GMT
The Hill Industry groups push Congress to roll back internet privacy rules The Hill The privacy order requires internet service providers to obtain consumer permission to before using their data for marketing purposes. One of the rules, which would have required providers to beef up their consumer data security , was stayed by the FCC ... Congress: Don't Let Internet Providers Sell Our Data to the Highest Bidder ACLU (blog) FCC blocks rules that stop internet providers from secretly selling your data ZDNet We need strong privacy protection — the issue is how to get it The Boston Globe Morning Consult  - Federal Communications Commission all 76 news articles »
Industry groups push Congress to roll back internet privacy rules - The Hill
Tue Mar 7 15:10, 2017 GMT
There's no question about it, agreed our panel: the controversial play about radicalisation was censored. The post Homegrown: “Not enough has been said about the silencing of young artists” appeared first on Index on Censorship .
Homegrown: “Not enough has been said about the silencing of young artists”
Tue Mar 7 02:40, 2017 GMT
The live-streaming feature has been used to broadcast live at least 50 acts of violence, including murder, beatings and suicides, according to the Wall Street Journal.
Violence on Facebook Live presents censorship dilemma - CNET
Mon Mar 6 22:30, 2017 GMT
The influential nonprofit says it will begin including evaluations of a product's online security and privacy features in its reviews.
Consumer Reports to factor cybersecurity into reviews - CNET
Mon Mar 6 20:55, 2017 GMT
Following complaints from copyright holders, Italian ISPs are required to block hundreds of websites, a list that continues to expand. During the past week a handful of new sites were added including Flashx and RARBG, with streaming site 123movies being next in line. The question remains, however, how effective these measures are. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Italy’s Pirate Site Blocklist Expands with Flashx, RARBG and Others
Mon Mar 6 12:26, 2017 GMT
Heat Street Chinese Official Dares to Challenge Repressive Government Internet Censorship Heat Street A senior Chinese official has spoken out against his country's repressive internet censorship measures in a rare show of defiance. Luo Fuhe, a technology adviser to China's parliament, said that Communist officials should un-ban some of the thousands ... Senior Official Slams China's Internet Censorship | The Daily Caller Daily Caller Chinese official calls for easing of internet censorship The Guardian China's internet censorship hampering country's scientific and economic development, warns government adviser The Independent The Straits Times  - South China Morning Post  - Taipei Times all 11 news articles »
Chinese Official Dares to Challenge Repressive Government Internet Censorship - Heat Street
Mon Mar 6 09:37, 2017 GMT
International organisations call on the Azerbaijani authorities to immediately and unconditionally release Mehman Huseynov. The post Azerbaijan: Crackdown on free expression accelerates with conviction of prominent blogger appeared first on Index on Censorship .
Azerbaijan: Crackdown on free expression accelerates with conviction of prominent blogger
Sat Mar 4 06:19, 2017 GMT
The Indian Express China: Senior government advisor criticises country's internet ... The Indian Express In a rare public criticism of a sensitive government policy. Luo Fuhe warned that the country's internet censorship is hampering scientific research and economic ... and more »
China: Senior government advisor criticises country's internet ... - The Indian Express
Mon Mar 6 05:11, 2017 GMT
(Reuters) - Consumer Reports, an influential U.S. non-profit group that conducts extensive reviews of cars, kitchen appliances and other goods, is gearing up to start considering cyber security and privacy safeguards when scoring products.
Consumer Reports to consider cyber security in product reviews
Sat Mar 4 06:10, 2017 GMT
U.S. News & World Report Senior China Government Adviser Criticizes Web Censorship U.S. News & World Report China authoritarian communist government provides little public information about its censorship regime, although it recently renewed a push for a greater role in global internet governance based on restrictions and regulations rather than the ... and more »
Senior China Government Adviser Criticizes Web Censorship - U.S. News & World Report
Sun Mar 5 13:00, 2017 GMT
The Hill New fight erupts over internet privacy The Hill The FCC under new GOP Chairman Ajit Pai on Wednesday moved to block a rule requiring internet service providers to take stronger steps to protect customers' data. The data security rule is part of a more expansive package of broadband privacy rules the ... and more »
New fight erupts over internet privacy - The Hill
Sat Mar 4 21:55, 2017 GMT
RARBG, one of the world's most popular torrent sites, has just received a pile of paperwork from major rightsholders including Village Roadshow, Disney, Universal and Warner. A letter sent from a Sydney lawfirm claims that the site infringes on "an enormous scale" and says that a blocking application was filed in February. It appears that local ISPs will not contest the action. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Movie Company Lawyers Warn Pirate Sites About Looming Blockades
Sat Mar 4 00:02, 2017 GMT
South China Morning Post Senior Chinese official slams internet curbs in rare public outburst South China Morning Post A senior official of China's top advisory body has lashed out at the country's increasing internet censorship , warning that heightened crackdowns threaten social and economic growth. The remarks by Luo Fuhe, a vice-chairmen of the Chinese People's ... and more »
Senior Chinese official slams internet curbs in rare public outburst - South China Morning Post
Sat Mar 4 16:09, 2017 GMT
U.S. News & World Report Senior Chinese Official Publicly Challenges China's Extensive Internet Censorship Daily Caller A senior government adviser slammed China's internet censorship practices, arguing that such restrictions prevent social and economic development. Luo Fuhe is vice chairman of the Chinese People's Political Consultative Conference (CPPCC) and ... Chinese official calls for easing of internet censorship The Guardian Senior China Government Adviser Criticizes Web Censorship U.S. News & World Report Senior Chinese official slams internet curbs in rare public outburst South China Morning Post all 303 news articles »
Senior Chinese Official Publicly Challenges China's Extensive Internet Censorship - Daily Caller
Sat Mar 4 04:37, 2017 GMT
South China Morning Post Chinese official calls for easing of internet censorship The Guardian It is a rare criticism of the country's censorship policies, which have become more severe since Xi Jinping assumed power in 2012. China operates one of the world's most sophisticated and far-reaching internet censorship systems. Known as the Great ... Senior Chinese official slams internet curbs in rare public outburst South China Morning Post all 2 news articles »
Chinese official calls for easing of internet censorship - The Guardian
Thu Mar 2 22:59, 2017 GMT
E-Commerce Times FCC Reverses Course on Internet Privacy Rules E-Commerce Times The Federal Communications Commission and the Federal Trade Commission on Tuesday issued a joint statement following the FCC's temporary stay of data security regulations. FCC Chairman Ajit Pai and FTC Acting Chairman Maureen K. Ohlhausen ...
FCC Reverses Course on Internet Privacy Rules - E-Commerce Times
Fri Mar 3 15:50, 2017 GMT
As the value of Bitcoin tops gold for the first time, we spoke to an early investor who bought one Bitcoin for just $18 (£14.70) in 2012.
Bitcoin buyer
Fri Mar 3 00:55, 2017 GMT
Asian American photographer says some digital foodies are playing into racist stereotypes about ethnic dishes.
Are food bloggers fuelling racist stereotypes?
Fri Mar 3 08:10, 2017 GMT
Demand for the digital cryptocurrency has soared since the beginning of the year.
Bitcoin value tops gold for first time
Fri Mar 3 00:01, 2017 GMT
The value of the digital currency hits an all-time high of $1,263.72.
One bitcoin now worth more than an ounce of gold - CNET
Thu Mar 2 15:21, 2017 GMT
After four years of providing web-based support to Veracode's RSA Conference team from our offices in Burlington Mass, I had the pleasure of finally attending the conference myself. First impressions were a bit staggering to say the least. One thing that doesn't exactly come through amid all the web and social chatter that happens around RSAC is the sheer size of this conference as measured by attendees along with both volume and variety of vendors. What an impossible challenge this presents for any position tasked with prioritization and selection of security technologies. I got my first glipmse of this challenge during an exercise we did at Veracode last year led by our Director of Product Marketing, Chris Kirsch . We played a simple Monopoly style game where every player took on the role of a CISO at an organization from a variety of sectors with varying budgets. As turns progressed players saved up budget, made choices to purchase technologies, and encountered random incidents. In short, the game felt like survival. You knew sooner or later something catastrophic would happen and even the largest budgets only got you so far, so fast. Walking the Expo floor at RSA Conference brought back that same sense of staggering choice. It's no wonder that consolidation of security vendors was an overriding theme throughout many presentations starting with RSA Chief Techonology Officer, Zulfikar Ramzan's opening keynote.  To get a sense of what they mean, take look at this map of cybersecurity domains from Henry Jiang, CISO at Oppenheimer & Co. And that's only domains, adding vendors to each of these and charting overlap is intimidating to think about. I have no idea how we, as an industry start simplifying this but all of us vendors should understand and be empathetic of this challenge because every single one of our customers share it. On a lighter note, it really cool to see how our little company has grown over ten years of RSAC. 2007 vs. 2017 @Veracode at #RSAC . Plus this year we're also at #DVWK17 and our signage is everywhere, which is pretty fun. ;) pic.twitter.com/Tj70BBq70M — Chris Eng (@chriseng) February 14, 2017 The team at the Veracode booth team was stellar all week and we hope that every attendee who came by the both had all their questions answered. If there's anything we missed or anything you're still wondering don't hesitate to reach out or ping us on social. Below find some session coverage from throughout the week and a video interview with our Director of Developer Engagement, Pete Chestna . Session & Keynote Coverage Live From RSA Conference 2017 The Power of Opportunity Zulfikar Ramzan Keynote: Ripples and Technology Brad Smith Keynote: We Need a Cyber Geneva Convention Michael McCaul Keynote: Fight for Our Digital Lives States Confront Cybersecurity Challenge Interview: Chris Wysopal, CTO & Co-Founder, Veracode Final Boarding Call for DevOps – You Don’t Have to Go Home, But … The Most Dangerous New Attack Techniques and What's Coming Next Your Chance to Get It Right, 5 Keys to Building AppSec into DevOps Topics of Leadership and Teamwork With Dame Stella Rimington Director of Developer Engagement, Pete Chestna Chats with DarkReading
RSA Conference 2017 Recap
Thu Mar 2 12:02, 2017 GMT
A spectre that has haunted Swedish journalism for decades is anti-democratic extremism, a phenomenon given new impetus by the rise of mainstream nationalist politics The post In the “safe” world of Swedish journalism, death threats are an everyday reality appeared first on Index on Censorship .
In the “safe” world of Swedish journalism, death threats are an everyday reality
Wed Mar 1 09:29, 2017 GMT
Later this year, a coalition of organizations including the Committee to Protect Journalists, the Freedom of the Press Foundation, the Reporters Committee for the Freedom of the Press, the Knight First Amendment Institute at Columbia University and the Index on Censorship will launch an as-yet unnamed news site to track press freedom violations in the […] The post Press freedom organizations are teaming up to start a news site (Poynter) appeared first on Index on Censorship .
Press freedom organizations are teaming up to start a news site (Poynter)
Tue Feb 28 09:37, 2017 GMT
Like the many faced god in the TV adaptation of the book, Game of Thrones, Azerbaijan’s new Vice President, Mehriban Aliyeva, has many faces – albeit she lacks the assassin followers of Game of Thrones, at least for now. She lists herself as the Head of the Azerbaijan Culture Foundation; founder of Azerbaijan’s Irs magazine; […] The post Mehriban Aliyeva: The many faces of Azerbaijan’s First Lady and new Vice President (LSE) appeared first on Index on Censorship .
Mehriban Aliyeva: The many faces of Azerbaijan’s First Lady and new Vice President (LSE)
Tue Feb 28 09:35, 2017 GMT
Journalists face an escalating risk of violence, threats and government censorship ‘like never before’, according to a report from Index on Censorship. Read the full article   The post Press Freedom Faces ‘Unprecedented’ Threat in 2017 (Rights Info) appeared first on Index on Censorship .
Press Freedom Faces ‘Unprecedented’ Threat in 2017 (Rights Info)
Thu Mar 2 08:33, 2017 GMT
SEOUL (Reuters) - A cyber attack from China has crashed the website of Lotte Duty Free, a company official said on Thursday, at a time when South Korean firms are reporting difficulties in China following the deployment of a U.S. missile defense system on their home soil.
South Korea's Lotte Duty Free says China cyber attacks crashed website
Thu Mar 2 03:14, 2017 GMT
Among today's fastest-growing cybercrime epidemics is "ransomware," malicious software that encrypts all of your computer files, photos, music and documents and then demands payment in Bitcoin to recover access to the files. A big reason for the steep increase in ransomware attacks in recent years comes from the proliferation of point-and-click tools sold in the cybercrime underground that make it stupid simple for anyone to begin extorting others for money.
Ransomware for Dummies: Anyone Can Do It
Wed Mar 1 23:07, 2017 GMT
Los Angeles Times FCC halts Internet privacy rule that imposes data security requirements on broadband providers Los Angeles Times The Federal Communications Commission on Wednesday voted to halt an Internet privacy rule that would have imposed data security requirements on broadband providers. The move, by a 2-1 vote, came after the agency's new Republican chairman, Ajit Pai, ... FCC halts internet privacy requirements The Verge FCC votes to block internet privacy rule The Hill FCC Stays Key Portions of Obama Internet Privacy Rules Wall Street Journal (subscription) Yahoo Finance  - Engadget  - WBUR all 45 news articles »
FCC halts Internet privacy rule that imposes data security requirements on broadband providers - Los Angeles Times
Wed Mar 1 22:41, 2017 GMT
Los Angeles Times FCC Stays Key Portions of Obama Internet Privacy Rules Wall Street Journal (subscription) Federal regulators took steps toward rolling back key portions of a big Obama-era privacy rule for internet service providers, while promising a new regulatory approach that treats all online companies the same. The Federal Communications Commission ... FCC halts Internet privacy rule that imposes data security requirements on broadband providers Los Angeles Times all 2 news articles »
FCC Stays Key Portions of Obama Internet Privacy Rules - Wall Street Journal (subscription)
Wed Mar 1 20:41, 2017 GMT
The Hill FCC votes to block internet privacy rule The Hill The Federal Communications Commission on Wednesday voted 2-1 along party lines to block a new internet privacy rule from taking effect. The rule would have required internet service providers to take more stringent steps to protect consumers' personal ... and more »
FCC votes to block internet privacy rule - The Hill
Wed Mar 1 20:49, 2017 GMT
The Hill New FCC Chairman Begins Attacks on Internet Privacy EFF Newly minted Republican FCC Chairman Ajit Pai just granted the telecom industry its wish: he has blocked new requirements that Internet service providers (ISPs) like Comcast apply common sense security practices to protect your private data. FCC votes to block internet privacy rule The Hill Markey Fights Back After FCC Moves To Block Online Privacy Rules WBUR all 10 news articles »
New FCC Chairman Begins Attacks on Internet Privacy - EFF
Wed Mar 1 21:03, 2017 GMT
The Verge FCC halts internet privacy requirements The Verge The FCC has halted a set of privacy rules that would have required internet providers to more responsibly handle your sensitive data. Internet providers have been lobbying to overturn the entire set of privacy rules for a couple months now — in short ... and more »
FCC halts internet privacy requirements - The Verge
Wed Mar 1 20:35, 2017 GMT
NEW YORK (Reuters) - The U.S. Federal Communications Commission on Wednesday blocked some Obama administration rules approved last year that would have subjected broadband providers to stricter scrutiny than websites, a victory for internet providers such as AT&T Inc, Comcast Corp and Verizon Communications Inc .
FCC blocks stricter broadband privacy rules from taking effect
Wed Mar 1 18:50, 2017 GMT
BERLIN (Reuters) - The German parliament, which was attacked by hackers in 2015, suffered an internet outage for several hours on Wednesday but there were no indications it was triggered by a cyber attack, a spokesman for the Bundestag said.
German parliament suffers internet outage but no signs of attack
Wed Mar 1 16:02, 2017 GMT
Swedish ISP Bredbandsbolaget has begun blocking The Pirate Bay but it will not give up the fight. The provider says that in order to ensure that private players "do not have the last word regarding content that should be accessible on the Internet," it will be forced to fight any new blocking demands. Meanwhile, several of the blocked domains appear to be linking to legal sites. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
ISP Blocks Pirate Bay But Vows to Fight Future Blocking Demands
Wed Mar 1 03:58, 2017 GMT
Personal information of 850 employees and servicemen was accessed, but no classified information was stolen.
Singapore's Defence Ministry hit with first cyber attack - CNET
Tue Feb 28 21:53, 2017 GMT
Fox News Data from internet -connected teddy bears held ransom, security expert says Fox News Data from internet -connected smart teddy bears has been leaked and ransomed, exposing children's voice messages and more than half a million customer accounts, according a security expert. In a blog post, cybersecurity expert Troy Hunt says that an ... Creepy Teddy Bears Leak Kids' Voices to Strangers on the Internet Fortune Stuffed toys database left personal data exposed, says security expert ZDNet The latest internet -of-things privacy breach was brought to you by teddy bears Mashable Softpedia News  - Quartz  - Newsweek all 81 news articles »
Data from internet-connected teddy bears held ransom, security expert says - Fox News
Tue Feb 28 02:54, 2017 GMT
Leading international freedom of expression organisation Index on Censorship and the Freedom Project at Wellesley College, Boston, are pleased to announce the launch of a new partnership to promote awareness of censorship. The post Index on Censorship and Wellesley College launching an annual Freedom of Expression lecture appeared first on Index on Censorship .
Index on Censorship and Wellesley College launching an annual Freedom of Expression lecture
Tue Feb 28 11:40, 2017 GMT
BRUSSELS (Reuters) - European Union countries should test bank defenses against cyber-attacks using a common set of requirements, a senior EU official said on Tuesday, as the bloc plans measures to boost the retail market for financial products.
EU needs common approach on testing banks' cyber-risks: Dombrovskis
Tue Feb 28 08:29, 2017 GMT
Media Freedom Month highlights pressures on journalists. Report shows media workers silenced through violence and arrest in 2016 The post Journalists in jeopardy: new report launches media freedom campaign appeared first on Index on Censorship .
Journalists in jeopardy: new report launches media freedom campaign
Tue Feb 28 07:20, 2017 GMT
SINGAPORE (Reuters) - Cyber attackers have stolen basic personal data from about 850 Singapore national servicemen and employees in a possible attempt to access official secrets, the Defence Ministry said on Tuesday.
Cyber attackers target Singapore Defence Ministry, but no secrets found
Fri Feb 24 22:28, 2017 GMT
CNET FCC Chairman Pai moves to block internet privacy rules CNET New Federal Communications Commission's Chairman Ajit Pai is hitting the pause button on internet privacy regulations put in place during the Obama administration, which wireless and broadband companies have complained are unfair. The rules ... and more »
FCC Chairman Pai moves to block internet privacy rules - CNET
Mon Feb 27 20:46, 2017 GMT
MeriTalk (blog) FCC Chairman Proposes Rollback of Internet Privacy Rules MeriTalk (blog) The Federal Communications Commission chairman seeks to roll back Internet privacy protections that were set in place by the previous chairman, Tom Wheeler. FCC Chairman Ajit Pai proposed that the agency revert to the Internet privacy rules created by ... and more »
FCC Chairman Proposes Rollback of Internet Privacy Rules - MeriTalk (blog)
Tue Feb 28 00:58, 2017 GMT
The Hill Overnight Tech: Dems fire back on net neutrality, internet privacy | Trump dodges on Time Warner-AT&T | Group ... The Hill DEM FCC COMMISH VOWS TO FIGHT FOR NET NEUTRALITY: The lone Democratic commissioner on the Federal Communications Commission (FCC) joined with activists on Capitol Hill Monday to commemorate the anniversary of the agency's landmark ...
Overnight Tech: Dems fire back on net neutrality, internet privacy | Trump dodges on Time Warner-AT&T | Group ... - The Hill
Mon Feb 27 22:49, 2017 GMT
Dem senator pushes back against GOP efforts to rescind internet privacy rules The Hill Late last week, Federal Communications Commission Chairman Ajit Pai announced that he would block a portion of the privacy rules passed in October under former Democratic Chairman Tom Wheeler, set to take effect in early March. The rules would have ...
Dem senator pushes back against GOP efforts to rescind internet privacy rules - The Hill
Mon Feb 27 22:13, 2017 GMT
Western Journalism Internet Censorship : Google and Liberal Media Gang Up On Natural News Western Journalism Left-wing technocrats have begun a nefarious assault on the First and Fourth Amendment rights of conservative and right-wing media outlets. In truly cowardly fashion, socialist technocrats are now using “divide and conquer” methods to single out, and ...
Internet Censorship: Google and Liberal Media Gang Up On Natural News - Western Journalism
Mon Feb 27 21:44, 2017 GMT
Los Angeles Times FCC Chairman Pai wants to halt Internet privacy rules before they begin taking effect this week Los Angeles Times The nation's new top telecommunications regulator wants to halt tough Internet privacy rules before they begin taking effect this week, arguing they would unfairly impose tougher requirements on broadband providers than on websites and social networks ... and more »
FCC Chairman Pai wants to halt Internet privacy rules before they begin taking effect this week - Los Angeles Times
Sun Feb 26 22:24, 2017 GMT
The Boston Globe Internet privacy rules headed for showdown The Boston Globe In a showdown over Internet privacy , the newly conservative Federal Communications Commission and the Republican-led Congress are trying to block tough Obama administration rules that limit how broadband Internet providers use their customers' personal ... FCC Chairman Goes After His Predecessor's Internet Privacy Rules NPR FCC Chairman Pai moves to block internet privacy rules CNET FCC's GOP chairman blocks Internet privacy rule The Hill GeekWire  - Yahoo Finance  - Deadline  - Federal Communications Commission all 200 news articles »
Internet privacy rules headed for showdown - The Boston Globe
Sun Feb 26 12:07, 2017 GMT
dailytelegraph.com.au Internet privacy : Rogue public servants stealing information to use in court cases dailytelegraph.com.au Bureaucrats have accessed confidential databases to pay their own parking fines and road tolls using other people's names and addresses, the state's privacy watchdog revealed yesterday. Privacy Commissioner Elizabeth Coombs warned gaps in privacy  ... and more »
Internet privacy: Rogue public servants stealing information to use in court cases - dailytelegraph.com.au
Sat Feb 25 03:16, 2017 GMT
Western Herald New app to bring awareness to internet censorship Western Herald Here in the United States, if the internet isn't working, or is working slowly, the solution is often as simple as calling tech support. In most cases, they'll have the user run a speedtest, and there are millions of sites and applications that provide ...
New app to bring awareness to internet censorship - Western Herald
Fri Feb 24 22:28, 2017 GMT
NPR FCC Chairman Goes After His Predecessor's Internet Privacy Rules NPR The newly appointed Republican chairman of the Federal Communications Commission is moving to scale back the implementation of sweeping privacy rules for Internet providers passed last year. Chairman Ajit Pai on Friday asked the FCC to hit pause ... FCC Chairman Pai moves to block internet privacy rules CNET FCC's GOP chairman blocks Internet privacy rule The Hill FCC Chairman Moves To Stop Internet Privacy Plan, Seeking To Match FTC Rules Deadline Consumerist  - WIRED  - Washington Post all 133 news articles »
FCC Chairman Goes After His Predecessor's Internet Privacy Rules - NPR
Fri Feb 24 21:22, 2017 GMT
Chairman Pai has asked his fellow commissioners to vote to delay implementing part of the FCC's new privacy rules as it considers petitions that challenge the regulation.
FCC chairman delays implementation of internet privacy rules - CNET
Fri Feb 24 21:21, 2017 GMT
In another strange tale from the kinetic-attack-meets-cyberattack department, earlier this week I heard from a loyal reader in Brazil whose wife was recently mugged by three robbers who nabbed her iPhone. Not long after the husband texted the stolen phone -- offering to buy back the locked device -- he soon began receiving text messages stating the phone had been found. All he had to do to begin the process of retrieving the device was click the texted link and log in to the phishing page mimicking Apple's site.
iPhone Robbers Try to iPhish Victims
Fri Feb 24 19:30, 2017 GMT
The Electronic Frontier Foundation has warned the Copyright Office that aggressive copyright enforcement policies could stifle innovation, free speech, and other basic human rights. Anti-piracy filters, website blockades, and terminating Internet accounts of repeat copyright infringers, will come at a high cost, the organization says. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Anti-Piracy Measures Shouldn’t Stifle Free Speech, EFF Says
Fri Feb 24 18:11, 2017 GMT
The Hill FCC's GOP chairman blocks Internet privacy rule The Hill In a statement emailed to reporters Friday, an FCC spokesman said Pai believes the privacy rules should mirror those implemented by the Federal Trade Commission (FTC), and that service providers should not be subject to tougher scrutiny than other ... New FCC Chair Plans To Block Internet Privacy Rule Before It Kicks In Consumerist Republicans Are Trying to Let Internet Providers Sell Your Data WIRED These rules force Internet providers to protect the data they have on you. Now the FCC wants to put those on hold. Washington Post Daily Kos  - Wall Street Journal (subscription)  - STLtoday.com all 115 news articles »
FCC's GOP chairman blocks Internet privacy rule - The Hill
Fri Feb 24 17:42, 2017 GMT
WASHINGTON (Reuters) - The new U.S. Federal Communications Commission chief will move to block broadband privacy rules, approved by the Obama administration, that subject broadband providers to stricter scrutiny than websites, a spokesman said on Friday, in a victory for internet providers like AT&T Inc, Comcast Corp and Verizon Communications Corp.
FCC chair to block implementation of stricter broadband privacy rules
Fri Feb 24 17:41, 2017 GMT
Consumerist New FCC Chair Plans To Block Internet Privacy Rule Before It Kicks In Consumerist One of those two commissioners, Ajit Pai, is now FCC Chairman, and he's announced his plan to stop the privacy rule from taking effect because he thinks it's not fair to pick on the Comcasts and Charters of the world. ... expressed her support for the ... Republicans Are Trying to Let Internet Providers Sell Your Data WIRED Senate Republicans put net neutrality-based privacy rules on the chopping block Daily Kos These rules force Internet providers to protect the data they have on you. Now the FCC wants to put those on hold. Washington Post The Hill all 99 news articles »
New FCC Chair Plans To Block Internet Privacy Rule Before It Kicks In - Consumerist
Fri Feb 24 16:46, 2017 GMT
Gizmodo Everything You Need to Know About Cloudbleed, the Latest Internet Security Disaster Gizmodo Have you heard? A tiny bug in Cloudfare's code has led an unknown quantity of data—including passwords, personal information, messages, cookies, and more—to leak all over the internet . If you haven't heard of the so-called Cloudbleed vulnerability ... CloudFlare Leaked Sensitive Data Across the Internet For Months Fortune Software Bug at Internet -Service Provider Sparks Privacy Concerns Wall Street Journal (subscription) Bug causes personal data leak, but no sign of hackers exploiting: Cloudflare Reuters The Verge  - The Register  - Cloudflare Blog  - Monorail all 71 news articles »
Everything You Need to Know About Cloudbleed, the Latest Internet Security Disaster - Gizmodo
Fri Feb 24 16:04, 2017 GMT
Leslie Jones Joked About Her Internet Hack in Her Stand-Up Set Vanity Fair On Thursday night, Leslie Jones turned the cyber attack that included the release of her private information and nude photographs this summer into comedy. During a set at Carolines on Broadway, the S.N.L. star described a conversation she had to have ... and more »
Leslie Jones Joked About Her Internet Hack in Her Stand-Up Set - Vanity Fair
Fri Feb 24 06:09, 2017 GMT
Fortune CloudFlare Leaked Sensitive Data Across the Internet For Months Fortune The leaked data included "private messages from major dating sites, full messages from a well-known chat service, online password manager data, frames from adult video sites, hotel bookings," according to Tavis Ormandy, the Google (googl) security  ... Are you at risk of being hacked? A security bug has leaked the passwords and private messages of MILLIONS of Uber ... Daily Mail Software Bug at Internet -Service Provider Sparks Privacy Concerns Wall Street Journal (subscription) Bug causes personal data leak, but no sign of hackers exploiting: Cloudflare Reuters The Verge  - Cloudflare Blog  - Monorail  - GitHub all 56 news articles »
CloudFlare Leaked Sensitive Data Across the Internet For Months - Fortune
Fri Feb 24 14:32, 2017 GMT
Automated piracy fines and settlement letters have become a serious threat in several countries. This week several Dutch Internet users received a letter in the mail, asking them to pay a small "settlement" to avoid worse. However, the Dutch movie company on the letterhead has nothing to do with the campaign, which turns out to be an elaborate scam. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Movie Company Issues Warning Over Fake “Piracy” Fines
Fri Feb 24 08:36, 2017 GMT
Bahrain's government continues its judicial harassment of Nabeel Rajab The post Bahrain: Rights activist facing two trials in March appeared first on Index on Censorship .
Bahrain: Rights activist facing two trials in March
Fri Feb 24 10:39, 2017 GMT
Independent journalist Jovo Martinovic’s arrest with 13 other individuals during a joint Croatian and Montenegrin police operation on 22 October 2015 began an ongoing ordeal The post Montenegro: Investigative journalists’ lengthy legal proceedings appeared first on Index on Censorship .
Montenegro: Investigative journalists’ lengthy legal proceedings
Fri Feb 24 10:06, 2017 GMT
As Australians get used to the idea of The Pirate Bay being blocked by ISPs, more obstacles are on their way. Movie company Village Roadshow has initiated new legal action, targeting dozens of domains belonging to some of the most popular torrent, streaming, and direct download sites. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Dozens of Pirate Sites Targeted in New Aussie Crackdown
Fri Feb 24 01:32, 2017 GMT
Letter: Internet security is in jeopardy INFORUM Moreover, because many government services, telecommunications, emergency services (and military concerns) are critically tied to the internet , the passing of control to an international consortium raises concerns about national security , privacy ...
Letter: Internet security is in jeopardy - INFORUM
Thu Feb 23 12:11, 2017 GMT
WIRED Republicans Are Trying to Let Internet Providers Sell Your Data WIRED The Affordable Care Act is far from the only Obama-era policy Republicans want to take down now that they control the government. A set of internet privacy rules passed by the Federal Communications Commission last year has also become a target. Senate Republicans put net neutrality-based privacy rules on the chopping block Daily Kos all 3 news articles »
Republicans Are Trying to Let Internet Providers Sell Your Data - WIRED
Thu Feb 23 01:24, 2017 GMT
Malware researcher Anton talks about who does what in the web's dark marketplaces.
A guided tour of the cybercrime underground
Wed Feb 22 16:03, 2017 GMT
16 смелых людей и организаций, которые борются за свободу слова по всему миру The post Борцы с цензурой по всему миру вошли в шорт-лист «Премии свободы слова» appeared first on Index on Censorship .
Борцы с цензурой по всему миру вошли в шорт-лист «Премии свободы слова»
Wed Feb 22 10:36, 2017 GMT
The long-term opposition and LGBT rights activist had been jailed under Russia's repressive Public Assembly Law. The post Russian supreme court orders release of Index Award nominee Ildar Dadin appeared first on Index on Censorship .
Russian supreme court orders release of Index Award nominee Ildar Dadin
Tue Feb 21 19:16, 2017 GMT
The Data Center Journal World Wide Web Creator Calls for Internet Decentralization & Encryption The Data Center Journal Russia and UK, for example, have passed new intrusive surveillance laws, and China and Vietnam block major websites from their citizens; users are being tracked by corporations and advertisers, and their data is being sold to third parties; Internet ...
World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal
Tue Feb 21 16:43, 2017 GMT
此奖项之最终候选者包括被津巴布韦当局拘扣的#ThisFlag活动家,一位来自伊朗在澳洲被拘留的寻求庇护者,一位中国大陆的漫画家以及一位来自俄罗斯的人权活动家。Index on Censorship 为了奖赏在世界各地与种种审查制度搏斗多年的记者以及艺术家而拟定了这个候选名单。特别值得一提的是,被大众提名的言论自由活动家一共有四百位之多。这十六位候选者为了争取言论自由经常遭受当地政府的迫害, 有的甚至面临生命危险。 The post 数位来自世界各地的言论自由活动家已被列入审查指数 (Index on Censorship) 之言论自由奖的最终候选名单 appeared first on Index on Censorship .
数位来自世界各地的言论自由活动家已被列入审查指数 (Index on Censorship) 之言论自由奖的最终候选名单
Tue Feb 21 14:46, 2017 GMT
Verizon cuts the price it will pay for Yahoo's core internet business following two huge cyber attacks.
Verizon and Yahoo agree $350m price cut
Tue Feb 21 11:07, 2017 GMT
Last week's landmark ruling compelling a Swedish ISP to block The Pirate Bay won't spread quickly, despite copyright holders' wishes. Telecoms giant Telia says that the ruling does not apply to them, so connectivity to the site will continue unless a court orders otherwise. Copyright holders are assessing their options. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
“We Won’t Block Pirate Bay,” Swedish Telecoms Giant Says
Tue Feb 21 11:00, 2017 GMT
The Hill GOP sets sights on internet privacy rules The Hill Republicans in Congress are setting their sights on killing the Federal Communications Commission's landmark internet privacy rules, the next target in their push to roll back Obama-era regulations. The rules require broadband service providers to ... Internet Privacy Rules Repeal Could Leave Providers Unregulated ... InsideSources all 11 news articles »
GOP sets sights on internet privacy rules - The Hill
Mon Feb 20 18:28, 2017 GMT
InsideSources Internet Privacy Rules Repeal Could Leave Providers Unregulated InsideSources Republicans in Congress are eyeing a repeal of privacy rules for internet providers passed by the Federal Communications Commission that, if passed, could leave some free of any privacy oversight at all. Arizona Republican Sen. Jeff Flake said this ...
Internet Privacy Rules Repeal Could Leave Providers Unregulated - InsideSources
Mon Feb 20 09:18, 2017 GMT
Index on Censorship has recruited a new youth board to sit until June 2017. The group is made up of young students, journalists and legal professionals from countries including India, Hungary and the Republic of Ireland. The post Meet the new Index youth advisory board appeared first on Index on Censorship .
Meet the new Index youth advisory board
Mon Feb 20 03:56, 2017 GMT
WELLINGTON (Reuters) - A New Zealand court ruled on Monday that internet entrepreneur Kim Dotcom could be extradited to the United States to face charges relating to his Megaupload website, which was shutdown in 2012 following an FBI-ordered raid on his Auckland mansion.
NZ court rules Megaupload founder Kim Dotcom can be extradited to U.S. for alleged fraud
Sun Feb 19 18:36, 2017 GMT
Brave is a new privacy and security focused web browser with built-in support for torrent downloading and streaming. The browser allows seasoned downloaders and complete novices to get their torrent fix instantly, without any hassle. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Brave: A Privacy Focused Browser With Built-in Torrent Streaming
Sat Feb 18 09:39, 2017 GMT
The head of Rozcomnadzor, the body that oversees website-blocking in Russia, made a shocking statement this week. According to Alexander Zharov, children under ten years of age shouldn't use the Internet, and there's "nothing good" about a three-year-old who uses a tablet to watch cartoons. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Kids Shouldn’t Use the Internet, Russia’s Site-Blocking Chief Says
Fri Feb 17 19:46, 2017 GMT
It's been a remarkable week for cyber justice. On Thursday, a Ukrainian man who hatched a plan in 2013 to send heroin to my home and then call the cops when the drugs arrived was sentenced to 41 months in prison for unrelated cybercrime charges. Separately, a 19-year-old American who admitted to being part of a hacker group that sent a heavily-armed police force to my home in 2013 was sentenced to three years probation.
Men Who Sent Swat Team, Heroin to My Home Sentenced
Fri Feb 17 14:02, 2017 GMT
SANS took the main stage at RSA Wednesday morning to talk about the seven most dangerous cyberattacks and what they expect to see in the coming years. The panel, moderated by Alan Paller, consisted of SANS researchers Ed Skoudis, Johannes Ullrich and Michael Assante. The four issues that stood out: 1. The rise of ransomware and crypto-ransomware Cryptography, Skoudis explained, was invented to help secure information. But now that same technology is being used by ransomware to hijack data for nefarious purposes. And, even scarier, these criminals actually get companies and organizations to pay them for the privilege of getting their data back. We’ve seen this type of attack carried out against hospitals, scarier still, because lives hang in the balance. How to prevent: Skoudis recommended practicing the foundations of good network security. Contain networks so that if one area is compromised, the rest are not vulnerable. Limit permissions, so that information doesn’t flow more freely than necessary. And, of course, prepare for the possibility of being hit – for instance, who will decide if or what you will pay the ransomer? As most ransomware comes in through phishing attempts, I would add that educating employees on phishing is a good way to prevent ransomware infections. What to do if you are a victim: Skoudis wasn’t too optimistic on this one. Basically, your options are to pay and get your data back, or not pay and lose the data. For many companies, the second option isn’t really an option at all. So, he suggests remembering you are in a negotiation. These criminals would rather have something than nothing. Make your company sound “small and poor” and then negotiate for the smallest payment possible. 2. IoT attacks For a long time, we all recognized that our IoT devices are vulnerable, but we weren’t concerned. Why, we asked, would someone want to hack my thermostat? For what gain? Well, it turns out our IoT devices aren’t just insecure, they are also a complex infrastructure of Internet-enabled devices that can be used to spread DDoS attacks. Eventually everything will be online, and we need to make these devices more secure, or we are only making our world more vulnerable. How to prevent: The best thing we can do is to change our default passwords and shut off remote access to these devices if it isn’t needed. Skoudis also recommended putting them on a separate network from the rest of your home or company. And finally, we need to push to make it possible/easier to patch devices when security defects are found. What to do if you are a victim: Again, there wasn’t much optimism here. The answer is shut it off and reconfigure. 3. Attacks on industrial control systems This has long been a subject of FUD in the security community, but we are seeing SCADA/ICS attacks take place in the wild today. The attacks on Ukraine over the past few years demonstrate the ease at which cyber-terrorists can take down the power grid. 4. Insecure libraries (components) We’ve talked a lot about how the proliferation of vulnerable components is spreading risk at an alarming rate. So I was glad to see that this was added to the list. Stay tuned for more from RSA …
Live From RSA: The Most Dangerous New Attack Techniques and What's Coming Next
Fri Feb 17 14:08, 2017 GMT
The Daily Dot Comcast and other internet providers may soon be able to sell your web history The Daily Dot The broadband privacy rules prevented ISPs, like Comcast and Verizon, from selling your geolocation data, financial and health information, and the content of your messages if they weren't sent without encryption. The rules went into effect at the ... and more »
Comcast and other internet providers may soon be able to sell your web history - The Daily Dot
Fri Feb 17 11:49, 2017 GMT
A new study from Sweden has found that just over half of all young people admit to obtaining movies and TV shows from the Internet without paying, a figure that rockets to 70% among young men. With The Pirate Bay about to be blocked by one ISP with more to follow, can piracy rates be controlled? Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Study: 70% of Young Swedish Men Are Video Pirates
Fri Feb 17 09:53, 2017 GMT
Digital activism group GreatFire talk about developments in China's approach to internet censorship. The post GreatFire: Chinese authorities don’t understand how the internet works appeared first on Index on Censorship .
GreatFire: Chinese authorities don’t understand how the internet works
Fri Feb 17 09:53, 2017 GMT
Here are six sites that are regularly blocked by China's Great Firewall The post Six sites blocked by China’s Great Firewall appeared first on Index on Censorship .
Six sites blocked by China’s Great Firewall
Fri Feb 17 08:26, 2017 GMT
The mysterious pirate site blockade by Internet backbone provider Cogent was a 'mistake.' The Pirate Bay and dozens of other pirate sites were blocked as collateral damage, following a broad court order directed at a yet unnamed target. According to Cloudflare, which owns the associated IP-addresses, courts should understand how Internet systems work to avoid such unintended consequences. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Cogent’s Broad Pirate Site Block Was ‘Collateral Damage’ of a Court Order
Thu Feb 16 19:52, 2017 GMT
NEW YORK/BOSTON (Reuters) - New York state on Thursday announced final regulations requiring banks and insurers to meet minimum cyber-security standards and report breaches to regulators as part of an effort to combat a surge in cyber crime and limit damages to consumers.
New York state cyber security regulation to take effect March 1
Wed Feb 15 17:39, 2017 GMT
It has been almost a year to the day since I began representing Milo Yiannopoulos as his literary agent. I have largely stayed quiet about the controversy that started right before the New Year, when the book deal became public, but I feel compelled to respond to Joy Peskin, whose soapbox “Drawing the Line” appeared […] The post In Defense of Milo Yiannopoulos’s Book (Publishers Weekly) appeared first on Index on Censorship .
In Defense of Milo Yiannopoulos’s Book (Publishers Weekly)
Tue Feb 14 17:42, 2017 GMT
Chairman of press regulator IPSO Sir Alan Moses has said unpicking legislation brought in after part one of the Leveson Inquiry, including the Section 40 cost provision amendments, could take up to 15 years. Read the full article The post Unravelling Leveson legislation could take 15 years (Press Gazette) appeared first on Index on Censorship .
Unravelling Leveson legislation could take 15 years (Press Gazette)
Thu Feb 16 16:55, 2017 GMT
While torrent sites have been a thorn in the side of the MPAA for more than a decade, there's a new kid on the block. Speaking at the Berlin Film Festival, MPAA chief Chris Dodd cited the growing use of the Kodi platform for piracy, describing the problem as the "$64,000 question." Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
MPAA: Dealing With Kodi is the $64,000 Question
Thu Feb 16 11:00, 2017 GMT
Organisations have written to the Permanent Council of the Organization for Security and Co-operation in Europe urging it to ensure continuity in the role of Representative on Freedom of the Media The post OSCE must act quickly to fill media freedom role appeared first on Index on Censorship .
OSCE must act quickly to fill media freedom role
Thu Feb 16 09:11, 2017 GMT
The Pirate Bay and dozens of other pirate sites that were blocked by Cogent's Internet backbone are now accessible again. CloudFlare appears to have moved the sites in question to a new pair of IP-addresses, effectively bypassing Cogent's blackhole. Whether Cogent has plans to block their new home as well is unknown. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
CloudFlare Puts Pirate Sites on New IP Addresses, Avoids Cogent Blockade
Thu Feb 16 01:45, 2017 GMT
Engadget Republicans hope to overturn internet privacy rules Engadget FCC Chairman Ajit Pai isn't the only one bent on rolling back internet regulations. Republican Senator Jeff Flake is planning to submit a resolution that would eliminate the FCC's recently instituted broadband privacy rules through a vote. It's not ... Republicans may reverse internet privacy rules The Verge all 5 news articles »
Republicans hope to overturn internet privacy rules - Engadget
Wed Feb 15 23:41, 2017 GMT
The Hill Overnight Tech: Hatch to unveil 'Innovation Agenda' | GOP lawmaker targets internet privacy rules | Yahoo warns of ... The Hill A release announcing the event said that topics would include spurring tech investment via tax reform, and fostering an "open Internet ." A spokesperson for Hatch said the senator intends to unveil both legislative priorities and work that he intends to ... and more »
Overnight Tech: Hatch to unveil 'Innovation Agenda' | GOP lawmaker targets internet privacy rules | Yahoo warns of ... - The Hill
Wed Feb 15 23:27, 2017 GMT
NEW YORK (Reuters) - A Florida software engineer and a New Jersey pastor engaged in lies and corruption to facilitate an illegal bitcoin exchange business whose operators wanted to take over a small credit union to evade scrutiny, a federal prosecutor said on Wednesday.
U.S. takes pastor, software developer to trial over bitcoin exchange
Wed Feb 15 16:17, 2017 GMT
Before Terry McAuliffe made his plea for audience members to move to Virginia, the Virginia Governor and the Chairman of the National Governors Association spoke about the need for states to take cybersecurity into their own hands and work with the federal government to improve it. He pointed out that, collectively, the 50 U.S. states possess more data than the federal government. Health information, licenses, state tax returns – all this information is collected and stored at the state level. That makes states a prime target for cybercriminals – to the tune of more than 86 million attacks in 2016 alone. But right now, each state has a different standard for cybersecurity. McAuliffe said 10 to 15 states have strong security protocols, while another 10 to 15 have basic but functioning protocols. The remaining are not doing enough, or anything at all. His point is that while laws and regulations stop at state borders, information does not. Citizens use out-of-state healthcare facilities, and that information is shared across state lines – as is many other kinds of information. Our states’ security systems are only as strong as the weakest links, and those links are fragile. The states must come up with one agreed-upon standard. My only concern is that our states are so diverse. Some are very adverse to regulations and have industries that would lobby against such controls. However, I think McAuliffe is right; there is a chance cybersecurity may be the issue in which the states can find common ground. McAuliffe also wants the federal government to do more to support the states. Regardless of the states’ political affiliations, they must all work with the president and federal government to create a standard set of practices. Like many of the other speakers this year at RSA, McAuliffe also made a call for opening up our borders so we can let smart people into this country who can help us solve the cybersecurity problem. This was a prevalent theme this year – there are people outside of our country who can help us solve the cybersecurity challenge, and we need to be open to working with them. The session ended with McAuliffe making an impassioned speech for Virginia – calling it the birthplace of America, with the oldest settlement. While Virginia has a lot of history, and was even home to quite a few of our founding fathers, I’d like to point out that Massachusetts is the birthplace of America and was home to John Adams, John Hancock, Paul Revere and more. And the first battle of the American Revolution took place in Lexington, Mass. So Virginia may be for lovers (and a fantastic state), as McAuliffe says, but Massachusetts is the spirit of America. However, after the weather we’ve been having, I may consider a move to Virginia. Stay tuned for more from RSA …
Live From RSA: States Confront Cybersecurity Challenge
Wed Feb 15 16:00, 2017 GMT
The RSA 2017 theme of cyberwar and the need for improved national security continued with a presentation by Michael McCaul, Chairman of the House Committee on Homeland Security. Like many of the other speakers I heard today, McCaul danced a political line. But if others were dancing a ballet, he was more of a tap dancer, clearly stomping on the line while others glided around it. He began his speech by declaring: “we are a nation of immigrants” and stating that we must maintain that tradition for the survival of liberty. He continued by saying “America must extend an open hand to freedom-loving people” so we can attract the world's best minds in helping us solve the cybersecurity problem. McCaul then went on to describe how we are losing the fight of our digital lives by detailing the ways our enemies are succeeding: They are stealing government and business secrets and IP; and terrorists are using encryption techniques, social media and safe spaces on the dark web to radicalize and recruit terrorists. And it is working. Here’s why: Volume:  We are in a digital frontier. McCaul called it the wild west of technology. There are more cybercriminals than cyber-sheriffs. Speed: The speed at which innovation and adaptation happens gives criminals the advantage. He stated we are fighting “21st century threats with 20th century technology and 19th century bureaucracy. Challenges in sharing: The government and private industry do not have a safe way to share information about threats and vulnerabilities. So even if one company or agency is aware of the problem, they have no way to safely warn others. Deterrence: The consequences for bad behavior are limited. We don’t have specific policies for striking back against a cyberattack the way we do for a physical attack. We need rules that will allow us to implement sanctions when a country or nation state sponsors cybercrime. Paradox in national security: If terrorists are using the web to recruit, and we know about it, we can counter it. But if we shut them down, we push them further underground.  McCaul believes the answer won’t come from the government alone. It will come from the private sector, where innovation thrives. However, the government can help by creating a civilian agency, rather than a military agency, to protect civilians. He proposes an agency within Homeland Security focused on fixing the weaknesses we have in information sharing. He then proposed policies to strengthen our cybersecurity workforce . To start, expedite hiring authority and allow private industry and the government to bring in talent from all over the world so we can have a true innovation economy. He also wants to create scholarships for students willing to focus on cybersecurity and work for the federal government. McCaul concluded by calling 2016 a “watershed year” for security awareness , citing the DNC hack and the Russian hack on our election. The good news is that we are now more aware and clear-eyed, so we can act. Stay tuned for more from RSA …
Live From RSA: Michael McCaul Keynote – Fight for Our Digital Lives
Wed Feb 15 22:48, 2017 GMT
KIEV (Reuters) - Ukraine on Wednesday accused Russian hackers of targeting its power grid, financial system and other infrastructure with a new type of virus that attacks industrial processes, the latest in a series of cyber offensives against the country.
Ukraine charges Russia with new cyber attacks on infrastructure
Wed Feb 15 21:48, 2017 GMT
Republicans may reverse internet privacy rules The Verge Republicans may try to reverse a landmark privacy rule that requires internet providers to get permission before sharing your web browsing data and other sensitive information with outside companies. Politico reports that Senate Republicans are ...
Republicans may reverse internet privacy rules - The Verge
Wed Feb 15 18:45, 2017 GMT
Yahoo and Verizon are said to be close to agreeing revised sale terms, after the search giant was hit by cyber attacks.
Yahoo and Verizon 'near to agreeing revised sale terms'
Wed Feb 15 17:56, 2017 GMT
Why DuckDuckGo donated $300000 to these 16 internet privacy projects Technical.ly “People are actively looking for ways to reduce their digital footprint and these donations will support new education initiatives and continued development of privacy tools and services.” As we've reported before, the Tor Project has some Philly ...
Why DuckDuckGo donated $300000 to these 16 internet privacy projects - Technical.ly
Wed Feb 15 15:34, 2017 GMT
When RSA’s Zulfikar Ramzan finished his keynote discussing technology’s “ripple effect,” Brad Smith, President of Microsoft, took the stage to talk about cyberspace as the new battlefield. He started by pointing out that – unlike when war shifted from land, to the sea, to the air – cyberspace is not physical. Yet the battle can still have physical impacts. This makes security professionals the first line of defense in the war in cyberspace. An implication I hadn’t given much thought to is the victims of this war. In modern times, there have been agreements between nations on how to treat civilians in times of war. Civilians are to be protected and not targeted. But in this new battlefield, civilians are becoming the target, even in times of peace. Why is this so scary? As Smith put it – every company has at least one person who will click on anything. That’s why 90 percent of cyberattacks start out as phishing attempts. We’ve even seen examples of nation states targeting private companies with the goal of hurting our economy – not the company.  We aren’t close to victory. And I fear this is the type of battle that never ends. But as Smith puts it – we can do more, together. Smith reminds us that we’ve had four Geneva Conventions in modern history. In each convention, the world’s nations came together to agree upon a set of guidelines on how war would be conducted, how civilians would be treated and how governments would respond if these agreements were broken. Smith then called for a fifth Geneva Convention with the goal of creating an agreement for how civilians should be protected online in times of peace as well as war – and what the penalty will be for breaking this agreement. He cited recent agreements in the UN and with China as precedents we can use for these agreements. The keynote concluded with a call to the current US administration to address Russian hacking of the US and other governments. I’ve heard calls for cybersecurity regulations and international agreements in the past. However, this call felt different. It was specific, it was pointed and it cited recent precedents to demonstrate that such regulations are possible. Stay tuned for more from RSA …
Live From RSA: Brad Smith Keynote – We Need a Cyber Geneva Convention
Wed Feb 15 13:25, 2017 GMT
It almost didn’t happen, but I made it to the RSA Conference. A series of unfortunately timed winter storms delayed/canceled flights, but I was able to make it out of Boston and to San Francisco only a day late – which meant I only missed the DevSecOps @ RSA Conference 2017 talks on Monday. And the big takeaway after my first day at the conference: it’s all about DevOps. If DevOps dominated last year’s talks , it owns them this year. In just about every session I have attended thus far, no matter the focus or title, DevOps was mentioned or examined. Let’s see if this trend continues throughout the week. Another common thread I noticed throughout the day was the sentiment of “the bad-guys’ job is easier than ours.” It started with an opening monologue from John Lithgow – yes John Lithgow – congratulating us on our passion for security and telling the audience that it may feel like we are losing the battle against cybercrime, but really we are preventing a dystopian society from forming. He stated, rather passionately, that without the efforts of the vendors and people at this conference we would not be able to overcome the challenges of the digital economy – throwing us into a 21 st century dark age. If only we could get the rest of the world to care about security as much as we do. Over the next few days, I’ll be attending sessions, taking notes and then sharing my observation on this blog. I’ll also live tweet from the event ( @jlavepoze ) and share photos of the activities in the Expo Hall. I look forward to another great conference and sharing ideas on how we can improve security. Here we go ... 
Live From RSA Conference 2017 – The Power of Opportunity
Wed Feb 15 13:00, 2017 GMT
This security expert knows all the tricks for stealing your personal information. His new book tells you how to keep your data safe.
Hacker knows best: Privacy tips from Kevin Mitnick - CNET
Wed Feb 15 13:00, 2017 GMT
Because the public battle over security and privacy ended in a draw, there's still a lot left to be resolved.
Apple vs. FBI one year later: Still stuck in limbo - CNET
Wed Feb 15 09:41, 2017 GMT
Livemint India is vulnerable to web-application attack: Akamai report Livemint The company released its Fourth Quarter, 2016 State of the Internet / Security Report, which provides analysis of the current cloud security and threat landscape, as well as insight into seasonal trends. The US and the Netherlands were the first and ... Cyber security : India faces high web application attack risk, says report Financial Express India among top target nations for web application attacks: Akamai India Today all 16 news articles »
India is vulnerable to web-application attack: Akamai report - Livemint
Wed Feb 15 13:14, 2017 GMT
Arrested twice and imprisoned for 14 years, writer Mamadali Makhmudov was released in 2013 after an international outcry. He continues to be blacklisted and his works are silenced. The post Mamadali Makhmudov: Writing the truth, only truth appeared first on Index on Censorship .
Mamadali Makhmudov: Writing the truth, only truth
Wed Feb 15 13:08, 2017 GMT
Australia’s Media Entertainment Arts Alliance launched a campaign to open Australia’s borders to the Index Award-shortlisted Kurdish-Iranian journalist Behrouz Boochani, who is currently interned in Papua New Guinea. The post Campaign seeks entry to Australia for Index Award nominee appeared first on Index on Censorship .
Campaign seeks entry to Australia for Index Award nominee
Tue Feb 14 11:33, 2017 GMT
The INQUIRER Akamai Releases Fourth Quarter 2016 State of the Internet / Security ... Yahoo Finance CAMBRIDGE, Mass., Feb. 14, 2017 /PRNewswire/ -- Akamai Technologies, Inc. (AKAM), the global leader in content delivery network (CDN) services, today ... Cyber security : India faces high web application attack risk, says report Financial Express all 13 news articles »
Akamai Releases Fourth Quarter 2016 State of the Internet / Security ... - Yahoo Finance
Wed Feb 8 01:09, 2017 GMT
CyberScoop Tor-developed smartphone app will detect internet censorship and ... CyberScoop The Tor Project, responsible for software that enables anonymous Internet use and communication, is launching a new mobile app to detect internet censorship ... Ooniprobe Maps Countries Around the World That Censor the ... The Atlantic The Tor Project's new smartphone app can help detect and report internet censorship International Business Times UK all 7 news articles »
Tor-developed smartphone app will detect internet censorship and ... - CyberScoop
Wed Feb 15 08:47, 2017 GMT
HP Launches Original Web Series About Internet Security Guiding Tech (blog) Internet security has been debated over and over for the past several years and there have been numerous instances of people proving that privacy and security on the internet is a myth, including whistleblower Edward Snowden unearthing the global ... and more »
HP Launches Original Web Series About Internet Security - Guiding Tech (blog)
Wed Feb 8 11:31, 2017 GMT
AOL News Sean Spicer appears to have some internet security issues after personal data leaks AOL News The Trump Administration has exhibited a number of behaviors leading to some questioning its level of cybersecurity. There's Trump's alleged use of an unsecured phone, staffers' poorly guarded emails, and, it appears, Press Secretary Sean Spicer's ... Sean Spicer on Citing Atlanta Terror Attack That Never Happened: I 'Clearly Meant' Orlando ABC News White House rattled by McCarthy's spoof of Spicer Politico Sean Spicer Makes Up Atlanta Islamist Terror Attack Daily Beast CNN all 302 news articles »
Sean Spicer appears to have some internet security issues after personal data leaks - AOL News
Tue Feb 14 19:51, 2017 GMT
The original convention is part of a set of global agreements meant to protect civilians, prisoners and others during war. The tech giant wants to translate that for the digital age.
Microsoft wants 'Digital Geneva Convention' on cyberattacks - CNET
Tue Feb 14 09:37, 2017 GMT
The Independent UK's cyber - security chief ridicules public guidelines for internet passwords as impossible even for spies to follow The Independent The UK's cyber security chief has ridiculed public guidelines on internet passwords, claiming they require average Britons to memorise the equivalent of a 600-digit number every month. The head of GCHQ's new National Cyber Security Centre, Ciaran ... Cybersecurity: Queen opens centre to protect against attacks BBC News GCHQ boss admits that even he struggles to remember his internet passwords Telegraph.co.uk British political parties ask GCHQ for advice on preventing cyber -attacks The Guardian Daily Mail  - Wired.co.uk  - Sky News all 132 news articles »
UK's cyber-security chief ridicules public guidelines for internet passwords as impossible even for spies to follow - The Independent
Tue Feb 14 14:39, 2017 GMT
A reading list looking at Bahrain's uprising six years on. The post Bahrain’s Day of Rage, six years on appeared first on Index on Censorship .
Bahrain’s Day of Rage, six years on
Tue Feb 14 11:42, 2017 GMT
The £100,000 grant will be used to provide workshops for boards and senior management of arts organisations in England and Wales The post Arts Council England awards Index funding to help address arts censorship appeared first on Index on Censorship .
Arts Council England awards Index funding to help address arts censorship
Tue Feb 14 11:17, 2017 GMT
The post After 45 years, Index on Censorship magazine “as necessary as ever” appeared first on Index on Censorship .
After 45 years, Index on Censorship magazine “as necessary as ever”
Tue Feb 14 10:12, 2017 GMT
After a court ruled yesterday that The Pirate Bay must be blocked in Sweden, reaction has been polarized. While copyright holders celebrated, the boss of ISP Bahnhof criticized the move, deriding the court action as signaling the death throes of the copyright industry. Interestingly, the company also teased a potential workaround. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Pirate Bay Blockade Signals Copyright Industry’s Death Throes, ISP Boss Says
Tue Feb 14 09:06, 2017 GMT
The UK government is considering new laws that target whistleblowers and journalists who obtain or share state secrets. Draft legislation proposed as part of an upcoming overhaul of the UK’s Official Secrets Acts (OSA) could see individuals jailed for up to 14 years for handling leaked information. This is a substantial increase from current laws, […] The post UK considers new punishments for whistleblowers and journalists to deter the next Snowden (The Verge) appeared first on Index on Censorship .
UK considers new punishments for whistleblowers and journalists to deter the next Snowden (The Verge)
Tue Feb 14 08:31, 2017 GMT
Join Index on Censorship for a screening of Tickling Giants as part of the Human Rights Watch Film Festival The post 11-12 March: Tickling Giants screening appeared first on Index on Censorship .
11-12 March: Tickling Giants screening
Mon Feb 13 09:03, 2017 GMT
The UK government is considering new proposals that would drastically increase prison sentences for individuals and journalists found guilty of obtaining or sharing state secrets. In a bid to modernize the Official Secrets Acts, a new espionage-focused law could lead to sentences of up to 14 years, which currently sits at two years and an […] The post The UK considers tougher prison sentences for whistleblowers (Endgadget) appeared first on Index on Censorship .
The UK considers tougher prison sentences for whistleblowers (Endgadget)
Mon Feb 13 09:01, 2017 GMT
Downing Street insisted that whistleblowers and investigative journalists will not have their freedom restricted by proposals which could result in a 14-year jail sentence for revealing state secrets. Read the full article The post Whistleblowers and investigative journalists will not face jail, Downing Street insists (I News) appeared first on Index on Censorship .
Whistleblowers and investigative journalists will not face jail, Downing Street insists (I News)
Tue Feb 14 04:10, 2017 GMT
The new security centre designed to improve Britain's resilience to hacking will be opened by the Queen.
Cyber security: Queen to open centre to protect against attacks
Mon Feb 13 17:33, 2017 GMT
Proposed legislation that could see journalists and whistleblowers sentenced up to 14 years for leaking official documents has no place in a democracy. The post Proposed legislation a body blow to public interest journalism appeared first on Index on Censorship .
Proposed legislation a body blow to public interest journalism
Mon Feb 13 12:00, 2017 GMT
Jeffrey Tarrant believes that the hedge fund world is on the verge of a new, Silicon Valley-inspired revolution. He calls it the Third Wave. The post AI and Bitcoin Are Driving the Next Big Hedge Fund Wave appeared first on WIRED .
AI and Bitcoin Are Driving the Next Big Hedge Fund Wave
Mon Feb 13 11:01, 2017 GMT
NEW YORK (Reuters) - A Florida software engineer and a New Jersey pastor are expected on Monday to face trial in a case stemming from an investigation into a bitcoin exchange and a data breach at JPMorgan Chase & Co .
U.S. trial set over bitcoin exchange linked to JPMorgan hack probe
Mon Feb 13 10:50, 2017 GMT
A Court of Appeal has ordered The Pirate Bay and streaming portal Swefilmer to be blocked by an ISP in Sweden. The landmark ruling, in favor of Universal Music, Sony Music, Warner Music, and the Swedish film industry, will see local ISP Bredbandsbolaget forced to block the sites for the next three years. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
The Pirate Bay Must Be Blocked in Sweden, Court of Appeal Rules
Mon Feb 13 08:27, 2017 GMT
Whistleblowers and journalists could face up to 14 years in prison for handling leaked official documents, under proposed legislation drawn up for the Government. Read the full article The post Journalists and whistleblowers face 14 years in prison for exposing leaked official secrets (Daily Mail) appeared first on Index on Censorship .
Journalists and whistleblowers face 14 years in prison for exposing leaked official secrets (Daily Mail)
Sat Feb 11 08:32, 2017 GMT
Eaten Fish (Ali Durrani), a 25-year-old Iranian cartoonist began a hunger strike on January 31 in Manus Island detention centre. He has now been on hunger strike for more than two weeks. The Media Entertainment and Arts Alliance (MEAA) published an open letter on February 5 calling on the federal government to free and resettle […] The post Media workers stand with refugees (Green Left Weekly) appeared first on Index on Censorship .
Media workers stand with refugees (Green Left Weekly)
Sat Feb 11 08:28, 2017 GMT
Campaigners have expressed outrage at new proposals that could lead to journalists being jailed for up to 14 years for obtaining leaked official documents. Read the full article The post Journalists who obtain leaked official material could be sent to prison under new proposals (The Telegraph) appeared first on Index on Censorship .
Journalists who obtain leaked official material could be sent to prison under new proposals (The Telegraph)
Fri Feb 10 08:33, 2017 GMT
Proposals in the UK for a swingeing new Espionage Act that could jail journalists as spies have been developed in haste by legal advisors, The Register has learned. Read the full article The post Planned Espionage Act could jail journos and whistleblowers as spies (The Register) appeared first on Index on Censorship .
Planned Espionage Act could jail journos and whistleblowers as spies (The Register)
Fri Feb 10 08:29, 2017 GMT
Artists are preparing go it alone at the Young Vic next month when the cast of a controversial play are reunited. Read the full article The post Cast of a controversial play are reunited at the Young Vic (London News) appeared first on Index on Censorship .
Cast of a controversial play are reunited at the Young Vic (London News)
Thu Feb 9 08:35, 2017 GMT
A play cancelled by the National Youth Theatre because of its apparent “extremist agenda” is to be given a new lease of life by its writer and director. Read the full article The post Axed play to be relaunched at Young Vic (The Stage) appeared first on Index on Censorship .
Axed play to be relaunched at Young Vic (The Stage)
Wed Feb 8 08:38, 2017 GMT
TRAILBLAZING social activist and cleric, Evan Mawarire has been nominated for the prestigious 2017 Index on Censorship Freedom of Expression Awards. Read the full article The post Mawarire nominated for global award (Zimbabwe Daily) appeared first on Index on Censorship .
Mawarire nominated for global award (Zimbabwe Daily)
Wed Feb 8 08:36, 2017 GMT
That picture of Zimbabwe protest pastor Evan Mawarire reading his Bible as he was driven off in a police truck last week? Fellow activist Patson Dzamara said it left him “heartbroken” – and it will have touched a chord in more than a few Zimbabweans’ hearts. Read the full article The post Five things you didn’t know about FREED pastor Evan Mawarire (News 24) appeared first on Index on Censorship .
Five things you didn’t know about FREED pastor Evan Mawarire (News 24)
Sun Feb 12 18:30, 2017 GMT
Many of the attacks in the last three months "threatened national security", a government expert says.
UK targeted by 'dozens' of serious cyber attacks each month
Mon Feb 13 05:57, 2017 GMT
Player Attack Orwell, Internet Privacy and You Player Attack Do you ever have those moments where you're happily browsing away online, looking up something silly on a whim and thinking to yourself, 'hoo boy, I sure am glad there's no giant Government watchdog conspiracy group watching me right now because ...
Orwell, Internet Privacy and You - Player Attack
Sat Feb 11 10:07, 2017 GMT
A popular stand-alone public BitTorrent tracker has effectively been ordered to block itself by Russia's telecoms watchdog. In a complaint, Rozcomnadzor orders the site to take action against its main URL, but the site neither carries nor curates any infringing content and has no mechanism to take hashes down. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Russia Orders Public Tracker to Block Itself, Site Refuses
Sat Feb 11 02:52, 2017 GMT
A five-year pilot in schools in England will seek out those with potential to defend the UK against attacks.
Cyber security lessons offered to schools in England
Sat Feb 11 00:44, 2017 GMT
NEW YORK (Reuters) - A Turkish hacker was sentenced to eight years in a U.S. prison on Friday for his role as one the masterminds behind three cyber attacks that enabled $55 million to be siphoned from automated teller machines globally.
Turkish hacker behind cyber heists gets 8 years in U.S. prison
Fri Feb 10 16:56, 2017 GMT
ROME (Reuters) - Italy's foreign ministry was hacked last year, a source close to the department said on Friday, confirming a report in the Guardian newspaper which also said Russia was suspected of perpetrating the attack.
Italy's foreign ministry came under cyber attack in 2016: source
Fri Feb 10 11:28, 2017 GMT
Indiatimes.com Detect Blocked Sites, Internet Censorship & Surveillance Through TOR's Ooniprobe Mobile App Indiatimes.com The Onion Router or Tor is a champion of apps and services for anonymous browsing of the Internet , whose mission also includes uncovering state-sponsored censorship and surveillance of the Internet . Ooniprobe is the Tor Project's convenient iOS and ... The Tor Project's ooniprobe allows you to participate in the vigil against internet censorship Android Police TOR's Ooniprobe App Tests Your Internet Speed And Censorship Level Fossbytes How to check if your internet connection is being watched htxt.africa all 5 news articles »
Detect Blocked Sites, Internet Censorship & Surveillance Through TOR's Ooniprobe Mobile App - Indiatimes.com
Fri Feb 10 05:55, 2017 GMT
Android Police The Tor Project's ooniprobe allows you to participate in the vigil against internet censorship Android Police Experienced internet explorers will know about The Onion Router Project, and some of you may have even used it at one point (guilty). Regardless of your thoughts on it, Tor has always tried to stand for internet freedom. The organization frowns upon ... and more »
The Tor Project's ooniprobe allows you to participate in the vigil against internet censorship - Android Police
Fri Feb 10 06:07, 2017 GMT
SHANGHAI (Reuters) - Two of China's three largest bitcoin exchanges said they were taking measures to stop withdrawals of the cryptocurrency from their platforms, as capital outflows prompt the Chinese central bank to step up its scrutiny of the industry.
China's OkCoin, Huobi exchanges to stop bitcoin withdrawals
Thu Feb 9 19:24, 2017 GMT
The Obama-appointed chief information security officer was charged with keeping the president and his staff safe from cyber-threats posed by hackers and nation-state attackers.
Secrecy surrounds White House cybersecurity staff shakeup
Thu Feb 9 18:45, 2017 GMT
In a word, very. You simply cannot secure your application layer without being one step ahead of application security threats and solutions. The problem is that it’s almost impossible to keep up in the face of the current security skills shortage. In a report titled, “Hackers Wanted: An Examination of the Cybersecurity Labor Market,” the RAND Corporation states that: “ It’s even harder to find senior resources who have the combination of security and business skills to drive a successful application security program : the estimated demand is 10 to 30 times larger than the available supply for security program managers.” Keeping pace will mean supplementing your team with outside help, but not just any outside help. You need an AppSec partner with a laser focus on this segment and its future, and an ability to both pivot and innovate as quickly as the ways applications are developed, used, regulated and threatened change. AppSec regulations changing rapidly As breaches proliferate and fill the headlines, the threat to the app layer is trickling down to the regulators, and we predict you will see more and more AppSec regulations taking shape in the next few years. For example, in an unprecedented move for a state government, the NY State Department of Financial Services has proposed cybersecurity regulations (slated to go into effect March 2017) for financial services companies  licensed by or operating in New York State . This is just the beginning of a shift toward more specific and prescriptive cybersecurity regulations. For instance, the proposed regulation includes a  comprehensive list of requirements  including: Implement a cybersecurity program with written policies and an audit trail Employ a Chief Information Security Officer (CISO) and dedicated cybersecurity personnel Identify cyber risks and conduct  penetration testing  at least annually and vulnerability assessment at least quarterly Secure applications by ensuring the use of  secure development practices  for in-house developed applications, and implement procedures for assessing and testing the security of all externally developed applications Assess risk to non-public information and information systems accessible or held by third parties, and conduct  third-party security assessments  at least annually Application threat landscape changing rapidly Your application landscape is growing and changing – very quickly. In turn, so are the threats. Take, for example, open source components. As the importance of applications grew in recent years, so did the pace of development. With that shift, building every app from scratch became unfeasible, and most developers today rely heavily on the ability to plug open source code components into their code. But security has not kept pace with the rapid influx of open source code. Our recent research found that approximately 97 percent of Java applications contained at least one component with a known vulnerability . And cyberattackers are increasingly using these widespread components to get the most bang for their buck – compromise one component, and you breach thousands. The scramble to find and secure components affected by Heartbleed is an example of the chaos that can and will ensue. Technology moves fast, and so do cyberattackers. You need application security that moves just as fast. Developer processes changing rapidly In the not-so-distant past, development processes didn’t really affect application security all that much. Developers did their thing, then passed the code to security to do theirs. As the demand for software increases, development processes have had to adapt and pivot. You want secure software? It’s not going to happen without educating developers about secure coding, and then making it easy and seamless for them to practice it. If your AppSec solution isn’t keeping up with development processes and integrating into those processes, you’re going to fall behind. AppSec technologies changing rapidly As new development methodologies like DevOps increase the complexity of securing software, the application security market must adapt. The nature of software development demands that software security is fast-moving. As development methods change and apps proliferate, new technologies will emerge to fill gaps and solve problems. Those new technologies today are solutions like software composition analysis, runtime application self-protection and developer sandboxes, but tomorrow, they will be something else. Application security will not be served by maintaining the status quo. Veracode is committed to keeping up with this fast-moving space; find out more about our solution .
How important is it to stay on top of the quickly evolving landscape of application security and application layer risk?
Tue Feb 7 18:48, 2017 GMT
When it is treated as an afterthought, security can never work. When enterprises purchase and write thousands of applications without any formal app security mechanism, they are opening themselves up to breaches. What recent reports show is that there is a real disconnect between the spend on applications and the investment in protecting them.  Gartner is projecting that U.S. enterprises will drop $380 Billion/year on developing and buying applications by next year and the tiniest fraction of that will be spent on application security. That's like spending the $4.5 million dollars on a Lamborghini and then parking it outside with the doors unlocked. Yes, it is an amazing vehicle but you are leaving it vulnerable. The problem is threefold. It is not usually that IT management doesn't understand/appreciate the need for app security. So what is the problem? One. Not making app security a sufficiently high priority to deal with it proactively, rather than reactively. Two. Assuming that developers (internal and external) are already handling app security sufficiently. Three. Assuming that perimeter security efforts and other band-aid approaches will adequately deal with any remaining app security problems. In other words, they assumed that the application infrastructure—the interconnected high-tech industry itself, if you will—was going to protect them. Let's take these one at a time. Not making app security a sufficiently high priority. This speaks to security spend. Many IT and security teams are forced to take the “peanut butter” approach to cybersecurity. There are so many areas on which to focus, they end up not focusing at all. Instead they spend 10 percent of budget on network security, 10 percent on endpoint security, 10 percent on application security and so on. As a result, no one area is strong and all are weak. Since applications are the number one attack vector , is stands to reason that applications are the area that companies should be paying the most attention to in regards to security. In addition, true security has a cost and it's not limited to money. An oft-cited reason for coders/developers to rush their apps into deployment is because of timing pressure from the line of business. Time to market is indeed essential, which means that departments must anticipate their needs and request apps early enough so that there's time for sufficient security efforts. When an app development request is being prepared, business units must insist on seeing a projected timeline so that they can make sure that there is enough time allocated for research and post-production security testing. That additional time in the timeline is essential. It's hard to fully blame developers for security lapses when management is only giving them two weeks to deliver. However, companies working in CI/CD environments can’t add time to their cycles and need ways to assess applications for vulnerabilities that work right in the development process. Most critically, you need to retain specialized app security talent. A third-party service is the most cost-effective route because you want teams who are familiar with the latest app security holes. As long as code-reuse shortcuts are commonly used, such experience is essential and the larger number of verticals they are helping, the better. And although the adage does say that time is money, in this case, money is also money. That means that businesses need to have a specific line item in internal app development for security testing and research. Nothing is free or magical. Businesses can't spend nothing on app security, allocate no time for the developers to spend effort on app security and then be surprised when vulnerabilities emerge after the app has gone live. The dynamic changes somewhat when dealing with apps purchased externally, whether it's off-the-shelf or custom code. Your agreements with ISVs must be unambiguous that your company expects clean and secure code and that initial responsibility for security falls on the ISV. Software vendors are under huge time-to-worker and cost pressures. Therefore, unless paying clients insist on documented security processes and sign off on the additional time/money such efforts require, it's hard to fault ISVs for not delivering. Your company's security spend speaks directly to your priorities. Make sure that app security is one of them.
Examining Security Spend Reveals Much About Priorities
Thu Feb 9 18:05, 2017 GMT
Several Pirate Bay users from ISPs all over the world have been unable to access their favorite torrent site for more than a week. Their requests are being stopped in the Internet backbone network of Cogent Communications, which has blackholed the CloudFlare IP-address of The Pirate Bay and many other torrent and streaming sites. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Internet Backbone Provider Cogent Blocks Pirate Bay and other “Pirate” Sites
Thu Feb 9 16:15, 2017 GMT
The Atlantic Why Did an Internet Censorship App Send My Phone to ... - Gizmodo Gizmodo Cannabis.com, GayEgypt.com, Circumcision.org, WhitePower.com, and yes, HardSexTube.com are all sites that the Tor Project's new app pointed my iPhone ... Ooniprobe Maps Countries Around the World That Censor the ... The Atlantic Tor-developed smartphone app will detect internet censorship and ... CyberScoop Tor Project's New Mobile App Alerts You To Internet Surveillance ... Forbes International Business Times UK all 6 news articles »
Why Did an Internet Censorship App Send My Phone to ... - Gizmodo - Gizmodo
Thu Feb 9 17:05, 2017 GMT
To highlight the most pressing concerns for press freedom in Europe in 2017, members Index's outgoing youth board review the year gone by with Mapping Media Freedom correspondents The post Index’s youth board discusses media freedom in Europe with MMF correspondents appeared first on Index on Censorship .
Index’s youth board discusses media freedom in Europe with MMF correspondents
Thu Feb 9 13:28, 2017 GMT
The confusion could leave companies open to future attacks, suggests BAE research.
Firms split on who handles aftermath of cyber-attacks
Thu Feb 9 12:29, 2017 GMT
Art dealing with “the Muslim problem” is branded “urgent”, “brave” and “provocative”. But who's doing the provoking? Who's getting provoked? The post The inconvenient Muslim: An evening to launch Homegrown appeared first on Index on Censorship .
The inconvenient Muslim: An evening to launch Homegrown
Thu Feb 9 11:00, 2017 GMT
How Trump's cybersecurity quest could reshape the internet TechRadar ... and often forgotten about. Mainstream discussions about cybersecurity are almost always reactive to instances of privacy infringement, and thus, ineffective — much like the hotly-debated Russian hacking of the DNC prior to the U.S. election ... and more »
How Trump's cybersecurity quest could reshape the internet - TechRadar
Thu Feb 9 09:30, 2017 GMT
The Atlantic Mapping Countries That Censor the Internet The Atlantic This project is sponsored by Tor, the organization behind the privacy -preserving Tor Browser. OONI has ... OONI only shows one confirmed case of censorship in Africa—Sudan appears to block a handful of adult sites, according to a 2-year-old scan—but ...
Mapping Countries That Censor the Internet - The Atlantic
Wed Feb 8 22:40, 2017 GMT
CNNMoney New app helps people track internet censorship CNNMoney A new tool wants to make it easy to track internet outages and help people learn how to circumvent them. The Open Observatory of Network Interference (OONI), which monitors networks for censorship and surveillance, is launching Ooniprobe, a mobile app ... and more »
New app helps people track internet censorship - CNNMoney
Wed Feb 8 20:45, 2017 GMT
SAN FRANCISCO/MOSCOW (Reuters) - Russian cyber-security experts have scaled back cooperation with Western contacts after one of their number was arrested in Moscow on treason charges, making it harder to fight global online crime, U.S. law-enforcement and industry sources say.
Cyber expert's arrest silences Russian contacts of some Western crime fighters
Tue Feb 7 16:02, 2017 GMT
More than thirty cultural institutions and human rights organisations around the world oppose Trump’s immigration ban The post National and international cultural and human rights organisations denounce Trump’s executive order on immigration appeared first on Index on Censorship .
National and international cultural and human rights organisations denounce Trump’s executive order on immigration
Wed Feb 8 15:21, 2017 GMT
Senator Mitch McConnell, we present to you the Streisand effect. The post The Internet Won't Let the Senate Censor Elizabeth Warren appeared first on WIRED .
The Internet Won’t Let the Senate Censor Elizabeth Warren
Wed Feb 8 15:00, 2017 GMT
Recent research suggests that many VPNs for Android have privacy and security flaws, and the problem of choosing a reliable VPN goes even further. The post Beware: Most Mobile VPNs Aren't as Safe as They Seem appeared first on WIRED .
Beware: Most Mobile VPNs Aren’t as Safe as They Seem
Wed Feb 8 13:44, 2017 GMT
Internet providers in Europe can be ordered to block access to The Pirate Bay, even though the site itself doesn't store any infringing material. This is the advice Advocate General Szpunar has sent to the EU Court of Justice in what may turn out to be a landmark case. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Blocking The Pirate Bay is Allowed Under EU Law, AG Concludes
Wed Feb 8 13:30, 2017 GMT
Throughout 2016, many of the attacks and risks in the world of cybercrime followed “analog” crime: holding something for ransom/extortion, propaganda, theft, and identity scams. You might expect a cybersecurity vendor to see... read more The post What’s new from Webroot in early 2017? appeared first on Webroot Threat Blog .
What’s new from Webroot in early 2017?
Wed Feb 8 09:27, 2017 GMT
Three weeks after reports that Cameroon had blocked the internet in English-speaking regions, residents say services have yet to be restored. So what is going on?
Why has Cameroon blocked the internet?
Wed Feb 8 08:15, 2017 GMT
For Azerbaijan’s president Ilham Aliyev and many other authoritarian leaders across the world, independent journalism and what it represents is bad news. The post Azerbaijan: Journalists strive to cover the country from exile appeared first on Index on Censorship .
Azerbaijan: Journalists strive to cover the country from exile
Tue Feb 7 16:12, 2017 GMT
A man from the UK who admitted recording movies in a cinema then uploading them to the Internet has been handed a community sentence. Shaun Forry was charged with fraud and copyright infringement offenses, but despite recording two movies and illegally distributing more than 670 others, he avoided a custodial sentence. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Movie Cammer & Prolific Uploader Receives Community Sentence
Tue Feb 7 12:39, 2017 GMT
TAIPEI (Reuters) - Taiwan said on Tuesday several domestic securities and futures firms had experienced cyber attacks and at least 10 had been threatened with attacks if they did not pay blackmailers.
Taiwan says some securities firms get blackmail messages, cyber attacks
Tue Feb 7 09:07, 2017 GMT
The Motion Picture Association is trying to have three popular streaming portals blocked by Irish Internet providers. In a new court case, the movie studios describe movie4k.to, primewire.ag and onwatchseries.to as massive copyright infringement hubs, with each offering thousands of infringing movies. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Movie Industry Wants Irish ISPs to Block Pirate Movie Streaming Portals
Tue Feb 7 06:01, 2017 GMT
Judges include actor Noma Dumezweni; former Vanity Fair editor Tina Brown Sixteen courageous individuals and organisations who fight for freedom of expression in every part of the world A Zimbabwean pastor who was arrested by authorities last week for his #ThisFlag campaign, an Iranian Kurdish journalist covering his life as an interned Australian asylum seeker, […] The post Global heroes battling censorship announced in Index Freedom of Expression Awards shortlist appeared first on Index on Censorship .
Global heroes battling censorship announced in Index Freedom of Expression Awards shortlist
Tue Feb 7 00:25, 2017 GMT
Facial recognition tech has many applications in business and security, but what price privacy?
Nowhere to hide
Mon Feb 6 10:36, 2017 GMT
TAIPEI (Reuters) - Taiwan is investigating an unprecedented case of threats made to five brokerages by an alleged cyber-group seeking payment to avert an attack that could crash their websites, an investigator and the securities regulator said on Monday.
Five Taiwan brokerages report cyber attack threats, regulator says
Mon Feb 6 10:17, 2017 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout the European Union and neighbouring countries. The post Mapping Media Freedom: French journalists ejected from Le Pen appearance appeared first on Index on Censorship .
Mapping Media Freedom: French journalists ejected from Le Pen appearance
Mon Feb 6 09:10, 2017 GMT
An entertainment organization comprising companies from the music, movie, and videogame industries is targeting several pirate sites for blocking in Belgium. The Belgian Entertainment Association informs TorrentFreak that it wants local ISPs to block nine of the most popular streaming sites under principles established by the Court of Justice of the European Union. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Music, Movie & Gaming Industries Seek Piracy Blockades in Belgium
Fri Feb 3 22:21, 2017 GMT
Hotel Doors Locked By Ransomware A prestigious hotel in Austria was the target of a ransomware attack that left their electronic door locking systems inoperable for several hours. The hack only stopped hotel... read more The post Cyber News Rundown: Edition 2/3/17 appeared first on Webroot Threat Blog .
Cyber News Rundown: Edition 2/3/17
Fri Feb 3 20:57, 2017 GMT
The third week of September 2016 was a dark and stormy one for KrebsOnSecurity. Wave after wave of huge denial-of-service attacks flooded this site, forcing me to pull the plug on it until I could secure protection from further assault. The site resurfaced three days later under the aegis of Google's Project Shield, an initiative which seeks to protect journalists and news sites from being censored by these crippling digital sieges. Damian Menscher, a Google security engineer with whom I worked very closely on the migration to Project Shield, spoke publicly for the first time this week about the unique challenges involved in protecting a small site like this one from very large, sustained and constantly morphing attacks.
How Google Took on Mirai, KrebsOnSecurity
Fri Feb 3 11:00, 2017 GMT
PCWorld HMA Pro 3.3 VPN review: An easy-to-use internet privacy tool PCWorld This is a powerful VPN, but expert users might prefer the older version, HMA 2, which has a more conventional desktop software look and feel. and more »
HMA Pro 3.3 VPN review: An easy-to-use internet privacy tool - PCWorld
Fri Feb 3 15:38, 2017 GMT
LONDON (Reuters) - Britain's government has taken too long to coordinate an "alphabet soup" of agencies tasked with protecting the country from an ever-increasing risk of cyber attack, a parliamentary report said on Friday.
'Alphabet soup' of agencies leave UK exposed to cyber attacks: report
Fri Feb 3 12:00, 2017 GMT
RadiTo hopes to bring forbidden audio to Iran's growing audience of smartphone users---and stay a step ahead of the country's internet filters. The post A Pirate Podcast App Takes on Iran's Hardline Censors appeared first on WIRED .
A Pirate Podcast App Takes on Iran’s Hardline Censors
Fri Feb 3 11:17, 2017 GMT
The Index award winner talks about the war in Yemen, president Trump's travel ban his involvement in a prize for aspiring artists from around the world The post Murad Subay: Yemen’s war makes a month feel like a year appeared first on Index on Censorship .
Murad Subay: Yemen’s war makes a month feel like a year
Fri Feb 3 10:26, 2017 GMT
NEW DELHI (Reuters) - Indian police have busted an internet scam in which around 650,000 people lost a combined 37 billion rupees ($549 million) after sending money to a company that promised they would earn cash by clicking on web links, police said on Friday.
Indian police bust $550 million internet scam that duped thousands
Fri Feb 3 11:05, 2017 GMT
TechHive HMA Pro VPN review: An easy-to-use tool for securing your online privacy TechHive If you've never used a VPN before the basic idea is that you route all your PC's Internet traffic through a third-party server. This lets you spoof your real location with a virtual one, as well as secure your web browsing habits from prying eyes such ... and more »
HMA Pro VPN review: An easy-to-use tool for securing your online privacy - TechHive
Fri Feb 3 10:00, 2017 GMT
International organisations call on the British foreign minister to pressure Bahrain to end judicial harassment of human rights advocate Nabeel Rajab The post Groups urge Boris Johnson to call for release of Nabeel Rajab appeared first on Index on Censorship .
Groups urge Boris Johnson to call for release of Nabeel Rajab
Fri Feb 3 02:11, 2017 GMT
A skills shortage and "chaotic" handling of data breaches undermine confidence, report says.
MPs question UK's cyber attack defences
Fri Feb 3 00:28, 2017 GMT
As the number of cyber-attacks escalates, can a new approach to security help keep us safe?
Superpower software
Thu Feb 2 22:01, 2017 GMT
App Developer Magazine How the new US administration will effect Internet privacy App Developer Magazine Many ordinary Americans, who are also concerned about future Internet security and privacy , started to turn to encryption services, such as VPNs (Virtual Private Networks). ProtonMail, encrypted email provider from Switzerland, has seen its number of ...
How the new US administration will effect Internet privacy - App Developer Magazine
Thu Feb 2 16:38, 2017 GMT
In the US, there exist no meaningful national cybersecurity rules, but, as a practical matter, that is likely to change this year. But it's not coming from Congress. The catalyst is new rules slated to start in March from the New York State Department of Financial Services . In financial areas, that New York department is typically mimicked by a wide range of other state regulators, along with federal regulators. Hence, de facto national rules. The rules themselves (you can peruse the full guidelines here ) are not especially controversial, primarily being security best practices. The rules insist on regular penetration testing and vulnerability assessments. They also establish strict encryption guidelines and require written access-control policies. Notably, however, the way they approach application security is somewhat novel, and the regulations do contain some language that might cause confusion. What defines an “attack”? The new rules set a 72-hour deadline for reporting incidents to the state, although when that clock starts is unclear. In addition, the rules define a cybersecurity event as "any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on such Information System." That is what needs to be reported within 72 hours, and that definition seems problematic. Brian Fitzgerald, the chief marketing officer at Veracode, argued in a new podcast discussion that this may be difficult to enforce given the nature of today's typical attacks. "Oftentimes, these attacks take weeks or months to execute. The evidence may take weeks or months to put together. Many of the banks in question here are attacked literally thousands of times a day, in terms of people testing the networks or attempting to phish their users or anything like that," Fitzgerald said. "So how do you tell when an attack has gained some traction and how do you know when that traction has actually caused potential risk to the bank, the financial organization or the customer? That spectrum is very blurry," and one possible criteria could be if a company has "clear evidence that files that contained sensitive information were actually exfiltrated from your organization." The big issue is that they define a reportable act as an "attempt, successful or unsuccessful." How realistic is it for large enterprises to report every unsuccessful attempt? Does that include any unsuccessful attempt at a password? Is that a legitimate user who made a typo or an attack attempt? Given the volume of failed attempts, what is the value in preparing that paperwork? What defines a “small business”? One area that was reportedly a subject of last-minute negotiations were exemptions for small businesses that employed "fewer than 10 employees including any independent contractors" or had gross annual revenue—in each of the last three fiscal years—of less than $5 million or which had less than $10 million in year-end total assets. Those definitions are key, given that federal guidelines have typically defined a small business as one with fewer than 100 employees. That means that a lot of companies may hear about a small business exemption and think that they are exempt, when they're not. Also, companies have typically considered only salaried employees. Given that these New York rules include any independent contractors in that list of 10, the number of "small businesses" that will be exempt may be tiny indeed. Spotlight on data retention The new rules also crack down on data retention. In the New York language: "Each Covered Entity shall include policies and procedures for the secure disposal on a periodic basis of any Nonpublic Information that is no longer necessary for business operations or for other legitimate business purposes of the Covered Entity, except where such information is otherwise required to be retained by law or regulation, or where targeted disposal is not reasonably feasible due to the manner in which the information is maintained." The tricky part of this new wording is the phrase "no longer necessary for business operations or for other legitimate business purposes." Like the rules being pursued for global cybersecurity consistency by the European Union, the GDPR , this is going to force strategic conversations that companies should have had years ago. If regulatory compliance is the reason, that's for the best. But companies today are retaining far more sensitive data than they need, and a healthy part of that is laziness. The data was needed for a project three years ago, for example, and when the project ended and the team was reassigned, no one bothered to go back and delete no longer needed data. Most likely, no one even saw it as their responsibility. Now multiply that by the thousands of such projects that the typical enterprise starts and stops each year, and the problem becomes clear. Even worse, this orphaned data is solely secured by the requirements that existed at the time it was created. No one is going back and upgrading security on forgotten data. These new rules will give IT a reason will keep track of these efforts or face fines. Encouraging for AppSec All in all, though, this New York effort is encouraging, especially in the way that it highlights application security awareness. Fitzgerald argued that this reflects a major improvement in regulatory thinking. "They are showing some real insight into some of the specific areas of security that the regulators are going to identify as important and, in some cases, as required," he said, citing regulations surrounding training on secure coding as a particularly encouraging sign. The New York state rules mandate "education of your developers and making sure that developers know how to actually write good code. They also focused on the testing of applications to ensure that there's some kind of validation for the security-oriented quality of the software that is developed," Fitzgerald said. These regulations, in a move away from past regulations, are considering security at every phase of the development lifecycle – from development to QA to production --- and that is certainly a positive development. Still, he added, it's not perfect and may need even more specificity in the near future. "Although there is an advocacy for testing here, there really isn’t necessarily a bar for how do I know when what I have is actually good enough," Fitzgerald said. Listen to the AppSec in Review podcast: Making Sense of the New York DFS Cybersecurity Regulations to hear the full discussion and get more details on these upcoming regulations.  
Some Surprises in the New New York Cybersecurity Regulations
Thu Feb 2 19:37, 2017 GMT
Confusion Between Internet Security And Privacy May Have Implications Leaving Individuals And Organizations ... InvestorIdeas.com (press release) Albany, NY - February 2, 2017 (Investorideas.com Newswire) It is not unusual for the most private people - those who eschew social media, and refrain from posting personal information - to use very basic (and therefore breachable) passwords to protect ...
Confusion Between Internet Security And Privacy May Have Implications Leaving Individuals And Organizations ... - InvestorIdeas.com (press release)
Thu Feb 2 12:19, 2017 GMT
Statement from Evan Mawarire who has been arrested in Zimbabwe The post #ThisFlag: Evan Mawarire tells Zimbabweans to “never ever be silent” appeared first on Index on Censorship .
#ThisFlag: Evan Mawarire tells Zimbabweans to “never ever be silent”
Wed Feb 1 18:43, 2017 GMT
New research codifies a framework for the type of tools survivors need to protect their digital security and privacy from an abusive intimate partner. The post Tech Can Do More to Help Survivors of Abuse. Here's Where to Start appeared first on WIRED .
Tech Can Do More to Help Survivors of Abuse. Here’s Where to Start
Wed Feb 1 16:45, 2017 GMT
NEW YORK (Reuters) - New York filed a lawsuit on Wednesday accusing Charter Communications Inc of short-changing customers who were promised faster internet speeds than it could deliver.
New York sues Charter, alleges Time Warner fraud on internet speeds
Wed Feb 1 08:50, 2017 GMT
Memeburn Is TrackOFF the internet security service you've been sorely missing? Memeburn “The beauty of TrackOFF is that it was designed not to disrupt or disturb your browsing experience, as many other privacy products do. It does not block scripts from running, as that could affect the way pages are loaded or displayed, and even break ...
Is TrackOFF the internet security service you've been sorely missing? - Memeburn
Tue Jan 31 14:21, 2017 GMT
Huffington Post Canada Canadians' Internet Data Affected As Trump Cancels Privacy Rules Huffington Post Canada The Department of Homeland Security in 2007 extended certain Privacy Act protections to include “non-U.S. persons including visitors and aliens.” The original Privacy Act of 1974 did not cover non-U.S. citizens. Trump's order “has enormous implications ...
Canadians' Internet Data Affected As Trump Cancels Privacy Rules - Huffington Post Canada
Tue Jan 31 10:32, 2017 GMT
Authorities in Sweden are mulling new measures to deal with evolving 'pirate' sites. As part of a legislative review, the government wants to assess potential legal tools, including categorizing large-scale infringement as organized crime, tougher sentences, domain seizures, and site-blocking. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Swedish Govt. Mulls Tougher Punishments to Tackle Pirate Sites
Tue Jan 24 16:19, 2017 GMT
Glens Falls Post-Star French internet censorship up sharply in 2016 Salt Lake Tribune Lille, France • French authorities ordered the blockage or removal of more than 2,700 websites in 2016, Interior Minister Bruno Le Roux said Tuesday, a spike in censorship that some critics in the tech industry fear will do little to snuff out ... French Internet Censorship Rose Sharply in 2016 - ABC News ABC News French internet censorship rose sharply in 2016 Glens Falls Post-Star all 5 news articles »
French internet censorship up sharply in 2016 - Salt Lake Tribune
Mon Jan 30 21:57, 2017 GMT
Amidst Increased Government Surveillance, Chinese Internet Users Finally Gain Important Online Privacy Protections Techdirt Techdirt stories about China have been relentlessly grim in recent years, offering a depressing vision of an online world under ever-greater surveillance, with correspondingly more systems for censoring every digital thought. But it's important not to ...
Amidst Increased Government Surveillance, Chinese Internet Users Finally Gain Important Online Privacy Protections - Techdirt
Mon Jan 30 18:00, 2017 GMT
The Hill (blog) Congress should undo FCC's dysfunctional Internet privacy rules The Hill (blog) Consider how the FCC has ill-served American consumers with its self-serving, dysfunctional broadband privacy regulations. For over a decade, the Federal Trade Commission was America's unified federal privacy regulator for most every industry including ... Net Neutrality Foe to Head the FCC Scientific American beware Trump and his internet killswitch The Australian Financial Review all 21 news articles »
Congress should undo FCC's dysfunctional Internet privacy rules - The Hill (blog)
Mon Jan 30 13:02, 2017 GMT
International investment in fossil fuel extraction is making me and other Azerbaijani political prisoners hostages to the Aliyev regime. The post Azerbaijan: Political prisoners hostages to fossil fuel extraction appeared first on Index on Censorship .
Azerbaijan: Political prisoners hostages to fossil fuel extraction
Mon Jan 30 10:41, 2017 GMT
Arts organisation Siyah Bant examines how emergency rule has affected artistic expression in Diyarbakır in southeastern Turkey The post Turkey: Bans on Kurdish arts festivals spark solidarity actions appeared first on Index on Censorship .
Turkey: Bans on Kurdish arts festivals spark solidarity actions
Mon Jan 30 11:00, 2017 GMT
Forbes Industry Groups Beg Congress, FCC To Restore Scrambled Internet Privacy Rules Forbes Former and new FCC and FTC Chairs (L to R Tom Wheeler, Ajit Pai, Edith Ramirez, Maureen Ohlhausen) testifying last year on proposed FCC privacy rules that rejected the FTC's longstanding “notice and choice” framework. ... cut them out of the picture ... and more »
Industry Groups Beg Congress, FCC To Restore Scrambled Internet Privacy Rules - Forbes
Mon Jan 30 10:30, 2017 GMT
Casper Privacy Film makes screens look like black boxes, so your open-plan office doesn't sacrifice security for transparency. The post ‘Cloaking’ Film for Windows Blacks Out the Screens Within appeared first on WIRED .
‘Cloaking’ Film for Windows Blacks Out the Screens Within
Sat Jan 28 23:42, 2017 GMT
A chief criticism I heard from readers of my book, Spam Nation: The Inside Story of Organized Cybercrime, was that it dealt primarily with petty crooks involved in petty crimes, while ignoring more substantive security issues like government surveillance and cyber war. But now it appears that the chief antagonist of Spam Nation is at the dead center of an international scandal involving the hacking of U.S. state electoral boards in Arizona and Illinois, the sacking of Russia's top cybercrime investigators, and the slow but steady leak of unflattering data on some of Russia's most powerful politicians.
A Shakeup in Russia’s Top Cybercrime Unit
Fri Jan 27 21:03, 2017 GMT
Consumerist Cable & Phone Industries Tell Congress To Reverse New Internet Privacy Rule Consumerist Last fall, the FCC approved a new rule detailing internet service providers can and can't gather and use your information. The affected industries cried “unfair!” and now, with a new business-friendly FCC Chairman and White House, they are calling on ... and more »
Cable & Phone Industries Tell Congress To Reverse New Internet Privacy Rule - Consumerist
Fri Jan 27 13:44, 2017 GMT
New York Magazine Click Here to Kill Everyone New York Magazine Someone used your DVR, along with millions of insecure webcams, routers, and other connected devices, to launch an attack that started a chain reaction, resulting in Twitter, Reddit, Netflix, and many sites going off the internet . You probably didn't ... The Internet of Things or: How I Learned to Stop Worrying and Love the IoT Business 2 Community Smart Card Alliance Releases Primer on Securing the Internet of Things insideBIGDATA Staying Ahead of Privacy and Security Risks in the Internet of Things Lexology (registration) TechTarget (blog)  - Mississippi Business Journal  - Business Insider all 55 news articles »
Click Here to Kill Everyone - New York Magazine
Fri Jan 27 16:07, 2017 GMT
ZURICH (Reuters) - Bitcoin wallet provider Xapo said it has received conditional approval from Switzerland's financial market watchdog to operate in the country in a regulatory breakthrough for companies that provide safekeeping for the virtual currency.
Bitcoin firm gets approval to operate in Switzerland
Thu Jan 26 15:59, 2017 GMT
The United Kingdom might be seeing its own version of the infamous Gawker versus Hogan case play out in its own legal system, but with a twist. Section 40 is a new law that if enacted, will force publishers to pay for the legal expenses of the person suing them, regardless of whether the claimant […] The post Section 40: Protection for the People, or Oppression of the Press? (Mediafile) appeared first on Index on Censorship .
Section 40: Protection for the People, or Oppression of the Press? (Mediafile)
Wed Jan 25 16:01, 2017 GMT
National news media can’t agree whether buzzfeed.com erred when it published the 35-page compendium of salacious rumors about Donald Trump in Moscow. Read the full article The post Why BuzzFeed published the Trump dossier (CityBeat) appeared first on Index on Censorship .
Why BuzzFeed published the Trump dossier (CityBeat)
Fri Jan 27 10:31, 2017 GMT
MOSCOW (Reuters) - Russia's major commercial banks came under cyber attacks in November last year, the country's Federal Security Service said on Friday, Interfax news agency reported.
Russian security service says hackers attacked major banks in 2016: Ifax
Fri Jan 27 00:00, 2017 GMT
Microsoft Internet Explorer XSS Filter CVE-2016-3212 Security Bypass Vulnerability
Vuln: Microsoft Internet Explorer XSS Filter CVE-2016-3212 Security Bypass Vulnerability
Fri Jan 27 00:00, 2017 GMT
RETIRED: Microsoft Internet Explorer XSS Filter Security Bypass Vulnerability
Vuln: RETIRED: Microsoft Internet Explorer XSS Filter Security Bypass Vulnerability
Fri Jan 27 09:38, 2017 GMT
Writer Ece Temelkuran warns global movements to learn from the example of her homeland. The post Learn from Turkey: Resistance can’t just end at “No” appeared first on Index on Censorship .
Learn from Turkey: Resistance can’t just end at “No”
Fri Jan 27 08:24, 2017 GMT
Video-hosting platform DailyMotion has been permanently blocked in Russia . The platform, owned by French company Vivendi, was ordered to be blocked by the Moscow City Court after repeated allegations of copyright infringement were not adequately addressed by the company. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
DailyMotion Permanently Blocked in Russia After Copyright Complaints
Fri Jan 27 04:33, 2017 GMT
HONG KONG (Reuters) - Hong Kong's securities regulator said brokers in the city had suffered cyber attacks and warned of possible further incidents across the industry.
Hong Kong securities brokers hit by cyber attacks, may face more: regulator
Thu Jan 26 18:09, 2017 GMT
The semi-private BitTorrent tracker Demonoid has been offline for more than two days due to an unforeseen hosting problem. The site's operators planned to move the site to a new location earlier this week but hit a roadblock. While the site could remain offline for a few more days, the team plans to bring it back up as soon as possible. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Demonoid Suffers Extended Downtime Due to Hosting Issue
Thu Jan 26 16:16, 2017 GMT
Khaosod English Ecology of Intrusion: Report Details Thai State's Assault on Internet Privacy Khaosod English The report relies on well-placed sources, media reports, government records and technical analyses to lay out the cultural, structural and technological means by which the authorities surreptitiously assault security . Representatives of the government ... and more »
Ecology of Intrusion: Report Details Thai State's Assault on Internet Privacy - Khaosod English
Thu Jan 26 00:54, 2017 GMT
The site offers itself as a venue for publishing climate research, as scientists and others fear censorship by the Trump administration.
WikiLeaks offers to save climate data from Trump - CNET
Wed Jan 25 20:56, 2017 GMT
IndustryWeek Four Security Priorities Will Drive Adoption of the Industrial Internet of Things IndustryWeek Securing the Industrial IoT requires focus on four zones that comprise most applications: sensors that remotely gather data, the “first mile” on-site OT networks that convert this data and securely connect it to the internet , software that stores and ... Staying Ahead of Privacy and Security Risks in Internet of Things The National Law Review Connecting The World To Everything, That's The Internet Of Things WVXU Smart Card Alliance Releases Primer on Securing the Internet of Things EIN News (press release) all 108 news articles »
Four Security Priorities Will Drive Adoption of the Industrial Internet of Things - IndustryWeek
Wed Jan 25 16:21, 2017 GMT
To stay competitive, every company in every industry has to not only create software, but also create it fast. This pressure has most likely trickled down to your development team, which is feeling squeezed to meet ever-tighter deadlines and continually get new products and features out the door. In turn, we’re seeing the adoption of new, speedier development and deployment practices , such as Agile, DevOps and CI/CD. But the frequent releases and tight deadlines that are hallmarks of these practices often leave security in their wake. Traditional application security solutions, which address security issues late in the SDLC, simply can’t keep pace with these new development practices. And if you’ve read any news headlines in the past few months, you know the consequences of releasing insecure software. Breaches are proliferating, and a recent Verizon study of 2,260 confirmed data breaches found that  40 percent resulted directly from web app attacks , by far the largest category. In the end, we need to produce software quickly and securely, which means we need application security testing that adapts to development processes , not the other way around. Enter Veracode Greenlight Veracode Greenlight gives developers the “green light” to code without security disruptions or delays. With Veracode Greenlight, you discover security-related defects while you are writing code, and fix them before moving on to the next task. In this way, you find these defects when they are the easiest and cheapest to fix – during development. Get security feedback in seconds – in the privacy of your IDE Nobody writes perfect code the first time around, so Veracode enables you to test your code easily and quickly within your normal development workflow. Simply install a plug-in to your IDE and use Veracode Greenlight to get secure coding feedback in seconds, privately in your IDE, so you can fix issues before you even commit the code. Because Veracode Greenlight was built using Veracode’s proven static analysis engine that has analyzed over 2 trillion lines of code, you’ll benefit from high accuracy and very low false positives. Further, by allowing you to address the security of small units of code as you work, Veracode Greenlight alleviates the distractions that stem from analyzing the security of a whole application. These analyses often leave you with a long list of flaws that you can only address by stopping your current work to revisit unfamiliar code. In contrast, Veracode Greenlight returns results in seconds for the file or small package that you are currently working on. Fix flaws earlier and learn to write secure code Veracode Greenlight provides not only immediate feedback as soon as a flaw is introduced, but also contextual remediation advice to help you quickly fix the issue, and positive feedback when you’ve taken active steps to secure your application. In addition, you can rescan in seconds to ensure a flaw no longer exists, so you can actively learn while you’re coding and introduce fewer defects going forward. Get started easily without provisioning servers or tweaking rules Veracode Greenlight makes your life easier because it scans code through the Veracode Static Analysis engine, which has improved its accuracy with every one of the 2 trillion lines of code scanned so far – no rule tweaking required. Because the Veracode Platform is SaaS-based, it scales up to your needs without the burden of provisioning and maintaining servers. In addition, Veracode Greenlight scans passively in the background, without taking up resources on your machine. Use an application security platform that works for development, security and operations Ultimately, application security is a problem that affects the entire software development lifecycle and stakeholders throughout your organization; it requires a solution that works at each of these stages and for each of these parties. While Veracode Greenlight helps developers by scanning smaller units of code while they write it, Veracode Static Analysis provides security with the assurance they need to prove the application meets the organization’s security policy. Unlike solutions that use different engines for testing at different development stages, Veracode Greenlight and Veracode Static Analysis are based on the same time-tested engine, which enables: More consistent and accurate results A faster road to application compliance   Deployment of secure code at the speed of DevOps Used together, the two products provide the only end-to-end application security offering that meets the security, speed and usability needs of both development and security teams. Find out more about Veracode Greenlight at https://www.veracode.com/products/greenlight . If you're headed to RSA Conference or DeveloperWeek , visit the Veracode booth - at either event - to see a demo of Greenlight!
Developers, Never Leave Your IDE Again: Veracode Greenlight provides secure coding feedback within seconds, and within your IDE
Wed Jan 25 19:23, 2017 GMT
STOCKHOLM (Reuters) - Sweden's armed forces were recently exposed to an extensive cyber attack that prompted them to shut down an IT system used in military exercises, daily newspaper Dagens Nyheter reported on Wednesday.
Swedish forces exposed to extensive cyber attack: Dagens Nyheter
Wed Jan 25 14:34, 2017 GMT
PARIS (Reuters) - France's central bank governor called on French insurers to enhance cyber risk coverage for their clients, as hack attacks and data privacy laws in Europe spur rising demand.
French central bank chief urges insurers to step up cyber risk coverage
Wed Jan 25 12:19, 2017 GMT
Dealing with mutilated bodies, an attempted acid attack and speakers arresting each other. All part of Peter Florence's job organising Hay literature festivals around the world The post Hay Festival director on global challenges to freedom of speech appeared first on Index on Censorship .
Hay Festival director on global challenges to freedom of speech
Tue Jan 24 16:21, 2017 GMT
Yahoo Finance EU--France-Online Censorship Yahoo Finance Octave Klaba, the founder of French internet hosting firm OVH, speaks to a journalist at a cybersecurity conference in Lille, northern France, Tuesday Jan. 24, 2017. French authorities say they've ordered the blockage or removal of more than 2,700 ... and more »
EU--France-Online Censorship - Yahoo Finance
Sun Jan 22 10:47, 2017 GMT
A look inside Flying Dog, the company that made a bestseller out of a beer with a naughty name—and launched a First Amendment fight to call its brews whatever the hell it wants. Read the full article The post The Battle of Raging Bitch (Washingtonian) appeared first on Index on Censorship .
The Battle of Raging Bitch (Washingtonian)
Thu Jan 19 10:42, 2017 GMT
Members and supporters of the National Secular Society gathered in Portcullis House on Wednesday night to discuss the future of free speech, two years after the attack on Charlie Hebdo. Read the full article The post Legacy of Charlie Hebdo honoured in event at Parliament (National Secular Society) appeared first on Index on Censorship .
Legacy of Charlie Hebdo honoured in event at Parliament (National Secular Society)
Mon Jan 23 19:00, 2017 GMT
This simple advice will help to protect you against hackers and government surveillance.
Online security 101: Tips for protecting your privacy from hackers and spies
Tue Jan 24 16:21, 2017 GMT
Yahoo News EU--France-Online Censorship Yahoo News Octave Klaba, the founder of French internet hosting firm OVH, speaks to a journalist at a cybersecurity conference in Lille, northern France, Tuesday Jan. 24, 2017. French authorities say they've ordered the blockage or removal of more than 2,700 ... French internet censorship rose sharply in 2016 nwitimes.com all 8 news articles »
EU--France-Online Censorship - Yahoo News
Tue Jan 24 12:12, 2017 GMT
Journalist Yavuz Baydar writes about this hopes for Turkey's journalists in 2017 The post Dim hopes for 2017, but we’ll keep up the struggle for a free world appeared first on Index on Censorship .
Dim hopes for 2017, but we’ll keep up the struggle for a free world
Tue Jan 24 10:30, 2017 GMT
French internet censorship rose sharply in 2016 Phys.Org ... privacy watchdog last year. In April the watchdog reported that 312 sites were blocked and 855 de-listing requests were made in France between March 11, 2015 and Feb. 29, 2016. French authorities can block sites without a judge's order under a 2011 ... and more »
French internet censorship rose sharply in 2016 - Phys.Org
Tue Jan 24 09:26, 2017 GMT
Late last week, Kim Dotcom was getting ready to make a major announcement about Bitcache and the new Megaupload 2.0 service. However, just before going public the news was halted due to a "roadblock." Today, Dotcom reveals that he planned to announce a merger with a publicly listed Canadian company, but the stock exchange got in the way. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Canadian Stock Exchange Blocked Megaupload 2.0 Plans
Tue Jan 24 10:10, 2017 GMT
French Internet Censorship Rose Sharply in 2016 ABC News France's interior minister says authorities have blocked or ordered search engines to de-list hundreds of websites in 2016, a significant increase over 2015. Bruno Le Roux told a cybersecurity conference in the French city of Lille that his government ...
French Internet Censorship Rose Sharply in 2016 - ABC News
Mon Jan 23 22:45, 2017 GMT
The Hill Overnight Cybersecurity: Senate poised to confirm Pompeo for CIA ... The Hill Welcome to OVERNIGHT CYBERSECURITY, your daily rundown of the biggest news in the world of hacking and data privacy. We're here to connect the dots as ... and more »
Overnight Cybersecurity: Senate poised to confirm Pompeo for CIA ... - The Hill
Mon Jan 23 18:38, 2017 GMT
Softpedia News China just made VPNs illegal Engadget Chinese authorities block access to big-name websites such as Twitter, Facebook, YouTube and numerous others, and to thwart these restrictions, many residents on the mainland use virtual private networks. Starting this week, that could be a crime. Use ... China Makes VPNs Illegal, Boosts Internet Censorship Softpedia News China Increases Internet Controls, Hits VPNs as Web Population Grows Variety China cracks down on Internet Sarasota Herald-Tribune The Daily Progress  - Ars Technica  - South China Morning Post all 46 news articles »
China just made VPNs illegal - Engadget
Mon Jan 23 20:47, 2017 GMT
Softpedia News China Makes VPNs Illegal, Boosts Internet Censorship Softpedia News This firewall was used by authorities to block access to large websites they deemed unfit for the local users, such as Twitter, Facebook, YouTube and many others. In response, local ... Despite the fact that freedom on the Internet is seen as freedom ... China Increases Internet Controls, Hits VPNs as Web Population Grows Variety China cracks down on tools used to get around web filters The Daily Nonpareil China announces mass shutdown of VPNs that bypass Great Firewall Ars Technica Engadget  - South China Morning Post all 39 news articles »
China Makes VPNs Illegal, Boosts Internet Censorship - Softpedia News
Mon Jan 23 14:43, 2017 GMT
If an industry continuously talks about how a trend is going to be a hurdle, it becomes a hurdle. Conversely, if an industry views the trend as an opportunity and talks about it in such terms, thinking shifts toward the potential this trend brings for improvement. We are seeing this phenomenon with DevOps, but not in a good way. Security professionals are talking about the hurdles of securing applications in DevOps environments. But the truth is the DevOps culture creates an opportunity for us to improve application security.  We in the security industry have a tendency to go negative. It’s not completely our fault; we’ve been conditioned to look for the worst-case scenario in an effort to keep our businesses and personal lives more secure. The ability to “find the problem” rather than look on the bright side can be a valuable skill in the battle against cybercrime. We’ve also become cynical. After years of talking about the importance of issues like strong passwords, only to go on vacation and find the vacation home’s WiFi password is 1234567890, or about secure components only to find that 97% of Java applications have at least one vulnerable component , who can blame us? Being cynical can help security professionals be more in-tune with reality versus the ideal state. But it’s time to knock it off. Our tendency to go negative or be cynical means that when a trend like DevOps is introduced, we start hemming and hawing about the absence of security. “Why isn’t it Dev-SEC-Ops?” we cry. Or we fret that the concept of continuous integrations and deployments creates a huge barrier for security by presenting continuous occasions for vulnerabilities to be introduced. And all of a sudden, a trend that has positive implications for development and operational teams, as well as businesses, becomes a threat. Knock it off, security friends. Rather than look at DevOps as yet another way we are going to be insecure, let’s see this for the opportunity it really is – a chance to build security into a system that values cross-team collaboration, continuous improvements and quality. Continuous improvements and continuous deployments don’t create opportunities for vulnerabilities, they create opportunities for continuous security testing. The collaborative culture of DevOps creates an environment where operational teams, developers and QA all work together in continuous release cycles to produce high-quality, functional code. This makes secure code no longer the domain of one team, but instead the responsibility of all teams, including the development team. Security professionals have an opportunity to embrace the DevOps culture and create an environment where secure code is part of overall code quality. DevOps provides precise systems and processes for developing applications, and these processes have logical and easy points for when security should be integrated. Injecting security into the processes early on makes DevOps an enabler of security, rather than another hurdle to overcome.
Securing DevOps: Enough With the Cynicism
Thu Jan 19 14:54, 2017 GMT
Application security is no longer optional; it has become an absolute necessity. With an increasing number of companies welcoming the idea of developing their own apps, in addition to purchasing record numbers of apps and incorporating open source code into their apps , the risks and vulnerabilities associated have also risen manifold. I’ve worked as a Security Program Manager at Veracode for the past several years, and I have seen a growing number of both large and small organizations fall victim to cyberattackers, resulting in data breaches as well as hefty financial losses to the affected parties (many are now Veracode customers). In fact, according to the 2016 Breach Level Index report , there were 974 reported incidents of data breaches, with 728 of them occurring in the United States alone, resulting in the loss of millions of confidential documents. This alarming figure raises a lot of questions, one of which is whether companies are doing their level best to protect customer information and prevent it from falling into the wrong hands, and why they should do so. Here are some benefits and risks all companies need to be aware of, and that I think should be a motivator to tighten up your application security immediately. The Benefits: Safety and Security of Confidential Information The safety and security of sensitive information is a primary concern for many individuals. This is one of the major reasons why many are hesitant to share personal information online. To remove this negative stigma, many companies go to huge lengths to assure customers that their information is safe with them. The online retail business and credit card industry are prime examples of this. With the growing trend of online shopping , the Payment Card Industry (PCI) has enforced a set of guidelines and security measures to limit instances of credit card fraud and make the process of online transactions safe. This added security measure has helped the companies in this industry grow, but there is always that question of whether they doing enough. Sound Market Reputation In this day and age where companies are being affected by cyberattackers left and right, it is somewhat of a luxury to be safe from such occurrences. However, those who manage to do so have reaped the rewards in terms of the number of customers they serve , sales they make and reputation they have earned as a result of their best-in-industry practices. The Risks: Lawsuits Data breach, or any other form of loss of personal and confidential information, is a serious matter that could land a company in a lot of trouble . It could even require an organization to pay a huge sum of money as a settlement. Case in point: A major search engine company is currently battling a lawsuit in the wake of a data breach it suffered in 2014 , which compromised the accounts of nearly 500 million users. From lawyer fees to an uncertainty looming over the company’s health, this is definitely something every small or large business wants to avoid. Poor Brand Image What company wouldn’t love to be in the news? After all, it’s free publicity, increasing their brand awareness as well as enhancing their brand identity and popularity; that is if they are on the news for all the right reasons! Having your company’s name appear on news channels in a negative context will have a completely opposite impact — your brand identity diminishing, creating a negative perception of your company . This can have a severe impact on your business in the short as well as long term; it could also force your business to run aground if the situation is not dealt with and diffused properly! Do you know how well your company is protected from cyberattackers and breaches? Find out more about application security from someone who’s been there; check out our new 5 Lessons From an Application Security Pro eBook.
The Importance of Application Security: A Few of the Benefits and Risks
Mon Jan 23 19:17, 2017 GMT
According to a notice published by China's Ministry of Industry and Information Technology, the government has launched a 14-month campaign to crack down on 'unauthorized' Internet platforms. That includes censorship-busting VPN services, which will require government pre-approval to exist. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
China Bans Unauthorized VPN Services in Internet Crackdown
Mon Jan 23 19:30, 2017 GMT
The Hill (blog) How the Trump administration can promote a free global internet The Hill (blog) Internet controls, in China and elsewhere, put U.S. business at a disadvantage. Blocks on messaging apps disrupt the services of American companies, and censorship limits the access of American content producers and social media platforms to foreign ...
How the Trump administration can promote a free global internet - The Hill (blog)
Mon Jan 23 17:20, 2017 GMT
KHOBAR, Saudi Arabia (Reuters) - Saudi Arabia warned organizations in the kingdom on Monday to be on the alert for cyber attacks including a version of the destructive Shamoon virus, as a chemicals firm reported a network disruption and the labor ministry said it had been attacked.
Saudi Arabia warns over cyber attacks as labor ministry hit
Mon Jan 23 17:21, 2017 GMT
LONDON (Reuters) - Lloyds Banking Group is working with law enforcement agencies to trace who may be behind a cyber attack that caused intermittent outages for customers of its personal banking websites almost two weeks ago, according to a source familiar with the incident.
Lloyds a victim of cyber attack that hit banking services
Mon Jan 23 11:03, 2017 GMT
Variety China Increases Internet Controls, Hits VPNs as Web Population Grows Variety China already operates one of the strictest Internet security regimes through an army of civil servants and battery of technology, frequently characterized as the great firewall of China. China currently blocks Google, Facebook, Twitter and YouTube, as ... China cracks down on tools used to get around web filters The Daily Nonpareil China announces mass shutdown of VPNs that bypass Great Firewall Ars Technica China cracks down on VPNs in fresh campaign to 'clean up' devices used to evade internet censorship Hong Kong Free Press Reuters all 25 news articles »
China Increases Internet Controls, Hits VPNs as Web Population Grows - Variety
Mon Jan 23 12:56, 2017 GMT
A Bahraini court has postponed human rights activist Nabeel Rajab's trial date for an eighth time until 21 February The post Bahrain: Court postpones trial of Nabeel Rajab for a seventh time appeared first on Index on Censorship .
Bahrain: Court postpones trial of Nabeel Rajab for a seventh time
Mon Jan 23 11:57, 2017 GMT
Channel Pro Putting teeth into enforcing Internet of Things security , but for how long? Macworld So what can shift that balance, making consumer privacy and Internet security valuable to makers? Putting teeth into the consequences of failure to meet a basic bar. In some segments of the electronics industry, trade groups have this power through ... The Internet of Things Channel Pro Five technology trends to watch out for in 2017 Livemint all 24 news articles »
Putting teeth into enforcing Internet of Things security, but for how long? - Macworld
Mon Jan 23 12:43, 2017 GMT
Lloyds Bank was hit by a denial of service attack nearly two weeks ago that disrupted online access.
Lloyds cyber-attack details emerge
Mon Jan 23 11:55, 2017 GMT
China is cracking down on the hi-tech ways citizens avoid official scrutiny of what they do online.
China to crack down on censor-busting services
Mon Jan 23 10:34, 2017 GMT
HONG KONG (Reuters) - China is reinforcing its censorship of the internet with a campaign to crack down on unauthorized connections, including virtual private network (VPN) services, that allow users to bypass restrictions known as the Great Firewall.
China cracks down on unauthorized internet connections
Mon Jan 23 09:36, 2017 GMT
BRUSSELS (Reuters) - The European Union is considering testing banks' defenses against cyber attacks, EU officials and sources said, as concerns grow about the industry's vulnerability to hacking.
As attacks grow, EU mulls banking stress tests for cyber risks
Mon Jan 23 04:37, 2017 GMT
SHANGHAI (Reuters) - China's three largest bitcoin exchanges, whose activities have drawn increased scrutiny from the central bank, said they will begin charging trading fees effective Tuesday.
China's bitcoin exchanges, eyed by regulators, slap on trading fees
Sun Jan 22 07:00, 2017 GMT
The real secret of Chinese internet censorship ? Distraction The Guardian If you ever want to annoy western policymakers or politicians, then here is a surefire way to do it. Tell them that the only government in the world that really understands the internet is the Chinese communist regime. And if you want to add a killer ...
The real secret of Chinese internet censorship? Distraction - The Guardian
Sat Jan 21 21:35, 2017 GMT
A cyberattack leveled the indie film fest's ticketing systems for less than an hour.
Hackers hit Sundance film fest, shutting down box office - CNET
Sat Jan 21 17:45, 2017 GMT
Modern Diplomacy An uneven balance: Analysis of Internet Censorship in Zimbabwe, Zambia, and Swaziland Modern Diplomacy This does not mean that censorship is not happening at all inside of Zimbabwe, but only that from the specific vantage point from which we ran measurements on a set of specific URLs we could not find signs of internet censorship occurring. ... Through ...
An uneven balance: Analysis of Internet Censorship in Zimbabwe, Zambia, and Swaziland - Modern Diplomacy
Sat Jan 21 14:59, 2017 GMT
Threatpost Mozilla's First Internet Health Report Tackles Security , Privacy Threatpost Mozilla released the report this week as part of a broader goal to track the health of the internet in categories such as Open Innovation, Digital Inclusion, Decentralization, Privacy and Security and Web literacy. The 40-page report, according to ...
Mozilla's First Internet Health Report Tackles Security, Privacy - Threatpost
Fri Jan 20 22:09, 2017 GMT
Last year Netflix launched an aggressive campaign to prevent its users from bypassing geo-blockades through VPN services. The crackdown has met fierce resistance around the world but is still in effect. Today we review the current state of affairs with some prominent VPN providers, many of whom voice concerns about the ongoing blocking efforts. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Netflix VPN Crackdown, A Year of Frustrations
Fri Jan 20 21:15, 2017 GMT
Today we bring you the next episode of the Steal This Show podcast, discussing renegade media and the latest file-sharing and copyright news. In this episode, we talk to Jeremy Kauffman, founder and CEO of the blockchain-based, P2P content platform LBRY. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Steal This Show S02E09: The Information Apocalypse
Fri Jan 20 15:39, 2017 GMT
A few hours ago Kim Dotcom was gearing up to make an important announcement about a new version of the defunct Megaupload service. However, with minutes left to go, the Megaupload 2.0 plans hit an "expected" roadblock, which means that the wait continues. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Megaupload 2.0 News Delayed By ‘Expected’ Roadblock
Fri Jan 20 13:30, 2017 GMT
MongoDB Hacks Spreading Fast In the past few weeks, researchers have been monitoring the steady rise of hacked MongoDB installations, now surpassing over 28,000 individual systems. While the attacks started with ransoming back... read more The post Cyber News Rundown: Edition 1/19/17 appeared first on Webroot Threat Blog .
Cyber News Rundown: Edition 1/19/17
Fri Jan 20 12:20, 2017 GMT
The Hill (blog) FCC selections matter for keeping the Open Internet The Hill (blog) We should support steps that help keep the Internet “open,” and we applaud rules that protect individual privacy . Democratic FCC Chairman Tom Wheeler made a pathway to protect the Open Internet , but it's far from perfect. Let me be clear though ... and more »
FCC selections matter for keeping the Open Internet - The Hill (blog)
Fri Jan 20 10:14, 2017 GMT
The trend towards ramping up the regulation of the media has worrying implications. The post Dunja Mijatović: Resisting the urge to over regulate the media appeared first on Index on Censorship .
Dunja Mijatović: Resisting the urge to over regulate the media
Fri Jan 20 09:07, 2017 GMT
The censoring of an artwork because of its viewpoint is a deeply disturbing and divisive act in an already polarized nation The post Groups condemn removal of police protest painting from US Capitol appeared first on Index on Censorship .
Groups condemn removal of police protest painting from US Capitol
Thu Jan 19 16:21, 2017 GMT
The post #FashionRules: Fashion is a crucial element of free expression appeared first on Index on Censorship .
#FashionRules: Fashion is a crucial element of free expression
Thu Jan 19 13:31, 2017 GMT
A coalition of more than 70 civil rights groups urges Facebook to be clearer about content it removes.
Facebook urged to be more transparent over 'censorship'
Thu Jan 19 11:06, 2017 GMT
Police recorded an 8% rise in all offences in England and Wales as a survey shows figures in cybercrime and fraud.
New figures reveal scale of cybercrime
Thu Jan 19 01:30, 2017 GMT
In an open letter, almost 80 advocacy groups say the social network needs to be more transparent about its censorship decisions.
ACLU accuses Facebook of racial bias in hate speech takedowns - CNET
Wed Jan 18 17:48, 2017 GMT
On September 22, 2016, this site was forced offline for nearly four days after it was hit with “Mirai,” a malware strain that enslaves poorly secured Internet of Things (IoT) devices like wireless routers and security cameras into a botnet for use in large cyberattacks. Roughly a week after that assault, the individual(s) who launched that attack -- using the name “Anna Senpai” -- released the source code for Mirai, spawning dozens of copycat attack armies online. After months of digging, KrebsOnSecurity is now confident to have uncovered Anna Senpai’s real-life identity, and the identity of at least one co-conspirator who helped to write and modify the malware.
Who is Anna-Senpai, the Mirai Worm Author?
Wed Jan 18 18:33, 2017 GMT
WASHINGTON (Reuters) - Nearly 80 rights groups on Wednesday accused Facebook of "racially biased censorship" and failing to be more transparent about its removal policies and cooperation with law enforcement, adding to criticism the company has faced in recent months over its management of content on its network of 1.8 billion users.
Facebook dismissive of censorship, abuse concerns, rights groups allege
Wed Jan 18 12:53, 2017 GMT
Daily Mail Fraudster calls one of Britain's leading internet experts Daily Mail This is the toe-curling moment two fraudsters tried - and failed - to rip off one of Britain's top internet security experts. Matt Horan turned the tables on the cold callers, who appear to work for one of several Asian call centres set up to pester ...
Fraudster calls one of Britain's leading internet experts - Daily Mail
Wed Jan 18 12:00, 2017 GMT
A site that chronicles animals versus the power grid makes a good point about cyberwar hype, but an attack would still be serious business. The post Squirrels Keep Menacing the Power Grid. But at Least It's Not the Russians appeared first on WIRED .
Squirrels Keep Menacing the Power Grid. But at Least It’s Not the Russians
Wed Jan 18 13:10, 2017 GMT
Imprisoned journalists make headlines, but the Turkish government has a more insidious method for controlling the media The post Turkey: Pro-government newspapers rewarded with state-sponsored advertising appeared first on Index on Censorship .
Turkey: Pro-government newspapers rewarded with state-sponsored advertising
Wed Jan 18 11:22, 2017 GMT
KIEV/MILAN (Reuters) - A power blackout in Ukraine's capital Kiev last month was caused by a cyber attack and investigators are trying to trace other potentially infected computers and establish the source of the breach, utility Ukrenergo told Reuters on Wednesday.
Ukraine's power outage was a cyber attack: Ukrenergo
Tue Jan 17 22:51, 2017 GMT
NEW YORK (Reuters) - A Florida man pleaded guilty on Tuesday to charges stemming from his employment with an unlicensed bitcoin exchange that prosecutors say was owned by an Israeli who oversaw a massive scheme to hack companies including JPMorgan Chase & Co.
Bitcoin exchange employee pleads guilty in U.S. case tied to hacking
Tue Jan 17 12:57, 2017 GMT
It's squirrels, not cyber-attacks, that pose the real threat to critical infrastructure systems, says one security expert.
Squirrel 'threat' to critical infrastructure
Mon Jan 16 10:33, 2017 GMT
The post Mapping Media Freedom: Five incidents to watch appeared first on Index on Censorship .
Mapping Media Freedom: Five incidents to watch
Sun Jan 15 13:53, 2017 GMT
MOSCOW (Reuters) - Russia is facing increased cyber attacks from abroad, a senior security official was quoted on Sunday as saying, responding to Western accusations that Moscow is aggressively targeting information networks in the United States and Europe.
Russia says facing increased cyber attacks from abroad
Sun Jan 15 10:40, 2017 GMT
During the next few weeks, ISPs in the UK will begin sending out warnings to subscribers who use BitTorrent to share pirated content. It's a curious situation. Since every major torrent site and hundreds of others are already blocked by those very same ISPs, few people should even have access to torrents. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Piracy Notices? There Shouldn’t Be Many UK Torrent Users Left to Warn
Sat Jan 14 01:16, 2017 GMT
HRW Slams Internet Censorship Laws in Southeast Asia Latin American Herald Tribune Saying governments in the region perceive the internet as a threat, he added that several new cyber-crime laws are directed at keeping people compliant so that governing elites can continue to reap the social and economic benefits of the status quo.
HRW Slams Internet Censorship Laws in Southeast Asia - Latin American Herald Tribune
Fri Jan 13 20:31, 2017 GMT
A Guardian report says WhatsApp and its parent Facebook could intercept user messages. Security experts aren't sure it's really a problem.
WhatsApp again dogged by privacy questions, but there's a fix - CNET
Fri Jan 13 03:21, 2017 GMT
KGO-TV Internet security expert suggests lying when asked for personal information online KGO-TV If you sign up online for a membership, email address, or nearly anything you'll be asked for personal information, but one security expert has some advice for those situations - lie. Privacy Expert Adam Levin says that to stay secure in the digital ...
Internet security expert suggests lying when asked for personal information online - KGO-TV
Fri Jan 13 20:09, 2017 GMT
A Guardian report says WhatsApp and its parent Facebook could intercept user messages. Security experts aren't sure it's really a problem.
Privacy questions dog WhatsApp again, but latest issue has a fix - CNET
Fri Jan 13 18:38, 2017 GMT
The Guardian view on internet privacy : technology can't fix it The Guardian In fact, the preservation of personal privacy and collective security online is a political and social task as much as it is one for the very few experts who understand the ramifications of mathematical magics like public key cryptography ...
The Guardian view on internet privacy: technology can't fix it - The Guardian
Fri Jan 13 11:38, 2017 GMT
Information about the customers of Cellebrite, an Israeli firm that markets hacking tools, is stolen in a cyber-attack.
Phone-cracking firm Cellebrite hacked
Fri Jan 13 09:22, 2017 GMT
The MPA recently filed a complaint in Norway seeking to expand a blockade of The Pirate Bay, ExtraTorrent and several other sites that was put in place during 2015. The Hollywood group aimed to add seven new ISPs and several additional sites to the country's blocklist. It has now achieved its goals but critics say that holding ISPs responsible for copyright infringement is unfair. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Hollywood Lawsuit Expands Pirate Bay & ExtraTorrent Web Blockade
Thu Jan 12 16:04, 2017 GMT
BERLIN (Reuters) - Nations in Europe, where Germany and France this year hold elections, are erecting defenses to counter possible Russian cyber attacks and disinformation to sway Western politics, but intelligence experts say this might be too little and too late.
Europe erects defenses to counter Russia's information war
Thu Jan 12 14:55, 2017 GMT
Global human rights organisations strongly condemn the abduction and torture of Azerbaijani journalist Mehman Huseynov The post Rights groups demand justice for journalist Mehman Huseynov tortured in Azerbaijan appeared first on Index on Censorship .
Rights groups demand justice for journalist Mehman Huseynov tortured in Azerbaijan
Thu Jan 12 13:58, 2017 GMT
RTI Presents "The Inside Story: Leveraging the IIC's Industrial Internet Security Framework" Complimentary Webinar Intelligent Aerospace The new framework focuses on safety, reliability, resilience, security and privacy , and is designed to help IT and OT professionals, system architects and industrial engineers define risks, assessments and threats to proactively mitigate security ... and more »
RTI Presents "The Inside Story: Leveraging the IIC's Industrial Internet Security Framework" Complimentary Webinar - Intelligent Aerospace
Thu Jan 12 13:25, 2017 GMT
LONDON (Reuters) - Shipping companies grappling with the threat of cyber attacks on vessels are finding insurance policies often fall short, officials involved in both industries say, a risk that could feed through into global prices.
Insurance gaps leave shipping exposed to growing cyber threats
Thu Jan 12 09:10, 2017 GMT
The co-chief of movie studio Village Roadshow is warning of a new wave of site blocking efforts in Australia. Graham Burke says he has a long list of sites to block when the court resumes in February. Worryingly, he has also renewed his promise to sue pirate site users. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Movie Studios Prepare New “Big Time” Wave of Aussie Site Blocks
Thu Jan 12 03:22, 2017 GMT
The Inquisitr Bella Thorne: 'Nearly Nude' Snaps, Internet Privacy , & Ex-Boyfriends The Inquisitr Bella Thorne is calling out the paparazzi for their near-harassment levels of photo coverage, and she's talking about beating the paps at their own game with her use of social media outlets like Snapchat and Instagram. Do you follow Thorne's posts online? and more »
Bella Thorne: 'Nearly Nude' Snaps, Internet Privacy, & Ex-Boyfriends - The Inquisitr
Wed Jan 11 15:27, 2017 GMT
Christian Science Monitor Will this EU privacy proposal lead to a more trustworthy internet or a more annoying one? Christian Science Monitor The European Commission, the executive arm of the 28-nation bloc, submitted the proposed legislation on Tuesday, dubbing it the Regulation on Privacy and Electronic Communications. The European Parliament and member states must approve it before it ... European Commission's telco privacy laws may soon also cover internet firms Digital Trends Telecoms firms and internet services like WhatsApp face tougher new privacy rules EurActiv Commission proposes high level of privacy rules for all electronic communications EU News The Guardian  - EU News all 75 news articles »
Will this EU privacy proposal lead to a more trustworthy internet or a more annoying one? - Christian Science Monitor
Wed Jan 11 12:08, 2017 GMT
I am a Turkish activist, a human rights defender, a dissident, and currently I feel like a lab rat trapped in a maze, trying to find an exit to freedom. The post Turkey: “The worst time is when the ruler and the evil of the people are united” appeared first on Index on Censorship .
Turkey: “The worst time is when the ruler and the evil of the people are united”
Wed Jan 11 12:04, 2017 GMT
A power cut that hit part of Kiev is judged a cyber-attack by researchers investigating the incident.
Ukraine power cut 'was cyber-attack'
Wed Jan 11 06:58, 2017 GMT
Sputnik International See No Evil: Italy's Leaders to Use Internet Censorship as 'Trojan Horse' Sputnik International The Italian government recently called for the introduction of Internet censorship in their country as political elites struggle to accept last year's historic events, including Brexit and the failure of the Italian referendum, according to independent ...
See No Evil: Italy's Leaders to Use Internet Censorship as 'Trojan Horse' - Sputnik International
Tue Jan 10 23:03, 2017 GMT
Christian Science Monitor Will an EU privacy proposal lead to a more trustworthy or annoying internet ? Christian Science Monitor The European Commission, the executive arm of the 28-nation bloc, submitted the proposed legislation on Tuesday, dubbing it the Regulation on Privacy and Electronic Communications. The European Parliament and member states must approve it before it ... European Commission's telco privacy laws may soon also cover internet firms Digital Trends Telecoms firms and internet services like WhatsApp face tougher new privacy rules EurActiv EU privacy proposal could dent Facebook, Gmail ad revenue Reuters EU News  - The Guardian  - Novinite.com all 54 news articles »
Will an EU privacy proposal lead to a more trustworthy or annoying internet? - Christian Science Monitor
Tue Jan 10 19:22, 2017 GMT
The government agency releases 100 pages of documents on how it broke into the smartphone, but censors the most important information.
FBI docs tell how it hacked San Bernardino shooter's iPhone, kind of - CNET
Tue Jan 10 18:06, 2017 GMT
Tens of thousands of personal and possibly proprietary databases that were left accessible to the public online have just been wiped from the Internet, replaced with ransom notes demanding payment for the return of the files. Adding insult to injury, it appears that virtually none of the victims who have paid the ransom have gotten their files back because multiple fraudsters are now wise to the extortion attempts and are competing to replace each other's ransom notes.
Extortionists Wipe Thousands of Databases, Victims Who Pay Up Get Stiffed
Tue Jan 10 12:29, 2017 GMT
Surely David Cameron will be remembered as one of the most ham-fisted prime ministers in British history. For party political (ie, personal) reasons he staged the European Union referendum. After making a hash of the remain campaign, he watched more than half the population defy him by opting for Brexit. Then, with the nation divided, […] The post Section 40 – David Cameron’s ticking time-bomb under the press (The Guardian) appeared first on Index on Censorship .
Section 40 – David Cameron’s ticking time-bomb under the press (The Guardian)
Tue Jan 10 11:45, 2017 GMT
Could you be landed with a crippling bill for telling the truth? It’s hard to believe it could happen in a free country but there’s a serious risk that it could happen here. Read the full article The post Time running out to help stop new law on the media (News & Star) appeared first on Index on Censorship .
Time running out to help stop new law on the media (News & Star)
Tue Jan 10 10:21, 2017 GMT
The press industry in Britain is under threat like never before. The future of journalism in the UK could be effectively killed off if controversial legislation is enacted. Read the full article The post The stories which would NOT have been told under controversial new press law (Birmingham Mail) appeared first on Index on Censorship .
The stories which would NOT have been told under controversial new press law (Birmingham Mail)
Mon Jan 9 23:59, 2017 GMT
A proposed piece of legislation threatens to bring press freedom to a halt – and news organisations are right to take a stand in defence of true democracy, Tim Crook says. Read the full article The post Why Fleet Street is right to fight Government-backed regulation of the press (Independent) appeared first on Index on Censorship .
Why Fleet Street is right to fight Government-backed regulation of the press (Independent)
Mon Jan 9 18:13, 2017 GMT
Anti-censorship groups have warned new press gagging laws will be a “gift to the corrupt”. Read the full article The post Press gagging laws will be a ‘gift to the corrupt’ as deadline looms (Mirror) appeared first on Index on Censorship .
Press gagging laws will be a ‘gift to the corrupt’ as deadline looms (Mirror)
Mon Jan 9 14:47, 2017 GMT
Several major literature and anti-censorship organizations have signed a statement defending publisher Simon and Schuster’s “right to publish” MILO’s upcoming book Dangerous, which has seen many others threaten to boycott the company. Read the full article The post Free Speech Groups, Literature Associations, English Teachers Declare Support for MILO Book Publisher (Breitbart News) appeared first on Index on Censorship .
Free Speech Groups, Literature Associations, English Teachers Declare Support for MILO Book Publisher (Breitbart News)
Tue Jan 10 14:02, 2017 GMT
The post Index on Censorship magazine: Talking fashion and freedom appeared first on Index on Censorship .
Index on Censorship magazine: Talking fashion and freedom
Tue Jan 10 08:42, 2017 GMT
HONG KONG (Reuters) - Nintendo's hit smartphone app, Pokemon Go, and other augmented reality games are unlikely to be rolled out in China any time soon, after the state censor said it would not license them until potential security risks had been evaluated.
China not to license Pokemon Go, similar games as it weighs security risks
Sat Jan 7 13:20, 2017 GMT
Q&A: FTC's Edith Ramirez on internet security, agency under Trump - Chicago Daily Herald. FTC Charges D-Link Put Consumers' Privacy at Risk Due to the Inadequate Security of Its Computer Routers and ...
Q&A: FTC's Edith Ramirez on internet security, agency under Trump - Chicago Daily Herald
Sun Jan 8 12:03, 2017 GMT
France warns hackers are attacking its defence systems and this year's election could be a target.
France thwarts 24,000 cyber-attacks against defence targets
Mon Jan 9 14:24, 2017 GMT
Rolling Back Obama's Internet Privacy Rules Independent Women's Forum (blog) American consumers and internet providers may get some relief from cumbersome online privacy -related opt-ins and red tape passed last fall by the Obama Administration. An association of internet providers has filed a petition to have onerous and ... and more »
Rolling Back Obama's Internet Privacy Rules - Independent Women's Forum (blog)
Mon Jan 9 11:31, 2017 GMT
LONDON (Reuters) - The British government said on Monday it is launching a national inquiry into cyber security to assess the extent to which the UK is protected from an ever-increasing tide of attacks worldwide.
After U.S. intel report on Putin, British government launches cyber security review
Mon Jan 9 12:06, 2017 GMT
Local newspapers have an extremely important role in shining a light on corruption, danger and crime in their communities. The post Section 40: Local newspapers respond to “dangerous lunacy” appeared first on Index on Censorship .
Section 40: Local newspapers respond to “dangerous lunacy”
Mon Jan 9 09:33, 2017 GMT
The post Portugal: Low wages and job insecurity threaten media freedom appeared first on Index on Censorship .
Portugal: Low wages and job insecurity threaten media freedom
Sun Jan 8 16:19, 2017 GMT
Russian President Vladimir Putin directed a massive propaganda and cyber attack operation aimed at discrediting Hillary Clinton and getting Donald Trump elected, the top U.S. intelligence agencies said in a remarkable yet unshocking report released on Friday.
DNI: Putin Led Cyber, Propaganda Effort to Elect Trump, Denigrate Clinton
Sun Jan 8 15:10, 2017 GMT
(Reuters) - President-elect Donald Trump accepts the U.S. intelligence community's conclusion that Russia engaged in cyberattacks aimed at disrupting the U.S. elections, his incoming chief of staff Reince Priebus said on Sunday, adding that "actions may be taken" in response.
Trump accepts U.S. intelligence on Russia hacking: chief of staff
Sat Jan 7 17:10, 2017 GMT
High Speed Internet Security And Safety ISBuzz News While the primary drivers for updating the HTTP protocol were improved performance and support for richer web applications, the inclusion of default security requirements promises a great benefit to the privacy and integrity of Internet traffic. Among ...
High Speed Internet Security And Safety - ISBuzz News
Sat Jan 7 13:50, 2017 GMT
Ask any pirate if site-blocking works and the answer will probably be a resounding "no." Ask them if ISP warnings or DMCA notices have much of an effect and it's likely they'll give the same answer. However, a range of weak measures has a cumulative effect and the ability to make piracy frustrating. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
A Bunch of Weak Anti-Piracy Measures Are Still a Pest to Pirates
Sat Jan 7 13:26, 2017 GMT
Cable companies pushing to repeal internet privacy rules - Chicago Daily Herald. WASHINGTON -- Some of America's biggest cable companies are asking the government to roll back a landmark set of privacy regulations it approved last fall -- kicking off an effort by the industry and its allies to dismantle key internet policies of the ...
Cable companies pushing to repeal internet privacy rules - Chicago Daily Herald
Fri Jan 6 10:03, 2017 GMT
The malware asks for 222 Bitcoin but will not honor promises to decrypt files after payment is made.
$247,000 KillDisk ransomware demands a fortune, forgets to unlock files
Fri Jan 6 19:54, 2017 GMT
WASHINGTON (Reuters) - President-elect Donald Trump said he had a "constructive" meeting with members of U.S. intelligence agencies on Friday and plans to appoint a team to give him a plan to combat cyber attacks within 90 days of taking office on Jan. 20.
Trump to order anti-hacking plan within 90 days of taking office: statement
Fri Jan 6 19:15, 2017 GMT
An Energy Department report seeks new powers to deal with attacks and other emergencies.
​US warns of 'imminent' cyberattack threat on electrical grid - CNET
Fri Jan 6 15:15, 2017 GMT
NEW YORK (Reuters) - Donald Trump's top aides said he would have an open mind on Friday when he is briefed on what U.S. intelligence agencies have concluded were Russian cyber attacks during the 2016 election campaign, despite rising tensions between the president-elect and the nation's spy agencies.
Trump's aides say president-elect open to Russian hack info
Fri Jan 6 13:20, 2017 GMT
The post Azerbaijan: Regime targets musician through his family appeared first on Index on Censorship .
Azerbaijan: Regime targets musician through his family
Fri Jan 6 12:00, 2017 GMT
A new kind of hedge fund bets that bitcoin is way more valuable if you don't think about it mainly as money. The post Bitcoin Will Never Be a Currency—It's Something Way Weirder appeared first on WIRED .
Bitcoin Will Never Be a Currency—It’s Something Way Weirder
Fri Jan 6 12:00, 2017 GMT
The Hill (blog) Lawmakers must clarify privacy protections for the Internet of Things The Hill (blog) If a victim, or the subject of an investigation, has a Nest security camera, can police subpoena the video files from Google? If a house has a smart thermometer, can police subpoena the temperature data to determine whether a suspect is ... Amendments ... and more »
Lawmakers must clarify privacy protections for the Internet of Things - The Hill (blog)
Fri Jan 6 11:20, 2017 GMT
Section 40 does not protect “ordinary” individuals as its advocates claim. It protects the rich and powerful and is a gift to the corrupt and conniving to silence investigative journalists – particularly media outfits that don’t have very deep pockets. The post What is Section 40 of the Crime and Courts Act 2013? appeared first on Index on Censorship .
What is Section 40 of the Crime and Courts Act 2013?
Fri Jan 6 10:29, 2017 GMT
The post Threats to boycott publishers undermine intellectual freedom and harm readers and writers appeared first on Index on Censorship .
Threats to boycott publishers undermine intellectual freedom and harm readers and writers
Fri Jan 6 10:08, 2017 GMT
On 7 January 2015, two gunmen entered the offices of Charlie Hebdo and murdered 12 people, including most of the senior editorial staff. The attack was in reprisal for the satirical magazine's publishing cartoons of the prophet Mohammed. The post Charlie Hebdo: Two years on appeared first on Index on Censorship .
Charlie Hebdo: Two years on
Thu Jan 5 21:31, 2017 GMT
Under Trump, Lobbyists Are Poised To Dismantle Internet Privacy ... Vocativ In October, the Federal Communications Commission (FCC) passed rules that prevent large telecommunications companies from profiting from customers' ... and more »
Under Trump, Lobbyists Are Poised To Dismantle Internet Privacy ... - Vocativ
Thu Jan 5 21:35, 2017 GMT
New York Law Journal (registration) Conflicting Needs of International Bankruptcy Cases and Internet Privacy New York Law Journal (registration) You have the right to not send that email, but if you do, anything you say can be used against you in a court of law. Business professionals do not need a Miranda warning to understand that their email correspondences can be subject to the discovery ... and more »
Conflicting Needs of International Bankruptcy Cases and Internet Privacy - New York Law Journal (registration)
Thu Jan 5 15:40, 2017 GMT
Campus Safety Magazine Internet Security and Privacy Advice for 2017 Campus Safety Magazine This is particularly dangerous for privacy , since lesser security features means easier backdoor access. When one device is compromised, the hacker can easily overtake the whole system of interconnected devices. Smart devices shipped out in 2017 may ... and more »
Internet Security and Privacy Advice for 2017 - Campus Safety Magazine
Thu Jan 5 11:54, 2017 GMT
CNBC Security concerns are rising in the age of the internet of things CNBC The internet of things, where ordinary physical objects become connected to the internet , will have a big impact on our home lives, but all of these connected devices could become a target for hackers and cybercriminals. Cybercrime is a huge problem ... and more »
Security concerns are rising in the age of the internet of things - CNBC
Thu Jan 5 13:03, 2017 GMT
UK schools are the latest victims of ransomware, according to the UK's national cybercrime centre.
UK schools targeted by web fraudsters
Thu Jan 5 08:50, 2017 GMT
Index award-winning human rights activist Nabeel Rajab’s pre-trial detention was renewed for a further 15 days by Bahrain's Public Prosecution on 5 January according to Nabeel’s lawyer. The post Bahrain renews detention of human rights activist Nabeel Rajab appeared first on Index on Censorship .
Bahrain renews detention of human rights activist Nabeel Rajab
Thu Jan 5 00:01, 2017 GMT
PYMNTS.com Internet Privacy Rules At Risk Amid Politics? PYMNTS.com In a world where corporate regulations are being targeted across most industries by the newly installed Republican Congress and the incoming new administration in the White House, the rumble may become a roar for Internet privacy regulations. ... of ... It's begun: Internet providers are pushing to repeal Obama-era privacy rules Washington Post Ad Groups Petition Consumer Internet Privacy Rules, Call Opt-In ... MediaPost Communications all 16 news articles »
Internet Privacy Rules At Risk Amid Politics? - PYMNTS.com
Wed Jan 4 19:40, 2017 GMT
The pope and Internet security : Putting tape over the camera Standard-Examiner To that group of privacy -conscious Internet users we can now add the pope, who has proven his social media chops but evidently has a knack for online security , as well. A photo spread Tuesday by Collin Anderson, a hacking researcher, showed Pope ... and more »
The pope and Internet security: Putting tape over the camera - Standard-Examiner
Wed Jan 4 18:33, 2017 GMT
Washington Post Why a years-old photo of the pope is suddenly making the rounds again Washington Post To that group of privacy -conscious Internet users we can now add the pope, who has proven his social media chops but evidently has a knack for online security , as well. A photo spread Tuesday by Collin Anderson, a hacking researcher, showed Pope ... and more »
Why a years-old photo of the pope is suddenly making the rounds again - Washington Post
Wed Jan 4 18:01, 2017 GMT
STLtoday.com Cable companies are pushing to repeal Obama-era Internet privacy rules STLtoday.com WASHINGTON • Some of America's biggest cable companies are asking the government to roll back a landmark set of privacy regulations it approved last fall — kicking off an effort by the industry and its allies to dismantle key Internet policies of the ... Ad Groups Petition Consumer Internet Privacy Rules, Call Opt-In Requirement 'Onerous' MediaPost Communications all 9 news articles »
Cable companies are pushing to repeal Obama-era Internet privacy rules - STLtoday.com
Wed Jan 4 17:56, 2017 GMT
One of the biggest cybersecurity stories of 2016 was the surge in online attacks caused by poorly-secured "Internet of Things" (IoT) devices such as Internet routers, security cameras, digital video recorders (DVRs) and smart appliances. Many readers here have commented with ideas about how to counter vulnerabilities caused by out-of-date software in IoT devices, so why not pitch your idea for money? Who knows, you could win up to $25,000 in a new contest put on by the U.S. Federal Trade Commission (FTC).
The FTC’s Internet of Things (IoT) Challenge
Wed Jan 4 16:37, 2017 GMT
Washington Post It's begun: Cable companies are pushing to repeal Obama-era Internet privacy rules Washington Post Some of America's biggest cable companies are asking the government to roll back a landmark set of privacy regulations it approved last fall — kicking off an effort by the industry and its allies to dismantle key Internet policies of the Obama years ... Ad Groups Petition Consumer Internet Privacy Rules, Call Opt-In Requirement 'Onerous' MediaPost Communications Telecom Lobbyists Trying To Overturn New Privacy Rules, Eventually Gut Net Neutrality Consumerist all 9 news articles »
It's begun: Cable companies are pushing to repeal Obama-era Internet privacy rules - Washington Post
Wed Jan 4 01:35, 2017 GMT
Over the past few weeks, I've been inundated with questions from readers asking why I haven't written much about two stories that have consumed the news media of late: The alleged Russian hacking attacks against the Democratic National Committee (DNC) and, more recently, the discovery of malware on a laptop at a Vermont power utility that has been attributed to Russian hacker groups. I've avoided covering these stories mainly because I don't have any original reporting to add to them, and because I generally avoid chasing the story of the day -- preferring instead to focus on producing original journalism on cybercrime and computer security.
The Download on the DNC Hack
Wed Jan 4 01:47, 2017 GMT
MediaPost Communications Ad Groups Petition Consumer Internet Privacy Rules, Call Opt-In Requirement 'Onerous' MediaPost Communications The major U.S. ad trade associations Tuesday evening jointly submitted a petition for to the Federal Communications Commission to reconsider its order mandating opt-in privacy requirements by Internet service providers. The petition, which was ... and more »
Ad Groups Petition Consumer Internet Privacy Rules, Call Opt-In Requirement 'Onerous' - MediaPost Communications
Tue Jan 3 21:04, 2017 GMT
A new cybersecurity regulatory regime will go into effect this year in New York – the world’s financial capital and home to many banking, insurance and financial services organizations. The new cybersecurity regulation, known as 23 NYCRR 500 , has grabbed the attention of impacted companies doing business in New York, and others who might be anticipating cybersecurity requirements in other jurisdictions and industries. New York Governor Andrew Cuomo announced the new "first-in-the-nation"  cybersecurity regulation in September 2016, saying it is necessary to "guarantee the financial services industry upholds its obligation to protect consumers and ensure that its systems are sufficiently constructed to prevent cyber-attacks to the fullest extent possible."  You may be wondering what the regulation says and how to comply. We put together this brief FAQ to help you understand whether and how this regulation affects your organization, what the regulation covers from a security standpoint, and what protections you should consider to meet compliance requirements. Although this doesn’t constitute legal advice, we hope this FAQ helps you begin the process of planning your next steps for compliance. What is 23 NYCRR 500? The new cybersecurity regulation issued by the New York State Department of Financial Services (DFS) is officially known as Part 500 of Title 23 of the Official Compilation of Codes, Rules and Regulations of the State of New York, or 23 NYCRR 500 for short. Who is covered? The DFS is the regulatory body that oversees financial services companies licensed by or operating in New York State . Organizations covered by the new cybersecurity regulation include banks and trust companies, insurance companies, mortgage lenders, investment companies, brokers and other financial services providers. There are some exemptions for some smaller organizations. When does it go into effect? The regulation took effect as of January 1, 2017. There is a 180-day grace period for companies to comply, therefore, covered entities must be in compliance by June 30, 2017. A further requirement to provide a Certification of Compliance to the DFS commences on January 15, 2018. What does the regulation require? The regulation includes a comprehensive list of requirements for protecting information systems from cybersecurity threats and unauthorized access of “non-public information.” Below is a partial list of some of the main requirements. Covered entities must: Implement a cybersecurity program with written policies and an audit trail Employ a Chief Information Officer and dedicated cybersecurity personnel Identify cyber risks and conduct penetration testing at least annually and vulnerability assessment at least quarterly Secure applications by ensuring the use of secure development practices for in-house developed applications, and implement procedures for assessing and testing the security of all externally developed applications Assess risk to non-public information and information systems accessible or held by third parties, and conduct third-party security assessments at least annually Provide and require all personnel attend regular cybersecurity awareness training Implement controls, including encryption, to protect non-public data in transit and at rest Establish an incident response plan, including notification of regulatory agencies How might you meet compliance? Strategic organizations understand that they cannot treat compliance as an end in itself, but as the outcome of an ongoing process. The Veracode Application Security Platform provides a variety of methods to assess application security, compliance and development team reporting, and secure development training. Veracode helps deliver continuous compliance by: Providing application security testing that integrates into your software development lifecycle Conducting regular discovery scans of the web applications in your domain, including temporary marketing sites, international domains and sites obtained via M&A Continuously monitoring your production web applications for vulnerabilities Providing virtual patching for your web application firewalls based on the security intelligence from your application assessments Below are some possible security solutions you should consider when assessing your risk and compliance requirements. Veracode's Application Security Platform can provide a secure audit trail of your compliance processes, including critical information such as application security scores; listings of all discovered flaws; and flaw status information (new, open, fixed, or re-opened). Summary data is also included for third-party assessments, including scores and top risk categories Veracode Static Analysis can ensure that your applications are not vulnerable to attack through exploits such as SQL injection and Cross-Site Scripting, preventing potential data loss, brand damage, and ransomware infections Veracode Static Analysis can help meet the requirement to protect non-public information by assessing your applications’ cryptographic code for known vulnerabilities and ensuring encryption is implemented correctly Veracode Vendor Application Security Testing provides security testing of outsourced and vendor code without compromising vendor intellectual property Veracode Manual Penetration Testing complements Veracode's automated scanning technologies with best-in-class penetration testing services You should check with your compliance and legal departments for complete information on how you may be required to comply.
FAQs About the New York DFS Cybersecurity Regulation
Tue Jan 3 19:21, 2017 GMT
Tackle Internet censorship directly — not through antitrust law The Hill (blog) Sewlyn Duke's recent op-ed for The Hill, “Antitrust should be used to break up partisan tech giants like Facebook, Google,” addresses the serious problem of how a few privately owned internet companies have unprecedented control over the distribution ...
Tackle Internet censorship directly — not through antitrust law - The Hill (blog)
Mon Jan 2 22:55, 2017 GMT
Commentary: It's acceptable for the city of Bologna, but Facebook apparently thinks it's rude.
Facebook censors nude Neptune statue, writer says - CNET
Mon Jan 2 11:07, 2017 GMT
Stuff Tech Resolutions #5: why I'm finally getting smart about internet privacy Stuff Despite being quite tech-savvy, I've still been winging it with these basics. I'm lazy, like many. But I've also realised waiting for something to go wrong is like waiting to be robbed before you buy home contents insurance. Internet privacy and ...
Tech Resolutions #5: why I'm finally getting smart about internet privacy - Stuff
Sat Dec 31 14:02, 2016 GMT
Digital Trends 2016 was the year internet security died – so what can you do about it? Digital Trends A single phishing email compromised a major presidential campaign, and one of the United States' two main political parties suffered a security intrusion that compromised hundreds of thousands of emails. Many of the world's largest ... Our privacy was ...
2016 was the year internet security died – so what can you do about it? - Digital Trends
Thu Dec 29 12:00, 2016 GMT
In a previous blog post , we explored how software is “eating the world,” and how applications have gone from a nice-to-have to a critical part of running a business. As enterprises are forced to develop and buy more and more software – and at a lightning pace in order to keep up with the competition – what are the security implications? Cyberattackers are increasingly targeting the application layer to breach organizations and gain access to sensitive, confidential — and lucrative – data. At the same time, organizations can’t stop using software, or develop it more slowly. What does this mean for security? Security Implications of the Increase in Number of Apps The proliferating number of applications, combined with the decentralized way applications are now developed and purchased, mean it’s increasingly difficult to get a handle on your application landscape . For example, digital marketing has become one of the most important ways that companies interact with their target market and customers. Marketing departments are often spinning up new web pages and incorporating new technologies, and not communicating with IT security. Bottom line: It’s hard to secure what you don’t know about. The nature of this new application landscape means visibility comes before security. When we work with customers on this problem, we typically find that they have 30 percent to 40 percent more websites than they originally report having. The solution? Look for application security solutions that can accurately inventory your entire web perimeter . Security Implications of the Need for Speed You don’t just need to develop apps to keep up with the competition in today’s digital world – you need to develop them fast . This emphasis on speed means that developing apps from scratch is nearly impossible, and developers are increasingly relying on third-party applications and components to meet deadlines. A recent IDG study found that among enterprise applications, 28 percent are typically developed externally, 34 percent are procured from software vendors and 38 percent are developed internally (source: IDG Study, “Majority of Internally Developed Apps not Assessed for Critical Security Vulnerabilities,” June 2014). The problem is that it’s hard to keep track of these third-party additions and their security status. But you can keep up with the competition without sacrificing security. Consider application security solutions that: Inventory and report on the security of open-source components Help you assess applications sourced from independent software suppliers with a program for managing third-party software risk Security Implications of Apps Connecting to Your Most Sensitive Data As applications increasingly play a pivotal role in interacting with customers, prospects and partners and making business decisions, they are also increasingly standing in front of your most critical data. Gartner describes applications and application security with the analogy of a crown jewel in a treasure chest: the sensitive information is the crown jewel, and the applications are the treasure chest . And when apps are the treasure chest: Cyberattackers take notice: The bad guys know that your network layer is most likely secure, that your app layer is not, and that your apps are the key to some highly valuable data . Regulators take notice: Numerous regulations now require controls regarding application security , including PCI, NIST, HIPAA and MAS. Customers take notice: Your customers will increasingly ask questions about your application security practices . Expect to not only be asked about security, but to provide proof of your efforts. The security implication here? Neglecting application security is risky business – you risk losing customers, paying regulatory fines and suffering a damaging breach. There’s a lot riding on your app layer, and application security needs to be a part of your security mix. A New Digital Landscape Requires a Security Pivot Security “business as usual” won’t cut it in this new digital world. You need to pivot your strategy to focus where the risk is – and that is increasingly at the app layer. For more, get Gartner’s take on the security implications of a digital world in their new report, Managing Risk and Security at the Speed of Digital Business .
Applications Have a New Role in Today’s Digital World: What Are the Security Implications?
Wed Dec 28 12:00, 2016 GMT
It seems so tempting. Solve your application security problem by throwing an appliance at it. After all, if web applications are the most common form of attack, why not just protect them the same way you protect your network and email servers, and be done with it? Why should you spend time hunting down vulnerabilities in your code and figuring out how to fix them? The “appliance throwing” approach would be viable if WAFs were perfect, but protecting your app layer with only a WAF leaves a lot of holes. WAFs, at their heart, are black-box protection technologies that rely on inspecting incoming traffic for known attack patterns – and that’s often not enough. There are circumstances where WAFs will leave you vulnerable to attack, for instance: Missed attack due to new patterns A WAF tries to use known attack patterns to protect an application. It can be tuned via writing rules, but attackers are coming up with new patterns all the time. In fact, creating WAF bypasses is something of a cottage industry for security researchers, to the point that you can download a cheat sheet for conducting SQL injection via WAF bypass from the OWSP project . Missed attack due to application changes Based on the results of a penetration test or other evaluation of an application, you can make a WAF very accurate by creating rules that focus on specific input fields and types of vulnerability. However, you have to maintain these rules every time the application is changed. The SANS Institute notes, "During the WAF deployment, everyone involved understands exactly which form fields and inputs are vulnerable and to which attack categories, but over time, this knowledge fades. Many organizations lack the in-house expertise to conduct penetration tests every time they change the web application or WAF configuration (and miss the opportunity to ensure a vulnerability was not introduced).” Missed attack due to configuration complexity The same SANS report notes that it’s not uncommon for WAFs to be extended to cover more applications than they can handle or to fail under high load, or to have a high number of false positives. For this reason, some organizations configure their WAFs only to alert in the event of a potential attack, rather than try to block it — which means that a successful attack will likely be missed in the midst of other alerts from the WAF. There are definitely still benefits to deploying WAFs, including avoidance of denial of service attacks and—when properly configured—providing some protection against an attack. But at best, they slow an attacker down. No application security silver bullet Effective application security requires multiple technologies that protect apps in different ways and in different stages of their lifecycle. If you’re going to use a WAF, you won’t be protecting your products from attack indefinitely. So use the time a WAF gives you wisely; figure out where the underlying vulnerabilities are in your application and fix them. For instance, consider an automated application security solution that integrates into your SDLC, allowing developers to find and remediate security-related defects early in the development process. But in the end, perfect prevention is not possible: You should also consider supplementing both your efforts to secure code in the SDLC and your WAF with technology designed to specifically protect applications in production, such as runtime application security protection . Cyberattackers are increasingly focused on the application layer; it’s critical to understand both how this layer is being exploited, and which solutions protect it most effectively. To find out more, start with tips and advice on application security from someone who’s been there – check out 5 Lessons From an Application Security Pro .
Application Security? But I Have a WAF!
Wed Dec 21 20:20, 2016 GMT
We recently conducted a survey of developers and development managers to find out what’s on their minds and how their concerns compare to those of application security teams. The results contain some surprises. What’s not surprising is that development teams are feeling pressured to meet productivity goals, while still meeting requirements for quality and stability. Add to that the growing threat of cyberattacks, and penalties – both legal and market-based – for companies that suffer from a breach, and developers are feeling squeezed from all sides. In this pressure cooker environment, AppSec is suffering, with more than 60 percent of applications failing OWASP top 10 policy on initial assessment, according to Veracode’s State of Software Security 2016. With that in mind, here are the top takeaways from the Veracode Secure Development Survey . 1. Preventing data breaches and cyberattacks is developers’ number one challenge and concern Over the years, developers have been stereotyped as caring mainly about features, with little regard for security. That may be changing. Veracode’s survey asked a sample of 350 developers and 150 development managers to rank their top challenges and concerns. Preventing data breaches and cyberattacks was rated the number one concern by 37 percent of developers. By contrast, only 23 percent of developers said meeting customer or regulatory compliance was their top challenge or concern, while 21 percent said meeting budget and delivery schedules, and 19.4 percent said delivering secure code to pass internal audits. 2. More developers are testing early in the development cycle Perhaps as a result of this shifting mindset about security, more developers are testing the security of their code at the programming stage (40 percent) than any other stage of the software lifecycle. Another 21 percent of developers said they incorporate security testing at the design stage. Research by the National Institute of Standards and Technology has found that securing applications at later stages increases the cost of fixing defects by orders of magnitude: fixing defects in production is 30 times more expensive than doing so in architecture/requirements. 3. Developers worry that security testing slows them down Developers are still dealing with security programs that impede their development efforts – 52 percent of developers feel application security testing often delays development and threatens deadlines. And, fewer than 25 percent of developers feel they have authority over decisions regarding application security. There were some regional differences between respondents in our survey. Developers in the U.S. identified security delaying development as a challenge (56 percent) more often than their counterparts in the UK and Germany (46 percent). 4. Sensitive data exposure is the most concerning vulnerability More than half of developers identified sensitive data exposure as a vulnerability they are concerned about (53 percent) – more than any other vulnerability cited in the survey. No other vulnerability was cited by a majority of developers as a top concern. According to Veracode analysis in the State of Software Security 2016 , 65 percent of applications have cryptographic issues and 41 percent have credentials management vulnerabilities, showing that developers’ concerns about sensitive data exposure are well-placed. However, less than a third of developers (28.5 percent) cite using components with known vulnerabilities as a major concern, despite the high prevalence of vulnerabilities in open source components. For example, Veracode analysis found that 97 percent of Java applications had at least one component with a known vulnerability. 5. Secure DevOps is the future Although nearly a quarter of developers say their teams don’t have authority over application security (24 percent), 22 percent of development organizations now share responsibility for AppSec with another team, and the security team reports to development in 16 percent of organizations. This indicates that more organizations are shifting to DevOps, with development, security and operations working in integrated teams. Download the complete Veracode Secure Development Survey to find out more about what developers and development managers are saying about their top application security challenges and concerns.  What the Data Says: Veracode Secure Development Survey .cta {background-color:#8fbc48; width: 95%; margin: 15px auto 15px auto; padding:15px 0px 15px 0px; border:solid 1px #000; text-align:center;} .cta a{color:#fff; font-size: 20px; font-weight: 800; font-family: "Gotham SSm A","Gotham SSm B",Helvetica,Arial,sans-serif;} .cta a:hover{color:#eee;}
Top Takeaways From Veracode’s Developer Survey
Mon Dec 19 15:16, 2016 GMT
Do you think you don’t need application security? Maybe you think application security is too complex, or too expensive. Maybe you think, we haven’t been breached yet, what are the chances? And even if someone tries, we have a WAF. It might seem more cost-effective to simply “do nothing” rather than invest in application security. But you should be aware that there is indeed a cost associated with “doing nothing” when it comes to application security. Chance of a breach is high … You do have a good chance of suffering a breach through the app layer – no matter your size or industry. Verizon recently studied 2,260 confirmed data breaches across 82 countries and found that 40 percent resulted directly from web app attacks , by far the largest category. In addition, according to Akamai’s Q3 2015 State of the Internet Security Report , attacks at the application layer are growing by more than 25 percent annually. … so is the cost A recent blog post on pcicomplianceguide.org observed that “ the average consolidated total cost of a data breach is $3.8 million . With each lost or stolen record costing an average of $174, even 500 compromised payment records can exceed $75,000 in liability for a breached merchant.” And that’s a conservative number considering that breach-related costs include:   Lost revenue: This might result from stolen corporate data, lowered sales volumes (if consumers get scared) or falling stock prices. Money spent on investigation and cleanup Cost of downtime: A recent Information Age article estimated that every hour of downtime costs businesses $100,000. In addition, time spent fixing a breach means time diverted away from development and innovation. Brand damage: A recent Deloitte study found that security is the second leading risk to a company's brand , behind ethical issues and ahead of risks related to safety, health and the environment. A breach is not the only cost Many regulators, in many different industries, now require some application security controls be put into place. And with the increase in breaches through the app layer, they’re paying closer attention to application security controls. Regulations that now require application security controls include: PCI-DSS NIST MAS HIPAA What’s the cost of failing to comply? Here are two examples: HIPAA: Noncompliance fees are up to $50,000 per violation . In addition, attorney generals can also issue HIPAA fines, and criminal penalties could even result from HIPAA violations. PCI: Fines for noncompliance vary on the discretion of the card brands and acquiring banks, and can range from $5,000 to $100,000 per month for the merchant. Network security not protecting your app layer You might think you are “doing something” to protect your app layer if you’re relying on network security solutions, but, in fact, you are “doing nothing.” Protecting the network layer is not the same as protecting the application layer, and network solutions do not protect your organization against application-layer attacks. But most organizations continue to focus their budgets on blocking attacks at the network/infrastructure layer, while neglecting today’s real threats. Cyberattackers know this and are taking advantage of the insecure app layer. A web application firewall is not an adequate application security solution either. Firewalls were designed to handle network-events, such as finding and blocking botnets and remote access exploits. Some can address application-level events — but not as well as application-layer solutions, and only with significant effort to configure and monitor them. Ultimately, they don’t fix application-layer vulnerabilities, but rather, simply mitigate them. Effective application security requires an application security program that involves multiple technologies designed specifically to assess the security of the application layer, and addresses the security of applications from development through to production. “Doing nothing” is not a cost saver Neglecting to address application security will not save you money. In fact, it will cost you, most likely a significant amount, in the future. Applications play a pivotal role in today’s digital role, and need a correspondingly pivotal place in your security plan. To find out more about how digital business is changing the security landscape and how your security initiatives need to pivot accordingly, check out Gartner’s new report, Managing Risk and Security at the Speed of Digital Business .
What's the Worst That Can Happen? The Cost of a "Do Nothing" AppSec Plan
Fri Dec 30 21:49, 2016 GMT
International Business Times Internet Censorship : Governments Shut Down The Internet More Than 50 Times In 2016 International Business Times Deji Olukotun, the senior global advocacy manager at Access Now, told the Inter Press Service an internet shutdown was imposed in Uganda by President Yoweri Museveni–including a blackout of social media sites like Facebook and Twitter —on the ...
Internet Censorship: Governments Shut Down The Internet More Than 50 Times In 2016 - International Business Times
Fri Dec 30 19:54, 2016 GMT
MOSCOW (Reuters) - President Vladimir Putin refrained on Friday from retaliating for the U.S. expulsion of 35 suspected Russian spies, putting the onus on Donald Trump to help solve a crisis over Russian cyber attacks when he takes over the White House next month.
Russia will not expel anyone over U.S. sanctions, to wait for Trump
Thu Dec 29 21:43, 2016 GMT
The US expels 35 Russian diplomats in the wake of cyber attacks related to the US election.
US expels Russian diplomats over cyber attack allegations
Thu Dec 29 21:53, 2016 GMT
The US will deport dozens of diplomats, and has named specific individuals implicated in the cyberattacks. The post Obama’s Russian Hacking Retaliation Is Biggest “Since the Cold War" appeared first on WIRED .
Obama’s Russian Hacking Retaliation Is Biggest “Since the Cold War”
Thu Dec 29 12:00, 2016 GMT
Setting up a password manager may sound tedious and awful, but taking control of your personal security and privacy is doable. And it's going to be more important than ever in 2017. The post Your 5 Totally Achievable Security Resolutions for the New Year appeared first on WIRED .
Your 5 Totally Achievable Security Resolutions for the New Year
Thu Dec 29 05:35, 2016 GMT
Andrew Torba Talks Fighting Internet Censorship and His New Site 'Gab' FrontPage Magazine Andrew Torba Talks Fighting Internet Censorship and His New Site 'Gab' ... And the nature of censorship is that you don't know that it's happening until it's already too late because you're not seeing things because they're being censored. .... So ... and more »
Andrew Torba Talks Fighting Internet Censorship and His New Site 'Gab' - FrontPage Magazine
Wed Dec 28 19:20, 2016 GMT
Security Sales & Integration Predictions and Internet Security Advice for 2017 Security Sales & Integration Predictions and Internet Security Advice for 2017. VPN service provider NordVPN analyzes online privacy conditions and offers predictions for the year ahead. Learning about internet ... privacy infringements. Consider the rash of major corporate hacks ... Only a quarter of world's Internet users got free access in 2016 The Hindu all 2 news articles »
Predictions and Internet Security Advice for 2017 - Security Sales & Integration
Wed Dec 28 18:50, 2016 GMT
The Data Center Journal Internet Privacy in 2017: Predictions and Security Advice The Data Center Journal ... ever in online privacy , considering increasingly restrictive surveillance laws of governments around the world, major online hacks—such as compromised accounts of over a million Yahoo users—and authoritarian regimes blocking Internet to restrict ... Only a quarter of world's Internet users got free access in 2016 The Hindu all 2 news articles »
Internet Privacy in 2017: Predictions and Security Advice - The Data Center Journal
Wed Dec 28 15:59, 2016 GMT
RIGA/TALLINN (Reuters) - Russia and its president Vladimir Putin should expect tough sanctions after cyber attacks during the presidential election won by Donald Trump, U.S. Republican Senator Lindsey Graham said on Wednesday.
U.S. senator says Russia can expect sanctions after cyber attacks
Wed Dec 28 15:16, 2016 GMT
Nabeel Rajab, the prominent Bahraini human rights activist who has been held in prison for the past seven months, was due to be released on bail but remains in Jau prison. The post Bahrain: Nabeel Rajab remains in prison despite court order for his release appeared first on Index on Censorship .
Bahrain: Nabeel Rajab remains in prison despite court order for his release
Wed Dec 28 14:50, 2016 GMT
Wccftech Best of 2016: Trust the World's Fastest VPN with Your Internet Security & Freedom Wccftech Whether you want to secure your browsing experience on your mobile phone, or connect a gaming console or a smart TV – PureVPN is the true answer to internet security and user privacy . One of the most sought-after deals of 2016, Wccftech Deals is now ...
Best of 2016: Trust the World's Fastest VPN with Your Internet Security & Freedom - Wccftech
Wed Dec 28 00:32, 2016 GMT
Electronic Frontier Foundation Tries to Raise Awareness on Internet Privacy The Merkle While millions of people are still trying to assimilate the fact that Donald Trump won the election, in the United States a movement of concerned activists is trying to warn the incoming administration and the general public about the dangers of ...
Electronic Frontier Foundation Tries to Raise Awareness on Internet Privacy - The Merkle
Tue Dec 27 21:38, 2016 GMT
Israel Jumps On The Internet Censorship Band Wagon - Daily Caller. Will Israeli internet censorship law prevent the next terror attack ...
Israel Jumps On The Internet Censorship Band Wagon - Daily Caller
Tue Dec 27 18:10, 2016 GMT
HAMBURG (Reuters) - Major travel booking systems lack a proper way to authenticate air travelers, making it easy to hack the short code used on many boarding passes to alter flight details or steal sensitive personal data, security researchers warned on Tuesday.
Flight booking systems lack basic privacy safeguards, researchers say
Tue Dec 27 14:49, 2016 GMT
InfoWorld The real reason we can't secure the internet InfoWorld Now think about trying to get the entire world to agree on how to fix internet security , particularly when most of the internet was created and deployed before it went global. Over the last two ... All governments invade privacy in the name of ... and more »
The real reason we can't secure the internet - InfoWorld
Tue Dec 27 05:03, 2016 GMT
Zeman rejects internet censorship in reaction to ministry's plan Prague Daily Monitor Lany, Central Bohemia, Dec 26 (CTK) - Czech President Milos Zeman rejected any attempts to apply censorship to the Internet in his Christmas speech on Monday and said he does not wish the Interior Ministry to become a modern Konias, probably in ...
Zeman rejects internet censorship in reaction to ministry's plan - Prague Daily Monitor
Mon Dec 26 03:25, 2016 GMT
Lessons For The Left: How China Handles Fake News And Cuts Off 700 Million Web Users From The World Daily Caller Ongoing efforts in the United States to censor the internet in response to a liberal outcry over “fake news” follow in the footsteps of a country notorious for its internet censorship practices. There is a growing controversy in the U.S. over the issue ... and more »
Lessons For The Left: How China Handles Fake News And Cuts Off 700 Million Web Users From The World - Daily Caller
Mon Dec 26 02:37, 2016 GMT
Will Israeli Internet Censorship Law Prevent the Next Terror Attack? Haaretz “The problem with the law is that it is designed to block the Israeli public from viewing content but does not to prevent people from posting things that could harm the security of the country. This is a law that will let the police obtain an order ... and more »
Will Israeli Internet Censorship Law Prevent the Next Terror Attack? - Haaretz
Sun Dec 25 12:00, 2016 GMT
In uncertainty times, these non-profits need your year-end charity to protect privacy and civil liberties online. The post Where to Donate to Protect the Internet in 2017 appeared first on WIRED .
Where to Donate to Protect the Internet in 2017
Wed Dec 21 03:07, 2016 GMT
Human Rights Watch Thailand: Cyber Crime Act Tightens Internet Control | Human Rights ... Human Rights Watch (New York) – Thailand's new Computer-Related Crime Act (CCA) gives overly broad powers to the government to restrict free speech, enforce surveillance and ... and more »
Thailand: Cyber Crime Act Tightens Internet Control | Human Rights ... - Human Rights Watch
Fri Dec 23 12:16, 2016 GMT
The value of the Bitcoin virtual currency has hit a three-year high with each one now worth about $900 (£730).
Bitcoin enjoys end of year price surge
Fri Dec 23 08:05, 2016 GMT
The post Poland’s new laws on surveillance have “enormous implications for media freedom” appeared first on Index on Censorship .
Poland’s new laws on surveillance have “enormous implications for media freedom”
Thu Dec 22 18:09, 2016 GMT
Bitcoin bounces back after a mid-2016 currency hack by posting its highest-ever valuation.
Bitcoin reaches highest total valuation of $14 billion - CNET
Thu Dec 22 17:45, 2016 GMT
District beefs up internet security Gustine Press-Standard The new Securly filtering system, which was scheduled to be rolled out this week, will allow the district to more precisely filter sites which students can access on their district-issued Chromebooks and offers a number of other security enhancements ...
District beefs up internet security - Gustine Press-Standard
Thu Dec 22 17:47, 2016 GMT
Huffington Post How Will Internet Security Threats Change Over the Coming Years? Huffington Post Smart phones are actually much more secure than computers. They have fairly bad privacy problems, but from a security point of view, they are clearly superior to computers. This is mostly because of the app store model, as you can't just run random ...
How Will Internet Security Threats Change Over the Coming Years? - Huffington Post
Thu Dec 22 16:16, 2016 GMT
Mobile & Apps How Signal App Can Win Against Internet Censorship Mobile & Apps This way, if the government-sponsored censorship tools want to block the request, it has to block the entire Google system. It can also shut down its ... The Signal app, which is now available in Google PlayStore, can circumvent from censorship tools ... Encryption App 'Signal' Fights Censorship With a Clever Workaround WIRED all 19 news articles »
How Signal App Can Win Against Internet Censorship - Mobile & Apps
Thu Dec 22 14:42, 2016 GMT
VILNIUS (Reuters) - The Baltic state of Lithuania, on the frontline of growing tensions between the West and Russia, says the Kremlin is responsible for cyber attacks that have hit government computers over the last two years.
Lithuania said found Russian spyware on its government computers
Tue Dec 20 14:54, 2016 GMT
Freedom of expression magazine Index on Censorship has negotiated rights to translate a short story from Haroldo Conti, an Argentine writer who was “disappeared” by the state in the 1970s during the Argentine military dictatorship. Read the full article The post ‘Index’ translates work of murdered Argentine writer (The Bookseller) appeared first on Index on Censorship .
‘Index’ translates work of murdered Argentine writer (The Bookseller)
Thu Dec 22 10:35, 2016 GMT
A Syrian citizen journalist on the realities of reporting in a country where a pseudonym and bulletproof vest offer little protection from constant danger The post Inside Syria’s war: The extreme dangers faced by local reporters appeared first on Index on Censorship .
Inside Syria’s war: The extreme dangers faced by local reporters
Thu Dec 22 08:21, 2016 GMT
A final inquiry report published by the Australian government's Productivity Commission is steadfastly maintaining the position that citizens should have the right to use VPNs to access geo-restricted content. The advisory body is also unmoved when it comes to delivering fair use exceptions, stating that rightsholder objections are based on flawed and "self-interested" assumptions. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Australian Govt Advisory Body Digs in Over Fair Use & Geo-Unblocking
Thu Dec 22 05:34, 2016 GMT
WASHINGTON (Reuters) - A hacking group linked to the Russian government and high-profile cyber attacks against Democrats during the U.S. presidential election likely used a malware implant on Android devices to track and target Ukrainian artillery units from late 2014 through 2016, according to a new report released Thursday.
Russian hackers tracked Ukrainian artillery units using Android implant: report
Wed Dec 21 20:01, 2016 GMT
A technique called "domain fronting" makes the app's encrypted traffic look no different from a Google search. The post Encryption App 'Signal' Fights Censorship With a Clever Workaround appeared first on WIRED .
Encryption App ‘Signal’ Fights Censorship With a Clever Workaround
Wed Dec 21 18:22, 2016 GMT
BRUSSELS (Reuters) - The mass retention of data is illegal, the European Union's highest court said on Wednesday, dealing a blow to Britain's newly passed surveillance law and signaling that security concerns do not justify excessive privacy infringements.
EU court says mass data retention illegal
Wed Dec 21 12:18, 2016 GMT
Section 40 of the Crime and Courts Act 2013 is a danger to a free press. We urge you to take action. The post Section 40 jeopardises press freedom appeared first on Index on Censorship .
Section 40 jeopardises press freedom
Wed Dec 21 09:44, 2016 GMT
Join us 18-20 January at the Arcola Theatre to kick off the Truth to Power Cafe 2017. The post Truth to Power Cafe 2017 appeared first on Index on Censorship .
Truth to Power Cafe 2017
Wed Dec 21 09:39, 2016 GMT
Linguist and newspaper columnist, Sevan Nişanyan has found himself being locked up for 16 years after being subjected to a torrent of lawsuits relating to a mathematics village he was building The post Free speech locked up appeared first on Index on Censorship .
Free speech locked up
Wed Dec 21 07:42, 2016 GMT
Firstpost Turkey's answer to most problems is Internet censorship as it blocked Tor and social media Firstpost Turkey has blocked social media websites such as Facebook, YouTube, Twitter and WhatsApp along with Tor – the popular network used to browse the Internet without being traced or tracked. According to reports by Turkey Blocks, an internet monitoring ... Turkey maintains Tor block , flicks social networks offline for 12 hours TechCrunch all 2 news articles »
Turkey's answer to most problems is Internet censorship as it blocked Tor and social media - Firstpost
Tue Dec 20 20:01, 2016 GMT
Hack Read Anonymous Shut Down Thai Sites Against Internet Censorship , Surveillance Law Hack Read Anonymous Shut Down Thai Sites Against Internet Censorship , Surveillance Law. A series of ... The government of Thailand has been under the hammer of internet activist groups since the parliament approved an amendment to the 2007 Computer Protection ... and more »
Anonymous Shut Down Thai Sites Against Internet Censorship, Surveillance Law - Hack Read
Tue Dec 20 16:06, 2016 GMT
KIEV (Reuters) - Ukraine is investigating a suspected cyber attack on Kiev's power grid at the weekend, the latest in a series of strikes on its energy and financial infrastructure, the head of the state-run power distributor said on Tuesday.
Ukraine investigates suspected cyber attack on Kiev power grid
Tue Dec 20 16:01, 2016 GMT
New research suggests that an elaborate cybercrime ring is responsible for stealing between $3 million and $5 million worth of revenue from online publishers and video advertising networks each day. Experts say the scam relies on a vast network of cloaked Internet addresses, rented data centers, phony Web sites and fake users made to look like real people watching short ad segments online.
Report: $3-5M in Ad Fraud Daily from ‘Methbot’
Tue Dec 20 15:33, 2016 GMT
Forty-nine international human rights and free expression organisations have written to the United Nations on behalf of Bahraini human rights activist Nabeel Rajab. The post Groups urge UN to call on Bahrain to release human rights defender appeared first on Index on Censorship .
Groups urge UN to call on Bahrain to release human rights defender
Tue Dec 20 11:25, 2016 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout the European Union and neighbouring countries. Here are five recent reports that give us cause for concern. The post Mapping Media Freedom: In review 9-15 December appeared first on Index on Censorship .
Mapping Media Freedom: In review 9-15 December
Tue Dec 20 09:03, 2016 GMT
Telstra has become the very first Australian ISP to block The Pirate Bay, a move designed to crack down on piracy in the country. However, the blocking method chosen by the ISP is the most basic option permitted under the Federal Court's order. As a result, it's been defeated in seconds. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
First Aussie Pirate Bay Block Gets Defeated in Seconds
Tue Dec 20 06:52, 2016 GMT
Index on Censorship is delighted to announce CNN as its media partner for the 2017 Freedom of Expression Awards. The post CNN announced as media partner for Freedom of Expression Awards 2017 appeared first on Index on Censorship .
CNN announced as media partner for Freedom of Expression Awards 2017
Tue Dec 20 05:50, 2016 GMT
Internet privacy ? Forget it Alaska Dispatch News The right to internet privacy seems to be anchored in arguments for common decency, the almost universal belief that what you have to say via email is nobody's business except yours and the people you choose to share it with. WikiLeaks advocates ...
Internet privacy? Forget it - Alaska Dispatch News
Tue Dec 20 00:55, 2016 GMT
Mashable Turkey's internet censorship is starting to look like China's 'Great Firewall' Mashable The Turkish government is strengthening its already tight grip on the country's internet . In the past, government officials have blocked Twitter, Facebook and other social networks where Turkish residents often discuss politics. These blocks have no ... and more »
Turkey's internet censorship is starting to look like China's 'Great Firewall' - Mashable
Mon Dec 19 19:27, 2016 GMT
New Poll: Internet Censorship Is Gov't and Social Media Responsibility Church Militant DETROIT (ChurchMilitant.com) - Information gatekeepers complain people are being inundated with fake news, and many Americans think something should be done about it. The new mainstream media fury over so-called fake news has become one of the ...
New Poll: Internet Censorship Is Gov't and Social Media Responsibility - Church Militant
Mon Dec 19 09:00, 2016 GMT
It's been an exciting year for the MIT CSAIL lab with ingestible origami robots, AI acting as oracles and cyberattack detection research only the tip of the iceberg.
The most exciting, innovative MIT projects in 2016
Mon Dec 19 14:15, 2016 GMT
Collective Evolution Google Is Battling Global Censorship In Canada's Supreme Court Collective Evolution Google Is Battling Global Censorship In Canada's Supreme Court ... Because of this impact, Internet censorship continues to be a question of implementation in order to control or suppress what can be accessed, published, or viewed on the Internet . This ...
Google Is Battling Global Censorship In Canada's Supreme Court - Collective Evolution
Mon Dec 19 13:36, 2016 GMT
Turkey has blocked direct access to the Tor anonymous browsing network as part of a wider crackdown on the ways people circumvent official internet censorship.
Turkey blocks access to Tor anonymising network
Mon Dec 19 12:04, 2016 GMT
LONDON (Reuters) - Additional rules may be needed to monitor growth in Big Data, or collection of high volumes of information, which could pose security, privacy and accountability risks, European Union regulators said on Monday.
EU financial regulators say more rules may be needed for Big Data
Mon Dec 19 10:24, 2016 GMT
ExtraTorrent has taken steps to block unofficial proxy sites from "stealing" traffic and thus, their revenue. This will also help to keep users safe from rogue sites that may cause other kinds of harm. Of course, ExtraTorrent users are still welcome to use any of the official proxies to bypass ISP blockades. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
ExtraTorrent Takes on ‘Leeching’ Proxy Sites
Mon Dec 19 08:24, 2016 GMT
Journalists and columnists in The Netherlands are dealing with threats when writing about the controversial black-faced children’s character Black Pete. The post The Netherlands: Journalists face threats in heated Black Pete racism debate appeared first on Index on Censorship .
The Netherlands: Journalists face threats in heated Black Pete racism debate
Mon Dec 19 07:46, 2016 GMT
Malaysian cartoonist Zulkiflee Anwar Ulhaque, aka Zunar, was arrested on Saturday 17 December during a fund-raising event to recoup losses related to the seizure of 20 of his artworks. The post Malaysia: Cartoonist arrested for second time in three weeks appeared first on Index on Censorship .
Malaysia: Cartoonist arrested for second time in three weeks
Mon Dec 19 00:29, 2016 GMT
LONDON (Reuters) - Britain's intelligence agencies need to do more to help regulators to protect the financial services industry from cyber crime, the head of an influential parliamentary committee said on Monday.
Britain urged to increase cyber security in financial services
Sun Dec 18 20:54, 2016 GMT
WASHINGTON (Reuters) - U.S. Republican and Democratic senators called on Sunday for a special bipartisan panel to investigate cyber attacks against the United States by foreign countries with a focus on Russia's alleged efforts to influence the U.S. presidential election.
Senators call for probe of cyber attacks by Russia
Sun Dec 18 19:14, 2016 GMT
This week pirate site blocking arrived in Australia after years of planning and negotiations. We take a look at some of the lesser-discussed points from the Federal Court's ruling which allow for the rapid expansion of site blocking based on the trusted words of rightsholders. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
The Future of Aussie Pirate Site Blocking: Six Additional Facts
Sat Dec 17 20:45, 2016 GMT
The Pirate Bay and other sites must be blocked by local Internet providers, an Australian court ruled this week. While the measures have yet to be implemented, many pirates are already trying to find ways around them. Data from Google shows a big surge in "VPN" searches and VPN services also report a significant increase in Aussie interest. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Australia’s Pirate Site Blockade Boosts Demand For VPNs
Fri Dec 16 14:15, 2016 GMT
Breitbart News Academic: Former Stasi Secret Police Informant Unfit to Lead Government Internet Censorship Task Force Breitbart News The Ministry of Justice has come under renewed pressure to cut ties with Anetta Kahane after a Stasi expert declared her unfit to lead a “sensitive task like controlling the internet ” based on her history working with the Communist secret police. A ...
Academic: Former Stasi Secret Police Informant Unfit to Lead Government Internet Censorship Task Force - Breitbart News
Fri Dec 16 10:12, 2016 GMT
ISTANBUL (Reuters) - Hackers targeted Turkish lender Akbank in a cyber attack on the SWIFT global payment system, the bank said, adding it faced a liability of up to $4 million from the incident but no customer information was compromised.
Turkey's Akbank says targeted by hackers, faces up to $4 million liability
Fri Dec 16 09:26, 2016 GMT
The post Editorial: The censor’s new clothes appeared first on Index on Censorship .
Editorial: The censor’s new clothes
Fri Dec 16 09:26, 2016 GMT
The post Contents: Fashion rules appeared first on Index on Censorship .
Contents: Fashion rules
Fri Dec 16 09:26, 2016 GMT
The post Fashion rules appeared first on Index on Censorship .
Fashion rules
Fri Dec 16 08:26, 2016 GMT
The post Fashion Rules winter magazine launch appeared first on Index on Censorship .
Fashion Rules winter magazine launch
Fri Dec 16 08:56, 2016 GMT
This letter appeared in The Times on 16 December 2016 Sir, Index on Censorship has published stories by censored writers for more than four decades. Now we ourselves face the prospect of censorship via legal action in the UK. As it stands, legislation on the statute means that we — as an independent publisher that […] The post Freedom of the press and a state regulator appeared first on Index on Censorship .
Freedom of the press and a state regulator
Fri Dec 16 06:16, 2016 GMT
The Pirate Bay has been chased around the world, and now Australia's internet service providers have been ordered to block it Down Under, along with a raft of other torrent sites.
Australian ISPs ordered to block The Pirate Bay by year's end - CNET
Thu Dec 15 23:20, 2016 GMT
Outspoken Overstock CEO Patrick Bryne delivers the stock market's "Sputnik moment." The post Overstock Begins Trading Its Shares Via the Bitcoin Blockchain appeared first on WIRED .
Overstock Begins Trading Its Shares Via the Bitcoin Blockchain
Thu Dec 15 12:49, 2016 GMT
International Business Times Cyberattacks 2016: With Yahoo Breach And US Election Hack , 5 Times Internet Security Was Compromised International Business Times Cyberattacks have seen an upsurge in 2016. Governments, private companies and even internet service providers (ISPs) have suffered from several cyberattacks in 2016. They have impacted social media websites and are believed to have affected the ... and more »
Cyberattacks 2016: With Yahoo Breach And US Election Hack, 5 Times Internet Security Was Compromised - International Business Times
Thu Dec 15 10:21, 2016 GMT
BANGKOK (Reuters) - Thai Prime Minister Prayuth Chan-ocha on Thursday defended a decision to amend a cyber-crime law to increase the military government's ability to remove online content as authorities seeks to tighten control on dissent.
Thai PM defends cyber controls as censorship concerns rise
Thu Dec 15 09:59, 2016 GMT
Internet Privacy Rules Take Effect Jan. 3 Light Reading The FCC has announced that the controversial privacy regulations will go into effect on January 3, although certain new data security obligations will not be effective until March 2, and some customer notification and approval elements of the ruling ... and more »
Internet Privacy Rules Take Effect Jan. 3 - Light Reading
Thu Dec 15 08:56, 2016 GMT
Following a case brought by several prominent rightsholders, the Australian Federal Court has ordered dozens of local Internet service providers to block The Pirate Bay, Torrentz, TorrentHound, IsoHunt, SolarMovie, plus many proxy and mirror services. The event marks the start of mass-blocking Down Under. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
The Pirate Bay and Other Pirate Sites Will Be Blocked in Australia
Thu Dec 15 08:39, 2016 GMT
The post Bahrain: Nabeel Rajab’s trial postponed for fifth time appeared first on Index on Censorship .
Bahrain: Nabeel Rajab’s trial postponed for fifth time
Wed Dec 14 23:33, 2016 GMT
(Reuters) - Yahoo Inc warned it had uncovered yet another massive cyber attack, saying data from more than 1 billion user accounts was compromised in August 2013, making it the largest breach in history.
Yahoo says one billion accounts exposed in newly discovered security breach
Wed Dec 14 22:59, 2016 GMT
The company, already besieged by cybersecurity and privacy woes, says Wednesday that a separate hack in 2013 compromised vast amounts of personal data, affecting more than 1 billion users.
Yahoo reveals another, even bigger hack - CNET
Wed Dec 14 21:22, 2016 GMT
The browser now will supply ads for Bitcoin info site CoinDesk, an encouraging sign for the startup and those looking for an internet free of intrusive ads.
​Brave gets first paying partner for privacy-protected ads - CNET
Wed Dec 14 14:19, 2016 GMT
Parliamentarians today joined in calling on the UK government to call for the release of jailed activist Nabeel Rajab. The post Bahrain: Parliamentary pressure mounts on Theresa May to call for Nabeel Rajab’s release appeared first on Index on Censorship .
Bahrain: Parliamentary pressure mounts on Theresa May to call for Nabeel Rajab’s release
Tue Dec 13 22:55, 2016 GMT
Amnesty International Ethiopia: Government blocking of websites during protests widespread, systematic and illegal Amnesty International The Ethiopian government systematically and illegally blocked access to social media and news websites in its efforts to crush dissent and prevent reporting of attacks on protesters by security forces during the wave of protests that started in ... and more »
Ethiopia: Government blocking of websites during protests widespread, systematic and illegal - Amnesty International
Tue Dec 13 17:51, 2016 GMT
Federal investigators in the United States and Europe last week arrested nearly three-dozen people suspected of patronizing so-called "booter" services that can be hired to knock targeted Web sites offline. The global crackdown is part of an effort by authorities to weaken demand for these services by impressing upon customers that hiring someone to launch cyberattacks on your behalf can land you in jail.
‘Operation Tarpit’ Targets Customers of Online Attack-for-Hire Services
Tue Dec 13 15:17, 2016 GMT
Bahraini human rights activist Nabeel Rajab, an Index award winner, has been imprisoned for tweeting about the Bahraini government, and could face up to 15 years in jail. The post Bahraini human rights activist to face trial appeared first on Index on Censorship .
Bahraini human rights activist to face trial
Tue Dec 13 10:21, 2016 GMT
A poem by Meltem Arikan on the current state of Turkey: The piece of land surrounded by water on three sides is turning into a country where blood-sucking spirits conquer people’s bodies The post Turkey is a country of blood-sucking spirits appeared first on Index on Censorship .
Turkey is a country of blood-sucking spirits
Tue Dec 13 07:35, 2016 GMT
Harry Potter actor Noma Dumezweni will join a panel of judges that also includes lawyer Caiolfhionn Gallagher, who represented the families of those killed in the Hillsborough disaster, and former Vanity Fair editor Tina Brown to decide this year’s Index on Censorship Freedom of Expression Award winners. The post #IndexAwards2017: Harry Potter actor Noma Dumezweni to judge leading free speech awards appeared first on Index on Censorship .
#IndexAwards2017: Harry Potter actor Noma Dumezweni to judge leading free speech awards
Mon Dec 12 21:52, 2016 GMT
LONDON/BOSTON (Reuters) - Cyber attacks on the global banking system have continued - and succeeded - since February’s heist of $81 million from the Bangladesh central bank, underscoring the continuing vulnerability of the SWIFT messaging network, a SWIFT official told Reuters.
Exclusive: SWIFT confirms new cyber thefts, hacking tactics
Mon Dec 12 12:00, 2016 GMT
They can't see his data. He can't see them. But Richard Craib believes the blind can lead the blind to a better hedge fund. The post 7,500 Faceless Coders Paid in Bitcoin Built a Hedge Fund's Brain appeared first on WIRED .
7,500 Faceless Coders Paid in Bitcoin Built a Hedge Fund’s Brain
Mon Dec 12 10:29, 2016 GMT
We are looking for enthusiastic young people between that ages of 16 and 25 who can commit to monthly meetings and contribute fresh ideas to the discussion The post Join Index on Censorship’s youth advisory board appeared first on Index on Censorship .
Join Index on Censorship’s youth advisory board
Mon Dec 12 09:12, 2016 GMT
The French music industry is continuing its efforts to make torrent sites unavailable. After obtaining a blocking injunction against The Pirate Bay, it has now managed to do the same with LimeTorrents, TorrentHound, TorrentReactor, and TorrentFunk. The effect of the blockade will be relatively limited though, as two of the sites have already shut down. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Court Orders French ISPs to Block (Dead) Torrent Sites
Sun Dec 11 20:27, 2016 GMT
Two major Swedish ISPs are warning that a possible court-ordered Pirate Bay blockade will introduce a dangerous and unwarranted form of censorship. Instead, they encourage copyright holders to collaborate with them to find better solutions to the piracy problem. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
ISPs: Blocking The Pirate Bay is Dangerous Censorship
Fri Dec 9 10:56, 2016 GMT
ESET launches new internet security products for home users Business Standard With the new line of products, ESET highlights the need for privacy when operating PCs and laptops. For example, ESET Webcam Protection available with both ESET Smart Security Premium and ESET Internet Security regulates access to the camera so the ... and more »
ESET launches new internet security products for home users - Business Standard
Fri Dec 9 11:08, 2016 GMT
Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout the Europe. Here are five recent reports that give us cause for concern. The post Mapping Media Freedom: Recent roundup appeared first on Index on Censorship .
Mapping Media Freedom: Recent roundup
Fri Dec 9 09:49, 2016 GMT
Prominent human rights defenders Razan Zaitouneh, Samira Al-Khalil, Wa’el Hamada and Nazim Hammadi – the Douma four – should be released immediately, 32 human rights organisations said today, on the third anniversary of their abduction.  On 09 December 2013, a group of armed men stormed into the office of the Violations Documentation Centre in Syria, […] The post Syria: Whereabouts of four abducted activists unknown appeared first on Index on Censorship .
Syria: Whereabouts of four abducted activists unknown
Thu Dec 8 22:38, 2016 GMT
The accused ringleader of a cyber fraud gang that allegedly rented out access to a criminal cloud hosting service known as "Avalanche" is now a fugitive from justice following a bizarre series of events in which he shot at Ukrainian police, was arrested on cybercrime charges and then released from custody.
‘Avalanche’ Crime Ring Leader Eludes Justice
Thu Dec 8 22:02, 2016 GMT
WASHINGTON (Reuters) - The White House said on Thursday that it raised concerns about China's new cyber security law during a meeting with a Chinese official after the latest round of talks between the two countries on cyber crime.
White House voices concerns about China cyber law
Thu Dec 8 10:37, 2016 GMT
INFORMATION WARFARE: Chinese Software Supports Subtle Censorship Strategy Page December 8, 2016: In one area of military technology China has taken the lead and that is the development and employment of Internet censorship software and techniques. The latest feature is the use of artificial intelligence (AI) software to ...
INFORMATION WARFARE: Chinese Software Supports Subtle Censorship - Strategy Page
Thu Dec 8 16:09, 2016 GMT
The post Forbidden songs: Where there is power, there is censorship appeared first on Index on Censorship .
Forbidden songs: Where there is power, there is censorship
Thu Dec 8 15:07, 2016 GMT
Dixie Sun News DSU honors internet privacy Dixie Sun News As part of the IT department's attempt to keep DSU students and employees safe and free, the school requires its internet users to login using a username and password, said Information Security Officer Andrew Goble. “This is consistent with standard ...
DSU honors internet privacy - Dixie Sun News
Thu Dec 8 12:00, 2016 GMT
A major bitcoin exchange has decided to stop selling the digital currency that was supposed to transform money on the internet. So what happens next? The post The Future of Bitcoin Is Not as a Digital Currency appeared first on WIRED .
The Future of Bitcoin Is Not as a Digital Currency
Wed Dec 7 20:45, 2016 GMT
NEW YORK (Reuters) - U.S.-based Circle Internet Financial Ltd, a social payments app backed by Goldman Sachs, said on Wednesday it will no longer allow customers to buy and sell bitcoin because it has failed to become a meaningful part of its business.
Payments start-up Circle moves away from bitcoin business
Wed Dec 7 07:24, 2016 GMT
SC Magazine Reboot 2016 Influencers: Larry Clinton, president and CEO, Internet Security Alliance SC Magazine “We also addressed six cross-cutting issues that need to be addressed: the evolving nature of corporate boards; how cyberauditing needs to be reformed; the use of cyberinsurance; resolving the tensions between the privacy , security and intelligence ...
Reboot 2016 Influencers: Larry Clinton, president and CEO, Internet Security Alliance - SC Magazine
Wed Dec 7 03:09, 2016 GMT
Complaint with FTC alleges that internet-connected toys are recording and transmitting kids' conversations in violation of children's privacy rules.
Kids' talking toys accused of sharing their secrets - CNET
Tue Dec 6 20:40, 2016 GMT
WASHINGTON (Reuters) - The U.S. failure to retaliate strongly for the 2014 cyber attack against Sony Pictures may have helped inspire Russian hackers who sought to interfere in the 2016 U.S. election, a senior congressional Democrat said on Tuesday.
U.S. lawmaker: Sony hack may have inspired Russian election hacking
Tue Dec 6 18:08, 2016 GMT
Index on Censorship is deeply concerned about plans outlined by technology companies to share information about, and collectively remove, extremist content. The post Tech companies’ data-sharing agreement presents threat to free expression appeared first on Index on Censorship .
Tech companies’ data-sharing agreement presents threat to free expression
Tue Dec 6 17:04, 2016 GMT
Center for Internet Security expert offers a simple equation to manage cyber risk Healthcare IT News BOSTON – Tony Sager, senior vice president at the Center for Internet Security , promised to help simplify security – if not necessarily make it easy – at the HIMSS Health Privacy Forum on Tuesday. Sager, who spent nearly four decades at the National ...
Center for Internet Security expert offers a simple equation to manage cyber risk - Healthcare IT News
Tue Dec 6 12:48, 2016 GMT
Technology Zimbabwe The Gambia joins Africa's politically inspired internet censorship club – here's why Zimbabwe could be next Technology Zimbabwe While countries like Ghana have expressed plans to shut down social media during their elections, nations like Uganda, Mali, the DRC, Zambia and Gabon have all experienced some form of internet censorship that's been triggered by political tension ... and more »
The Gambia joins Africa's politically inspired internet censorship club – here's why Zimbabwe could be next - Technology Zimbabwe
Tue Dec 6 15:10, 2016 GMT
The government of Azerbaijan is carrying out a multi-pronged attack on freedom of expression. The post Azerbaijan must stop crackdown on freedom of expression appeared first on Index on Censorship .
Azerbaijan must stop crackdown on freedom of expression
Tue Dec 6 11:38, 2016 GMT
Theresa May has been urged to confirm she will put human rights reform on her agenda when she meets Saudi and Bahraini leaders on Tuesday, after announcements on her two-day trip to the Gulf were squarely focused on trade and security. Read the full article The post Theresa May urged to raise human rights concerns on Gulf visit (Guardian) appeared first on Index on Censorship .
Theresa May urged to raise human rights concerns on Gulf visit (Guardian)
Tue Dec 6 11:30, 2016 GMT
Bitcoin hasn't freed currency from the grip of governments just yet. But cross-border commerce may be the blockchain's killer app in the here-and-now. The post Stellar Emerges From Shadow of Bitcoin to Find a Home Overseas appeared first on WIRED .
Stellar Emerges From Shadow of Bitcoin to Find a Home Overseas
Tue Dec 6 11:00, 2016 GMT
Everyone's favorite supercomputer takes off its cybercrime training wheels. The post IBM’s Watson Now Fights Cybercrime in the Real World appeared first on WIRED .
IBM’s Watson Now Fights Cybercrime in the Real World
Mon Dec 5 05:00, 2016 GMT
MIT Technology Review Security Experts Warn Congress That the Internet of Things Could ... MIT Technology Review Poorly secured webcams and other Internet-connected devices are already being used as tools for cyberattacks. Can the government prevent this from ... Blockchain IoT startup Sensify Security joins Industrial Internet Consortium EconoTimes Principles For Securing The Internet Of Things Global Trade Magazine (blog) Cyber criminals could become mass murderers by hacking into 'smart' devices Daily Mail NewsMaker (press release) all 46 news articles »
Security Experts Warn Congress That the Internet of Things Could ... - MIT Technology Review
Tue Dec 6 10:06, 2016 GMT
In 2015, a coalition of copyright holders lost a court case which demanded an ISP blockade of The Pirate Bay in Sweden. A year later and Universal Music, Sony Music, Warner Music and Nordisk Film are back, hoping for a victory in a brand new court that could open the floodgates for widespread website blocking. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Pirate Bay Blocking Case Heads Back to Court in Sweden
Mon Dec 5 19:38, 2016 GMT
EU Threatens Massive Internet Censorship If Big Tech Won't Come To Heel Daily Caller The European Commission urged the biggest U.S. technology companies — like Facebook, Twitter, Microsoft, YouTube and Google — to crack down on online hate speech themselves Sunday, or it will enact legislation forcing them to do so. Several ... and more »
EU Threatens Massive Internet Censorship If Big Tech Won't Come To Heel - Daily Caller
Mon Dec 5 23:27, 2016 GMT
Addressing distributed denial-of-service (DDoS) attacks designed to knock Web services offline and security concerns introduced by the so-called "Internet of Things" (IoT) should be top cybersecurity priorities for the 45th President of the United States, according to a newly released blue-ribbon report commissioned by President Obama.
DDoS, IoT Top Cybersecurity Priorities for 45th President
Mon Dec 5 20:18, 2016 GMT
4shared, one of the largest file-hosting services on the Internet, is building its own 'fingerprint' database of pirated music. Since the major rightholder groups are unwilling to participate, 4shared has taken the matter into its own hands. According to the site, this has helped to significantly reduce the number of takedown requests it receives. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
4shared’s Piracy ‘Fingerprint’ Tool Helps to Reduce Takedown Notices
Mon Dec 5 18:49, 2016 GMT
Commentary: Encryption be damned. British police created novel tactic to get past Apple's insistence on privacy and security. They grab the phone while it's being used.
Police 'mug' suspect to get into iPhone while he's using it - CNET
Mon Dec 5 16:43, 2016 GMT
Slate Magazine Why Russia Is Using the Internet to Undermine Western Democracy Slate Magazine Now, I live in the United Kingdom, where the state does more surveillance than any other functioning democracy and requires extra-legal and untransparent censorship by internet service providers (because “Won't somebody think of the children?”). But ... and more »
Why Russia Is Using the Internet to Undermine Western Democracy - Slate Magazine
Sun Dec 4 17:00, 2016 GMT
The Bahraini authorities’ orchestrated attack on the rights to free expression, assembly and association, has seriously undermined the prospects of a political solution to Bahrain’s domestic unrest. The post The UK government must do more to address human rights situation in Bahrain appeared first on Index on Censorship .
The UK government must do more to address human rights situation in Bahrain
Mon Dec 5 11:00, 2016 GMT
The women around me are more alert to the Turkey’s situation than the men are. The comfortable male universe is full of denial. The post Ece Temelkuran: “Make Turkey so-so again!” appeared first on Index on Censorship .
Ece Temelkuran: “Make Turkey so-so again!”
Sun Dec 4 11:17, 2016 GMT
RadioFreeEurope/RadioLiberty Q&A: Russia, China Swapping Cybersecurity, Censorship Tips RadioFreeEurope/RadioLiberty A series of joint events by Russia and China on cybersecurity has prompted speculation that Moscow is looking to the architect of the Great Firewall of China for inspiration on how to censor and otherwise regulate the Internet . But it's a ... In ...
Q&A: Russia, China Swapping Cybersecurity, Censorship Tips - RadioFreeEurope/RadioLiberty
Sun Dec 4 10:44, 2016 GMT
The Digital Economy Bill is currently at the report stage. It hasn't yet become law and could still be amended. However, as things stand those who upload any amount of infringing content to the Internet could face up to 10 years in jail. With the latest bill now published, we take a look at how file-sharers could be affected. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Ten Years in Jail For UK Internet Pirates: How the New Bill Reads
Sat Dec 3 10:51, 2016 GMT
A group of prominent legal scholars has warned that the EU Commission's plans to modernize copyright law in Europe appear to be incompatible with EU law. One of the main problems is the mandatory piracy filter Internet services are required to use, which largely ignore existing case law and human rights. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Mandatory Piracy Filters May Violate EU Law, Scholars Warn
Fri Dec 2 20:02, 2016 GMT
NextShark Russia Asks China for Help in Censoring The Internet NextShark Currently, China's internet censorship is one of the most stringent in the world. The government, through its Great Firewall has been able to block many general Internet sites, as well as websites that discuss the Dalai Lama, the 1989 crackdown on ... and more »
Russia Asks China for Help in Censoring The Internet - NextShark
Fri Dec 2 20:09, 2016 GMT
MOSCOW (Reuters) - Hackers stole more than 2 billion rubles ($31 million) from correspondent accounts at the Russian central bank, the bank said on Friday, the latest example of an escalation of cyber attacks on financial institutions around the globe.
Russian central bank loses $31 million in cyber attack
Fri Dec 2 07:18, 2016 GMT
The post Mapping Media Freedom: In review 25 November-1 December appeared first on Index on Censorship .
Mapping Media Freedom: In review 25 November-1 December
Thu Dec 1 11:28, 2016 GMT
Doha News says access to its website has been blocked in an apparent act of government censorship.
Qatar accused of blocking Doha News website
Fri Dec 2 12:00, 2016 GMT
The Law that Could Allow Trump to Shut Down the U.S. Internet Forbes So, in Edger's estimation, we need to take seriously Trump's statements and what they might portend for the future of internet security and privacy . I think this is a wise move. But certainly our laws and bureaucracy would prevent efforts to surveil ... and more »
The Law that Could Allow Trump to Shut Down the U.S. Internet - Forbes
Fri Dec 2 08:51, 2016 GMT
MOSCOW (Reuters) - Russia said on Friday it had uncovered a plot by foreign spy agencies to sow chaos in Russia's banking system via a coordinated wave of cyber attacks and fake social media reports about banks going bust.
Russia says foreign spies plan cyber attack on banking system
Fri Dec 2 08:38, 2016 GMT
A site that was outlawed following mass court action against more than 150 domains has been cleared on appeal. Kisstube embeds movies, some of them infringing, hosted on other platforms such as YouTube. However, the Rome Court of Appeal found that according to an EU ruling, merely embedding pirated content is not illegal. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Court Overturns ‘Pirate’ Site Blockade Based on EU Ruling
Fri Dec 2 09:09, 2016 GMT
My gut tells me that this time Turkey’s turmoil may turn out to be long-lasting and leave a more harmful imprint on the nation’s soul. The post Yavuz Baydar: In exile you spend your days in a fog appeared first on Index on Censorship .
Yavuz Baydar: In exile you spend your days in a fog
Thu Dec 1 19:17, 2016 GMT
Forbes The Entire Internet Is Being Archived In Canada For Safekeeping Forbes Throughout history, libraries have fought against terrible violations of privacy —where people have been rounded up simply for what they read, [and] we are fighting to protect our readers' privacy in the digital world … ... During Trump's campaign ... Internet Archive seeking to backup entire web in Canada over Donald Trump fears International Business Times UK The Internet Archive is building a Canadian copy to protect itself from Trump The Verge The Entire Internet Will Be Archived In Canada to Protect It From Trump Motherboard Digital Trends  - Mobile Business Insights (blog)  - Gothamist all 99 news articles »
The Entire Internet Is Being Archived In Canada For Safekeeping - Forbes
Thu Dec 1 18:50, 2016 GMT
In what's being billed as an unprecedented global law enforcement response to cybercrime, federal investigators in the United States, United Kingdom and Europe today say they've dismantled a sprawling cybercrime machine known as "Avalanche" -- a distributed, cloud-hosting network that for the past seven years has been rented out to fraudsters for use in launching countless malware and phishing attacks.
‘Avalanche’ Global Fraud Ring Dismantled
Thu Dec 1 17:14, 2016 GMT
Center for Research on Globalization The “Fake News” Furor and the Threat of Internet Censorship Center for Research on Globalization There is more than a whiff of McCarthyism in this crusade against “fake news” on social media and the Internet , with online publications critical of US wars of aggression and other criminal activities being branded as Russian propaganda outlets ... and more »
The “Fake News” Furor and the Threat of Internet Censorship - Center for Research on Globalization
Thu Dec 1 17:18, 2016 GMT
(Reuters) - The U.S. Commodity Futures Trading Commission failed to verify whether futures and swaps brokerage firms have adequate policies to help ward off cyber attacks, an internal CFTC audit found.
CFTC failed to verify brokers have proper cyber policies: watchdog
Thu Dec 1 15:47, 2016 GMT
BERLIN (Reuters) - One of the world's biggest networks of hijacked computers, which is suspected of attacking online banking customers, has been targeted by police swoops in 10 countries, German police said on Thursday
Worldwide cyber-crime network hit in coordinated raids
Wed Nov 30 15:22, 2016 GMT
One of IWPR’s long-term contributors from Kazakstan, Gaziza Baituova, has been nominated for the Index on Censorship Journalism Award 2017. Read the full article The post IWPR Contributor Nominated for Prestigious Freedom of Expression Award (IWPR) appeared first on Index on Censorship .
IWPR Contributor Nominated for Prestigious Freedom of Expression Award (IWPR)
Thu Dec 1 15:33, 2016 GMT
The Post Office says about 100,000 customers have had their internet access hit by a malware attack.
Post Office broadband users hit by cyber-attack
Thu Dec 1 14:00, 2016 GMT
Free speech campaigners Index on Censorship will host a night of forbidden music on December 7 to raise money for censored artists. The post Index on Censorship to host a night of forbidden songs appeared first on Index on Censorship .
Index on Censorship to host a night of forbidden songs
Wed Nov 30 07:47, 2016 GMT
International Business Times UK Internet Archive seeking to backup entire web in Canada over Donald Trump fears International Business Times UK During his campaign, Trump had taken a rigid stance on internet censorship and even mentioned that the tech industry needs to "close that internet up" to stop the spread of extremism. "Somebody will say, 'Oh, freedom of speech, freedom of speech. These ... The Entire Internet Will Be Archived In Canada to Protect It From Trump Motherboard The Internet Archive is building a Canadian copy to protect itself from Trump The Verge The Internet Archive gears up for the Trump era by creating a backup in Canada Digital Trends Huffington Post Canada  - Gothamist  - BBC News all 82 news articles »
Internet Archive seeking to backup entire web in Canada over Donald Trump fears - International Business Times UK
Tue Nov 29 16:20, 2016 GMT
Deutsche Welle Deutsche Telekom hack part of global internet attack Deutsche Welle Deutsche Telekom's head of IT security and the German Office for Information Security (BSI) said on Tuesday that the outages appeared to be tied to a botched attempt to commandeer customers' routers to disrupt internet traffic around the world. "The ... Sunday's major internet outage in Germany was probably a botched hack attack Digital Trends Hack Suspected as Deutsche Telekom Customers Fail to Access Internet SPAMfighter News (press release) 900000 Routers Knocked Offline in Germany amid Rumors of Cyber -Attack BleepingComputer Reuters all 152 news articles »
Deutsche Telekom hack part of global internet attack - Deutsche Welle
Tue Nov 29 09:24, 2016 GMT
We discuss the situation in Aleppo, the re-emergence of populism in the West, how music can fight against censorship, and the luxuries and private lives of world leaders. Plus: today’s business news, an interview with Hong Kong interior designer André Fu and a review of the day’s newspapers. Listen to the full podcast The post How music can fight against censorship (Monocle Radio 24) appeared first on Index on Censorship .
How music can fight against censorship (Monocle Radio 24)
Thu Dec 1 07:57, 2016 GMT
Besides the difficulty in determining truth from opinion to a bald-faced lie, the inherent limiting of ideas, including criminalising them, makes us all suffer a little bit. The post Dunja Mijatović: Why bother? A quick take on lying on social media appeared first on Index on Censorship .
Dunja Mijatović: Why bother? A quick take on lying on social media
Thu Dec 1 06:08, 2016 GMT
The “fake news” furor and the threat of Internet censorship World Socialist Web Site There is more than a whiff of McCarthyism in this crusade against “fake news” on social media and the Internet , with online publications critical of US wars of aggression and other criminal activities being branded as Russian propaganda outlets ...
The “fake news” furor and the threat of Internet censorship - World Socialist Web Site
Thu Dec 1 01:54, 2016 GMT
Federal judge grants request for "John Doe" summons, demanding three years of customer records from the bitcoin exchange.
Coinbase ordered to turn over customers' records to IRS - CNET
Wed Nov 30 17:20, 2016 GMT
HowStuffWorks NOW How People in China Get Around Internet Censorship HowStuffWorks NOW In free locales such as Western Europe, in contrast, VPN usage dips to 15 percent; there, people use the servers mainly to ensure privacy . While VPNs are often banned in countries with restrictive internet service, citizens are generally not fined or ... and more »
How People in China Get Around Internet Censorship - HowStuffWorks NOW
Wed Nov 30 20:44, 2016 GMT
CIO How Internet of Things Companies Can Fix Their Security Mess ConsumerReports.org Experts say that many connected devices, which make up the growing Internet of Things, or IoT, are putting consumers' privacy at risk. Unfortunately, consumers have few tools to judge whether a router, a smart thermostat, or another device they buy was ... 2017 security predictions CIO 5-Point Checklist for Investing in the Internet of Things Motley Fool Two Hackers Appear To Have Created a New Massive Internet of Things Botnet Motherboard MediaPost Communications  - Security Intelligence (blog) all 104 news articles »
How Internet of Things Companies Can Fix Their Security Mess - ConsumerReports.org
Wed Nov 30 12:20, 2016 GMT
Russia turns to China for help on surveillance, Internet censorship , data storage DatacenterDynamics (registration) Earlier this year, Russia's security council secretary, Nikolai Patrushev, had two meetings with Chinese politburo members on information security , while this June, Chinese President Xi Jinping and Russia's Vladimir Putin pledged an “unswerving ... and more »
Russia turns to China for help on surveillance, Internet censorship, data storage - DatacenterDynamics (registration)
Wed Nov 30 10:17, 2016 GMT
The post 8 Dec: In defence of the demos appeared first on Index on Censorship .
8 Dec: In defence of the demos
Tue Nov 29 17:10, 2016 GMT
Motherboard The Entire Internet Will Be Archived In Canada to Protect It From ... Motherboard A pro-censorship regime could spell trouble for the Internet Archive. The Internet Archive is building a Canadian copy to protect itself from Trump The Verge The internet's historical archive wants to build a back up site in Canada to protect itself from Donald Trump Business Insider The Internet Archive is building a replica database in Canada in ... VentureBeat The Daily Dot  - Computerworld  - Boing Boing all 26 news articles »
The Entire Internet Will Be Archived In Canada to Protect It From ... - Motherboard
Tue Nov 29 20:44, 2016 GMT
FRANKFURT (Reuters) - A cyber attack on routers of nearly 1 million Deutsche Telekom customers is part of a bigger campaign targeting web-connected devices around the globe, the German government and security researchers said on Tuesday.
Deutsche Telekom attack part of global campaign on routers
Tue Nov 29 19:19, 2016 GMT
CW33 NewsFix The Internet Is Full of Your Personal Information CW33 NewsFix INDIANAPOLIS, Ind.-- Some say internet privacy has become a contradiction in terms and claim once you go online, you automatically reveal information about yourself that can't remain hidden. There is a national debate happening right now to determine ...
The Internet Is Full of Your Personal Information - CW33 NewsFix
Tue Nov 29 13:31, 2016 GMT
Організація Index on Censorship відзначила посилення ворожого ставлення по відношенню до ЗМІ по всьому світу. Поширення подібних настроїв призводить до зростання нападів на працівників ЗМІ а також загрожує свободі слова. Read the full article The post Index on Censorship зафіксував посилення глобального тиску на журналістів (Media Sapiens) appeared first on Index on Censorship .
Index on Censorship зафіксував посилення глобального тиску на журналістів (Media Sapiens)
Mon Nov 28 13:32, 2016 GMT
A group of data experts have attacked the provisions for data sharing in the UK digital economy bill ahead of its report stage and third reading in the House of Parliament today. In a letter to The Telegraph on Friday experts warned of their concerns on information sharing. Read the full article The post Digital Economy Bill enters report stage and third reading – experts attack data sharing provision (Computer Business Review) appeared first on Index on Censorship .
Digital Economy Bill enters report stage and third reading – experts attack data sharing provision (Computer Business Review)
Mon Nov 28 13:22, 2016 GMT
Journalists are facing an “unprecedented” wave of attacks around the world with increased hostility to the media leading to assaults on individuals as well as press freedom, according to a new report. A series of crackdowns on media workers and news outlets in Europe as well as elsewhere has confirmed 2016 as one of the […] The post Index on Censorship: journalists now under ‘unprecedented’ attack (Guardian) appeared first on Index on Censorship .
Index on Censorship: journalists now under ‘unprecedented’ attack (Guardian)
Fri Nov 25 13:35, 2016 GMT
Information specialists call for removal of personal data sharing proposals ‘in their entirety’ if necessary technical and legal safeguards cannot be embedded in current Bill and codes of practice. Read the full article The post Telegraph letter turns up heat over Digital Economy Bill data sharing proposals (Government Computing) appeared first on Index on Censorship .
Telegraph letter turns up heat over Digital Economy Bill data sharing proposals (Government Computing)
Tue Nov 29 10:48, 2016 GMT
Germany's spy chief warns Russia could seek to disrupt next year's election with cyber attacks.
German spy chief Kahl warns Russia 'could disrupt elections'
Tue Nov 29 12:48, 2016 GMT
BERLIN (Reuters) - German Chancellor Angela Merkel said on Tuesday she had no information on where a cyber attack on Deutsche Telekom, which hit its network on Sunday and Monday, came from.
Merkel says no details on origin of cyber attack on Deutsche Telekom
Tue Nov 29 12:17, 2016 GMT
HONG KONG (Reuters) - Cyber attacks on Chinese companies have soared in the past two years, according to a survey, with new technologies that connect household items to the internet and allow them to receive and send data seen as particularly vulnerable.
Chinese firms hit by huge increase in cyber attacks: survey
Tue Nov 29 10:40, 2016 GMT
BERLIN (Reuters) - Germany's spy chief warned that Russian hackers may target next year's German election with campaigns of misinformation that could undermine the democratic process, echoing concerns voiced by the country's domestic intelligence director.
Spy chief adds to warnings of Russian cyber attacks on Germany
Tue Nov 29 09:40, 2016 GMT
With your help, each year we are able to support more writers, journalists and artists at the free speech front line – wherever they are in the world. The post Defend free speech: Donate to Index on Censorship today appeared first on Index on Censorship .
Defend free speech: Donate to Index on Censorship today
Tue Nov 29 08:23, 2016 GMT
The cybercrime unit of the French military police has shut down the country's largest pirate site, Zone-Telechargement. In addition, the popular download site DL-Protect has also gone offline. With millions of regular visitors, both download portals have been a prime target of local copyright holders for years. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Police Shut Down France’s Largest Pirate Site (Updated)
Tue Nov 29 05:45, 2016 GMT
An unprecedented series of crackdowns on media professionals and news outlets took place during the third quarter of 2016, recorded by Index on Censorship’s Mapping Media Freedom project. Between 1 July and 30 September MMF’s network of correspondents, partners and other sources submitted a total of 406 verified reports of threats to press freedom, a […] The post Media freedom comes under unprecedented crackdown in 3Q 2016 appeared first on Index on Censorship .
Media freedom comes under unprecedented crackdown in 3Q 2016
Mon Nov 28 13:35, 2016 GMT
MoneyMakingArticles Ooma Introduces Internet Security to Make Home Networks Safer and More Secure Business Wire (press release) Ooma Internet Security provides unmatched security and threat detection by blocking viruses, malware and phishing attempts triggered by browsing the internet . It also provides users the choice to block many categories of potentially objectionable web ... Ooma adds Internet security service to VoIP platform | Network World Network World all 5 news articles »
Ooma Introduces Internet Security to Make Home Networks Safer and More Secure - Business Wire (press release)
Mon Nov 28 20:30, 2016 GMT
It's available in Ford's VR app, as well as on its YouTube page.
Watch Ken Block's Gymkhana 9 video in 360-degree VR - Roadshow
Mon Nov 28 16:35, 2016 GMT
Malaysian cartoonist Zulkiflee Anwar Ulhaque, aka Zunar, was arrested on 26 November under the Sedition Act for his cartoons which are deemed insulting to the country's prime minister Najib Razak. The post Malaysia: Cartoonist Zunar arrested on charges of sedition appeared first on Index on Censorship .
Malaysia: Cartoonist Zunar arrested on charges of sedition
Mon Nov 28 13:43, 2016 GMT
Jodie Ginsberg, CEO of Index on Censorship, spoke about hate speech at the 30th anniversary of the Rafto Forum, Bergen, 2016 The post Jodie Ginsberg: The question of hate speech appeared first on Index on Censorship .
Jodie Ginsberg: The question of hate speech
Sun Nov 27 10:22, 2016 GMT
Are you wondering when the latest blockbuster movies will leak online? Then Squawkr might be something for you. The new service allows people to maintain a watchlist of films and sends alerts when a high-quality scene release appears online. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Squawkr Alerts You When a Pirated Movie Leaks Online
Sat Nov 26 20:24, 2016 GMT
Toronto Star UK passes snooping law – now, residents can kiss their Internet privacy goodbye Toronto Star After months of wrangling, Parliament has passed a contentious new snooping law that gives authorities — from police and spies to food regulators, fire officials and tax inspectors — powers to look at the Internet browsing records of everyone in the ... The 48 organisations that can see your entire online browsing history Daily Mail No Privacy For Online Surfing In The UK Anymore? Investigatory Powers Bill Passes, Giving Orgs The Right To Browse ... Gamenguide UK Government Can Ask Internet Providers for Citizens Browsing History legal Insurrection (blog) The Sun  - Fossbytes  - Gloucestershire Live all 37 news articles »
UK passes snooping law – now, residents can kiss their Internet privacy goodbye - Toronto Star
Sat Nov 26 05:21, 2016 GMT
Antiwar.com Trump's New Security Aide Wants to Use Internet to Sow Unrest in Iran Antiwar.com Most recently, her focus has been on Iran, loudly condemning the P5+1 nuclear deal and urging the US to forcibly remove Iran's Internet censorship as an attempt to fuel dissent in the country, on the grounds that a large percentage of Iran's population ... Trump's newest security aide wants to stir up discontent in Iran Sacramento Bee all 193 news articles »
Trump's New Security Aide Wants to Use Internet to Sow Unrest in Iran - Antiwar.com
Fri Nov 25 18:06, 2016 GMT
Zulkiflee Anwar Haque, aka Zunar, a Malaysian political cartoonist, continues to face harassment from the government and its supporters due to his work. The post Malaysia: Cartoonist Zunar attacked by “pro-government thugs” appeared first on Index on Censorship .
Malaysia: Cartoonist Zunar attacked by “pro-government thugs”
Fri Nov 25 16:51, 2016 GMT
Author Ece Temelkuran brings Index up to date about the latest developments in Turkey. The post Ece Temelkuran: It is really amazing here! appeared first on Index on Censorship .
Ece Temelkuran: It is really amazing here!
Fri Nov 25 10:07, 2016 GMT
The post Letter: Hands off our data appeared first on Index on Censorship .
Letter: Hands off our data
Wed Nov 23 17:14, 2016 GMT
Huffington Post UK UK wants to censor 'non-conventional' sex videos TechCrunch Britain's recent pre-occupation with Internet censorship is at once harmless and alarming. It's abundantly clear that any effort to block porn in the UK is short-sighted and nearly every proposed punishment – from ISP controls to payment blocking – are ... UK to censor online videos of 'non-conventional' sex acts The Guardian 'Blocking Extreme Porn' Is A Gateway To Internet Censorship Huffington Post UK Britain ruins the internet , starts porn censorship plan Happy (press release) (registration) (blog) International Business Times UK  - Metro all 33 news articles »
UK wants to censor 'non-conventional' sex videos - TechCrunch
Wed Nov 23 17:10, 2016 GMT
Gospel Herald Facebook May Adhere to China's Internet Censorship to Enter Country Gospel Herald The Chinese government is very strict and censorship has become their staple. International companies would have to comply with China's conditions otherwise they will be banned from the country. Facebook seems to change its tunes. Apparently, the tech ... How and Why Facebook Might Accept Censorship to Get Back Into China Fortune Facebook Said to Create Censorship Tool to Get Back Into China New York Times Facebook has built tool to censor posts in China, report says Washington Post Gamenguide  - ValueWalk  - International Business Times, India Edition all 155 news articles »
Facebook May Adhere to China's Internet Censorship to Enter Country - Gospel Herald
Wed Nov 23 09:43, 2016 GMT
International Business Times UK UK to censor online videos of 'non-conventional' sex acts The Guardian Even some who back age verification questioned such strict censorship . “It's mad that we regulate such material that aren't even criminal acts,” said Prof Clare McGlynn, an expert on pornography laws at Durham University and co-founder of the Centre ... Internet provider can block porn site without age verification system under new UK government plans International Business Times UK 'Non-conventional' porn will be banned from all websites in the UK, BBFC warns Metro all 16 news articles »
UK to censor online videos of 'non-conventional' sex acts - The Guardian
Wed Nov 23 11:14, 2016 GMT
To far too many crooked governments, evil despots, corrupt moguls or power-mad militias, a journalist is more of a threat than even an armed opponent. The post The pen is not a menace: Protecting journalists and journalism appeared first on Index on Censorship .
The pen is not a menace: Protecting journalists and journalism
Wed Nov 23 10:46, 2016 GMT
In India, a court has gone to extreme lengths to protect a new movie distributed by Viacom 18. A so-called John Doe order filed against at least 40 ISPs instructs them to block a minimum of 1,250 websites that might make the newly released Force 2 available to the public. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Viacom 18 Obtains Court Order to Block 1,250 ‘Pirate’ Sites
Wed Nov 23 01:23, 2016 GMT
(Reuters) - Facebook Inc has quietly developed a censorship tool that could persuade China to allow the world's biggest social media network to re-enter the world's second largest economy after a seven-year ban, the New York Times reported on Tuesday.
Facebook builds censorship tool to attain China re-entry: NYT
Wed Nov 23 00:16, 2016 GMT
New software prevents posts from appearing in users' feeds in specific regions, The New York Times reports.
Facebook reportedly created censorship tool for China - CNET
Tue Nov 22 23:21, 2016 GMT
JD Supra (press release) Policing Internet Privacy : FCC's New Frontier JD Supra (press release) Unwilling to be left behind by the likes of Google and Facebook, Internet Service Providers are increasingly exploring how they may capitalize on the high-value targeted advertising market. In November 2016, AT&T explained that targeted advertising is ... and more »
Policing Internet Privacy: FCC's New Frontier - JD Supra (press release)
Tue Nov 22 19:05, 2016 GMT
The Opera web browser feature 'Turbo Mode' is designed to speed up browsing. As a side effect, it also bypasses website blocks, something popular with pirates. However, it appears that the company has been in talks to integrate a blacklist which could stop access to blocked domains. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Opera Browser Asked to Blacklist Pirate Sites in “Turbo Mode”
Tue Nov 22 17:41, 2016 GMT
Julia Farrington, associate arts producer at Index on Censorship, will discuss art and censorship at Hackney Wick at the independent bar and creative space Grow. The post Julia Farrington talks art and censorship appeared first on Index on Censorship .
Julia Farrington talks art and censorship
Tue Nov 22 12:50, 2016 GMT
Fossbytes Top 10 Countries With Highest Internet Censorship in 2016 Fossbytes Short Bytes: The Freedom on the Net 2016 report published by Freedom House brings some insight to the level of internet censorship in the world. Almost 67% internet population uses censored internet . Here are the top 10 countries with highest internet  ... The 5 Worst Places To Be An Internet User In Southeast Asia Forbes all 3 news articles »
Top 10 Countries With Highest Internet Censorship in 2016 - Fossbytes
Tue Nov 22 12:55, 2016 GMT
A Russian cybersecurity company warns of a spate of remotely coordinated attacks on cash machines.
Malware is making ATMs 'spit cash'
Tue Nov 22 10:13, 2016 GMT
BANGKOK (Reuters) - Thailand's military government, which has cracked down on online dissent since seizing power in 2014, is pushing ahead with cyber security bills that rights groups say could mean more extensive online monitoring, raising concerns over privacy protection.
Thailand seeks to tighten cyber security, raising questions about privacy protection
Tue Nov 22 08:16, 2016 GMT
Forbes The 5 Worst Places To Be An Internet User In Southeast Asia Forbes Internet freedom has declined around the world for the sixth year in a row thanks to censorship and government monitoring of messaging apps. While there are worse places to use the internet than Southeast Asia – such as blogging about religious freedom ...
The 5 Worst Places To Be An Internet User In Southeast Asia - Forbes
Tue Nov 22 08:39, 2016 GMT
PC Advisor BullGuard Internet Security v17 PC Advisor There's a strong antivirus engine, of course. A firewall detects and blocks network attacks. The vulnerability scanner highlights missing updates for your applications. The spam filter keeps your Inbox clean, browsing protection prevents you accessing ... and more »
BullGuard Internet Security v17 - PC Advisor
Tue Nov 22 00:42, 2016 GMT
Bitcoin exchange calls agency's request for "John Doe" summons overly broad.
Coinbase fights IRS efforts to obtain customer records - CNET
Mon Nov 21 17:37, 2016 GMT
Common Dreams (press release) Whose Fake News Gets a Pass? NYT Advocates Internet Censorship Common Dreams (press release) In its lead editorial on Sunday, The New York Times decried what it deemed “The Digital Virus Called Fake News” and called for Internet censorship to counter this alleged problem, taking particular aim at Facebook founder Mark Zuckerberg for letting ... Facebook's Plan To Stop "Fake News" Borders On Censorship ETF Daily News (blog) all 391 news articles »
Whose Fake News Gets a Pass? NYT Advocates Internet Censorship - Common Dreams (press release)
Mon Nov 21 12:38, 2016 GMT
A series of attacks and death threats towards journalists and broadcasters has stirred unrest amongst journalists in Europe’s youngest country The post Kosovo: Violence, threats and impunity continue to plague the media appeared first on Index on Censorship .
Kosovo: Violence, threats and impunity continue to plague the media
Sun Nov 20 07:29, 2016 GMT
International Business Times Facebook Fake News Stories: China Calls For More Censorship On Internet Following Social Media's Alleged Role In ... International Business Times China's vision of a more secure cyberspace with rigid censorship comes at a time when the West is debating on the fake news surge and if smartphone companies should cooperate with federal agents to help them gain access to private information in phones ... Rights Groups Warn Tech Firms Over China's Harsh New Internet Regime Radio Free Asia China Presses Tech Firms to Police the Internet Wall Street Journal China says terrorism, fake news impel greater global internet curbs The Indian Express Xinhua  - Patently Apple all 7 news articles »
Facebook Fake News Stories: China Calls For More Censorship On Internet Following Social Media's Alleged Role In ... - International Business Times
Sun Nov 20 19:52, 2016 GMT
NYT Advocates Internet Censorship Consortium News In its lead editorial on Sunday, The New York Times decried what it deemed “The Digital Virus Called Fake News” and called for Internet censorship to counter this alleged problem, taking particular aim at Facebook founder Mark Zuckerberg for letting ... and more »
NYT Advocates Internet Censorship - Consortium News
Sun Nov 20 09:51, 2016 GMT
UK Internet providers have added close to 500 URLs to the national pirate site blocklist. The expansion follows a request from copyright holders who frequently add new proxies for sites that have previously been barred. Despite this mass-update, the ongoing blocking whack-a-mole is far from over. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
UK Piracy Blocklist Silently Expands With Hundreds of Domains
Sat Nov 19 02:00, 2016 GMT
PCMag India F-Secure Internet Security (2017) PCMag India F-Secure Internet Security (2017) enhances its antivirus protection with those browser-safety features, and it includes an easy-to-use spam filter and simple parental control, too. But this collection of components doesn't quite make a top-notch suite ...
F-Secure Internet Security (2017) - PCMag India
Fri Nov 18 18:50, 2016 GMT
The FTC Should Regulate Internet Privacy Heritage.org In an October 25 blog commentary posted at this site, Geoffrey Manne and Kristian Stout argued against a proposed Federal Communications Commission (FCC) ban on the use of mandatory arbitration clauses in internet service providers' consumer service ... and more »
The FTC Should Regulate Internet Privacy - Heritage.org
Fri Nov 18 16:58, 2016 GMT
Washington Post 60 percent of Russians think Internet censorship is necessary, poll finds Washington Post Sixty percent of Russians believe that Internet censorship — in particular, the banning of certain websites and material — is necessary, according to a new poll. Just 25 percent opposed the idea; the rest of the respondents didn't know or declined to ...
60 percent of Russians think Internet censorship is necessary, poll finds - Washington Post
Fri Nov 18 14:19, 2016 GMT
Students at City University of London, home to one of the country’s most respected journalism schools, have voted to ban the Sun, Daily Mail and Express from its campus. Read the full article The post City University students vote for campus ban on Sun, Mail and Express (Guardian) appeared first on Index on Censorship .
City University students vote for campus ban on Sun, Mail and Express (Guardian)
Fri Nov 18 13:21, 2016 GMT
Slate Magazine The U.S. Needs to Stop Lecturing the Rest of the World About Internet Values Slate Magazine Back in 2005 and 2006, there was a series of scandals when U.S. tech firms colluded with internet censorship in China—Yahoo, Microsoft, and Google. In the most infamous case, Yahoo's collaboration was said to have resulted in the imprisonment of a ... Internet freedom on downfall, Ethiopia worst eNCA Pakistan among 10 worst countries for internet freedom The Express Tribune all 8 news articles »
The U.S. Needs to Stop Lecturing the Rest of the World About Internet Values - Slate Magazine
Thu Nov 17 15:34, 2016 GMT
The post Mapping Media Freedom: In review 10-17 November appeared first on Index on Censorship .
Mapping Media Freedom: In review 10-17 November
Fri Nov 18 08:33, 2016 GMT
MOSCOW (Reuters) - Russia's decision to block public access to networking site LinkedIn creates a precedent that could be used to justify blocking access to other sites operating in Russia, RIA news agency quoted the U.S. embassy in Moscow as saying.
U.S. concerned over Russia blocking access to LinkedIn: RIA
Thu Nov 17 17:19, 2016 GMT
WISD focuses on internet security Herald-Banner As classrooms become more technology-driven, a host of security challenges await in the age of the internet for the student population. Whether it be sexting, information security , school filters or educating staff and students on how to navigate such ...
WISD focuses on internet security - Herald-Banner
Thu Nov 17 19:36, 2016 GMT
NBC4i.com 'Better Call Jackson' protects your internet privacy NBC4i.com Internet Explorer – Go to the Privacy tab and click the Advanced button. Check the “Override automatic cookie handling” option, and then set “Third-party Cookies” to “ Block .” Click the OK button. Google Chrome – In the Privacy section, click on the ...
'Better Call Jackson' protects your internet privacy - NBC4i.com
Thu Nov 17 13:32, 2016 GMT
Christians in the UK believe their views are being “shut down” by wider society, the CEO of Index on Censorship Jodie Ginsberg has said. Speaking at Spiked’s ‘Enemies of the state: Religious freedom and the new repression’ event in London on Wednesday, Ginsberg said it was “vital” for everyone to be able to express their […] The post Christians feel their views are being ‘shut down’ says CEO of Index on Censorship (Premier) appeared first on Index on Censorship .
Christians feel their views are being ‘shut down’ says CEO of Index on Censorship (Premier)
Thu Nov 17 14:00, 2016 GMT
Firefox Focus blocks software that website ads use to track your behavior online. Also, say goodbye to tabs and no menus.
​Firefox's new iPhone browser hides you from advertisers' eyes - CNET
Thu Nov 17 07:30, 2016 GMT
WISD focuses on internet security Corsicana Daily Sun As classrooms become more technology-driven, a host of security challenges await in the age of the internet for the student population. Whether it be sexting, information security , school filters or educating staff and students on how to navigate such ... and more »
WISD focuses on internet security - Corsicana Daily Sun
Wed Nov 16 18:07, 2016 GMT
After - unverified - reports of a direct request by North Korea to China to stamp out nicknames referring to Kim Jong-un's weight, social media users are trying to get around the censors.
China clamps down on Kim Jong-un 'fatty' jokes
Thu Nov 17 08:35, 2016 GMT
MOSCOW (Reuters) - Russia's Roskomnadzor communications watchdog said on Thursday it had sent a request to Internet providers to block the website of social media network Linkedin.
Russia begins process to block Linkedin website
Wed Nov 16 21:13, 2016 GMT
WISD focuses on internet security Cleburne Times-Review As classrooms become more technology-driven, a host of security challenges await in the age of the internet for the student population. Whether it be sexting, information security , school filters or educating staff and students on how to navigate such ... and more »
WISD focuses on internet security - Cleburne Times-Review
Wed Nov 16 01:50, 2016 GMT
CNNMoney China holds 'World Internet Conference' as censorship intensifies CNNMoney China's goal "poses a real threat to the global and open nature of the internet ," said Patrick Poon, a researcher at Amnesty International. Amnesty has documented a marked uptick in censorship and restriction of freedom of expression in China over the ... Facebook, Microsoft, LinkedIn and others must resist China's Orwellian vision of the internet Amnesty International China's Xi Jinping Opens Tech Conference With Call for 'Cyber Sovereignty' Wall Street Journal China's Xi urges cooperation among nations in governance of global interne... Reuters CCTV all 48 news articles »
China holds 'World Internet Conference' as censorship intensifies - CNNMoney
Wed Nov 16 21:08, 2016 GMT
WISD focuses on internet security Palestine Herald Press As classrooms become more technology-driven, a host of security challenges await in the age of the internet for the student population. Whether it be sexting, information security , school filters or educating staff and students on how to navigate such ...
WISD focuses on internet security - Palestine Herald Press
Wed Nov 16 16:14, 2016 GMT
Quartz Internet freedom in Ethiopia is the fourth worst in the world Quartz Ethiopia's internet is among the least free in the world. According to a new index released by the nonprofit Freedom House, Ethiopia ranked ahead of only Iran, Syria, and China, out of 65 countries in terms of access to the internet , censorship , and ... and more »
Internet freedom in Ethiopia is the fourth worst in the world - Quartz
Wed Nov 16 15:23, 2016 GMT
Women’s rights defender, writer and blogger Ghada Jamsheer remains in jail in Bahrain The post Bahrain: Human rights defender Ghada Jamsheer remains in jail despite poor health appeared first on Index on Censorship .
Bahrain: Human rights defender Ghada Jamsheer remains in jail despite poor health
Wed Nov 16 13:21, 2016 GMT
Important year for freedom of expression coverage is being recognised in this BSME award, says Jolley. The post Rachael Jolley, editor of Index magazine, receives Editor of the Year award appeared first on Index on Censorship .
Rachael Jolley, editor of Index magazine, receives Editor of the Year award
Wed Nov 16 08:59, 2016 GMT
A complaint from the MPAA has led the cyber-crime division of Ukraine's National Police to raid FS.to, one of the country's most popular pirate sites. Thus far 60 servers have been seized and 19 people have been arrested, but police fear the site could reappear since some individuals are on the run and a mirror site may be standing by in Russia. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Police Raid Pirate Site & Seize 60 Servers Following MPAA Complaint
Wed Nov 16 01:39, 2016 GMT
WISD focuses on internet security Weatherford Democrat As classrooms become more technology-driven, a host of security challenges await in the age of the internet for the student population. Whether it be sexting, information security , school filters or educating staff and students on how to navigate such ...
WISD focuses on internet security - Weatherford Democrat
Tue Nov 15 17:17, 2016 GMT
Fortune Two-Thirds of the World Live Under Government Internet Censorship Fortune S&P Index data is the property of Chicago Mercantile Exchange Inc. and its licensors. All rights reserved. Terms & Conditions. Powered and implemented by Interactive Data Managed Solutions. © 2016 Time Inc. All rights reserved. Fortune.com is a part of ...
Two-Thirds of the World Live Under Government Internet Censorship - Fortune
Tue Nov 15 08:28, 2016 GMT
Bahrain’s public prosecution yesterday charged leading opposition politician Ebrahim Sharif under article 165 of the penal code with “inciting hatred against the regime”. The post Bahrain charges Ebrahim Sharif for AP interview after Prince Charles visit appeared first on Index on Censorship .
Bahrain charges Ebrahim Sharif for AP interview after Prince Charles visit
Tue Nov 15 05:12, 2016 GMT
Is Your Kid Learning About Internet Privacy ? The Interrobang Six year old Claire knows not to share her full name on the internet , but does your child? While we're at it, let's also teach them not to be obnoxious trolls, not to send non consensual dick pics, and stop sharing photos of their brunch… You know ... and more »
Is Your Kid Learning About Internet Privacy? - The Interrobang
Mon Nov 14 23:20, 2016 GMT
Breitbart News Report: Two-Thirds of Planet Live Under Internet Censorship Breitbart News Two-thirds of people on the planet live under government Internet censorship , while Internet freedom has declined for the sixth consecutive year, according to a report from Freedom House. Freedom House discovered that around 67% of Internet users live ... Freedom House warns that internet privacy is eroding fast Inquirer Two-thirds of the world's internet users live under government ... The Verge Global Internet Freedom Declines for 6th Straight Year Morning Consult NPR  - Voice of America  - Economic Times  - Freedom House all 14 news articles »
Report: Two-Thirds of Planet Live Under Internet Censorship - Breitbart News
Mon Nov 14 14:07, 2016 GMT
ITProPortal Is internet security fundamentally flawed? ITProPortal What is the current state of enterprise security ? As it has been for the past several years, the state of enterprise security is badly broken. We are seeing situations with great asymmetry between attacker (some script kiddies) and victim (much of the ... How voice recognition will affect privacy in the Internet of Things CIO The Internet Of Things, DNS Weaknesses, Or Trump: Which Will Sink The Internet ? Forbes IoT security attacks: a timeline of the internet of things' darkest hours RCR Wireless News IDTechEx.com (press release)  - V3.co.uk all 47 news articles »
Is internet security fundamentally flawed? - ITProPortal
Thu Nov 10 17:25, 2016 GMT
Malware threats are ever-present in mobile and this needs to be a top concern for IT execs, as they continue to issue millions of mobile devices to enterprise workers daily. An interesting piece ran in late October at TechTarget examining the protections—or lack of same—that exist for Android apps. It was a legitimate exploration of the issue and it noted that protections are much better in North America, Europe, Japan and Australia than in the rest of the world. The reason for those geographic security differences are that the places listed is where Google itself screens and monitors the apps. And that, ladies and gentlemen, is the real problem. It's about conflict of interest coupled with priorities. As for the conflict, do you really want to leave your security to a search engine firm that makes almost all of its money by selling your data to advertisers? As for the priorities, let's be honest. How much money and resources do you think a Google exec can justify protecting the apps before you can download them? Although it's true that Google has an interest in minimizing embarrassing security leak stories, it has a much greater business incentive in housing as many apps as possible. At the very least, Google wants to offer as many—if not more— apps than their rivals in the iOS offices at Apple. After all, IT managers supporting Android are always looking at Apple, in the same way that IT folk supporting Apple are always looking at Android. Where does this leave things on security? It means that Google will do the bare minimal effort on security—just enough to ferret out the most obvious offenders, so they can say that they did that. If it's of any comfort, Apple does the same level of effort for iOS apps. Apple's priority is selling hardware, software and services—none of which are security. Back to that TechTarget piece on Android. The story offered two other reasons to be comfortable with Android security, two reasons that should actually make you far more nervous. "Google’s statistics claim that 0.16 percent of the apps that users attempted to install from the Play Store in 2015 were found to be malicious. And various studies show that the average Android user only installs about one app per month," the story noted. "Basically, you really need to be unlucky to install a malicious app out of the 2.4 million available in the Play Store." First, enterprise employees download a lot more than one app per month, on an individual basis. But the company overall? It's a mammoth figure. That's because BYOD (Bring Your Own Device) efforts are coupled with corporate-owned devices being distributed. Either way, these devices are going to house a plethora of corporate apps right alongside personal apps. A handful of companies create rock-solid (or so they hope) partitions that supposedly provides some degree of separation between personal and corporate data. This allows for the company to backup corporate data onto their servers, while leaving personal data and apps alone. Even when that works—which isn't often—that does nothing for security risks. Any personal app that is downloaded with malware will have no respect for such a barrier and will infect corporate data with ease, which will then be backed up and do its nefarious damage across your LAN and then your WAN. Partitions are designed for privacy, not security. Secondly, that stat assumes that all apps are created equal, which they are not. When identity thieves or cyber assailants want to infiltrate enterprise networks, they will specifically target the kinds of apps most likely to be used. Indeed, some will target specific companies and research what apps are likely to be installed for those employees. Hence, that 0.16 percent number shouldn't provide any comfort. The story also offers seemingly comforting thoughts about how hard it is to work outside the Android environment. "Going outside of the Play Store does bump up your risk factor, but there is still a process to installing a malicious app that news about Android malware tends to gloss over. The vast majority of Android malware is delivered to devices via 'side loading,' which is to say the app has to be actively installed by the user outside of the Google Play Store environment. This is not a simple process," it noted. "In order to be able to side load an app, a user must first go into the device settings and turn on the option to install apps from 'Unknown Sources' and tap OK on the dialog that pops up warning the user that side loading apps makes 'your phone and personal data more vulnerable to attack.'" For a determined tech-comfortable employee, that's not difficult. And for a determined teenage offspring of said employee? It's a lot more fun than homework. To be fair, though, this misses the point. This suggests that it's safe staying within the Google control mechanism, in the same way that it's presumably safer to stay within Apple's environment. I'll concede that it's safer. It's simply not nearly safe enough. A company needs to control its own security and that means retaining the services of an operation whose priority is maintaining security. If it's a minor hobby far removed from how they make almost all of their money, that's not who you want checking your apps.
How Safe Is It Letting Google And Apple Be Your App Security Team?
Mon Nov 14 17:16, 2016 GMT
Inquirer Freedom House warns that internet privacy is eroding fast Inquirer The Chinese government's crackdown on free expression under president Xi Jinping's 'information security ' policy is taking its toll on the digital activists who have traditionally fought back against censorship and surveillance," said Freedom House ... Two-thirds of the world's internet users live under government censorship : report The Verge Internet Freedom Wanes As Governments Target Messaging, Social Apps NPR Internet freedom on the decline in India: Report Economic Times Estonian World (press release) (blog)  - Phys.Org  - The Memo all 10 news articles »
Freedom House warns that internet privacy is eroding fast - Inquirer
Tue Nov 8 16:15, 2016 GMT
As France continues to push the envelope in terms of enforcing a worldwide “right to be forgotten,” free press advocates in the U.S. have stepped in to help Google defend itself from an order to delist content across the global Internet.  Read the full article The post Journalism groups oppose French global delisting order (Reporters Committee) appeared first on Index on Censorship .
Journalism groups oppose French global delisting order (Reporters Committee)
Mon Nov 14 09:35, 2016 GMT
The post Indian sociologist accused of murder in case she says is retaliation for her work appeared first on Index on Censorship .
Indian sociologist accused of murder in case she says is retaliation for her work
Mon Nov 14 05:43, 2016 GMT
Two-thirds of the world's internet users live under government censorship : report The Verge Two-thirds of the world's internet users live under regimes of government censorship , according to a report released today. The report from Freedom House, a pro-democracy think tank, finds that internet freedom across the globe declined for a sixth ...
Two-thirds of the world's internet users live under government censorship: report - The Verge
Sun Nov 13 10:20, 2016 GMT
DMCA takedown notices are designed to take down infringing content, but they regularly target legitimate content as well. Just recently a local distributor of Dreamworks' "Trolls" movie tried to have several TorrentFreak links removed from Google for merely referencing "copyright trolls." Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
“Trolls” Try to Censor TorrentFreak’s Copyright Trolls Coverage…
Sun Nov 13 03:03, 2016 GMT
Hong Kong Free Press China is the obstacle to Google's plan to end internet censorship Hong Kong Free Press Our 2013 suggestions to Google on how they might end online censorship in China are no longer valid, largely because the Chinese authorities moved to completely block everything Google. Our premise at the time was that Google was too big for the ...
China is the obstacle to Google's plan to end internet censorship - Hong Kong Free Press
Sat Nov 12 09:18, 2016 GMT
Dazeinfo (blog) Facebook Buys Leaked Password on the Internet to Ensure Data Security Dazeinfo (blog) Moreover, Facebook provides tools to its users for tightening up their account's security and maintaining privacy . Some of ... While Facebook is doing everything possible to secure their users' accounts, several hackers continue to keep trying to hack ... and more »
Facebook Buys Leaked Password on the Internet to Ensure Data Security - Dazeinfo (blog)
Sat Nov 12 11:07, 2016 GMT
File-sharers are often portrayed as destroyers of the creative industries but new research suggests that isn't the case. According to the survey, 60% of music pirates also buy music, a figure that drops to 44% among non-sharers. Movie pirates continue the trend by being much more likely to pay than their law-abiding counterparts. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Internet Pirates More Likely to Pay Than Law-Abiding Counterparts
Fri Nov 11 21:01, 2016 GMT
The Pirate Bay and other pirate sites risk a "repeat offender" ban from Google, but not over copyright infringements. Google has updated its safe browsing service, used by modern browsers such as Chrome, Firefox, and Safari, which will now block websites for a minimum of thirty days after being repeatedly marked as harmful. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Pirate Bay Risks “Repeat Offender” Ban From Google
Thu Nov 10 15:26, 2016 GMT
Newsweek How Donald Trump could dismantle net neutrality and the rest of Obama's Internet legacy Washington Post In particular danger are key initiatives of the Obama years, including net neutrality and a pivotal series of Internet privacy regulations that came along with it. ... Providers cannot block or slow videos, for instance, in order to favor email traffic ... What a Trump Presidency Means for Cybersecurity, Net Neutrality and Internet Freedom Newsweek Editorial: Smart privacy protections for Internet users Tampabay.com Net neutrality is suddenly on the chopping block The Verge all 67 news articles »
How Donald Trump could dismantle net neutrality and the rest of Obama's Internet legacy - Washington Post
Fri Nov 11 20:01, 2016 GMT
Your online identity is at risk now more than ever. This week’s cyber news update covers the growing threat of online banking attacks and phishing scams across the globe. Tesco Bank Hacked For Millions... read more The post Cyber News Rundown: Edition 11/11/2016 appeared first on Webroot Threat Blog .
Cyber News Rundown: Edition 11/11/2016
Fri Nov 11 17:26, 2016 GMT
MOSCOW (Reuters) - Two of Russia's largest banks, Sberbank and Alfa Bank, say they have been hit by cyber attacks in recent days.
Two major Russian banks say hit by cyber attacks
Fri Nov 11 08:54, 2016 GMT
The post Mapping Media Freedom: In review 28 October-9 November appeared first on Index on Censorship .
Mapping Media Freedom: In review 28 October-9 November
Fri Nov 11 01:19, 2016 GMT
Bloomberg What a Trump Presidency Means for Internet Privacy Bloomberg Jamil Jaffer, George Mason University director of homeland security law, discusses the impact of a Trump presidency on Internet privacy and cybersecurity. He speaks with Bloomberg's Emily Chang on "Bloomberg Technology." (Source: Bloomberg) ...
What a Trump Presidency Means for Internet Privacy - Bloomberg
Thu Nov 10 23:12, 2016 GMT
NEW YORK (Reuters) - A Florida man is the latest individual to face criminal charges in connection with what U.S. prosecutors say was an illegal bitcoin exchange owned by an Israeli accused of being behind hacking attacks on companies including JPMorgan Chase & Co.
U.S. charges Florida man in case linked to JPMorgan hacking probe
Thu Nov 10 23:58, 2016 GMT
Washington Post Could better Internet security have prevented Trump's shocking win? Washington Post These twin forces — fear and regret — are fueling demands for the tech industry to push a new wave of security and privacy upgrades that would build on those adopted by the tech industry in the aftermath of the revelations by former National Security ... and more »
Could better Internet security have prevented Trump's shocking win? - Washington Post
Thu Nov 10 20:24, 2016 GMT
LONDON (Reuters) - Dutch Bank ABN-AMRO considered sending undercover security staff amid employees to help improve cyber security but has decided not to follow this practice, officials said.
ABN looked at using undercover security staff to prevent cyber attacks
Thu Nov 10 00:00, 2016 GMT
Bitcoin Knots CVE-2016-8889 Local Information Disclosure Vulnerability
Vuln: Bitcoin Knots CVE-2016-8889 Local Information Disclosure Vulnerability
Thu Nov 10 16:25, 2016 GMT
Five Russian banks were hit by a a series of cyber-attacks on 8 November, said the country's banking regulator.
Russia banks hit by cyber-attack
Thu Nov 10 14:12, 2016 GMT
MOSCOW (Reuters) - A Russian court on Thursday upheld a decision to block the website of social networking company LinkedIn, Interfax news agency reported.
Court upholds ban on LinkedIn website in Russia: Ifax
Thu Nov 10 12:32, 2016 GMT
Concentrated media market gives business owners influence over the news The post Exploring Ireland’s decline in media plurality appeared first on Index on Censorship .
Exploring Ireland’s decline in media plurality
Wed Nov 9 15:56, 2016 GMT
Newsweek What a Trump Presidency Means for Cybersecurity, Net Neutrality and Internet Freedom Newsweek “This in turn may lead to more aggressive cyber security policies, faster response to cyber attack campaigns, and greater investment in cyber security defenses.” It remains unclear how clued up Trump is on the actual issues and specific threats facing ... Trump's plan: Tariffs on electronics, ban on skilled tech migrants, cyber-weapons The Register all 18 news articles »
What a Trump Presidency Means for Cybersecurity, Net Neutrality and Internet Freedom - Newsweek
Wed Nov 9 19:25, 2016 GMT
The Mary Sue Internet Privacy 101: VPNs, Encrypted Messaging, and Anonymous Browsing The Mary Sue For no particular reason at all, here are some inexpensive and simple ways that you can beef up the security surrounding your internet presence. Let's just say, totally hypothetically, that you end up living in a country with a fascist regime that ...
Internet Privacy 101: VPNs, Encrypted Messaging, and Anonymous Browsing - The Mary Sue
Tue Nov 8 23:43, 2016 GMT
Corporate Counsel (registration) China Passes Controversial Internet Security Law Corporate Counsel (registration) The Standing Committee of the National People's Congress, China's top legislature, approved the new Cybersecurity Law, which was created for reasons of national security and to curb internet fraud. It will take effect in June 2017. Overseas criticism ...
China Passes Controversial Internet Security Law - Corporate Counsel (registration)
Thu Oct 27 14:54, 2016 GMT
Variety FCC Approves Contentious New Internet Privacy Rules Variety He said that what the FCC was doing was a “common sense step to move forward to protect internet privacy .” “Before today there were no protections,” he said, adding that they were extending to the internet the same concepts that they have extended to ...
FCC Approves Contentious New Internet Privacy Rules - Variety
Wed Nov 9 07:15, 2016 GMT
China's internet censorship is throttling software development Business Standard If you've ever been to mainland China, chances are you're familiar with the Great Firewall, the country's all-encompassing internet censorship apparatus. You know the despair of not being able to open Facebook, the pain of going mute on Twitter. But ...
China's internet censorship is throttling software development - Business Standard
Tue Nov 8 17:11, 2016 GMT
All too often, application development professionals believe that application security is not their responsibility. To make matters worse, this belief is shared by their managers and CIOs, and reinforced by organizational structures and job descriptions. When asked about application security, developers might say: They are responsible only for application functionality and quality. They are not security specialists. They do not have the time or skills to address application security. Their work is not driven by security concerns. Security is not their priority. Their priority is to deliver required application functionality by a deadline and under budget. When asked who should take care of application security, they point to the security team. Asking the security team the same question, you will often hear: Its team members are busy with installing, operating and tuning network firewalls, antivirus software, web gateways, data loss prevention systems, etc. They are not programmers and don’t know programming languages and application development methodologies. Therefore, they cannot be held responsible for application security. At best, they whitelist applications for end-point protection systems. When asked who should be responsible for application security, they point to the development team. Unfortunately, cyberattackers often know security better than application developers, and know application development better than security specialists. Both Dev and Sec feel that they are successful with their objectives, but when it comes to application security, this success is false. The gaps that exist between security and development teams have traditionally resulted in a situation when neither Dev nor Sec addressed application security completely, leaving security gaps exploited by cyberattackers. Bridging the AppSec Gap We believe that, with the emergence and advancement of DevOps and CI/CD, application security can be integrated into these processes, and a great deal of AppSec responsibility can be handed over to development teams without slowing down software development or delivery. Development teams can start by learning and adopting secure coding practices through educational organizations or application security testing vendors. Best practices for secure coding can also be found on websites of organizations such as OWASP. Developers should adopt manual code reviews and, more importantly, automated code reviews conducted by technologies such as static application security testing (SAST) that analyze application code in pre-production states for security vulnerabilities, point to their origin, and offer remediation advice. Developers should also adopt software composition analysis (SCA) technologies that analyze applications for the presence of third-party (mostly open source) components with known security vulnerabilities. At test phases near production, applications should be tested with dynamic testing technologies (DAST) that discover vulnerabilities in running tested applications. Those technologies – SAST, SCA, and DAST – have often been too complex for developers to operate, leaving dedicated experts to operate them. Over time, a few changes have occurred, making it easier for developers to take advantage of them: These technologies are now available as cloud services. Developers do not need to install or operate them. They only need to request their execution from cloud services, which will test applications on developers’ behalf, so that developers will only need to remediate vulnerabilities detected by the services. These technologies can be invoked programmatically via APIs at the defined events, such as upon completion of compilation or build process. These technologies have been evolving to support individual developers, enabling their invocation out of IDEs and returning test results back to IDEs. DevOps has the opportunity to become DevSecOps. It can be rapid, incremental and continuous. And it can be driven by development and operation specialists. It should be their responsibility to ensure that application security processes are invoked at proper phases of the software lifecycle, and that detected vulnerabilities are fixed and protected. If we do that, we close the gaps between great software and great security, and we’re all better off.
The Gap Between Development and Security Specialists Should Be Closed
Tue Nov 8 17:05, 2016 GMT
The EU has in recent years used trade agreements as a venue for promotion of human rights, notably freedom of speech.  Yet, as trade negotiators seek to wrap up trade negotiations on the Trade in Services Agreement (TiSA), the EU seems to have abandoned its promotion of freedom of expression. Read the full article The post Is the EU abandoning its promotion of freedom of expression via trade agreements? (Disruptive Competition Project) appeared first on Index on Censorship .
Is the EU abandoning its promotion of freedom of expression via trade agreements? (Disruptive Competition Project)
Tue Nov 8 14:53, 2016 GMT
LONDON (Reuters) - Britain's National Crime Agency (NCA) is leading a criminal investigation into the theft of money from thousands of bank accounts at Tesco Bank, a unit of Tesco Plc , according to a statement from the National Cyber Security Center (NCSC).
UK's National Crime Agency investigating Tesco Bank cyber attack
Tue Nov 8 12:39, 2016 GMT
Details of people's sexual preferences, health and surfing history have been shared by a browser add-on that rates website privacy and security policies.
Secure browser add-on pulled after privacy lapse
Tue Nov 8 11:23, 2016 GMT
Reuters After cyber attacks, Internet of Things wrestles with making smart devices... Reuters "The harsh reality is that cyber security is not even on the radar of many manufacturers," said Trent Telford, CEO of Covata (CVT.AX), an internet security firm. " Security will eventually become more of a priority, but it may well be too late for this ... and more »
After cyber attacks, Internet of Things wrestles with making smart devices... - Reuters
Tue Nov 8 09:56, 2016 GMT
The post Moddi copy appeared first on Index on Censorship .
Moddi copy
Mon Nov 7 15:09, 2016 GMT
As a Customer Success Manager at Veracode, I work with over 60 clients to help optimize their application security programs. Security programs come in all shapes and sizes, as they should, because not every organization is built the same. However, I’ve worked with enough clients to say that, regardless of whether your organization is in the Fortune 500 or Tom, Dick & Harry, Ltd., there are steps that any company can take to operationalize a successful AppSec program. 1 - Understand Your Application Portfolio First and foremost, understanding your application layer will be the first step to understanding where to focus your remediation efforts. I always tell my customers “you don’t know what you don’t know,” and as your organization introduces more and more applications into the environment, the “don’t know” starts to outweigh the “know” quickly when it comes to potential risk. It’s fairly typical for even the most mature AppSec programs to focus their efforts on web-facing applications or any apps that process critical data (PCI, PII, HIPPA, etc.). However, legacy applications, marketing websites, third-party/open source apps and even internally facing apps comprise some portion of your risk. At the very least, having awareness into your overall application inventory will help your team prioritize its remediation efforts. 2 - Institute Security Into Dev Culture Building a culture of secure coding is an alien concept to a lot of organizations, especially since functionality and deadlines usually trump all else. With that said, more and more security personnel that I speak to are working to institute a culture of security within the development environment by providing their developers context around what secure code actually entails. Many young developers just entering the workforce haven’t been exposed to the nuances of cybercrime, since it is not a major component of many computer science programs. Considering all of this, instituting a programmatic Developer Training curriculum can help bolster the understanding of the inherent risks of software vulnerabilities and how to go about fixing them. This can come in the form of a thorough eLearning program catered to specific programming technologies or, even better, live instructor-led seminars focusing on a specific area of AppSec that is relative to your dev team. There are also a slew of security conferences and roadshows that pop up in almost every major US city (OWASP, BlackHat, DefCon, etc.). It’s never a bad idea to get people out of the office to network with other like-minded security professionals to discuss experiences and best practices. 3 - Establish an Achievable Security Policy Part of instituting a security-minded culture is to make security testing as seamless as possible. I can tell you that instituting a draconian “fix everything” security policy is a surefire way to bring your AppSec program to a screeching halt. Security policies are meant to be aggressive, but attainable, as not every flaw is necessarily exploitable. Setting up a solid application security policy is often an iterative process. Starting with basic policy rules such as disallowing any high- or critical-severity flaws is a good starting point as it provides an actionable baseline without discouraging developers altogether. Over time, as your developers become more accustomed to security testing, you can fine-tune your policy to scale with your program as it matures. Instead of keeping the bar set at disallowing only highs and above, raise the bar to include medium-severity flaws and require more frequent scans before pushing to production. Developer adoption is one of the top reasons why AppSec programs stall, so it pays to minimize the barrier of entry, at least until you can gain traction and promote value across your dev teams. 4 - Integrate Security Testing into the Software Lifecycle Organizations have varying approaches to implementing security testing into their application deployment. Some choose to run tests just prior to launch while others take a more proactive approach and integrate directly into their development lifecycle. I speak to enough developers to know that the last thing they want to do is log into yet another portal to run a scan on their app in hopes of passing policy. They often ask how they can make security testing as streamlined as possible, and my answer always involves incorporating it directly into their development process. Incorporating testing as early in the SDLC as possible is the best way to minimize friction with security teams and ensure that your team is shipping safe code without sacrificing speed to market. That is why I push my more agile customers to integrate testing directly into their CI tools, like Jenkins, so that security scans are automated with each build. This enables dev teams to fix flaws as they find them. Granted, not everyone builds code the same way, but there is almost always a way to incorporate testing at each phase of the development process; it is just a matter of what makes sense for your team. What does success mean for your application security program? We’d love to hear how you’ve leveraged these tactics as well as any others to gain traction with your program.  In addition, you can get more detailed information on how our customers are finding success with their AppSec programs in our recently published State of Software Security report (based on our Platform data).
Tips From the Front Lines: 4 Surefire Ways to Ensure a Successful AppSec Program
Mon Nov 7 22:53, 2016 GMT
Wall Street Journal FBI Warns Internet Online Attacks on Private Industry Will Continue Wall Street Journal The FBI issued the bulletin five days after hackers used a network—called Mirai—of internet -connected devices including cameras and digital-video recorders to launch an attack on internet service provider Dynamic Network Services Inc., known as Dyn ... Hack attacks cut internet access in Liberia BBC News Massive cyber-attack grinds Liberia's internet to a halt The Guardian Massive DDoS Attacks Disable Internet Access Throughout Liberia eSecurity Planet TeenVogue.com  - TopExaminer  - Rappler all 143 news articles »
FBI Warns Internet Online Attacks on Private Industry Will Continue - Wall Street Journal
Mon Oct 31 19:22, 2016 GMT
Before you do anything on your new iPhone or iPad, you should lock it down. This is how you do it.
For privacy and security, change these iOS 10 settings right now
Mon Nov 7 12:38, 2016 GMT
What is worse: intelligence services gathering data without any legal basis or secret services operating within a legal framework that allows them to obtain vast amounts of personal information? The post Tailor-made laws: The state of surveillance in Germany appeared first on Index on Censorship .
Tailor-made laws: The state of surveillance in Germany
Mon Nov 7 07:57, 2016 GMT
The post Arts Fellow 2016 appeared first on Index on Censorship .
Arts Fellow 2016
Mon Nov 7 04:23, 2016 GMT
The post The Unnamed appeared first on Index on Censorship .
The Unnamed
Mon Nov 7 03:42, 2016 GMT
The post Awards 2017 appeared first on Index on Censorship .
Awards 2017
Mon Nov 7 01:43, 2016 GMT
The post ipulse test appeared first on Index on Censorship .
ipulse test
Mon Nov 7 17:51, 2016 GMT
WARSAW (Reuters) - Poland's digital economy minister accused Facebook of censorship on Monday after the company suspended some users' profiles for using a little-known far-right symbol.
Polish minister accuses Facebook of censorship over right-wing symbol
Mon Nov 7 16:55, 2016 GMT
Yes, the government and the cybersecurity industry are on high alert. But they don't expect an attack to bring down the internet. The post Your Government Isn't That Worried About An Election Day Cyberattack appeared first on WIRED .
Your Government Isn’t That Worried About An Election Day Cyberattack
Mon Nov 7 15:09, 2016 GMT
China passes Internet censorship law Washington Examiner (blog) China passes Internet censorship law. By Rudy ... Subscribe today to get intelligence and analysis on defense and national security issues in your Inbox each weekday morning from veteran journalists Jamie McIntyre and Jacqueline Klimas. Sorry, there ...
China passes Internet censorship law - Washington Examiner (blog)
Mon Nov 7 11:35, 2016 GMT
LONDON (Reuters) - The banking arm of Britain's biggest retailer Tesco was scrambling on Monday to deal with an online attack over the weekend on 40,000 customers' accounts, 20,000 of which had money removed.
Cyber fraudsters take money out of 20,000 Tesco Bank accounts
Mon Nov 7 08:08, 2016 GMT
Reuters China passes far-reaching Internet security law The Nation ... on Monday that the new internet security measures should not be seen as a barrier to trade. "This is a misunderstanding, a bias," Zhao said, adding that the law was not designed to limit foreign technology and standards. Tags; China · Internet ... China adopts cyber security law in face of overseas opposition Reuters International Business|China's Internet Controls Will Get Stricter, to Dismay of Foreign Business New York Times China's new cybersecurity law sparks fresh censorship and espionage fears The Guardian Casper Star-Tribune Online  - Geo News, Pakistan all 28 news articles »
China passes far-reaching Internet security law - The Nation
Mon Nov 7 05:20, 2016 GMT
The Guardian China adopts cybersecurity law in face of overseas opposition Reuters Overseas critics of the law argue it threatens to shut foreign technology companies out of various sectors deemed "critical", and includes contentious requirements for security reviews and for data to be stored on servers located in China. Rights ... China adopts controversial cybersecurity law: Xinhua Yahoo News China Approves Law to Tighten Control on Internet Use ABC News China's new cybersecurity law sparks fresh censorship and espionage fears The Guardian The News International all 16 news articles »
China adopts cybersecurity law in face of overseas opposition - Reuters
Sat Nov 5 00:58, 2016 GMT
The Cheat Sheet 4 of the Most Shocking Internet Privacy Laws The Cheat Sheet Many of us still believe outdated privacy myths about our activities online. Most of us aren't sure exactly how we should be protecting our personal information on the internet , and we might not know exactly what laws protect our privacy and our ... and more »
4 of the Most Shocking Internet Privacy Laws - The Cheat Sheet
Fri Nov 4 17:18, 2016 GMT
Nationwide restrictions have been placed on Twitter, WhatsApp, Facebook, YouTube and other social media networks.
Turkish government blocks access to social networks following detention of pro-Kurdish lawmakers - CNET
Fri Nov 4 12:38, 2016 GMT
BBC News Hack attacks cut internet access in Liberia BBC News Liberia has been repeatedly cut off from the internet by hackers targeting its only link to the global network. Recurrent attacks up to 3 November flooded the cable link with data, making net access intermittent. Researchers said the attacks showed ... Massive cyber-attack grinds Liberia's internet to a halt The Guardian FBI: New Malware to Spur More Large-Scale Cyber Attacks Washington Free Beacon The largest DDoS attack ever was probably pulled off by bored teens VICE News New Straits Times Online  - Boing Boing  - IT PRO all 57 news articles »
Hack attacks cut internet access in Liberia - BBC News
Fri Nov 4 10:13, 2016 GMT
WASHINGTON (Reuters) - Federal and state authorities are beefing up cyber defenses against potential electronic attacks on voting systems ahead of U.S. elections on Nov. 8, but taking few new steps to guard against possible civil unrest or violence.
U.S. boosting cyber defenses, but not police presence, for election
Thu Nov 3 19:16, 2016 GMT
The Guardian Massive cyber -attack grinds Liberia's internet to a halt The Guardian The previous target was Dyn, a company that controls a large number of domain name service infrastructure that acts as a switchboard for internet traffic, through which the attack brought down major internet services across Europe and the US including ... Mirai botnet: Massive 'test' cyberattack temporarily knocks out Liberia's internet International Business Times UK How the Mirai botnet almost took down an entire country, and what your business can learn TechRepublic Internet of Things botnet threatens to knock the entire country of Liberia offline Boing Boing Telegraph.co.uk  - ZDNet  - PC Magazine all 23 news articles »
Massive cyber-attack grinds Liberia's internet to a halt - The Guardian
Fri Nov 4 06:00, 2016 GMT
ISTANBUL (Reuters) - Access to social media sites Twitter and Whatsapp was blocked in Turkey on Friday, an internet monitoring group said, following the detentions of 11 pro-Kurdish lawmakers in the mainly Kurdish southeast overnight.
Turkey blocks access to Twitter, Whatsapp: internet monitoring group
Thu Nov 3 08:35, 2016 GMT
The popular movie streaming site 123movies has started redirecting UK and Indian traffic to a new domain name to circumvent local blocking orders. The site's operators are keen to keep their service accessible around the globe to the best of their ability. Taking a page from Pirate Bay's playbook, they're also considering the launch of a network of proxy sites. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
123Movies Circumvents ISP Blocking With New .GS Domain
Wed Nov 2 17:38, 2016 GMT
14 leading press freedom groups urge officials to end abuses under state of emergency The post Turkey: International coalition slams Cumhuriyet arrests and media closures appeared first on Index on Censorship .
Turkey: International coalition slams Cumhuriyet arrests and media closures
Wed Nov 2 15:47, 2016 GMT
Een opmerking van VVD-parlementariër Han ten Broeke over “het nut van publicatie” OneWorld is gesignaleerd door het internationale project Index on Censorship. Ten Broeke vond het vreemd dat het (met overheidsgeld gesubsidieerde) OneWorld regelmatig opinies van activist Quinsy Gario promoot. Read the full article The post Bemoeienis VVD met OneWorld in censuurindex (Villamedia) appeared first on Index on Censorship .
Bemoeienis VVD met OneWorld in censuurindex (Villamedia)
Wed Nov 2 14:26, 2016 GMT
Citing a computer virus outbreak, a hospital system in the United Kingdom has canceled all planned operations and diverted major trauma cases to neighboring facilities. The incident came as U.K. leaders detailed a national cyber security strategy that promises billions in cybersecurity spending, new special police units to pursue organized online gangs, and the possibility of retaliation for major attacks.
Computer Virus Cripples UK Hospital System
Wed Nov 2 13:42, 2016 GMT
To mark the International Day to End Impunity for Crimes Against Journalists, members of Index on Censorship’s youth board prepared a video statement outlining a particular case of impunity The post Index on Censorship’s youth board explores unpunished crimes against journalists appeared first on Index on Censorship .
Index on Censorship’s youth board explores unpunished crimes against journalists
Wed Nov 2 12:36, 2016 GMT
Today is the International Day to End Impunity for Crimes against Journalists. Since 2006, 827 journalists have been killed for their reporting The post #NoImpunity: Those who attack journalists must be held to account appeared first on Index on Censorship .
#NoImpunity: Those who attack journalists must be held to account
Tue Nov 1 20:31, 2016 GMT
(Reuters) - Microsoft Corp said on Tuesday that a hacking group previously linked to the Russian government is behind recent cyber attacks that exploit a newly discovered flaw in its Windows operating system.
Microsoft says Russia-linked hackers exploiting Windows flaw
Tue Nov 1 17:44, 2016 GMT
The British government is investing nearly £2 billion in cybersecurity and vows to respond aggressively when faced with online attacks.
Our cyberdefense will punch back, UK leaders say - CNET
Tue Nov 1 13:56, 2016 GMT
The App Economy is streamrolling along and has the very legitimate potential to rewrite so much of how businesses use technology. Uber obliterated Yellow Taxis, Pandora and Spotify has all but made FM radio irrelevant and streaming video has forced TV and movie theaters to sit in the back seat. But here's the frightening part: Security has also been demoted. Consider a recent study where, according to Dark Reading :  "Researchers surveyed 1,770 senior business and IT executives, including more than 100 CSOs and CISOs, to investigate how their security operations affect business performance. Results indicate businesses view IT security as a business enabler but struggle to deliver stronger protection under the pressure of the app economy. Sixty-eight percent of respondents admit they compromise on security to get apps to market faster." We are seeing a similar lack of security focus with the Internet of Things , although the reasons are a bit more complicated for IoT. Part of this problem comes from the remarkable speed of growth for the App Economy. Even Amazon recently got caught cutting back on its app testing . The truth, though, is that security and apps don't have to be rivals for corporate resources and attention. IT must get comfortable with dealing with both, which will require compromises. To be clear: One compromise that is unacceptable is diluting security protections. But can security operations be more accommodating of apps without undermining their role as chief protector of a company's assets? Absolutely. Much of the conflict between the two is the natural result of a lack of communication and cooperation. When the app team takes their development all the way through and then gets the change requests and/or signoff from every constituent (marketing, various germane line of business managers, even non-IT C-levels) before contacting Security or IT, the trainwreck is inevitable. Security asks for privacy/data-protection changes and the appdev teams resists because the project is 99 percent complete. This casts security as an outsider blocking progress. What if it happens quite differently? What if Security is involved at the very earliest stages, before any coding happens? That way, their suggestions could be made at that earliest stage and it doesn't require anyone to redo work that has been approved by a dozen people. This is all about making Security a key part of the process. That simply organizational/structural change could allow security to be dealt with, but at dramatically less disruption to anyone. App Security doesn't have to equal friction—unless the app team chooses to make it happen that way.
Can Security And The App Economy Learn To Get Along?
Tue Nov 1 16:07, 2016 GMT
After years of legal battles, YouTube and German music rights group GEMA have reached a landmark licensing agreement. As a result, Germans now have access to tens of thousands of music videos that were previously "not available" in their country. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
YouTube Signs Landmark Deal to End Music Video Blocking in Germany
Tue Nov 1 13:40, 2016 GMT
The UK must have the capability to respond in kind to hack attacks says its chancellor.
UK must retaliate versus cyber-attacks says chancellor
Tue Nov 1 10:50, 2016 GMT
LONDON (Reuters) - Russia is pushing its foreign policy in increasingly aggressive ways including cyber-attacks and espionage, posing a growing threat to Britain and the rest of Europe, the head of Britain's internal intelligence agency MI5 has said.
UK spy chief sees growing threat from Russian cyber-attacks, espionage
Tue Nov 1 09:55, 2016 GMT
On 11 September, the people of Belarus elected the lower house of parliament, the House of Representatives. Speaking about the media environment surrounding the elections The post Belarus: Equal media access denied to opposition candidates during election appeared first on Index on Censorship .
Belarus: Equal media access denied to opposition candidates during election
Fri Oct 21 22:50, 2016 GMT
Entertainment Weekly Technology|Hackers Used New Weapons to Disrupt Major Websites Across US New York Times The company, Dyn, whose servers monitor and reroute internet traffic, said it began experiencing what security experts called a distributed denial-of-service attack just after 7 a.m. Reports that many sites were inaccessible started on the East Coast ... Hacked Cameras, DVRs Powered Today's Massive Internet Outage Krebs on Security Widespread cyberattack takes down sites worldwide CNNMoney Mass Internet hack the butt of Black Mirror viral marketing jokes Entertainment Weekly TameBay  - iT News  - The Mercury News  - Krebs on Security all 1,635 news articles »
Technology|Hackers Used New Weapons to Disrupt Major Websites Across US - New York Times
Mon Oct 31 18:19, 2016 GMT
Supporters of GOP presidential nominee Donald Trump apparently create a misspelled hashtag to possibly avoid censorship by the social network.
No typo here: Hashtag #HillaryForPrision is trending on Twitter - CNET
Mon Oct 31 17:07, 2016 GMT
Morning Consult The Effects of the Forthcoming FCC Privacy Rules on Internet Security Freedom to Tinker Although the forthcoming rulemaking targets the collection, use, and sharing of customer data with “third parties”, an important—and oft-forgotten—facet of this discussion is that (1) ISPs rely on the collection, use, and sharing of CPNI to operate ... FCC Holds Off on Security Mandates for Internet of Things Morning Consult The FCC's sweeping new rules to protect your online privacy Chicago Daily Herald How Not to Regulate the Internet Bloomberg CBS Local  - Gizmodo Australia all 68 news articles »
The Effects of the Forthcoming FCC Privacy Rules on Internet Security - Freedom to Tinker
Mon Oct 31 18:13, 2016 GMT
Index on Censorship strongly condemns the recent wave of arrests and forced closures of media outlets in Turkey. The post Index condemns Turkey’s “deteriorating environment for free speech” appeared first on Index on Censorship .
Index condemns Turkey’s “deteriorating environment for free speech”
Mon Oct 31 16:20, 2016 GMT
The trial of prominent Bahraini human rights activist Nabeel Rajab – president of the Bahrain Centre for Human Rights – has been postponed for a fourth consecutive time The post Bahrain: Trial of Nabeel Rajab postponed until 15 December appeared first on Index on Censorship .
Bahrain: Trial of Nabeel Rajab postponed until 15 December
Sat Oct 29 17:47, 2016 GMT
Switzerland's national rail service will begin selling the digital currency Bitcoin at ticket machines.
Swiss railway ticket machines to sell Bitcoin digital currency
Mon Oct 31 08:03, 2016 GMT
iTech Post Can Advanced Tech Protect Internet Security ? iTech Post All these top internet companies have invested heavily in cyber security defenses. For them, it may be surprising how could have been possible to be taken down by a bunch of $100 devices. The latest major cyber attack should be a wake-up call for the ... Last week's record-breaking Internet attack came from 100000 enslaved Web devices Los Angeles Times Attack of the Internet of Things Science Friday Internet Providers Could Be the Key to Securing All the IoT Devices Already out There WIRED Daily Caller  - Dyn  - Arbor Networks all 186 news articles »
Can Advanced Tech Protect Internet Security? - iTech Post
Fri Oct 28 17:24, 2016 GMT
Abccolumbia.com Rules to Protect Internet Privacy Abccolumbia.com Consumer– Power to the consumer, that's what the Federal Communications Commission says its' new rules on internet usage will provide. The commission voting to include rules that require internet providers get a customers' permission to use sensitive ... and more »
Rules to Protect Internet Privacy - Abccolumbia.com
Fri Oct 28 20:24, 2016 GMT
Common Dreams (press release) Internet Privacy In The Age Of WikiLeaks Forbes Newspapers such as the New York Times and Washington Post are today trumpeting with front-page headlines the Federal Communications Commission's decision to crack down on Internet Service Providers all in the name of online consumer “ privacy . The Federal Government's Appropriate Role in Internet Privacy Regulation Heritage.org FCC Passes Sweeping Internet Privacy Rules in 'Big Win for Civil Rights' Common Dreams (press release) The FCC just passed sweeping new rules to protect your online privacy Washington Post Newsmax  - Los Angeles Times  - USA TODAY  - Federal Communications Commission all 250 news articles »
Internet Privacy In The Age Of WikiLeaks - Forbes
Fri Oct 28 19:10, 2016 GMT
Windows Report ESET releases new Internet Security 10 and Smart Security Premium 10 products Windows Report The first product, ESET Internet Security 10, is a product most people that use ESET services will be familiar with. Similar to Smart Security , it provides additional features such as an anti-spam filter, parental surveillance control features for ...
ESET releases new Internet Security 10 and Smart Security Premium 10 products - Windows Report
Fri Oct 28 17:39, 2016 GMT
Aseem Trivedi will join Martin Rowson in London to discuss, draw and debate freedom of expression and solidarity across borders. The post 18 Nov: Satire on the front line appeared first on Index on Censorship .
18 Nov: Satire on the front line
Fri Oct 28 16:56, 2016 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout the European Union and neighbouring countries The post Mapping Media Freedom: In review 21-27 October appeared first on Index on Censorship .
Mapping Media Freedom: In review 21-27 October
Fri Oct 28 12:45, 2016 GMT
The European Court of Justice (ECJ) has just heard a long-running case involving The Pirate Bay, Dutch anti-piracy group BREIN, and a pair of local ISPs. Should the infamous torrent site be blocked at the ISP level, even though it may not be a direct infringer itself? Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Pirate Bay Blocking Case Heard By European Court of Justice
Fri Oct 28 10:07, 2016 GMT
Index readers and contributors gathered to listen to writer Cory Doctorow and tech journalist Geoff White lay out the importance of online privacy and protecting personal data. The post Index magazine launch: “We have reached peak indifference to surveillance” appeared first on Index on Censorship .
Index magazine launch: “We have reached peak indifference to surveillance”
Fri Oct 28 09:04, 2016 GMT
The Government of Bahrain continues to arbitrarily detain Nabeel Rajab, president of the Bahrain Center for Human Rights, founding director of the Gulf Centre for Human Rights The post Urgent appeal to EU to call for the release of Nabeel Rajab appeared first on Index on Censorship .
Urgent appeal to EU to call for the release of Nabeel Rajab
Fri Oct 28 07:56, 2016 GMT
The UK website blocking efforts continue with the High Court adding over a dozen new "pirate" sites to the country’s unofficial ban list. The new order, requested by the Motion Picture Association, requires ISPs to block access to several streaming portals including the popular 123movies.to. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
UK Piracy Blocklist Expands With 123movies and Other Streaming Sites
Thu Oct 27 13:31, 2016 GMT
Amateur hackers probably caused Friday's Internet meltdown, researchers say - Chicago Tribune. Some have worried that the massive cyberattack that disrupted the Internet on Friday was the work of Russian government-backed hackers, politically motivated hacktivists or sophisticated cybercriminals. But researchers at cyber-intelligence ... The ...
Amateur hackers probably caused Friday's Internet meltdown, researchers say - Chicago Tribune
Thu Oct 27 23:10, 2016 GMT
Recent cyber-attacks using botnet armies of hacked "internet of things" devices highlights the pressing need for improved security.
Smart home threat
Thu Oct 27 20:02, 2016 GMT
Common Dreams (press release) The FCC just passed sweeping new rules to protect your online privacy Washington Post Federal officials delivered a landmark ruling in favor of online privacy Thursday, limiting how Internet providers use and sell customer data, while asserting that customers have a right to control their own personal information. Under the Federal ... FCC Passes Sweeping Internet Privacy Rules in 'Big Win for Civil Rights' Common Dreams (press release) The Federal Government's Appropriate Role in Internet Privacy Regulation Heritage.org FCC Approves Contentious New Internet Privacy Rules Newsmax Yahoo News  - hays Post  - Wall Street Journal  - Federal Communications Commission all 124 news articles »
The FCC just passed sweeping new rules to protect your online privacy - Washington Post
Thu Oct 27 21:32, 2016 GMT
Editorial: Is ' internet privacy ' an oxymoron? The Bucknellian October marks National Cyber Security Awareness Month in the United States. Ironically, these past few weeks have revealed WikiLeaks of the Clinton campaign's emails, videos from 2005 coming back to bite Donald Trump, and Ken Bone's Reddit paper trail ... and more »
Editorial: Is 'internet privacy' an oxymoron? - The Bucknellian
Thu Oct 27 17:42, 2016 GMT
Common Dreams (press release) FCC Passes Sweeping Internet Privacy Rules in 'Big Win for Civil Rights' Common Dreams (press release) The Federal Communications Commission (FCC) on Thursday passed sweeping new privacy rules designed to keep broadband providers from giving customers' private data to third parties. The rules, approved by a vote of 3-2, require Internet Service ... The Federal Government's Appropriate Role in Internet Privacy Regulation Heritage.org The FCC just passed sweeping new rules to protect your online privacy Washington Post FCC Approves Contentious New Internet Privacy Rules Newsmax Yahoo News  - hays Post  - Wall Street Journal  - Federal Communications Commission all 114 news articles »
FCC Passes Sweeping Internet Privacy Rules in 'Big Win for Civil Rights' - Common Dreams (press release)
Thu Oct 27 16:36, 2016 GMT
Internet service providers will now have to abide by strict FCC rules when it comes to sharing your personal data with third party advertisers.
FCC adopts controversial online privacy rules - CNET
Thu Oct 27 15:17, 2016 GMT
It may soon become easier for Internet service providers to anticipate and block certain types of online assaults launched by Web-based attack-for-hire services known as "booter" or "stresser" services, new research released today suggests.
Are the Days of “Booter” Services Numbered?
Thu Oct 27 15:38, 2016 GMT
KRASNAYA POLYANA (Reuters) - Russian President Vladimir Putin said on Thursday that cyber attacks or other types of interference in other countries' internal affairs were intolerable.
Russia's Putin says cyber attacks are unacceptable
Thu Oct 27 14:44, 2016 GMT
WASHINGTON (Reuters) - The U.S. Federal Communications Commission on Thursday voted 3-2 to adopt new privacy rules that will subject broadband internet service providers to more stringent requirements than websites like Facebook Inc, Twitter Inc or Alphabet Inc's Google site.
FCC votes to approve new broadband service privacy rules
Thu Oct 27 15:01, 2016 GMT
The Verge The Federal Government's Appropriate Role in Internet Privacy Regulation Heritage.org The Federal Communications Commission (FCC) has proposed a rule that would impose intrusive privacy regulation on broadband Internet service providers (but not other Internet companies), without regard to consumer harm. If implemented, the FCC's rule ... FCC Approves Contentious New Internet Privacy Rules Yahoo News Internet providers will soon need permission to share your web browsing history The Verge Internet provider planning to use or share your personal data? Not so fast, government says Los Angeles Times Forbes all 37 news articles »
The Federal Government's Appropriate Role in Internet Privacy Regulation - Heritage.org
Thu Oct 27 11:00, 2016 GMT
Spain's new "gag law" criminalizes the unauthorized use of police photos. Daniel Mayrit couldn't fight the law, so he decided to exploit it instead. The post Trolling Spanish Cops by Censoring All Their Photos appeared first on WIRED .
Trolling Spanish Cops by Censoring All Their Photos
Thu Oct 27 12:07, 2016 GMT
The undersigned organisations call on Turkey's national assembly to end the recently extended state of emergency, and take immediate steps to repair the damage to freedom of expression The post Turkey: Parliament must defend the health of democracy appeared first on Index on Censorship .
Turkey: Parliament must defend the health of democracy
Wed Oct 26 21:48, 2016 GMT
If a website is suffering from a cyberattack, don't keep trying to get to it.
How we may've made Friday's massive internet outage worse - CNET
Wed Oct 26 16:39, 2016 GMT
NEW YORK (Reuters) - U.S. prosecutors are expected to obtain their second guilty plea in a case related to what they say was an illegal bitcoin exchange owned by an Israeli behind a series of hacking attacks on organizations such as JPMorgan Chase & Co.
U.S. to secure guilty plea in case tied to JPMorgan hack probe
Tue Oct 25 18:42, 2016 GMT
Washington Post Can anyone keep us safe from a weaponized ' Internet of Things?' Washington Post That's what some experts are warning in the wake of a massive cyberattack Friday that used compromised Internet -connected devices like security cameras to disrupt many popular web sites. “These attacks are not going away,” said Ben ... The type of ... Internet Outage Shows How Sophisticated Attacks Can Target Your Home NBCNews.com Who's Responsible When Your DVR Launches a Cyberattack? The Atlantic Your DVR Didn't Take Down the Internet —Yet WIRED Macworld  - Government Technology  - iTech Post  - Krebs on Security all 117 news articles »
Can anyone keep us safe from a weaponized 'Internet of Things?' - Washington Post
Tue Oct 25 23:38, 2016 GMT
Internet block caused by 'non-state actor,' intel director says New York Daily News National Intelligence Director James Clapper says it appears that a “non-state actor” was behind a massive cyberattack last week that briefly blocked access to websites including Twitter and Netflix. Clapper says investigators are gathering a lot of ... and more »
Internet block caused by 'non-state actor,' intel director says - New York Daily News
Tue Oct 25 18:01, 2016 GMT
Cybersecurity professionals are some of the most highly sought after candidates in the job market. With most businesses taking advantage of web applications to streamline their operations, every company is a software company - and they all need security. Before now, the position of security professional remained a bit cryptic. More traditional roles in marketing or sales demonstrated obvious needs and measurable effects toward a successful business. However, as data breaches become more common, leaving companies and their customers vulnerable to attacks, cybersecurity candidates have rocketed to the top of the c-suite’s necessary hires. While all of this seems positive for protecting businesses and consumers at large, there is a sizeable problem.  Despite the opportunities to be had in this burgeoning field, 200,000 cybersecurity positions are unfilled and remain unfillable . This is due to the major education gap in the skills required for security professionals, and the skills taught to computer science, information systems, and engineering students at the university level.   Dark Reading notes a study done by CloudPassage, which found that none of the top 10 computer science or engineering programs require cybersecurity courses for students to get their degree - and that 3 of those schools offer no cybersecurity courses at all. Another study done by Raytheon and the National Cyber Security Alliance found that many millennials don’t seek to enter the cybersecurity industry because they simply do not know what the jobs entail  - especially women. 61% of global participants, as well as US participants, say they are unaware of the typical responsibilities of a cyber career, while 62% of global participants and 64% of US participants say that no mentor or career counselor ever mentioned cybersecurity as a possible career option. As entry level cybersecurity positions require a more robust skill set than others, the first step to fixing this problem is to close the education gap. Given the current job market and trajectory for security professionals - high level security executives are the fastest growing jobs in the cybersecurity space - colleges and universities should be taking steps to ensure students are aware of the full breadth of their options.  Here are five basic steps that higher education institutions can take to place their students in these high-demand jobs with room for professional growth.   Require students in appropriate majors to take cybersecurity courses. Additionally, offer security electives for students in related fields. Make sure your campus career center staff is aware of what a cybersecurity position entails, and what majors and interests lend themselves well to these careers. Have them discuss cybersecurity jobs with students who are interested, or those who may not know how their course of study can fit into the security industry. Invite cybersecurity companies and professionals to campus career fairs to give students a firsthand look at the range of businesses employing these positions. Host a career event with a panel of cybersecurity professionals to talk about the typical responsibilities and career path of the profession. Have professors encourage students in majors such as computer science or engineering to attend. Offer internships or work study programs within the university’s own security team to give students hands-on experience in the field, and a better idea of how they fit. Giving students information and experience in this field will make them more capable while pursuing a cybersecurity careers.  Even if students do not choose to enter the security field, a background in security can also make students more desirable in a host of other jobs, such as developers , as hacks in the application layer become more prolific.
Bridging the Cybersecurity Information Gap in Higher Education
Tue Oct 25 20:22, 2016 GMT
Despite KickassTorrents being taken offline during the summer, the battle to have clones and copies blocked by ISPs continued this week in the Australian Federal Court. Music industry groups and service providers argued over the implementation of blockades, with an old classic raising its head once again. Who will pay to protect the labels' copyrights? Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Aussie KickassTorrents Blocking Battle Continues, Despite Takedown
Tue Oct 25 17:40, 2016 GMT
The Verge Will the Dyn DDoS Attack Lead to Better Internet Security ? Knowledge@Wharton The cyberattacks on October 21 that denied web users access to popular websites such as Twitter, PayPal, Netflix and others was a stark reminder of weak security in an increasingly internet -driven world. The attacks on internet DNS (domain name ... Why it was so easy to hack the cameras that took down the web CNET What Happened to the Internet Last Week -- and Why It Matters ABC News Hacked webcams that helped shut down the internet last week are being recalled The Verge NBCNews.com  - TCC  - The Boston Globe all 389 news articles »
Will the Dyn DDoS Attack Lead to Better Internet Security? - Knowledge@Wharton
Tue Oct 25 16:04, 2016 GMT
SINGAPORE (Reuters) - Singapore telecom operator StarHub Ltd said on Tuesday intentional cyber attacks had caused web connection disruptions for some of its home broadband customers on October 22 and October 24.
Singapore telecoms group StarHub says hit by cyber attacks
Tue Oct 25 00:16, 2016 GMT
CNET Why it was so easy to hack the cameras that took down the web CNET Security experts have been warning for a few years that internet -connected devices are susceptible to hacking. They just didn't know exactly what hackers might do once they broke into your connected television, refrigerator or thermometer, for example. Who's Responsible When Your DVR Launches a Cyberattack? The Atlantic Your DVR Tried To Shut Down The Internet Gearbrain (blog) all 10 news articles »
Why it was so easy to hack the cameras that took down the web - CNET
Tue Oct 25 16:08, 2016 GMT
Your baby monitor may have contributed to last week's massive internet hack MarketWatch One 2014 study from Avast found that 79% of home internet networks were at risk of hacking due to poor privacy practices like easily guessable or default passwords on routers. ... Anthony Grieco, senior director of security and trust organization at ... and more »
Your baby monitor may have contributed to last week's massive internet hack - MarketWatch
Tue Oct 25 15:32, 2016 GMT
Impress has been recognised as an approved regulator by the Press Regulation Panel under the Royal Charter. The post Section 40 of Crime and Courts Act 2013 poses threat to press freedom appeared first on Index on Censorship .
Section 40 of Crime and Courts Act 2013 poses threat to press freedom
Tue Oct 25 10:23, 2016 GMT
The Crime and Courts Act 2013, as it stands, is a danger to a free press. Under the act, a publisher can be ordered to pay both sides' costs in a dispute if the publisher is not a member of an approved regulator. The post Letter: Crime and Courts Act 2013 danger to free press appeared first on Index on Censorship .
Letter: Crime and Courts Act 2013 danger to free press
Tue Oct 25 04:26, 2016 GMT
Morning Consult Internet Privacy : Just the Facts Hightech Forum In my last post, I reported on a press call by Senator Markey and a group of activists in support of the FCC's Internet Privacy NPRM. I found the call extremely unhelpful because of significant factual gaps and errors in the story the activists told ... How the Broadband Industry Could Challenge FCC's Privacy Rules Morning Consult all 4 news articles »
Internet Privacy: Just the Facts - Hightech Forum
Mon Oct 24 09:11, 2016 GMT
NBCNews.com Internet Outage Shows How Sophisticated Attacks Can Target Your Home NBCNews.com Cyber crime has moved closer to home than ever. The cyber attack that slowed many popular websites to a crawl last week is attracting new scrutiny to the security of the so-called " Internet of Things." The attack last week used a new type of malware ... Cyber-Attack Harnesses " Internet of Things" to Shut Down Websites Democracy Now! Hackers Used New IoT Weapon For Friday's Internet Attack iTech Post How Your Internet -Enabled Device Could Be Hijacked to Launch Cyber-Attacks ABC News Fortune  - BankInfoSecurity.com (blog)  - Recode all 64 news articles »
Internet Outage Shows How Sophisticated Attacks Can Target Your Home - NBCNews.com
Tue Oct 25 01:34, 2016 GMT
SAN FRANCISCO (Reuters) - Obama administration officials sought on Monday to reassure the public that it was taking steps to counter new types of cyber attacks such as the one Friday that rendered Twitter, Spotify, Netflix and dozens of other major websites unavailable.
U.S. takes aim at cyber attacks from connected devices as recalls mount
Mon Oct 24 23:23, 2016 GMT
Hackers exploited connected "smart" devices for massive cyberattack CBS News Federal investigators believe the attackers used malware called “mirai” to access devices in people's homes that are connected to the internet , like thermostats, fitness trackers, smart TVs and even baby monitors. “People tend to put these devices on ... and more »
Hackers exploited connected "smart" devices for massive cyberattack - CBS News
Mon Oct 24 23:19, 2016 GMT
Are hack attacks aimed at the technology behind Bitcoin and other virtual currencies undermining confidence in the digital cash world?
Blockchain bandits hit crypto start-ups
Mon Oct 24 17:16, 2016 GMT
Macworld What Happened to the Internet Last Week -- and Why It Matters ABC News He has since consulted for private companies on cyber issues and is the author of the book “Cyber War: The Next Threat to National Security and What to Do About It.”] Somebody finally did what internet experts have been fearing for years. That somebody ... Why the Internet broke and you couldn't do anything about it Macworld Internet Outage Shows How Sophisticated Attacks Can Target Your Home NBCNews.com ​How to defend against the internet's doomsday of DDoS attacks ZDNet iTech Post  - CircleID  - Yahoo News all 151 news articles »
What Happened to the Internet Last Week -- and Why It Matters - ABC News
Mon Oct 24 11:44, 2016 GMT
Macworld Why the Internet broke and you couldn't do anything about it Macworld The promise of the Internet of Things (IoT) is that everything that does something in your home will have an Internet connection. So your thermostat, security camera, alarm system, television set, DVR, kitchen scale and bathroom scale, refrigerator ... ​How to defend against the internet's doomsday of DDoS attacks ZDNet Internet Outage Shows How Sophisticated Attacks Can Target Your Home NBCNews.com Cyber-Attack Harnesses " Internet of Things" to Shut Down Websites Democracy Now! iTech Post  - IT World Canada  - eWeek all 102 news articles »
Why the Internet broke and you couldn't do anything about it - Macworld
Mon Oct 24 14:38, 2016 GMT
Democracy Now! Cyber-Attack Harnesses " Internet of Things" to Shut Down Websites Democracy Now! The attack employed thousands of web cameras, DVRs and other internet -enabled household devices, which were infected by malware. Internet security experts have long warned that devices on the so-called " Internet of Things" are poorly protected and ... and more »
Cyber-Attack Harnesses "Internet of Things" to Shut Down Websites - Democracy Now!
Mon Oct 24 13:17, 2016 GMT
Award-winning Malaysian cartoonist Zunar, who faces up to 43 years imprisonment for tweeting his cartoons criticising his country’s leaders reported on 17 October that he has had a travel ban imposed blocking him from travelling outside the country. The post Malaysia imposes travel ban on award-winning cartoonist appeared first on Index on Censorship .
Malaysia imposes travel ban on award-winning cartoonist
Mon Oct 24 08:00, 2016 GMT
After the brutal murders of other writers in his country, Ananya Azad moved to Germany when he began to receive death threats. The post “I have a name”: A Bangladeshi blogger on why he risked his life letting his identity be known appeared first on Index on Censorship .
“I have a name”: A Bangladeshi blogger on why he risked his life letting his identity be known
Sun Oct 23 21:00, 2016 GMT
On April 15, 2015, a network engineer noticed a strange signal emanating from the US Office of Personnel Management. That was just the tip of the iceberg. The post Inside the Cyberattack That Shocked the U.S. Government appeared first on WIRED .
Inside the Cyberattack That Shocked the U.S. Government
Sat Oct 22 01:03, 2016 GMT
Cyberattacks on key internet firm disrupt internet services Orlando Sentinel Withering cyberattacks on server farms of a key internet firm repeatedly disrupted access to major websites and online services including Twitter, Netflix and PayPal across the United States on Friday. The White House called the disruption malicious ... and more »
Cyberattacks on key internet firm disrupt internet services - Orlando Sentinel
Sat Oct 22 16:04, 2016 GMT
legal Insurrection (blog) Internet security expert: “We believe this attack was just a test, and more attacks will come” legal Insurrection (blog) The ONLY long term fix is to have major internet players (Google, Facebook, Twitter, etc.) threaten to block ALL traffic from non-compliant ISPs. 16. We believe this attack was just a test, and more attacks will come (most likely on different targets). Hacked Cameras, DVRs Powered Today's Massive Internet Outage Krebs on Security Hackers Used New Weapons to Disrupt Major Websites Across US New York Times Homeland Security Is 'Investigating All Potential Causes' of Internet Disruptions TIME WIRED  - CNNMoney  - Entertainment Weekly  - Gizmodo all 957 news articles »
Internet security expert: “We believe this attack was just a test, and more attacks will come” - legal Insurrection (blog)
Sat Oct 22 11:42, 2016 GMT
CBS News New World Hackers group claims responsibility for internet disruption CBS News Withering cyberattacks on server farms of a key internet firm repeatedly disrupted access to major websites and online services including Twitter, Netflix and PayPal across the United States on Friday. The White House called the disruption malicious ... and more »
New World Hackers group claims responsibility for internet disruption - CBS News
Sat Oct 22 09:28, 2016 GMT
By now, most UK Internet users have gotten used to pirate sites being blocked by their ISPs. However, instead of 'going legal' it turns out that many people simply move on to unblocked sites, or find other tricks to circumvent the restrictions. Today, we take a look at the most used 'pirate' sites in the UK, with some surprising results. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Pirate Sites Remain Popular in the UK, Despite Website Blockades
Fri Oct 21 22:09, 2016 GMT
Krebs on Security Hacked Cameras, DVRs Powered Today's Massive Internet Outage Krebs on Security As I noted in The Democratization of Censorship , to address the threat from the mass-proliferation of hardware devices such as Internet routers, DVRs and IP cameras that ship with default-insecure settings, we probably need an industry security ... Global internet outages continue as second wave of cyber attack cripples web servers Telegraph.co.uk Widespread cyberattack takes down sites worldwide CNNMoney A massive cyberattack blocked your favorite websites; FBI and Homeland Security are investigating Los Angeles Times Entertainment Weekly  - iT News  - Windows IT Pro  - Gizmodo all 670 news articles »
Hacked Cameras, DVRs Powered Today's Massive Internet Outage - Krebs on Security
Fri Oct 21 19:16, 2016 GMT
Warren Lends Support to FCC Internet Privacy Rules Morning Consult Progressive favorite Sen. Elizabeth Warren (D-Mass.) came out in support of the Federal Communications Commission's new privacy regulations for broadband service providers, set for an agency vote next week. “Right now we have no #broadband # privacy  ...
Warren Lends Support to FCC Internet Privacy Rules - Morning Consult
Fri Oct 21 20:49, 2016 GMT
  DDoS Attack on Dyn Crippled the Internet A portion of the internet went down after suffering a crippling blow from a series of global attacks on a cloud-based Internet Performance Management (IPM) company,... read more The post Cyber News Rundown: Edition 10/21/2016 appeared first on Webroot Threat Blog .
Cyber News Rundown: Edition 10/21/2016
Fri Oct 21 20:59, 2016 GMT
USA TODAY East coast Internet service attacks 'coming in waves' USA TODAY SAN FRANCISCO — Multiple waves of online attacks blocked many major websites Friday, at times making it impossible for users on the East Coast to access Twitter, Spotify , Netflix, Amazon, Tumblr, Reddit and other sites. The cause was a large-scale ... Internet Attack Disrupts Major Websites New York Times What We Know About Friday's Massive East Coast Internet Outage WIRED Blame the Internet of Things for today's web blackout Engadget Entertainment Weekly  - TIME  - Techworm  - Gizmodo all 500 news articles »
East coast Internet service attacks 'coming in waves' - USA TODAY
Fri Oct 21 20:44, 2016 GMT
NBC New York 3rd Cyberattack 'Has Been Resolved' After Hours of Major Outages: Company NBC New York A third wave of denial-of-service attacks on a key piece of internet plumbing was resolved by late Friday, said the company that was targeted. Internet infrastructure company Dyn Inc. told CNBC earlier in the day that the third wave was underway ... and more »
3rd Cyberattack 'Has Been Resolved' After Hours of Major Outages: Company - NBC New York
Fri Oct 21 21:31, 2016 GMT
Daily Mail Twitter, Spotify and Reddit are among major sites taken OFFLINE in massive shock cyber attack Daily Mail A massive co-ordinated series of cyber attacks has forced hundreds of major websites from Amazon to Twitter offline across the globe - and WikiLeaks believes its supporters were responsible. It urged its backers to 'stop taking down the US internet ... and more »
Twitter, Spotify and Reddit are among major sites taken OFFLINE in massive shock cyber attack - Daily Mail
Fri Oct 21 21:32, 2016 GMT
Twitter, Spotify, Reddit, Soundcloud and several other sites have been affected by three web attacks.
Cyber attacks briefly knock out top sites
Fri Oct 21 17:35, 2016 GMT
Hackers disrupt Internet service of major websites with multiple attacks - Chicago Tribune. Cyberattacks on a key internet firm repeatedly disrupted the availability of popular websites across the United States Friday, according to analysts and company officials. The White House described the disruption as malicious. Members of a hacker group ...
Hackers disrupt Internet service of major websites with multiple attacks - Chicago Tribune
Fri Oct 21 19:36, 2016 GMT
(Reuters) - PayPal Holdings Inc said on Friday that it has experienced some service disruptions due to the cyber attack on Dyn that caused Internet outages for its customers.
PayPal says some customers unable to make payments due to cyber attack on Dyn
Fri Oct 21 13:29, 2016 GMT
Slate Magazine (blog) This Is Probably Why a Whole Lot of the Internet Went Down This Morning Slate Magazine (blog) Update, October 21, 11:00 a.m.: Internet infrastructure company Dyn acknowledged that a distributed denial of service attack against its systems had caused disruptions. According to Dyn's post, the disruptions primarily affected customers throughout ... US Internet Repeatedly Disrupted by Cyberattacks on Key Firm ABC News What We Know About Friday's Massive East Coast Internet Outage WIRED Reported hack disrupts internet across East Coast WQAD.com CBS News all 25 news articles »
This Is Probably Why a Whole Lot of the Internet Went Down This Morning - Slate Magazine (blog)
Fri Oct 21 09:33, 2016 GMT
Russia’s recent elections have been described as “the dullest in recent memory”. But as Index on Censorship’s Mapping Media Freedom project shows there was no shortage of media violations The post Russia’s recent election was awash with media violations appeared first on Index on Censorship .
Russia’s recent election was awash with media violations
Fri Oct 21 13:47, 2016 GMT
(Reuters) - Some major internet companies suffered service disruptions on Friday due to what internet infrastructure provider Dyn said was a cyber attack that affected some sites, mainly for users on the U.S. East Coast.
U.S. web provider says probing East Coast cyber attack
Fri Oct 21 11:09, 2016 GMT
For the good of society, American cartoonist Mike Diana was jailed without bail in 1994. So ruled a jury at the Pinellas County court in Florida, taking just 90 minutes to find him guilty of obscenity following a week-long trial in March of that year. Diana was the first – and to date, only – […] The post New documentary looks at the only cartoonist to be jailed for obscenity in the USA appeared first on Index on Censorship .
New documentary looks at the only cartoonist to be jailed for obscenity in the USA
Fri Oct 21 08:15, 2016 GMT
The Wire Internet Censorship : Making the Hidden Visible The Wire When YouTube relayed this decision back to the Pakistan Telecommunications Authority (PTA), the decision was made to block YouTube. Although Pakistan has been intermittently blocking content since 2006, a more persistent blocking ... “The goal of a ...
Internet Censorship: Making the Hidden Visible - The Wire
Wed Oct 19 22:24, 2016 GMT
iNews US Urged Ecuador to Act Against WikiLeaks Leader Assange NBCNews.com Quiet pressure from the U.S. government played a role in Ecuador's decision to block WikiLeaks founder Julian Assange from using the internet at Ecuador's London embassy, U.S. officials told NBC News. "It was a bit of an eviction notice," said a senior ... How is the Ecuadorian Embassy blocking Julian Assange from using the internet ? iNews Ecuador confirms it 'temporarily' shut off Julian Assange's internet Wired.co.uk WikiLeaks founder Julian Assange increasingly isolated as Ecuador blocks his internet access The Australian Twitter  - Twitter  - Associated Press all 327 news articles »
US Urged Ecuador to Act Against WikiLeaks Leader Assange - NBCNews.com
Thu Oct 20 16:34, 2016 GMT
How dangerous are your app security holes? Sadly, they are quite dangerous and getting far more so. In a study released Tuesday (Oct. 18) that examined billions of lines of code from 300,000 assessments performed over the last 18 months, a stunning 97 percent of Java applications contained at least one component with a known vulnerability. To be fair, that probably isn't that surprising. Nor should it surprise any veteran security specialist that 60 percent of apps fail security testing in the first scan or that more than half of the examined apps were affected by misconfigured secure communications. What is surprising is the lax approach that so many companies are taking with such a monumental security nightmare. Today, a cybercriminal can focus on a single vulnerability in one component to exploit millions of applications. Software components are used by every industry and for software of all kinds, and given our dependence on applications, the ease at which millions of applications can be breached has the potential to create havoc in our digital infrastructure and economy. ~ Brian Fitzgerald, CMO, Veracode Here's more non-surprises: Standard time-tested (but unexciting) security tactics—things like remediation coaching, sandbox testing, continuous scanning and eLearning—were found to improve security as much as six-fold. These approaches do work, when dealt with in a rigorous and serious manner. In so many ways, security effectiveness is about attitude. A simple and consistent approach of using known security monitoring and testing tools really does work. That, however, requires company management to first accept that these holes are real and dangerous to the company in a litany of ways. The tools are here today. The attitudes, frighteningly enough, are what's lagging. "The prevalent use of open source components in software development is creating unmanaged, systemic risks across companies and industries," said Brian Fitzgerald , CMO of Veracode, which performed the study. "Today, a cybercriminal can focus on a single vulnerability in one component to exploit millions of applications. Software components are used by every industry and for software of all kinds, and given our dependence on applications, the ease at which millions of applications can be breached has the potential to create havoc in our digital infrastructure and economy." Let's drill down into one of these key defenses: continuous scanning. Whether the app is operating at the desktop or mobile level, there are two entirely distinct areas of security concern: what the itself can do—it's code alone—of security concern and what it actually does when interacting with the OS and networks and other apps. As for the first element—which we'll call code at rest—that is dangerous enough, especially when the code is open-source or third party. You don't even need to get into the issue if you trust the company that provided the app. If malware is lurking inside, the ISV may not know it, either. And remember that there are two kinds of security holes: deliberate efforts (aka malware): and unintended privacy/security holes, where data can leak. Both are troublesome but it's the second that bypass standard security safeguards. That's precisely why watching the data while it is interacting with everything it has to work with—battlefield conditions, if you will—is so critical and that is what continuous scanning is all about. Sandbox testing is essential as it will isolate the app while testing. Otherwise, you could release malware into your network a split-second before you discover it. Or, for that matter, a split-second after. None of this is especially helpful, of course, unless your people know what to look for and what to do about it when they find it, which is where e-learning and remediation coaching come in. It's critical to understand that this is a winning battle, but your people have to set aside the resources to do it properly. Cyberthieves are so very much hoping you don’t. Read the full report here: https://www.veracode.com/soss blockquote.full-width:before { position: absolute; top: 10px; left: 0px; content: "\f10d"; font: 2em "FontAwesome"; color: #808080; } blockquote.full-width { position: relative; border: none; width: 90%; padding-left: 40px; padding-bottom: 10px; margin:auto; } blockquote.full-width p{ font-size: 20px; font-style: italic; font-weight: 800; line-height: 20px; color: #808080; }
The App Security Battle Is Winnable, But Only If You Suit Up
Thu Oct 20 16:44, 2016 GMT
Index on Censorship believes that everyone has the right to express their opinion, no matter how vile or offensive those views, unless their words directly incite violence. The post IPSO right to reject Channel 4 complaint appeared first on Index on Censorship .
IPSO right to reject Channel 4 complaint
Thu Oct 20 11:09, 2016 GMT
Ukrainian rock musician and activist Andriy Klyvynyuk spoke to Index on Censorship of his support for Oleg Sentsov and the other Ukrainian political prisoners held by Russia. The post Andriy Klyvynyuk voices support for Ukrainian political prisoners in Russia appeared first on Index on Censorship .
Andriy Klyvynyuk voices support for Ukrainian political prisoners in Russia
Thu Oct 20 10:27, 2016 GMT
I remember the happy clowns of my childhood when the family would sit in front of the TV during the festive holidays to delight at the magnificent The post Manick Govinda: Defending the free expression of creepy clowns appeared first on Index on Censorship .
Manick Govinda: Defending the free expression of creepy clowns
Wed Oct 19 19:45, 2016 GMT
Internet Privacy Week: Sign The Bill Of Rights & Raise Money For The EFF Techdirt We've teamed up with Namecheap and the EFF to promote Internet Privacy Week and continue the fight to protect your privacy online. Show your support by signing and sharing the new Internet Privacy Bill of Rights. and more »
Internet Privacy Week: Sign The Bill Of Rights & Raise Money For The EFF - Techdirt
Wed Oct 19 15:23, 2016 GMT
This week’s National Cyber Security Awareness Month theme of “recognizing and combating cybercrime” brings up an elementary but crucial point about why our efforts to fight cybercrime seem inadequate for the challenge: it can be really difficult to fix what’s broken even when we know exactly what the problem is. Here’s an example. When a sick patient comes to a doctor complaining about pain, it’s important to immediately address the patient’s suffering. A good doctor will want to understand what caused the pain in the first place. With abdominal pain, for example, is it temporary – such as gas caused by an unhealthy diet? Or is it a chronic condition like Crohn’s disease? When the problem is identified, the doctor can prescribe the right medication and advise the patient on preventive measures to promote ongoing good health. But then the real challenge begins. The patient has to go forth and actually follow doctor’s orders, make health-conscious decisions and change lifestyles. Cybercrime is a huge and growing problem, with many types of attacks – from financially-motivated crime like 419 email scams and insidious ransomware, to politically-motivated hacktivist attacks and state-sponsored advanced persistent threat schemes. One of the most persistent and widespread problems in cybersecurity is application vulnerabilities – application-layer attacks are the most common source of confirmed breaches, according to the 2016 Verizon Data Breach Investigation Report . Although we have diagnosed the source of the application-layer threat – vulnerabilities that result from coding weaknesses – we still fail in our efforts to address the threats with preventive measures. Veracode research shows the enormous scale of the problem. More than 60 percent of applications fail to pass the OWASP Top 10 security policies on initial assessment, according to the latest Veracode State of Software Security report.   If addressing failures in application security were simply a matter of throwing enough money and resources at the problem, you might expect big, resource-rich companies to have it under control. But that is simply not the case. Even the biggest and brightest stars in the high-tech galaxy, like Facebook and Google, struggle with vulnerabilities in their applications. Just recently, a security researcher discovered that the French version of Google’s website had a Cross-Site Scripting vulnerability that bad actors could have exploited to steal private information or take over a victim user’s browser. The cause of common but preventable application vulnerabilities like Cross-Site Scripting (or XSS) is deep-seated and systemic – symptomatic of the way applications are built and how developers are trained. The vast majority of applications are built using third-party and open source components, so when there is defective code in commonly-used components, vulnerabilities are widely distributed. Developers may not be aware that they are using components with defective code and organizations may not know what components they are using and where. In addition, developers aren’t trained in secure coding. Even though XSS is an OWASP Top 10 vulnerability, just 11 percent of developers know how to prevent XSS, according to a 2014 Denim Group study . Is it really surprising that Veracode research shows 50% of applications have at least one XSS vulnerability on initial assessment? Given the systemic nature of these problems, the solution to application risks must be a systematic approach to security, including: A comprehensive application security (AppSec) program that includes static and dynamic testing of all code, including software composition analysis of open-source, third-party components and vendor-supplied software. A developer-friendly training program , such as online courses and video tutorials, to help developers recognize common coding weaknesses and learn preventive, secure coding practices. Of course, it’s not possible to eliminate all risk. People and programs are fallible. Mistakes happen. Applications we think are secure today may turn out to have built-in defects we won’t recognize until tomorrow. But there are some things we can control, particularly with developer training. It’s possible to get that low-hanging fruit and cut down on easily preventable errors. Online learning is proven to work: according to the 2016 State of Software Security report , development teams with an eLearning program reduce flaw density by 55 percent from initial to subsequent scans, on average. That’s opposed to just a 9 percent reduction in flaw density for teams without an eLearning program. If you have a developer training program, how could you make it better ? And if you don’t, what better time to begin your focus on developer training than National Cyber Security Awareness Month? If you want to know more about how Veracode is helping developers learn secure coding skills, watch a short video demonstration of our eLearning platform . And you can register to see a free sample course in XSS , which demonstrates a basic XSS attack and provides remediation training for Java and .NET developers.  
Why Even Google Is Susceptible to the Most Basic Website Vulnerabilities
Wed Oct 19 15:23, 2016 GMT
BRUSSELS (Reuters) - Website owners are free to store users' internet addresses to prevent cyber attacks, the European Union's top court said on Wednesday, rejecting a claim from a German privacy activist who sought to stop the practice.
Websites free to store IP addresses to prevent cyber attacks: EU court
Wed Oct 19 15:33, 2016 GMT
Nigerian writer Ken Saro-Wiwa Junior has died in London, aged 47, following a stroke. The writer and presidential adviser had recently written for Index on Censorship The post Ken Saro-Wiwa Junior dies, age 47 appeared first on Index on Censorship .
Ken Saro-Wiwa Junior dies, age 47
Wed Oct 19 14:03, 2016 GMT
WASHINGTON (Reuters) - U.S. bank regulators on Wednesday outlined cyber security standards meant to protect financial markets and consumers from online attacks against the nation's leading financial firms.
U.S. calls on banks to set higher cyber security standards
Wed Oct 19 13:55, 2016 GMT
We, the undersigned organisations, recognise that the Turkish government has the right and responsibility to investigate the violent events of the July 2016 coup attempt and to bring all those responsible to justice. The post Turkey: State of emergency provisions violate human rights and should be revoked appeared first on Index on Censorship .
Turkey: State of emergency provisions violate human rights and should be revoked
Wed Oct 19 10:58, 2016 GMT
MUMBAI (Reuters) - Axis Bank Ltd, India's third-biggest private sector lender by assets, said on Wednesday there was no loss to its customers from a recent cyber attack.
India's Axis Bank says no loss from cyber attack
Wed Oct 19 09:15, 2016 GMT
At it's best, trolling is a form of satire. But those who reduce it to nasty and humourless online threats don’t deserve the title. The post Alex Krasodomski-Jones: Where have all the good trolls gone? appeared first on Index on Censorship .
Alex Krasodomski-Jones: Where have all the good trolls gone?
Wed Oct 19 05:04, 2016 GMT
Digital Trends WikiLeaks: Ecuador says it blocked Assange's internet over U.S. election meddling Digital Trends As Julian Assange sits in the Ecuadorian Embassy in London twiddling his thumbs and contemplating life without the internet , his WikiLeaks site is continuing to dump masses of sensitive material on the web for everyone and his dog to peruse. ... to ... Ecuador admits it has 'temporarily restricted' Assange's Internet access USA TODAY Wikileaks: Ecuador Cut Off Assange's Internet Access PC Magazine Ecuador Cuts Internet of Julian Assange, WikiLeaks' Founder New York Times The Daily Dot  - Breitbart News  - VentureBeat  - Twitter all 710 news articles »
WikiLeaks: Ecuador says it blocked Assange's internet over U.S. election meddling - Digital Trends
Wed Oct 19 02:16, 2016 GMT
USA TODAY Ecuador admits it has 'temporarily restricted' Assange's Internet access USA TODAY Ecuador acknowledged Tuesday that it has “temporarily restricted” Internet access for WikiLeaks founder Julian Assange at its embassy in London, after his whistleblowing site published documents from Hillary Clinton's presidential campaign. Ecuador's ... WikiLeaks: Ecuador says it blocked Assange's internet over U.S. election meddling Digital Trends Wikileaks: Ecuador Cut Off Assange's Internet Access PC Magazine Ecuador Cuts Internet of Julian Assange, WikiLeaks' Founder New York Times The Daily Dot  - Breitbart News  - VentureBeat all 710 news articles »
Ecuador admits it has 'temporarily restricted' Assange's Internet access - USA TODAY
Fri Oct 14 18:02, 2016 GMT
Corporate execs are understandably worried these days about all of their electronic communications. Whether messages can be intercepted by corporate spies working for the opposition, government investigators snooping for terrorists or cyberthieves looking to steal what they can get, anything that is intercepted can wind up somewhere else. See Edward Snowden. It's therefore quite understandable why there is much corporate enthusiasm for instant message systems that boast point-to-point encryption. Note that we're not saying end-to-end encryption because, technically, that can't exist. Well, it could exist, but then no one on either end could read anything. Point to point is the better way to reference messages that are encrypted after they are sent and then unencrypted right before they are opened by the intended recipient. The next decision companies must make are whether to go outside for encryption services and, if so, what they will ask those vendors to do. Going outside for the encryption effort itself will be the choice for almost all companies that don't happen to have—as companies including Target, Boeing and Chase do—teams of cryptographers on the payroll. So, for most, they will indeed need outside help. The thornier decision is where the company will house the encrypted files and where the decrypting keys will reside. That will speak to the security of the enduser company—in other words, how equipped are they to securely protect such data and keys—and the perceived security and trust level of that outside vendor. There is no right answer to that question as both options have serious pros and cons. On the one hand, an outside company that specializes in data protection would, theoretically, be able to justify a much greater security investment, both in systems and specialized personnel. The problem is trust. That's not merely trust in that vendor's employees and contractors. It's also trust that they can protect their data from attackers. With a few exceptions, companies that house the data and decryption keys for lots of customers will be more high-valued targets than the typical individual company. This is for the same reason that payments processors and credit card companies are bigger targets than their retail customers. There are obviously exceptions, such as the largest retailers (Walmart could easily house more payment credentials than many smaller payments processors) and companies with especially valuable data, such as military contractors who are constantly attacked by well-financed government spies for hostile countries. But there's another trust consideration. Does the vendor have any business interests that would make them tempted to look at—and leverage—your data? As absurd as that they sound, companies have been known to trust their most sensitive data to just such a firm. And that brings us to Google. Google has recently started pushing an encrypted version of its Allo messenging service to businesses. Why not? Many of those companies are already trusting Google's Gmail with oceans of their most sensitive e-mails. But in this aspect of app security, endusers may have really good reasons to consider a pure security company, rather than a marketing firm that desperately wants to access their data. Consider this excerpt from a Washington Post story about Google's Allo efforts : "Google started offering users end-to-end encryption for the first time Wednesday with its new Allo instant-messaging app. The move makes Google the latest company to follow a tech trend that has privacy advocates cheering but some law enforcement officials worried. Conversations in Allo are not automatically protected by that extra secure form of encryption, which allows only those who send and receive messages to unlock them. Rather, users can choose to have 'incognito' conversations that feature the security measure — much like a system that Facebook is testing in its Messenger app. Other conversations in Allo are still encrypted between the app and Google's servers, but that means the tech company will be able to access the content of those messages." Let's bottom line that. Unless customers happen to use this "incognito" option—and it must be done individually, as opposed to with a master setting done by a company's IT operation—the encrypted messages can all be seen by Google. That's a pretty scary default setting. Forget about what happens if a cyberthief breaks into Google's systems or if a Google employee/contractor goes rogue and tries selling the data to the highest bidder—all of which are quite plausible scenarios. Google itself might love to mine your data and then resell access to that data to quite a few of its customers. That is their primary revenue source, after all. Security firms at least have a business model focused solely on security—and sometimes specifically app security. That's worth a big chunk of your consideration if you really want to keep your messaging contents secret.
Message Encryption Is Great—Depending On Who Has The Key
Fri Oct 14 15:30, 2016 GMT
Application security is an emerging and critical aspect of a security program; however, all AppSec attitudes are not created equal. Unlike other security initiatives, application security affects a lot of different people in your organization – and in different ways. A developer’s attitude toward and concerns about an application security program will not be the same as a member of the legal department, and a CTO’s will be completely different. Understanding the different priorities of the groups that will be affected by AppSec, and what they are going to need from the initiative, will go a long way toward AppSec success. Here’s what each team cares about and how AppSec affects those priorities. Dev: All About Deadlines Beyond the security team, AppSec affects developers more than any other individuals in your organization. Developers want their code to be secure, but not at the expense of their deadlines. Application security can’t be a development roadblock, or it will simply be overlooked or bypassed. Application security solutions should work the way developers work, and developers should have a voice in the planning of any application security program. C-Level: All About the Bottom Line What’s the ROI? Will it save us money, time, make us more efficient? Will it reduce our risk? These are the questions the C-suite will want answered around AppSec. Because of their focus on the health of the business and the bottom line, this group doesn’t want to hear about the technology of the solution, but about the business impacts. Talk to them about the numbers surrounding AppSec, and you’ll increase your chances of getting their support. Legal: All About Words Make your legal team an AppSec helper, rather than hindrance. If you’re a software vendor, or if you are including third-party applications in your AppSec program, the legal team will want to make sure the words are right – whether it’s a contract for applications you are purchasing, or a contract for software you are selling. The legal team will need to be part of any contract negotiation to ensure your requests of vendors are legal, and your practices for testing third-party applications do not breach your customer contract. In addition, the legal team will help you craft language around your own security posture in situations where you are the software vendor. Marketing: All About Reaching the Market Marketing is all about outreach, which today means a heavy use of new technology and tools to connect and share information with prospects and customers. Marketing departments are spinning up websites and landing pages, purchasing and creating mobile apps, hiring third-party contractors to help with automation and purchasing applications from third-party vendors. But introducing all this technology also frequently means they are introducing lots of risk. Make sure marketing is aware of application security, corporate AppSec policies and the implications of their innovations. Do you have a plan for working with the various groups in your organization on AppSec? Get more details with our guide, Joining Forces: Why Your Application Security Initiative Needs Stakeholder Buy-In .
AppSec: From the Breakroom to the Boardroom
Tue Oct 18 10:45, 2016 GMT
ITWeb Internet ' censorship ' Bill may see changes ITWeb The Bill, labelled by some as the " Internet Censorship Bill", has come under fierce scrutiny since it was first gazetted, with many calling for it to be overhauled for infringing on freedom of speech. Opponents of the Bill have voiced concerns over the ... and more »
Internet 'censorship' Bill may see changes - ITWeb
Tue Oct 18 08:00, 2016 GMT
We, the undersigned organisations, write to you regarding the systematic targeting of journalists, human rights defenders and online activists by the Internal Security Service (ISS) in Oman. The post Joint letter to the Sultan of Oman on the right of press freedom and the targeting of journalists and human rights defenders appeared first on Index on Censorship .
Joint letter to the Sultan of Oman on the right of press freedom and the targeting of journalists and human rights defenders
Mon Oct 17 17:08, 2016 GMT
Plus, we discuss Samsung testing the Galaxy Note 7's explosive batteries in-house, along with the tech behind marijuana.
Was Julian Assange censored by a government? (The 3:59, Ep. 124) - CNET
Mon Oct 17 16:08, 2016 GMT
76 Groups Urge FCC to Move on Internet Privacy , Set-Top Box Rules Morning Consult Consumer advocates such as Public Knowledge, Consumers Union and the New America Foundation's Open Technology Institute are among 76 groups that on Monday called on the Federal Communications Commission to advance rules aimed at opening ... and more »
76 Groups Urge FCC to Move on Internet Privacy, Set-Top Box Rules - Morning Consult
Mon Oct 17 12:00, 2016 GMT
We live in serious times, what with civil wars, US elections and the threat of Marmite rationing. But there's always room in the news for outrage about a joke. The post Timandra Harkness: I prefer comedy that challenges the audience appeared first on Index on Censorship .
Timandra Harkness: I prefer comedy that challenges the audience
Sun Oct 16 23:00, 2016 GMT
Cambridge Network Internet censorship : making the hidden visible Cambridge Network Despite being founded on ideals of freedom and openness, censorship on the internet is rampant, with more than 60 countries engaging in some form of state-sponsored censorship . A research project at the University of Cambridge is aiming to uncover the ...
Internet censorship: making the hidden visible - Cambridge Network
Thu Oct 6 22:36, 2016 GMT
Los Angeles Times FCC revises Internet privacy proposal; UN deal reached on aircraft emissions Washington Post A privacy proposal unveiled Thursday will require broadband providers such as Verizon and Comcast to get your permission before sharing with advertisers your phone or computer data. The Federal Communications Commission has changed its broadband ... FCC proposal would let Internet providers share your 'non-sensitive' data without your permission Los Angeles Times The FCC wants ISPs to get permission before sharing your data Engadget FCC Chairman's Privacy Plan Lets Consumers Govern ISP Data Tracking Deadline Federal Communications Commission  - Federal Communications Commission all 137 news articles »
FCC revises Internet privacy proposal; UN deal reached on aircraft emissions - Washington Post
Fri Oct 14 18:27, 2016 GMT
InfoWorld ISPs mind their MANRS to block DDoS attacks | InfoWorld InfoWorld The Internet Society's MANRS initiative improves Internet security by asking ISPs to clean up their routing rules and check network traffic. and more »
ISPs mind their MANRS to block DDoS attacks | InfoWorld - InfoWorld
Fri Oct 14 16:56, 2016 GMT
Slate Magazine (blog) What Ken Bone's Porn Preferences Tell Us About Internet Privacy Today Slate Magazine (blog) Ken Bone—undecided voter, red sweater aficionado, star of the second presidential debate—likes pregnancy porn. He also thinks the killing of Trayvon Martin was “justified” and allegedly committed felony insurance fraud. We know all this because Bone ... and more »
What Ken Bone's Porn Preferences Tell Us About Internet Privacy Today - Slate Magazine (blog)
Fri Oct 14 17:06, 2016 GMT
French TV Network Brought Down By Hacker Group Earlier this year, it was reported that TV5Monde fell victim to a cyberattack that nearly caused the demise of the network. Rather than gain access... read more The post Threat Recap: Week of October 10 appeared first on Webroot Threat Blog .
Threat Recap: Week of October 10
Fri Oct 14 09:11, 2016 GMT
MINSK (Reuters) - A Belarussian court started on Friday a closed trial of a blogger - known for his fierce criticism of Russia - who is accused of inciting hatred and distributing pornography in a case activists say is politically motivated.
Anti-Russia blogger stands trial in Belarus
Thu Oct 6 14:54, 2016 GMT
The Economist The internet of stings The Economist Edith Ramirez, chairwoman of America's Federal Trade Commission, said as much in January 2015 when she delivered a polite but blistering speech about privacy and security practices at one of the electronic industry's main trade meetings, the Consumer ... When smart goes bad: Why internet security does not just refer to computers Lexology (registration) ​Death of the internet : GIF at 11 ZDNet Hackers Release Botnet Code, Raising Specter of More Attacks Wall Street Journal CSO Online  - Naked Security  - Krebs on Security  - Krebs on Security all 77 news articles »
The internet of stings - The Economist
Fri Oct 14 10:02, 2016 GMT
After 29 years of circulation, Himal Southasian, which claims to be the only analytical and regional news magazine for South Asia, will cease to publish as of November 2016. The post Leading Nepal editor speaks out about independent media facing censorship in South Asia appeared first on Index on Censorship .
Leading Nepal editor speaks out about independent media facing censorship in South Asia
Thu Oct 13 17:25, 2016 GMT
The RIAA has submitted its most recent overview of "notorious markets" to the U.S. Government. As usual, the music industry group lists various torrent sites, download portals and stream ripping sites as direct threats. In addition, it points out that these sites are becoming harder to take enforcement action against, since they increasingly use CloudFlare. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
RIAA: CloudFlare Shields Pirates and Frustrates Blocking Efforts
Thu Oct 13 13:02, 2016 GMT
Multiple stories published here over the past few weeks have examined the disruptive power of hacked "Internet of Things" (IoT) devices such as routers, IP cameras and digital video recorders. This post looks at how crooks are using hacked IoT devices as proxies to hide their true location online as they engage in a variety of other types of cybercriminal activity -- from frequenting underground forums to credit card and tax refund fraud.
IoT Devices as Proxies for Cybercrime
Thu Oct 13 08:13, 2016 GMT
South China Morning Post China's internet censors target video viewers' live comments South China Morning Post The move reflects the increasingly intrusive and pre-emptive internet censorship on the mainland, as authorities get more assertive about controlling online information. The decree, released by the internet security department of the Shanghai Public ...
China's internet censors target video viewers' live comments - South China Morning Post
Wed Oct 12 19:09, 2016 GMT
Ball State Daily Child pornography cases lead to internet privacy concerns Ball State Daily ... on intellectual freedom and the right to inquiry and digital privacy . The lecture was prompted by faculty concerns about how much access the Office of Information Security Services has to internet search information on computers using the Ball ...
Child pornography cases lead to internet privacy concerns - Ball State Daily
Wed Oct 12 15:38, 2016 GMT
On Monday 10 October, Belarus Free Theatre hosted Freedom of Expression in Ukraine, an event at the House of Commons in solidarity with Oleg Sentsov The post Russia: Belarus Free Theatre calls for the release of jailed Ukranian filmmaker Oleg Sentsov appeared first on Index on Censorship .
Russia: Belarus Free Theatre calls for the release of jailed Ukranian filmmaker Oleg Sentsov
Tue Oct 11 23:54, 2016 GMT
ABC Local What does the hack on the BOM website tell us about Australia's internet security ? The 2016 Australian Cyber ... ABC Local Details of an overseas internet attack on the Australian Bureau of Meteorology's computer system have been revelaed in the 2016 Australian Cyber Security Centre Threat report. A foreign power managed to install malicious software known as malware ... and more »
What does the hack on the BOM website tell us about Australia's internet security? The 2016 Australian Cyber ... - ABC Local
Wed Oct 12 02:15, 2016 GMT
SYDNEY (Reuters) - A malware attack against Australia's Bureau of Meteorology which might have spread into other government networks originated from a foreign intelligence service, an official report by the country's cyber defense agency said on Wednesday.
Australia government cyber attack came from foreign intelligence service: report
Wed Oct 12 03:07, 2016 GMT
An official report into a 2015 cyber attack on the Australian Bureau of Meteorology concludes it was carried out by foreign spies.
Australia weather bureau hacked by foreign spies, says report
Tue Oct 11 14:46, 2016 GMT
WASHINGTON (Reuters) - The Group of Seven industrial powers agreed to guidelines on how to protect the financial sector from cyber attacks, Japan's finance ministry said on Tuesday.
G7 sets cybersecurity guidelines for financial sector
Tue Oct 11 13:05, 2016 GMT
(Reuters) - Cyber-security firm Symantec Corp said on Tuesday that a second hacking group has sought to rob banks using fraudulent SWIFT messages, the same approach that yielded $81 million in the high-profile February attack on Bangladesh's central bank.
Second hacker group targets SWIFT users, Symantec warns
Tue Oct 11 08:19, 2016 GMT
In this extract from Index on Censorship's Autumn issue, Mark Frary looks at some of the tactics you can use to remain safe and invisible when browsing The post How to stay anonymous online appeared first on Index on Censorship .
How to stay anonymous online
Tue Oct 11 08:57, 2016 GMT
HANOI (Reuters) - Vietnamese police have detained a prominent blogger for posting anti-state reports, including one about civilians dying in police custody, which they said undermined trust in the ruling Communist Party.
Vietnam detains blogger after police custody deaths post
Tue Oct 11 03:54, 2016 GMT
Breitbart News MILO: Obama is Handing The Internet Over To 'Kebabs, Censorship , And Religious Fanatics' Breitbart News In a speech entitled “Obama Just Handed The Internet Over To Monsters,” MILO explained why President Obama's plans to hand over control of the internet to an unknown unaccountable organisation will be a disaster for freedom of speech. and more »
MILO: Obama is Handing The Internet Over To 'Kebabs, Censorship, And Religious Fanatics' - Breitbart News
Mon Oct 10 22:46, 2016 GMT
US intelligence officials have accused Russia of trying to influence the outcome of the US presidential election by deploying cyber-attacks.
Did Russia hack the US Democrats?
Mon Oct 10 20:45, 2016 GMT
Your lack of internet privacy is part of Yahoo's business plan - Chicago Tribune. What's perhaps more remarkable, though, is how little privacy American internet users demand. First came news ... Before resigning, Yahoo's chief information security officer, Alex Stamos, pushed for the company to adopt end-to-end encryption. This ...
Your lack of internet privacy is part of Yahoo's business plan - Chicago Tribune
Mon Oct 10 14:39, 2016 GMT
BERLIN (Reuters) - A nuclear power plant became the target of a disruptive cyber attack two to three years ago, and there is a serious threat of militant attacks on such plants, the head of the United Nations nuclear watchdog said on Monday.
IAEA chief: Nuclear power plant was disrupted by cyber attack
Mon Oct 10 12:43, 2016 GMT
Access to online storage systems, including DropBox, GitHub and Microsoft OneDrive, was blocked in Turkey on Saturday.
Turkey blocks web drives after email leak
Mon Oct 10 10:42, 2016 GMT
Naija247news Nigerian Users' Privacy under the Protection of new Kaspersky Internet Security – multi-device Naija247news Kaspersky.co.za) announces the availability of the new version of its flagship security solution, Kaspersky Internet Security – multi-device in Nigeria, which provides users with additional opportunities to manage their Internet protection and to ... and more »
Nigerian Users' Privacy under the Protection of new Kaspersky Internet Security – multi-device - Naija247news
Mon Oct 10 10:15, 2016 GMT
Asena Günal, the program coordinator of Depo which is a center for arts and culture at Tophane, Istanbul, looks at how Turkey's art community has come under increasing pressure in the past year The post Turkey: Art in troubled times appeared first on Index on Censorship .
Turkey: Art in troubled times
Mon Oct 10 05:22, 2016 GMT
A powerful cyber-attack came close to destroying a French TV network, its director-general tells the BBC.
How France's TV5 was almost destroyed
Sat Oct 8 20:25, 2016 GMT
Running a fully functional website in a regular browser without any central servers being involved sounds complicated, but with Web2Web it isn't. The project, powered by WebTorrent and bitcoin, allows anyone to create updatable websites that are as resilient as it gets. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Web2Web: Serverless Websites Powered by Torrents & Bitcoin
Sat Oct 8 09:33, 2016 GMT
Faced with the possibility that website blocking may not achieve its goals, Russia is now considering fresh opportunities for decreasing online file-sharing. Sources familiar with negotiations say that authorities are mulling a system of fines which would target individual downloaders. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Russia Mulls Downloading Fines if Site Blocking Fails
Sat Oct 8 09:54, 2016 GMT
MOSCOW (Reuters) - U.S. accusations that Russia was responsible for cyber attacks against Democratic Party organizations lack any proof and are an attempt by Washington to fan "unprecedented anti-Russian hysteria", the Foreign Ministry in Moscow said.
Russia says U.S. cyber attack claims fan anti-Russian hysteria
Fri Oct 7 19:43, 2016 GMT
WASHINGTON (Reuters) - The U.S. government on Friday formally accused Russia of a campaign of recent cyber attacks against Democratic Party organizations.
U.S. accuses Russia of hacking attempts on political groups
Fri Oct 7 09:19, 2016 GMT
On Thursday 6 October, human rights groups gathered outside the UK's Foreign and Commonwealth Office to hold a vigil for imprisoned Bahraini human rights advocate, Nabeel Rajab The post Bahrain: Protesters call for Nabeel Rajab’s release appeared first on Index on Censorship .
Bahrain: Protesters call for Nabeel Rajab’s release
Fri Oct 7 14:07, 2016 GMT
Russian authorities have reportedly arrested Maxim Ryabyko, the head of one of the leading anti-piracy agencies. Several sources suggest that he offered to help drop a criminal investigation against an Internet entrepreneur with alleged connections to the pirate site Lib.rus.ec, in exchange for 50 million rubles. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Russian Anti-Piracy Chief Arrested in ‘Fraud’ Investigation
Fri Oct 7 11:47, 2016 GMT
Museums are increasingly under pressure from funders, the press and donors to change their programming, displays and events. As part of the Museum Association's annual conference Index on Censorship's Julia Farrington will tale about Index's guides for arts organisations dealing with controversial exhibitions. The post 7 Nov: Museums are increasingly under pressure appeared first on Index on Censorship .
7 Nov: Museums are increasingly under pressure
Fri Oct 7 11:15, 2016 GMT
Just before my last trip to Chechnya in mid-September my colleagues at Novaya Gazeta began to receive threats and were told to pass on the message that I shouldn’t go to Chechnya any more. If I did, my life would be in danger. As always, our paper has its ‘own people’ on the general staff and the ministry of defence — people who broadly share our views The post Anna Politkovskaya: Standing alone appeared first on Index on Censorship .
Anna Politkovskaya: Standing alone
Fri Oct 7 08:29, 2016 GMT
Writing in the latest Index on Censorship magazine, fellow Russian journalist Andrey Arkhangelsky reflects on Anna Politkovskaya's legacy The post Andrey Arkhangelsky reflects on Anna Politkovskaya’s legacy appeared first on Index on Censorship .
Andrey Arkhangelsky reflects on Anna Politkovskaya’s legacy
Fri Oct 7 09:34, 2016 GMT
On 24 September Index on Censorship’s CEO, Jodie Ginsberg, gathered with former BBC chief news correspondent Kate Adie and 2016 Index award-winning journalist Zaina Erhaim The post Podcast: How are women journalists shaping war reporting today? appeared first on Index on Censorship .
Podcast: How are women journalists shaping war reporting today?
Fri Oct 7 07:19, 2016 GMT
Forcing ISPs to block pirate sites can be both time-consuming and expensive but it doesn't have to be that way. A voluntary scheme in Portugal has streamlined the process and won the backing of the MPAA, who say that the system is the best international example of anti-piracy practices. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
MPAA Says Portugal’s Pirate Site-Blocking System is World Leader
Thu Oct 6 20:42, 2016 GMT
The agency backs away from imposing stricter data collection rules on broadband and wireless companies than on Facebook, Twitter and Google.
FCC's internet privacy proposal just got a little weaker - CNET
Thu Oct 6 18:18, 2016 GMT
CNET FCC revises internet privacy rule proposal CNET In a major shift in policy, the agency said Thursday Wheeler has changed his proposal for regulating privacy practices of internet service providers to keep them in line with the Federal Trade Commission's approach. The FCC's proposal is considered the ... Internet service providers would need customer permission to share sensitive data under FCC proposal Los Angeles Times These are the privacy rules your Internet provider might soon have to live by Washington Post FCC to vote this month on privacy rules for internet providers The Hill ABC News  - Deadline all 31 news articles »
FCC revises internet privacy rule proposal - CNET
Mon Oct 3 08:58, 2016 GMT
Graham Cluley Security News Download the Mirai source code, and you can run your own Internet of Things botnet Graham Cluley Security News ... to change, to weak or non-existent encryption, to no infrastructure for updating devices if a vulnerability is found at a later date. As I explain in the video below, an internet of things which doesn't treat security and privacy as a priority puts ... Here are the 61 passwords that powered the Mirai IoT botnet CSO Online Source Code for IoT Botnet 'Mirai' Released Krebs on Security KrebsOnSecurity Hit With Record DDoS Krebs on Security Ars Technica  - Wikipedia  - MalwareTech all 108 news articles »
Download the Mirai source code, and you can run your own Internet of Things botnet - Graham Cluley Security News
Thu Oct 6 17:38, 2016 GMT
Los Angeles Times Internet service providers would need customer permission to share sensitive data under FCC proposal Los Angeles Times But AT&T Inc., Charter Communications Inc, Verizon Communications Inc. and other providers of high-speed Internet service would not have to get a user's approval before sharing any other “non-sensitive” data, such as a person's name and address ... FCC Proposal: Internet Providers Must Ask to Share Your Data New York Times FCC Chairman's Privacy Plan Lets Consumers Govern ISP Data Tracking Deadline FCC Moves to Let You Control How ISPs Use Your Data PC Magazine all 17 news articles »
Internet service providers would need customer permission to share sensitive data under FCC proposal - Los Angeles Times
Thu Oct 6 10:11, 2016 GMT
CSO Online Taking down the internet : possible but how probable? CSO Online You may not have to imagine it, according to Bruce Schneier, CTO of Resilient Systems, cryptography guru, blogger and international authority on internet security . In a recent post titled, "Someone is Learning How to Take Down the Internet ," he wrote ... When smart goes bad: Why internet security does not just refer to computers Lexology (registration) Hackers Release Botnet Code, Raising Specter of More Attacks - WSJ Wall Street Journal The Internet of Things: How Vulnerable Is It? Government Technology CEPro  - Sky Valley Chronicle  - Naked Security all 27 news articles »
Taking down the internet: possible but how probable? - CSO Online
Thu Oct 6 10:49, 2016 GMT
Ahead of the anniversary of her murder, Index has compiled a reading list of articles written for the magazine both by Politkovskaya and about her The post Index remembers Anna Politkovskaya appeared first on Index on Censorship .
Index remembers Anna Politkovskaya
Thu Oct 6 09:18, 2016 GMT
Chrome and Firefox are again blocking direct access to The Pirate Bay's download pages. According to Google's safe browsing program, ThePirateBay.org is a "deceptive site" that may steal user information. The TPB crew has been alerted to the issue and hope it will be resolved soon. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Chrome and Firefox Brand The Pirate Bay As a “Phishing” Site…..Again
Thu Oct 6 09:35, 2016 GMT
Bahrain's judicial harassment of award-winning human rights defender must end The post Bahrain: Nabeel Rajab sentencing postponed to 31 Oct appeared first on Index on Censorship .
Bahrain: Nabeel Rajab sentencing postponed to 31 Oct
Wed Oct 5 17:36, 2016 GMT
I am not a developer, I’m a writer. However, it has become clear to me that these two professions have more in common than I had originally thought. Really, we are doing the same thing - just in different languages, and to different ends. The gratification that comes from starting with a blank page, building something that didn't exist before, and achieving a purpose, is the same. I write quickly. I get excited about an idea and take off without a second thought. The end result? Pages of content that convey a message, but also a lot of typos, misplaced commas, and dangling modifiers - an English teacher's nightmare. At this point I must sift back through my work - read it to myself, read it aloud, ask others to read it - and then finally, hours or days later, I have my finished, polished content. If my writing was checked as I went, my editing process could have been easier, more efficient, and more accurate. But to do that without interrupting my creative flow requires automation. The same is true for developers. Developers write code quickly because they too are in a creative flow, and because deadlines loom . In today’s fast paced market, there is precious little time to devote to reviewing every line of code, despite the consensus that code review is a best practice. Security is often the last thing on a developer’s mind, after functionality and performance. However, not “proofreading” code with an eye toward security defects can lead to the proliferation of vulnerabilities within software that can have an enormously detrimental business effect should there be a breach. Today every business builds or purchases software to streamline business operations. While many are aware that cybersecurity is important, there is an information gap when understanding how application security works. Vulnerabilities highlighted earlier in software development are easier and less expensive to fix. Fortunately, there are a variety of tools that can assist programmers in creating high-quality code quickly, without leaving security testing to the last minute. The end goal is a strong, integrated security program that allows developers to easily identify and fix threats during the production and use of their software. As with writers, there are a number of tools available and emerging to help developers deliver secure software without slowing them down: Static Analysis, Autocorrect This is like autocorrect – highlighting and making suggestions where you may have spelled something wrong, or meant something different. Static analysis integrates into the development team’s existing process and toolset, and scans code frequently during the development process to identify potential errors. Static analysis scans code and highlights potential vulnerabilities without actually executing the code.   Composition Analysis, the Automated Fact Checker This might be compared to a writer fact-checking their sources to ensure that contributors are reliable. Composition Analysis inventories elements of the code that were created by third parties and reused by the developer. The inventory is then compared to databases of known vulnerabilities to highlight potential risks in these third party libraries. Dynamic Analysis, the Automated Editor I wish this existed for writers (any of you developers want to take a shot?) Dynamic Analysis probes executing code and highlights areas that might be vulnerable to a hacker that is probing in a similar way. This would be like simulating a reader to make sure they understand the context of the story and are taking away the intended meaning. 30% of companies do not scan for vulnerabilities during code development. This either leaves themselves and their clients open to attacks, or slows down software deployment by running tests late in the process. An author would not write a book, then go back and add the periods and commas later. If they did, the result would likely be poor quality, or a missed deadline. This same risk exists if you do not scan for vulnerabilities during software development. The good news is that tools today can help automate the ongoing editing process.  For software developers, there are even more tools available that enable quality, security and speed. Is your company leveraging these tools in the software development lifecycle?
Software Grammar 101
Tue Oct 4 16:51, 2016 GMT
Fortune The malware that's pwning the Internet of Things is terrifyingly amateurish Boing Boing If mediocre malware can power some of the largest DDoS attacks ever, and considering the sad state of security of the Internet of Things in general, we should probably brace for more cyberattacks powered by our easy-to- hack “smart” Internet of Things, ... Why a Hacker Dumped Code Behind Colossal Website-Trampling Botnet Fortune Why the internet of things is the new magic ingredient for cyber criminals The Guardian Source Code for IoT Botnet 'Mirai' Released Krebs on Security The Register  - Ars Technica  - newsBTC  - Krebs on Security all 108 news articles »
The malware that's pwning the Internet of Things is terrifyingly amateurish - Boing Boing
Wed Oct 5 14:12, 2016 GMT
Bolo Bhi is continuing its fight against Pakistan's recently enacted cyber crimes bill. The post Bolo Bhi will continue to fight Pakistan’s cyber crimes law appeared first on Index on Censorship .
Bolo Bhi will continue to fight Pakistan’s cyber crimes law
Wed Sep 21 19:53, 2016 GMT
Morning Consult Internet , Ex-Im Provisions Likely in Spending Bill Morning Consult A pair of legislative provisions involving internet domain names and the Export-Import Bank are working their way into a wide-ranging bill to fund the government past Sept. 30, according to senators involved in the negotiations. Senate Republican ... Trump Opposes President Obama's Plan to Surrender American Internet Control to Foreign Powers | Donald J Trump ... Donald Trump Ted Cruz is wrong about how free speech is censored on the Internet Washington Post Sen. Cruz: Obama's Internet Handover Endangers Free Speech Online | Ted Cruz | U.S. Senator for Texas Ted Cruz PolitiFact  - New York Times all 136 news articles »
Internet, Ex-Im Provisions Likely in Spending Bill - Morning Consult
Fri Sep 23 15:17, 2016 GMT
Washington Post How Donald Trump's Internet policy could benefit Russia Washington Post So it may seem surprising to hear the Trump campaign suddenly change its tone on Russia this week over an obscure battle on Internet policy. Taking a swipe at Russia's support for Internet censorship , a Trump policy adviser warned Wednesday against ... Internet , Ex-Im Provisions Likely in Spending Bill Morning Consult Trump Opposes President Obama's Plan to Surrender American Internet Control to Foreign Powers | Donald J Trump ... Donald Trump Ted Cruz is wrong about how free speech is censored on the Internet Washington Post Ted Cruz  - PolitiFact  - New York Times all 136 news articles »
How Donald Trump's Internet policy could benefit Russia - Washington Post
Tue Oct 4 08:03, 2016 GMT
Mozilla team-up with Tor to improve internet privacy InSerbia News “CDT looks forward to working with Mozilla on the Polaris program and advising on issues like combating Internet censorship and protecting online anonymity, which are vital to promoting free expression online.” said Justin Brookman of ... Although Tor ...
Mozilla team-up with Tor to improve internet privacy - InSerbia News
Tue Oct 4 00:00, 2016 GMT
In a shocking announcement last month, Yahoo confirmed that data on 500 million user accounts was compromised in 2014, the largest data breach in history. Could it also become the most expensive?" Yahoo is in the final phases of a deal with Verizon to sell itself to the telecom giant for a mind-boggling sum of $4.8 billion. The breach bombshell can’t have gone over well in Verizon corporate headquarters. The companies announced the sale in July, the same month Yahoo claims it discovered the two-year-old breach. Yet Yahoo only told Verizon about the breach in September, two days before it came clean publicly. The sequence of events generated boatloads of brand-damaging media attention and set off a wave of speculation in the financial press that the deal could stall. Senior senators in Washington are talking about launching investigations into what Yahoo knew and whether it concealed the breach from Verizon to keep it from sinking the deal or lowering its offering price. In the wake of the Yahoo breach and the ongoing fallout, it’s not hard to imagine scenarios where a data breach or cyberattack could cost billions of dollars. Perhaps a merger or acquisition deal falls through. Or the acquiring company’s stock takes a major hit, devaluing the company and hurting investors. Investors are certainly paying attention to cybersecurity these days. Given the recent history of punitive fines and lawsuits against breached companies, it’s not unreasonable for risk-averse investors to steer clear or sell shares when companies are compromised. And now there’s a new investment strategy that sees risk in the potential for breaches based on security vulnerabilities. In early September, the medical device manufacturer St. Jude Medical was blindsided by short-sellers betting against its stock value, after a security research firm tipped off the trading firm Muddy Waters that vulnerabilities in St. Jude’s implantable devices could lead to product recalls. St. Jude took a hit on its stock price, which fell by 5 percent in one day. And the company’s value dropped 7 percent below the $25 billion asking price in St. Jude’s acquisition by another company. The financial arrangement between Muddy Waters and the security firm, MedSec Holdings, raises serious ethical questions. MedSec, which was founded by a former hedge fund manager, spent more than a year probing for vulnerabilities in St. Jude’s pacemakers and connected monitoring devices. The security firm had no intention of responsibly disclosing its findings to St. Jude before taking them public. Instead, MedSec provided the information to Muddy Waters, waiting until the investment firm shorted the stock before coming out with its findings. Muddy Waters principal Carson Block later told media that the public disclosure was a benefit to consumers, who could have been harmed by attackers launching a “mass attack” against the devices using insecure protocols connecting pacemakers to home monitors and physicians. Yet MedSec’s research findings seem to have more holes than St. Jude’s devices . St. Jude said MedSec’s findings were based on false assumptions and describe an attack that would be almost impossible to carry out. MedSec justified not disclosing to St. Jude because the “devices are so poorly protected,” it was likely the result of “gross negligence over many years,” and even if they told St. Jude the device manufacturer would “sweep it under the rug,” Block told Bloomberg news. “St. Jude has been putting profits before patients,” Block said. Not surprisingly, St. Jude is now suing Muddy Waters and MedSec . In the end, it doesn’t matter if the St. Jude devices were actually vulnerable to real-world attacks or not. Muddy Waters’ short of St. Jude’s stock was self-fulfilling, which should give us pause to consider the possibility that unscrupulous “researchers” could pull this trick based on even less. Even the false perception of risk could be enough to drive investor behavior and put companies in a vise. The St. Jude story underscores the importance of companies doing as much as possible to reduce the risk of vulnerabilities in every piece of software they use. For development teams, that means baking in security throughout the software lifecycle, beginning with systematic assessment of code as soon as developers write it, and continuous monitoring of applications in production. There’s no excuse or forgiveness for ignorance of what’s in third-party code or software products either. Companies need to assess the code quality in open source components they use in developing their own software. And they may want to consider requiring software vendors to commit to an assessment of their code before purchasing their products. The cost of breaches – and merely the possibility for security incidents – is becoming too great to take a chance on doing the bare minimum. A complete application security strategy is becoming a requirement. Customers expect it, lawmakers require it and investors demand it. You don’t want to be the next St. Jude or the next Yahoo. When it comes to application risk, no company is too big, or too small, to fail.
How Soon Will We See the First Billion-Dollar Security Vulnerability?
Tue Oct 4 16:58, 2016 GMT
A California federal court has thrown up a roadblock for filmmakers who want to obtain the personal details of an alleged BitTorrent pirate. The judge refused to issue a subpoena, twice, because it's not clear if the rightsholder obtained the geolocation details at the time of the infringement or after the fact. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Judge: Vague IP-Address Evidence is Not Enough to Expose BitTorrent ‘Pirates’
Tue Oct 4 11:57, 2016 GMT
In April 2016 the US government called China’a Great Firewall a barrier to trade. It came in the months following the US criticising China over its cyber spying on American The post GreatFire: Tear down China’s Great Firewall appeared first on Index on Censorship .
GreatFire: Tear down China’s Great Firewall
Tue Oct 4 08:10, 2016 GMT
U.S. universities in China get academic freedom, but face internet censorship – report Study International News U.S. universities operating in China say they are given the freedom to teach what they like in class, but face restrictions such as internet censorship , according to a report by an independent, nonpartisan U.S. agency. In the recent report released by ... and more »
U.S. universities in China get academic freedom, but face internet censorship – report - Study International News
Tue Oct 4 01:37, 2016 GMT
American Center for Law and Justice Internet Censorship as UN Intervenes into American Society The Market Oracle Soon the internationalists will push into high gear censorship of voices of opposition and resistance to the consolidation of global compliance and force a climate of universal surrender to authoritarian elites. So with the Obama-UN Internet Takeover ... Federal Judge Clears Way for President Obama's Internet Giveaway – But Case May Not be Over American Center for Law and Justice all 2 news articles »
Internet Censorship as UN Intervenes into American Society - The Market Oracle
Mon Oct 3 23:28, 2016 GMT
The Republican presidential candidate offered his most detailed---and hawkish---prescriptions yet on American cybersecurity. The post Trump Calls For 'Crippling' Cyberwar Attack Capabilities appeared first on WIRED .
Trump Calls For ‘Crippling’ Cyberwar Attack Capabilities
Mon Oct 3 20:49, 2016 GMT
Morning Consult FCC's Final Internet Privacy Rules Will Likely Align With FTC Morning Consult The FTC, the agency tasked with policing internet companies' privacy practices, has required those companies to receive explicit consent from consumers before accessing “sensitive” data, which includes Social Security numbers, geolocation information ... USTelecom Launches Ad Campaign Against FCC's Privacy Rules Morning Consult Can the FTC control the privacy of the IoT ( Internet of Things)? Lexology (registration) all 5 news articles »
FCC's Final Internet Privacy Rules Will Likely Align With FTC - Morning Consult
Mon Oct 3 20:14, 2016 GMT
The Republican presidential candidate says his administration would strengthen the US's defenses against hacking attacks.
Trump: Cybersecurity should be a top priority - CNET
Mon Oct 3 16:12, 2016 GMT
Business Insider A major Internet of Things hack has shown the importance of cybersecurity Business Insider The hackers utilized a collection of connected devices to generate data and webpage requests that took their targets offline, according to security experts. The size and scope of the attacks are what made the hack particularly noteworthy. The hackers ... and more »
A major Internet of Things hack has shown the importance of cybersecurity - Business Insider
Mon Oct 3 16:18, 2016 GMT
Lifesite Critics fear censorship as Obama hands control of the internet to multi-national body Lifesite Countries such as China, Russia and Iran, which have shown hostility to the open Internet by blocking websites and restricting Web access from their own citizens, now have the power to block particular websites from users worldwide, and the U.S. will ... ICANN transition moves forward, despite last-minute attempt to block it PCWorld Oversight Transition Isn't Giving Away the Internet , But Won't Fix ICANN's Problems EFF Obama's Giveaway of Internet Disturbing Newsmax WIRED  - Digital Trends all 24 news articles »
Critics fear censorship as Obama hands control of the internet to multi-national body - Lifesite
Mon Oct 3 15:49, 2016 GMT
Russian blogger and entrepreneur Anton Nosik has been found guilty of extremism by a Russian court over comments about Syria.
Russian blogger Anton Nosik convicted of extremism
Mon Oct 3 11:13, 2016 GMT
Join Index on Censorship, English Pen and the Bahrain Institute for Rights and Democracy for a vigil outside the Foreign and Commonwealth Office at 12 pm on Thursday 6 October to mark the trial of Bahraini human rights activist Nabeel Rajab, who could be sentenced to up to 15 years in prison. The Index on […] The post 6 Oct: Join us to tell the UK to help free Bahraini Nabeel Rajab appeared first on Index on Censorship .
6 Oct: Join us to tell the UK to help free Bahraini Nabeel Rajab
Mon Oct 3 07:13, 2016 GMT
Join us with writer Cory Doctorow and tech journalist Geoff White to debate the importance of anonymity, and find out more on how to protect your own identity online The post 25 Oct: Does anonymity need defending? Index magazine launch appeared first on Index on Censorship .
25 Oct: Does anonymity need defending? Index magazine launch
Mon Oct 3 04:41, 2016 GMT
Are reactions against offensive comics part of healthy debate over where we draw the line or is there something uniquely censorious in the reaction of audiences and comics alike? The post 23 Oct: Comedy and censorship at the Battle of Ideas appeared first on Index on Censorship .
23 Oct: Comedy and censorship at the Battle of Ideas
Fri Sep 30 15:34, 2016 GMT
Kansas City Star Here's Why AT&T Internet Customers Won't Pay Extra for Privacy Anymore Fortune AT&T is ending a controversial program that charged extra to high-speed Internet customers if they didn't agree to let the carrier track their online activity to sell targeted advertising. Under AT&T's Gigapower high-speed Internet service, customers ... AT&T to stop tracking internet habits of high-speed Web surfers Kansas City Star AT&T to end targeted ads program, give all users lowest available price Ars Technica AT&T stops tracking internet activity of GigaPower customers FierceTelecom all 8 news articles »
Here's Why AT&T Internet Customers Won't Pay Extra for Privacy Anymore - Fortune
Fri Sep 30 21:24, 2016 GMT
WASHINGTON (Reuters) - Yahoo's disclosure that hackers stole user data from at least 500 million accounts in 2014 has highlighted shortcomings in U.S. rules on when cyber attacks must be revealed and their enforcement.
Yahoo hack may become test case for SEC data breach disclosure rules
Fri Sep 30 20:51, 2016 GMT
  Another week, another threat recap. And this week wasn’t without its fair share of cyber incidents. Voter registration misstep? Check. New ransomware? Check. KrebsOnSecurity attack? Check! Here are five of the major security... read more The post Threat Recap: Week of September 26th appeared first on Webroot Threat Blog .
Threat Recap: Week of September 26th
Fri Sep 30 20:42, 2016 GMT
A popular YouTuber is experimenting with torrent-based technology in order to take control of his content and avoid third-party censorship. Bluedrake says that the potential for freedom when using WebTorrent "blows his mind" and has already carried out tests to get the project underway. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Popular YouTuber Experiments With WebTorrent to Beat Censorship
Fri Sep 30 10:04, 2016 GMT
Norwegian musician Moddi's new album, Unsongs, is made up of renditions of songs from around the world that had been banned, censored or silenced The post Twitter Q&A: Norwegian musician Moddi stands #WithTheBanned appeared first on Index on Censorship .
Twitter Q&A: Norwegian musician Moddi stands #WithTheBanned
Thu Sep 29 20:05, 2016 GMT
Wall Street Journal Hackers Infect Army of Cameras, DVRs for Massive Internet Attacks Wall Street Journal Attackers used an army of hijacked security cameras and video recorders to launch several massive internet attacks last week, prompting fresh concern about the vulnerability of millions of “smart” devices​in homes and businesses connected to the internet . Cybersecurity expert Brian Krebs was silenced by a huge hacker attack. That should terrify you. Los Angeles Times Record-breaking DDoS reportedly delivered by >145k hacked cameras Ars Technica Why a massive DDoS attack on a blogger has internet experts worried Naked Security all 23 news articles »
Hackers Infect Army of Cameras, DVRs for Massive Internet Attacks - Wall Street Journal
Thu Sep 29 17:28, 2016 GMT
Fraudsters who hack corporate bank accounts typically launder stolen funds by making deposits from the hacked company into accounts owned by "money mules," willing or unwitting dupes recruited through work-at-home job scams. The mules usually are then asked to withdraw the funds in cash and wire the money to the scammers. Increasingly, however, the mules are being instructed to remit the stolen money via Bitcoin ATMs.
‘Money Mule’ Gangs Turn to Bitcoin ATMs
Thu Sep 29 10:09, 2016 GMT
Breitbart News Meet the New Authoritarian Masters of the Internet Breitbart News Russia's “top cop,” Alexander Bastrykin, explicitly stated Russia needs to stop “playing false democracy” and abandon “pseudo-liberal values” by following China's lead on Internet censorship , instead of emulating the U.S. example. Like China's censors ... and more »
Meet the New Authoritarian Masters of the Internet - Breitbart News
Thu Sep 29 12:02, 2016 GMT
Burkinabe rapper and activist with Le Balai Citoyen, Smockey, became the inaugural Music in Exile Fellow at the Index on Censorship Freedom of Expression Awards in April 2016. The post Smockey: “We would like to trust the justice of our country” appeared first on Index on Censorship .
Smockey: “We would like to trust the justice of our country”
Thu Sep 29 05:00, 2016 GMT
SINGAPORE (Reuters) - A Singapore court sentenced 17-year-old blogger Amos Yee to six weeks in jail on Thursday for "wounding religious feelings", the second jail term for the teenager who was convicted on similar charges last year.
Singapore court sends teen blogger back to jail for criticizing religion
Wed Sep 28 22:54, 2016 GMT
The country's outdated, offline voting machines could actually save the election from cyberattacks, say experts at a Congressional hearing.
How to thwart Election Day hackers: Vote the old-fashioned way - CNET
Thu Sep 22 15:36, 2016 GMT
For the London Press Club’s monthly social evening, Index on Censorship has teamed up with the Frontline Club to present a discussion examining the changing role of the foreign correspondent The post 1 November: Redefining foreign correspondence appeared first on Index on Censorship .
1 November: Redefining foreign correspondence
Wed Sep 28 11:31, 2016 GMT
Banned Books Week was launched in 1982 in response to a surge in book censorship in schools, bookshops and libraries. Since then, over 11,300 books have been banned The post Banned Books Week: What are the censors so afraid of? appeared first on Index on Censorship .
Banned Books Week: What are the censors so afraid of?
Wed Sep 28 06:11, 2016 GMT
THE HAGUE (Reuters) - Cybercriminals offering contract services for hire offer militant groups the means to attack Europe but such groups have yet to employ such techniques in major attacks, EU police agency Europol said on Wednesday.
At your service: cyber criminals for hire to militants, EU says
Tue Sep 27 21:50, 2016 GMT
No, Mr. Trump, the US is not turning over control of the Internet to Russia and China - Los Angeles Times. ICANN has no authority over Internet content or government policies within borders; it can't stop Russia or China from imposing censorship on their own citizens, and they're unable to export censorship externally. ICANN manages technical standards, but ...
No, Mr. Trump, the US is not turning over control of the Internet to Russia and China - Los Angeles Times
Tue Sep 27 09:44, 2016 GMT
ITWeb Committee aims to finalise Internet 'censorship' Bill | ITWeb ITWeb The portfolio committee on communications says it is satisfied with the progress in processing the Films and Publications Amendment Bill. Parliament' and more »
Committee aims to finalise Internet 'censorship' Bill | ITWeb - ITWeb
Mon Sep 26 18:26, 2016 GMT
Internet security bill may help small businesses Salt Lake Tribune The Improving Small Business Cyber Security Act of 2016, which now goes to the Senate, calls on the Small Business Administration and Department of Homeland Security to create a strategy to increase business owners' awareness of internet attacks. and more »
Internet security bill may help small businesses - Salt Lake Tribune
Tue Sep 27 20:07, 2016 GMT
Middletown Transcript MAKING CENTS: We all need to be concerned with internet security Middletown Transcript In either case, there are basic rules that we all should follow to protect the privacy of everyone we connect with online. Some seem obvious, yet they are still the leading causes of breaches and other internet security issues. Even if you're not ...
MAKING CENTS: We all need to be concerned with internet security - Middletown Transcript
Tue Sep 27 14:23, 2016 GMT
On Sunday 25 September Nabeel Rajab was transferred from the West Riffa Police Station to solitary confinement in the East Riffa Police Station ahead of his sentencing next week. The post Bahrain: Nabeel Rajab put in isolation ahead of 6 October trial appeared first on Index on Censorship .
Bahrain: Nabeel Rajab put in isolation ahead of 6 October trial
Tue Sep 27 12:38, 2016 GMT
2016 Index on Censorship Freedom of Expression Journalism Award-winner Zaina Erhaim discussess the ongoing war in Syria. The post Zaina Erhaim: Balancing work and family in times of war appeared first on Index on Censorship .
Zaina Erhaim: Balancing work and family in times of war
Fri Sep 23 12:45, 2016 GMT
Huffington Post Donald Trump Doubles Down on Internet Ignorance Huffington Post Scare tactics aside, the transfer to ICANN will have no influence over the internet - censorship decisions of countries like China, Iran, Russia and Turkey. The repressive behavior of these countries is a huge problem, but it's not tied to the service ... How Donald Trump's Internet policy could benefit Russia Washington Post Trump Opposes Plan for US to Cede Internet Oversight Fortune Cruz internet crusade left out of Senate spending bill Dallas Morning News Morning Consult  - Morning Consult  - Donald Trump  - Washington Post all 136 news articles »
Donald Trump Doubles Down on Internet Ignorance - Huffington Post
Mon Sep 26 22:39, 2016 GMT
Brian Krebs' website had been largely unreachable for the past week, the victim of a "record" flood of fake requests for traffic.
Google shields security reporter targeted by massive cyberattack - CNET
Mon Sep 26 17:39, 2016 GMT
To mark the release of Norwegian musician Moddi’s new album, Unsongs, Index on Censorship is proud to announce a special series of appearances by currently banned voices from around the world The post October 2016: Norwegian musician Moddi stands #WithTheBanned appeared first on Index on Censorship .
October 2016: Norwegian musician Moddi stands #WithTheBanned
Mon Sep 26 16:51, 2016 GMT
Get Started: Internet security bill may aid small businesses San Francisco Chronicle The Improving Small Business Cyber Security Act of 2016, which now goes to the Senate, calls on the Small Business Administration and Department of Homeland Security to create a strategy to increase business owners' awareness of internet attacks. and more »
Get Started: Internet security bill may aid small businesses - San Francisco Chronicle
Mon Sep 26 14:40, 2016 GMT
On 24 September Index on Censorship’s CEO, Jodie Ginsberg, gathered with former BBC chief news correspondent Kate Adie and 2016 Index award-winning journalist Zaina Erhaim in Kew Gardens to discuss journalism in war zones The post Women on the front line: Zaina Erhaim and Kate Adie on the challenges of war reporting appeared first on Index on Censorship .
Women on the front line: Zaina Erhaim and Kate Adie on the challenges of war reporting
Mon Sep 26 11:28, 2016 GMT
Foreign correspondents often rely on "fixers" to help them report from war-torn countries. But, as Caroline Lees reveals in the new issue of Index on Censorship magazine, they can be targeted as spies if their names become known locally. The post Iraqi fixer on danger of accepting bylines in foreign media appeared first on Index on Censorship .
Iraqi fixer on danger of accepting bylines in foreign media
Mon Sep 26 00:00, 2016 GMT
Cyber Security a Top Concern in Asia Pacific, says Internet Society Survey Business Wire (press release) Moreover, 58% of respondents in the 2016 survey thought cybercrime was an issue that needed to be addressed by government, followed by connectivity (47%), data protection (45%) and privacy (44%). As connectivity has improved over ... “The results of ... and more »
Cyber Security a Top Concern in Asia Pacific, says Internet Society Survey - Business Wire (press release)
Tue Sep 20 05:20, 2016 GMT
Control Design IIC Releases Industrial Internet Security Framework RTInsights (press release) (blog) According to the September 19 announcement, the IISF focuses on five specific industrial IoT (IIoT) characteristics: safety, security , privacy , reliability and resilience. The characteristics help define trustworthiness, risk, threats, performance ... IIC Delivers Industrial Internet Security Framework IoT Evolution World (blog) IIC publishes the Industrial Internet Security Framework Control Design Industrial Internet Security Framework published by Industrial Internet Consortium Embedded Computing Design Plant Services  - iTWire  - SiliconANGLE (blog) all 27 news articles »
IIC Releases Industrial Internet Security Framework - RTInsights (press release) (blog)
Sun Sep 25 12:00, 2016 GMT
Ahead of Monday's debate, we look at how the candidates stack up on cybersecurity, privacy, STEM and other topics affecting tech.
Where Clinton, Trump stand on 7 big tech issues - CNET
Sun Sep 25 11:58, 2016 GMT
John Gilmore, an American entrepreneur and civil libertarian, once famously quipped that “the Internet interprets censorship as damage and routes around it”. This notion undoubtedly rings true for those who see national governments as the principal threats to free speech. However, events of the past week have convinced me that one of the fastest-growing censorship threats on the Internet today comes not from nation-states, but from super-empowered individuals who have been quietly building extremely powerful cyber weapons with transnational reach.
The Democratization of Censorship
Sun Sep 25 08:35, 2016 GMT
Robotics and Automation News (press release) (registration) Industrial Internet Consortium agrees security framework for robotics and automation systems connectivity Robotics and Automation News (press release) (registration) The organizations says IISF emphasizes the importance of five IIoT characteristics – safety, reliability, resilience, security and privacy – that help define “trustworthiness” in IIoT systems. The IISF also defines risk, assessments, threats, metrics ...
Industrial Internet Consortium agrees security framework for robotics and automation systems connectivity - Robotics and Automation News (press release) (registration)
Fri Sep 23 23:54, 2016 GMT
BBC News Akamai breaks ties with security expert The Boston Globe Akamai Technologies Inc. provides computer security services for some of the world's biggest companies. But this week, the Cambridge company broke ties with prominent Internet security researcher Brian Krebs, after his website became the target of a ... Why the silencing of KrebsOnSecurity opens a troubling chapter for the 'Net Ars Technica The Biggest Internet Attack in History Lawfare (blog) Massive web attack hits security blogger BBC News all 44 news articles »
Akamai breaks ties with security expert - The Boston Globe
Sat Sep 24 07:33, 2016 GMT
YouTube has faced its fair share of copyright controversies, one even more absurd than the others. In what appears to be an indirect censorship effort, the German National Library is now claiming copyright on the 87-year-old Nazi anthem, taking down a historical documentary in the process. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
German Library Claims Copyright on “Nazi Anthem,” Censors Documentary on YouTube
Thu Sep 22 03:08, 2016 GMT
Business Insider Akamai Releases Second Quarter 2016 State of the Internet / Security Report Yahoo Finance 22, 2016 /PRNewswire/ -- Akamai Technologies, Inc. (AKAM), the global leader in content delivery network (CDN) services, today released its Second Quarter, 2016 State of the Internet / Security Report. The report, using data gathered from the Akamai ... Cybercrooks 1, Akamai 0 The Boston Globe Why the silencing of KrebsOnSecurity opens a troubling chapter for the 'Net Ars Technica The Biggest Internet Attack in History Lawfare (blog) Twitter all 40 news articles »
Akamai Releases Second Quarter 2016 State of the Internet / Security Report - Yahoo Finance
Fri Sep 23 12:38, 2016 GMT
The target of raising £100,000 created by a blogger Anna Swabey, who was killed by brain cancer, is met on the day of her funeral.
Cancer blogger Anna Swabey fundraising target met
Thu Sep 22 19:48, 2016 GMT
Opera's Free VPN Takes On Internet Privacy Challenge LinuxInsider.com Users can enable the Opera VPN in the privacy and security subsetting, found either in the settings or preferences menu, depending on the OS the browser is running in. The VPN can be toggled on and off after being set up, and users can select their ...
Opera's Free VPN Takes On Internet Privacy Challenge - LinuxInsider.com
Fri Sep 23 10:28, 2016 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout the European Union and neighbouring countries The post Mapping Media Freedom: In review 16-22 September appeared first on Index on Censorship .
Mapping Media Freedom: In review 16-22 September
Fri Sep 23 09:28, 2016 GMT
The award-winning improvised musical Showstopper! has partnered with Index on Censorship to celebrate free expression this autumn. The post Showstopper! The Improvised Musical – special benefit performances in support of Index on Censorship appeared first on Index on Censorship .
Showstopper! The Improvised Musical – special benefit performances in support of Index on Censorship
Thu Sep 22 15:09, 2016 GMT
Security Intelligence (blog) Industrial Internet Consortium Develops an IoT Security Framework Security Intelligence (blog) In the document, IIC noted that an Industrial Internet of Things (IIoT) system exhibits five key end-to-end characteristics: security , safety, reliability, resilience and privacy . Other characteristics, such as scalability, usability, maintainability ... Intel: Security For The Internet Of Things Is More Critical Now Than Ever CRN all 26 news articles »
Industrial Internet Consortium Develops an IoT Security Framework - Security Intelligence (blog)
Thu Sep 22 23:28, 2016 GMT
Internet Privacy is a Three-Headed Dragon - Hightech Forum. Policy discourse on Internet privacy has been stagnant since it started in the 20th century. There are distinct battle lines and a working consensus about the obligations of current Internet data collectors, but that's it. The FTC Act excludes common ...
Internet Privacy is a Three-Headed Dragon - Hightech Forum
Thu Sep 22 21:16, 2016 GMT
NPR Yahoo Reveals Massive Data Breach; Internet Fixates On Fantasy Football NPR Yahoo says it's notifying all the affected users and taking other steps to beef up security to block any authorized access to any accounts. But also: "We are ... Even if there was good timing to reveal a big hack , for Yahoo this wouldn't be it. The ... Half a billion Yahoo users' data stolen in 'state-sponsored' hack Telegraph.co.uk 500 million Yahoo accounts breached USA TODAY Hackers steal data from 500 million Yahoo accounts Reuters Huffington Post  - Belfast Telegraph  - Recode all 428 news articles »
Yahoo Reveals Massive Data Breach; Internet Fixates On Fantasy Football - NPR
Thu Sep 22 18:55, 2016 GMT
Yahoo says a cyber attack in 2014 stole data from at least 500 million users and may have been state-sponsored.
Attack on Yahoo hit 500 million users
Thu Sep 22 15:54, 2016 GMT
Internet Blackouts, Elections Increasingly Linked in African Countries Voice of America Gabon is the latest country to employ internet censorship during a closely contested election, but other countries, including Uganda, Burundi, Ethiopia, Chad, Mali, Zimbabwe and the Republic of Congo have used the tactic this year, either during ...
Internet Blackouts, Elections Increasingly Linked in African Countries - Voice of America
Thu Sep 22 11:23, 2016 GMT
One of the biggest web attacks ever seen has been aimed at a security blogger after he exposed hackers who carry out such attacks for cash.
Massive web attack hits security blogger
Thu Sep 22 11:08, 2016 GMT
On 3 September 2015, a group of Houthi rebels convened a meeting at al-Najah School in the al-Haima district of Bani Waleed, a village, 72 kilometres west of Yemen’s capital, Sanaa. The post Artist Murad Subay worries about the future for Yemen’s children appeared first on Index on Censorship .
Artist Murad Subay worries about the future for Yemen’s children
Thu Sep 22 01:10, 2016 GMT
Gizmodo Surprise, Donald Trump Has No Idea How Internet Censorship Works Gizmodo Back in December, Donald Trump suggested fighting terrorism online by “closing the internet in some way,” openly mocking potential First Amendment concerns. Since then, the alleged computer user seems to have changed his mind, joining Ted Cruz's ... Internet , Ex-Im Provisions Likely in Spending Bill Morning Consult Trump opposes plan for US to cede internet oversight Reuters Trump backs Ted Cruz's Internet domain crusade Washington Post Morning Consult  - Boing Boing  - Politico all 63 news articles »
Surprise, Donald Trump Has No Idea How Internet Censorship Works - Gizmodo
Wed Sep 21 16:56, 2016 GMT
Control Design IIC publishes the Industrial Internet Security Framework Control Design The IISF emphasizes the importance of five IIoT characteristics – safety, reliability, resilience, security and privacy. IIC Delivers Industrial Internet Security Framework IoT Evolution World (blog) Industrial Internet Security Framework published by Industrial Internet Consortium Embedded Computing Design IIC Releases Industrial Internet Security Framework RTInsights (press release) (blog) iTWire  - Plant Services  - SiliconANGLE (blog) all 28 news articles »
IIC publishes the Industrial Internet Security Framework - Control Design
Wed Sep 21 15:27, 2016 GMT
The prince will visit in November as part of a tour aimed at "strengthening relations" in the region. The post Prince Charles to visit Bahrain: Here are some things he should consider appeared first on Index on Censorship .
Prince Charles to visit Bahrain: Here are some things he should consider
Wed Sep 21 14:43, 2016 GMT
To mark Banned Books Week, Vicky Baker, deputy editor of Index on Censorship magazine, will chair an online discussion with three authors on 29 September, followed by a Q&A. The post 29 Sept: Banned books webinar appeared first on Index on Censorship .
29 Sept: Banned books webinar

Archive of 'Internet censorship, security and privacy news tracking'



Google