International Telecommunication Union   ITU
 
 
Site Map Contact us Print Version
 Tuesday, March 25, 2008

Another "security lapse" has allowed unauthorised access to personal photos posted on Facebook. What makes this situation all the more worrying is that it happened after a recent upgrade to the website's privacy controls.

This incident was verified by the Associated Press after they were alerted by computer technician, Byron Ng.

Facebook spokeswoman, Brandee Barker stated, "We take privacy very seriously and continue to make enhancements to the site".

This latest lapse is yet another warning about the dangers of sharing photographs and personal information online, even when such websites attempt to assure its members that their information cannot be accessed by everyone.

Even after such warnings, increasing numbers of teenagers and young adults are still publishing personal details on the Internet.

MySpace.com, the only online social network larger than Facebook, also experienced a similar security lapse last year.

Full story at CNN website.

Tuesday, March 25, 2008 4:37:27 PM (W. Europe Standard Time, UTC+01:00)  #     | 

A blog entry by Jessica Hupp at VirtualHosting.com addresses the impact on the environment in web development and use of computer equipment in general.

It provides a sample collection of environmentally friendly applications, tools, networks and directories, web hostings, and others. The list mentions tools and resources concerning information and communication technology infrastructure, hardware, software, and so on.

For more information, click here.

Tuesday, March 25, 2008 4:17:31 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Reuters recently reports on cyber warfare, from the Cold War Soviet oil pipeline explosion to the current information security situation. "The pipeline explosion was probably the first major salvo in what has since become known as cyber warfare. The incident has been cropping up in increasingly urgent discussions in the U.S. on how to cope with attacks on military and civilian computer networks and control systems - and how and when to strike back. Air traffic control, power plants, Wall Street trading systems, banks, traffic lights and emergency responder communications could all be targets of attacks that could bring the U.S. to its knees."

According to Director of National Intelligence Michael McConnell's testimony to a Senate committee, "[the US] information infrastructure - including the Internet, telecommunications networks, computer systems and embedded processors and controllers in critical industries - increasingly is being targeted... by a growing array of state and non-state adversaries." The Pentagon adds that it detects three million attempts to infiltrate its computer networks every day. On a report of the US Government Accountability Office, an audit of 24 government agencies, including Defense and Homeland Security, had shown that "poor information security is a widespread problem with potentially devastating consequences" pertaining to the inevitable involvement of civilians with private companies owning more than 80 percent of the infrastructure.

"Unlike traditional defense categories (i.e. land, sea and air), the military capabilities required to respond to an attack on U.S. infrastructure will necessarily involve infrastructure owned and operated by the private sector," according to Jody R. Westby, CEO of Global Cyber Risk and a champion of better public-private coordination to cope with cyber attacks.

The article further discusses the importance of public-private coordination and the power of botnets in this warfare. A scenario of the damage extent and how the cyber warfare may unfold was also drawn from an interview with Westby.

Read the full article here.

Tuesday, March 25, 2008 2:15:58 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, March 19, 2008

An unexplained "security breach" at the US supermarket chain, Hannaford Bros., resulted in 1800 reported (to date) cases of fraud after about 4.2 million unique card numbers were exposed. This is reported to be one of the largest data breaches ever.

Although the supermarket chain is said to have become aware of the breach on February 27, 2008, investigators report that it actually began on December 7, 2007 and Hannaford Bros. vice president of marketing, Carol Eleazer stated that, "it wasn't contained until 10 March, 2008".

The company's president and CEO, Ronald C. Hodge stated, " We have taken aggressive steps to augment our network security capabilities. Hannaford doesn't collect, know or keep any personally identifiable customer information from transactions".

The US Secret Service, whose duties include investigating electronic crimes such as data breaches, confirmed that they are investigating this case.

Beth Givens, director of Privacy Rights Clearinghouse said that debit card holders involved in this incident were most at risk of fraud. Banks generally cover costs from fraudlent charges on credit cards but it might prove more difficult in proving fraud once a criminal has cleared out an individual's bank account.

Visa and MasterCard  state in their contracts with retailers that they do not divulge the source when a data breach occurs. Such a law  does nothing to help either the customer or the retailer in these situations.

Following criticism of the delay in notifying the public about this breach, Carol Eleazer said, " We moved with all deliberate speed to get out to customers with information that we could have confidence in..."

Read full article at CNN website.

Wednesday, March 19, 2008 4:30:52 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, March 18, 2008

Once again parents in the UK are being warned by teachers about the possible dangers to children by Internet and mobile phone misuse.

A survey of the Association of Teachers and Lecturers' members reports that more than half are aware of pupils being "cyber bullied" and 16% have been victims themselves.

Dr Mary Bousted, General Secretary of the Association of Teachers and Lecturers calls for more serious consequences and policies which might deter such behaviours. She then went on to suggest that as most cyber bullying takes place outside school hours, it might be difficult for teaching staff to take action.

What about the parental role? With parents complaining that their young children are watching pornography in the school playground on their mobile phones, it seems that the call to engage parent-teacher dialogue is not before time.

Unfortnately the situation is more complex, as Dr Bousted  points out the difficulty in  punishing children for such behaviours without the complete support of the parents, adding, "...it's not just students who can behave inappropriately through the Internet, it's parents as well".

Read full article at BBC website.

Tuesday, March 18, 2008 9:57:03 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, March 17, 2008

The Washington Post's Security Fix features an article on vishing scams reporting three recent vishing attacks and how these attacks were done. According to the article, a series of well-orchestrated wireless phone-based phishing attacks against several financial institutions took place last week illustrating how scam artists are growing more adept at fleecing consumers by exploiting security holes in seemingly unrelated Internet technologies.

"The scams in this case took the form of a type of phishing known as "vishing," wherein cell-phone users receive a text message warning that their bank account has been closed due to suspicious activity, and that they need to call a provided phone number to reactivate the account. Victims who called the number reached an automated voice mail box that prompted callers to key in their credit card number, expiration date and PIN to verify their information (the voice mail systems involved in these sorts of scams usually are run off of free or low-cost Internet-based phone networks that are difficult to trace and shut down)."

The article also pointed out the importance of installing the latest security updates on the Web servers as well as the use of non-obvious passwords to help mitigate these kinds of vishing attacks.

Read the full article on the Washington Post.

CYB | Cybersecurity | Malware | Spam | Mobile | Privacy
Monday, March 17, 2008 3:43:49 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Once more there is some discussion about privacy laws regarding the content of e-mails.This  time it concerns the publishing of letters reportedly sent by e-mail by an aide to the Mayor of London, Ken Livingstone. The American writer GK Chesterton is said to have argued that the best reason for leaving the country and moving to the city was to avoid everyone knowing your business.

Such a move might be laughable now, as it appears that privacy no longer exists. The author Clive James suggests,

"...every computer you sit down at, is a direct pipeline to universal publicity for any thought you dare to express..."

Indeed with the planned closure of around 3000 post offices in London, sending a letter by post may soon be a thing of the past.

Full article at BBC website.

Monday, March 17, 2008 1:10:23 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, March 14, 2008

Bill St. Arnaud writes about fiber to the home (FTTH) connections on his blog on Green IT/Broadband and Cyberinfrastructure. A presentation quoted of PriceWaterhouseCoopers and the European FTTH Council of 28 February 2008 takes into account CO2 emissions that are produced in the construction and deployment of fiber and measure them against the savings of three ICT applications in the area of telecommuting,telemedicine and home assistance. Among others, the main findings are that the environmental impact of the deployment of a typical FTTH network would be positive in less than 14 years regarding the selected services mentioned above. Additional existing or future applications would further emphasize these results.

For more information on the European FTTH Council, click here.

Friday, March 14, 2008 4:25:11 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Thorsten Holz writes about Measuring and Detecting Fast-Flux Service Networks on the Honeyblog, a weblog that deals with IT-security related stuff, honeypots/honeynets, malware and bots/botnets. Findings on a lab project focusing on fast-flux service networks (FFSNs), a mechanism used by attackers to build an overlay network on top of compromised machines, were published in a paper at NDSS'08.

The paper presents the first empirical study of fast-flux service networks (FFSNs), a newly emerging and still not widely-known phenomenon in the Internet. "Through [their] measurements [they] show that the threat which FFSNs pose is significant: FFSNs occur on a worldwide scale and already host a substantial percentage of online scams. Based on analysis of the principles of FFSNs, [they] developed a metric with which FFSNs can be effectively detected. " Possible mitigation strategies are also discussed in the document.

Read the full paper here.
More about the paper on Honeyblog.

Friday, March 14, 2008 10:07:14 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, March 13, 2008

Time Warner's AOL Internet Divison is buying the social networking site, Bebo, for $850m cash.

Social networking sites are valuable to online advertisers as the information posted by members is very valuable to online advertisers who can then target them with those products and services which match their profiles.

Bebo is reported to have 40 million members worldwide, many of whom are within the 13-24 year old age range and thus attractive to advertisers. ComScore report that Bebo is the UK's second most popular social networking site after Facebook. In the US, Bebo is the third biggest social networking site, after MySpace and FacebookComScore report that Bebo is the world's ninth most popular social site.

Read full article at bbc website.

Thursday, March 13, 2008 3:37:22 PM (W. Europe Standard Time, UTC+01:00)  #     | 

On 11 March 2008, the Initiative for the Regional Integration of South American Infrastructure (IIRSA) and the Inter-American Communications Commission (CITEL) jointly organized at the Inter-American Development Bank (IDB) headquarters a workshop on International Roaming Services for Mobile Telecommunications, the first component of an IDB Technical Cooperation to support the project known as Implementation of a Roaming Agreement in South America, included in IIRSA’s Implementation Agenda Based on Consensus. Following this event was the XII meeting of the Permanent Consultative Committee on Telecommunications I (PCC.I) of CITEL, held at the IDB’s headquarters, in Washington D.C., from 12 through 14 March 2008, during which telecommunication-related topics deemed important for the region were discussed, such as the coordination of standards for telecommunication networks and services, convergence, analysis of cybersecurity issues and critical infrastructure and the use of telecommunications in emergencies, among others.

A presentation on the Overview of ITU-D Activities Related to Cybersecurity and Critical Information Infrastructure Protection was given by Robert Shaw, head of the ICT Applications and Cybersecurity division, during the CITEL meeting, providing background information on ITU, cybersecurity, related ITU key activities underway, and an outline of the Framework for Organizing a National Approach to Cybersecurity. Specific cybersecurity-related activities and initiatives as well as a case study on botnets were also presented. 

Another presentation on Management Framework for Organizing National Cybersecurity/CIIP Efforts was given by Joe Richardson, further discussing the ITU Framework for Organizing National Cybersecurity/CIIP Efforts and the ITU National Cybersecurity/CIIP Self-Assessment Toolkit.

For more information on CYB's activities involving cybersecurity, visit the division website.

Thursday, March 13, 2008 3:04:03 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, March 11, 2008

The ICANN Security and Stability Advisory Committee (SSAC) recently released an advisory on fast and double flux attacks. "'Fast flux' is an evasion technique that cyber-criminals and Internet miscreants use to evade identification and to frustrate law enforcement and anticrime efforts aimed at locating and shutting down web sites used for illegal purposes." This Advisory describes the technical aspects of fast flux hosting and fast flux service networks. It explains how the DNS is exploited to abet criminal activities that employ fast flux hosting, identifying the impacts of fast flux hosting, and calling particular attention to the way such attacks extend the malicious or profitable lifetime of the illegal activities conducted using these fast flux techniques. It describes current and possible methods of mitigating fast flux hosting at various points in the Internet. The Advisory discusses the pros and cons of these mitigation methods, identifies those methods that SSAC considers practical and sensible, and recommends that appropriate bodies consider policies that would make the practical mitigation methods universally available to registrants, ISPs, registrars and registries (where applicable for each).

Read the full advisory here.

Tuesday, March 11, 2008 9:58:31 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, March 05, 2008

The Global Digital Solidarity Fund (DSF) today launched the project of "1000 Telemedicine Units for Africa". This eHealth initiative aims to support financing telemedicine units in Africa as well as to enable health professionals to obtain continuing education. The project consists of equipping district hospitals with diagnostic tools and internet connectivity to enable real-time or deferred exchanges with experts at a distance and to update medical knowledge of health professionals through e-Learning tools.

To date, DSF partners in this project are the Network of French-speaking Africa for Telemedicine (RAFT) of the University Hospitals of Geneva and the Africa Health Infoway (AHI) of the World Health Organization.

For more information on DSF, click here.

Wednesday, March 05, 2008 4:37:15 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, March 03, 2008

The UK  industry watchdog, the Press Complaints Commission (PCC), will undertake an investigation into the use of material taken from personal profiles on social networks by newspapers.

Tim Toulmin, director of the PCC has said that his organisation had received complaints from people about material "that is being re-published when they themselves are the subject of news stories", and suggests that guidelines are necessary in order to guide the press in their use of social network content. Due to the present lack of boundaries, the PCC has commissioned Ipsos MORI to conduct research into public attitudes. In addition, Mr Toulmin points out that social networking sites have a responsibility to advise their users about the implications of uploading personal information to public, or semi-private spaces and goes one step further, saying, "..the press do have obligations over and above those that govern the online community".

However, Bob Satchwell, Director of the Society of Editors stated that the press should be subject to the same regulation as the public.

The recent media interest in the large number of suspected suicides among young people in Brigend, UK, has caused concern about the way social network profiles were being used by journalists.

The British Journal of Photography has stated that the publication of images on social networks does not automatically grant rights to republish photographs elseware.

Read full article on BBC website

Monday, March 03, 2008 12:26:19 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Jooce, a virtual desktop aimed at users who access the Web via cybercafes is attracting interest from organisations set up to bridge the digital divide. It is claimed that Jooce is presently targetting the estimated 500 million people who log on to the Internet from a cybercafe each day. Experts suggest that its free web-based desktop may be of great use for people who cannot afford their own personal computer.

Jooce provides the same functions as a personal computer, allowing access to files, e-mail, instant messaging, storage and other applications. "It's a platform that will make it much easier for the world's cybernomads to manage their digital lives",  said Jooce founder, Stefan Surzyck, referring to this platform as "their very own private space online".

Joocetop, a public desktop, is also said to be able to allow friends to access and share files. In addition a dedicated e-mail client is underway.

Eloisa San Mateo, regional IT coordinator for the Philippines National Computer Centres, has some concerns about the performance of Jooce on lower spec machines with poor bandwith.

Meddie Mayanja, a senior program officer with telecentre.org sees organisations such as Jooce  as essential to the sustainability of net access centres.

Michael Gartenberg, an analyst with JupiterResearch is less positive about web-based operating systems.

CNET.com, an online technology news site, nominated Jooce as a finalist in its 2008 Webware 100 awards.

Read full article at BBC website.

Monday, March 03, 2008 10:17:08 AM (W. Europe Standard Time, UTC+01:00)  #     | 

The European Commission recently proposed a new Safer Internet programme to enhance the safety of children in the online environment. Encompassing recent communications services from the Web 2.0, such as social networking, the new programme will fight not only illegal content but also harmful behaviour such as bullying and grooming. With a budget of €55 million, the programme, which builds further on the successful Safer Internet programme started in 2005, will run from 2009 to 2013.

The proposed new programme will:

  • Reduce illegal content and tackle harmful conduct online.
  • Promote a safer online environment.
  • Ensure public awareness.
  • Establish a knowledge base.

Read the full press release here.
For more information on the Safer Internet Programme, click here.

Monday, March 03, 2008 9:27:18 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, February 27, 2008

Websense Security Labs has discovered that Google’s popular web mail service Gmail is being targeted in recent spammer tactics. Spammers in these attacks managed to create bots that are capable of signing up and creating random Gmail accounts for spamming purposes. Websense believes that from the spammers’ perspective, there are four main advantages to this approach. First, signing up for an account with Google allows access to its wide portfolio of services. Second, Google’s domains are unlikely to be blacklisted. Third, they are free to sign up. And fourth, it may be hard to keep track of them as millions of users worldwide are using various Google services on a regular basis. According to Websense, these accounts could be used by spammers at any time for abusing Google’s infrastructure. A wide range of attacks could be possible as the same account credentials can be used to target various services offered by Google.

A detailed analysis report is provided showing the entire process of the CAPTCHA breaking hosts. Read more about the analysis report here.

Wednesday, February 27, 2008 10:15:24 AM (W. Europe Standard Time, UTC+01:00)  #     | 

The Australian federal Government's plan to have internet service providers filter pornography and other internet content deemed inappropriate for children is going full-steam ahead. The Government wants to evaluate content filters in a controlled environment. Trials are to be conducted soon in a closed environment in Tasmania. Enex TestLab was selected more than six months ago after the Australian Communications and Media Authority closed a tender for an organisation to test ISP-based content filters. ISP-based filters will block inappropriate web pages at service provider level and automatically relay a clean feed to households. To be exempted, users will have to individually contact their ISPs. The trial will evaluate ISP-level internet content filters in a controlled environment while filtering content inappropriate for children, Enex said. "We invite vendors of all types (hardware appliances, software - proprietary or open-source) of ISP-based internet content filters to participate." The testing is slated for completion by July and will be followed by live field trials.

The internet sector has consistently voiced concern about the Government's ISP filters. Internet Industry Association chief executive Peter Coroneos has said any clean feed policy would have to be balanced against the likely financial and performance costs, and ACMA's first annual report to Senator Conroy confirmed his fears. On the performance impact of filters, ACMA said: "In the case of personal computers the cost of upgrading processing power may be modest (although significant in terms of household income). "However, for ISPs the cost of upgrading or augmenting the expensive hardware that they typically deploy may be substantial, particularly for small providers."

Read the full article on the Australian IT.

Wednesday, February 27, 2008 9:40:02 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, February 26, 2008

According to a report from vendor Mcafee, the growing number of cyber criminals in areas of Asia and Eastern-Europe is the result of a lack of IT jobs for qualified professionals. Joe Telafici, vice president of operations at Mcafee says that "the motivation to engage in illegal behavior is strong in Eastern Europe where technical skills were widely taught during the Cold War but economic opportunities are limited. The same is true in Asia, where population growth has stretched strong economic performance to the limits." In China, 43 per cent of IT graduates are unemployed, and hacker "training" web sites are creating a pool of effective malware authors and paying them like a legitimate business.

Read the full article here.

Tuesday, February 26, 2008 9:49:54 AM (W. Europe Standard Time, UTC+01:00)  #     | 

GigaOm Earth2Tech’s 101 Cleantech Startups provides a map showing cleantech hot spots around the globe. The different sectors such as solar, energy storage, biofuels and electric vehicles are all represented by a logo, and each pin on the map has all of the vital stats for each startup (founding year, investors, technology, etc.).

For more information, visit GigaOm's Earth2Tech website.
View the map here.

Tuesday, February 26, 2008 9:31:36 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, February 25, 2008

The ITU-T newslog featured the following entry last Friday:

Senior technical experts have laid down the gauntlet on energy saving in information and communication technologies (ICTs) following a recent meeting in Geneva. Following tutorials on power saving, at a February meeting of ITU-T’s Study Group 15, experts agreed to work towards a proposed percentage reduction of power consumption in broadband technologies. The aim is for the agreed figure to form part of a Resolution from the upcoming World Telecommunication Standardization Assembly. Reduction of power consumption should and can be done without the degradation of services according to experts.

The UN Secretary-General, Ban Ki-moon has also underlined ITU’s role here saying: "ITU is one of the very important stakeholders in the area of climate change." ITU representatives made a statement at the UN Conference on Climate Change in, illustrating how ICTs are both a cause and a potential cure for climate change.

Speaking during the event attended by over 100 representatives from the ICT industry worldwide for each of its three, hour-long sessions, the Deputy Secretary-General of ITU, Houlin Zhao expressed appreciation that the meetings had proven so popular at such an early stage of the work. He pointed out that ICTs are responsible for 2.5 per cent of carbon emissions. This is roughly the equivalent of the airline industry and would require our urgent attention, he said.

The issue of power saving will be discussed within the wider context of climate change at ITU Symposia on ICTs and Climate Change to be held 15-16 April 2008 in Kyoto (Japan) and hosted by the Ministry of Internal Affairs and Communications and 17-18 June 2008 in London (Great Britain) and hosted by British Telecom. The events are part of a new initiative by ITU to better understand how ICTs can help mitigate and adapt to climate change as well as monitoring its impact.

Experts speaking at the SG 15 tutorials pointed to inefficiencies in terms of end-device power consumption level compared to the signal power. The deployment of passive optical network (PON) technology is of particular concern as operators worldwide rollout this new technology that some predict will massively increase power demands. Some simple measures, for example specifying power saving modes in network terminations such as: ‘asleep’, ‘standby’, as well as ‘on’ and ‘off’, were cited by speakers. It was also noted that next-generation networks (NGN) can lower greenhouse gas emissions by reducing network complexity, and introducing equipment that is more tolerant to natural climatic conditions and therefore does not require air conditioning. Smart buildings, energy supply and transport industries must all play their part in achieving greenhouse gas reductions.

A first and completed task of the ITU experts has been to create a power saving checklist for standards authors. Malcolm Johnson, Director of the Telecommunication Standardization Bureau, ITU congratulated SG 15 for responding so quickly to the request to address climate change. He urged all Study Groups to start the process of reviewing their Recommendations (ITU’s name for standards) according to the new checklist and assign appropriate metrics regarding reduction of greenhouse gases.

The checklist is intended to ensure that standards are drafted taking into account the most economic and energy-efficient solution, particularly related to energy saving in networks. Experts propose that each new ITU-T Recommendation should contain a clause that identifies its impact on climate change and demonstrates ways that it contributes towards emission reduction, covering both production and the use of the equipment.

To ensure that this work is completed with the highest degree of efficiency there is broad consensus that ITU action has to be taken into account collaborating in partnerships with other bodies working in the field and that everything is done to avoid duplication of work.

For activities carrying out in ITU's Telecommunication Development Sector on ICTs and climate change and e-environment, click here.

Monday, February 25, 2008 10:46:43 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, February 22, 2008

The ITU Regional Cybersecurity Forum ended yesterday following the adoption of the Doha Declaration on Cybersecurity. The ITU Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection (CIIP) was held in Doha, Qatar, 18−21 February 2008 in collaboration with the Qatar Supreme Council of Information and Communication Technology (ictQATAR) and the Qatar Centre for Information Security (Q-CERT). Over 80 representatives from 18 countries in the Arab region as well as key regional organizations including the League of Arab States, Gulf Cooperation Council, and United Nations Economic and Social Commission for Western Asia, participated in the Forum.

"Global interconnectivity creates new interdependencies and risks that need to be managed at national, regional and international levels," said Mr Sami Al Basheer Al Morshid, Director of ITU’s Telecommunication Development Bureau. "The formulation and implementation by all nations of a national framework for cybersecurity and critical information infrastructure protection represents a significant first step in addressing the challenges arising from globally interconnected ICT infrastructures."

During the event, the role of governments in leading national cybersecurity efforts was discussed as well as the critical role of the private sector and other groups in developing policy and law aimed at the implementation and operation of a national cybersecurity strategy. The Forum stressed the importance of reviewing national cybercrime legislation to address threats in cyberspace and called for a national focal point for cyber-incident management to strengthen watch, warning, investigation, response and recovery. Discussions were also held on the necessity of promoting a national culture of cybersecurity to ensure that all users, owners and operators of information systems and networks know their responsibilities with regard to security and develop appropriate tools to combat cyber attacks.

Referring to the recent damage to undersea optical cables, said to have been caused by an adrift ship anchor according to the operator FLAG, Mr Al Basheer said that experience is the hardest teacher. "Whatever the cause, whether intentional or not, whether cybercrime or a mundane accident, the lesson we take away is that every nation needs to organize itself to take coordinated action related to the prevention of, preparation for, response to, and recovery from cyber incidents," said Mr Al Basheer.

Read more of the ITU press release here.

Friday, February 22, 2008 9:46:59 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, February 21, 2008

According to reports, DDoS (Distributed Denial of Service) assaults on online gambling sites, particularly on major online poker websites, have surfaced this week. The online poker information portal Poker-king.com advised that many online poker and casino properties have suffered outages, naming  Full Tilt Poker as probably the most visible with an inaccessible website for as long as 48 hours, probably incurring serious losses in business. As of 5 am EST Tuesday, the website is redirecting to www2.fulltiltpoker.com as a consequence of the attacks. According to the ShadowServer.org organisation, the attacks on Internet gambling sites commenced on 10 February 2008 and continued through to 18 February 2008. Among the targets were Full Tilt Poker, Party Casino, Titan Poker, Virgin Games, CD Poker, Europa Casino, and a number of Russian online gambling including Pokerlistings.ru. The extent of the outages for each site varied depending on the ferocity of the attacks and if they had any anti-DDoS attack measures in place. Full Tilt Poker is clearly still having issues while a number of the Russian web properties are still down. There have been reports that Full Tilt's poker room has crashed numerous times over the past few days, including an embarrassing outage during the final table of the FTOPS main event. The motive behind the attacks is still unknown.

Read the full report here.

Thursday, February 21, 2008 9:34:56 AM (W. Europe Standard Time, UTC+01:00)  #     |