International Telecommunication Union   ITU
Site Map Contact us Print Version
 Thursday, 03 December 2009

The 13-year-old Florida girl sent a topless photo of herself to a boy in hope of gaining his attention. Instead, she got the attention of her school, as well as the high school nearby. The incessant bullying by classmates that followed when the photo spread put an emotional weight upon Hope that she ultimately could not bear.

Her death is only the second known case of a suicide linked to bullying after “sexting” — the practice of transmitting sexual messages or images electronically. In March, 18-year-old Jesse Logan killed herself in the face of a barrage of taunts when an ex-boyfriend forwarded explicit photos of her following their split. “As far as training them on the Internet and what to look at and what not to look at, yeah, we talked about it,”


(Source: MSNBC)

Full story


Thursday, 03 December 2009 10:06:19 (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, 02 December 2009

If your iPhone has been jailbroken, change your passwords now, advised Paul Ducklin, Sophos Australia's chief of technology. Ducklin said the writers of this virus included a program call "Duh", which added malicious capabilities not present in last month's ikee release.

The new password installed by this virus was "ohshit", which can be used to remove the threat of further remote attacks on an infected device. Ducklin said to clean up the device by searching the file "directory/private/var/mobile/home", type in "passwd" to initiate the command, and change the password. "Otherwise the buggers can get back in anytime they want," said Ducklin.


(Source: ZDNet Australia)

Full story

ZDNet Australia

Wednesday, 02 December 2009 17:23:29 (W. Europe Standard Time, UTC+01:00)  #     | 

Online sales in China almost doubled in the first nine months of this year, official data showed Tuesday, as the nation becomes more switched on and confident in Internet shopping.

China's enormous Internet community spent 168.9 billion yuan (25 billion dollars), a 90 percent increase from the same period last year, the government data showed. And Di Jiankai, a director-general of the commerce ministry, told reporters the total figure for the whole year was expected to exceed 260 billion yuan. He did not providing a comparative figure for 2008. "The commerce ministry pays great attention to e-commerce," he added. "It is a very important business form we can use to boost consumption."


(Source: AFP)

Full story


Wednesday, 02 December 2009 11:10:35 (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, 01 December 2009

It’s not good news for IT cities. According to a report prepared by the Computer Emergency Research Team from the Union IT ministry, a total of 692 websites have been affected in September alone.

The unit has now asked the respective state governments to secure their own websites. “We have instructed all state governments to instal security measures, especially for those sites which contain sensitive data,’’ said a senior ministry official. Of the websites hacked, a whopping 74% belong to the dotin domain Most common hacking method is to steal password from administrator Hackers also enter web server and destroy the site Another method is to try and poison the URL.


(Source: The Economic Times)

Full story

The Economic Times

Tuesday, 01 December 2009 14:02:40 (W. Europe Standard Time, UTC+01:00)  #     | 

A computer worm that China warned Internet users against is an updated version of the Panda Burning Incense virus, which infected millions of PCs in the country three years ago, according to McAfee.

The original Panda worm, also known as Fujacks, caused widespread damage at a time when public knowledge about online security was low, and led to the country's first arrests for virus-writing in 2007. The new worm variant, one of many that have appeared since late 2006, adds a malicious component meant to make infection harder to detect.


(Source: PC World)

Full story

PC World

Tuesday, 01 December 2009 13:17:37 (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, 30 November 2009

Diners who frequent a popular Downtown restaurant should review their charge-card statements because hackers broke into its computer system to loot debit- and credit-card numbers, police said today.

Between 30 and 50 people have reported fraudulent charges on their accounts, and Columbus detectives said that anyone who used a charge card at Tip Top Kitchen and Cocktails in July or August is at risk. The hackers have been traced to an overseas Internet address, and no Tip Top employees are involved, police said. The hackers found a weak point in the restaurant's computer defenses, wormed their way in, and installed "malware" that stripped the numbers.


(Source: The Columbus Dispatch)

Full story

The Columbus Dispatch

Monday, 30 November 2009 14:31:41 (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, 26 November 2009

The European Union’s first dedicated NGO Alliance for Child Safety Online (eNACSO) launched its Digital Manifesto on 14 November 2009 during the Internet Governance Forum(IGF) in Egypt. ‘The global nature of the internet places a particular responsibility on international institutions and governments to take action at national and international level to ensure children are safe online’ says Dieter Carstensen, eNACSO Chair.

The Digital Manifesto will form part of eNACSO’s ‘Agenda for Action’ document which will be launched in Brussels in May 2010.


(Source: eNACSO)

Full story



Thursday, 26 November 2009 16:24:59 (W. Europe Standard Time, UTC+01:00)  #     | 

While the Senate bogs down in negotiations over drafting major cybersecurity reform legislation, a House panel Wednesday passed a nuts-and-bolts IT security bill that would require the president to assess the government's cybersecurity workforce, including an agency-by-agency skills assessment, and provide scholarship to students who agree to work as cybersecurity specialists for the government after graduation.

"There are some very technically, sophisticated ways in enhancing cybersecurity, but there are some simple ways, also. Some aspects of computer security are rocket science and others are fairly, simple precautionary steps which most people can take."


(Source: Gov Info Security)

Full story

Gov Info Security

Thursday, 26 November 2009 15:00:07 (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, 25 November 2009

In today’s technologically advanced world, documents and correspondences that were once sent by post are now exchanged electronically. This exchange takes place smoothly until a signature is required in the transaction. Then the entire process falls back to the real ‘e-less’ world of paper documents, faxes, snail-mail and even physical presence.

Technology, however, has not ceased to search for solutions to this barrier. The result: a method that is accurate and arguably more secure than the traditional handwritten signature, which allows documents to be signed online — e-signatures.


(Source: Business Today)

Full story

Business Today

Wednesday, 25 November 2009 15:13:38 (W. Europe Standard Time, UTC+01:00)  #     | 

That television set you discourage your children from watching may not be the greatest threat to their wellbeing. Instead, the mobile phone is the gateway in introducing children to the world of cyberspace, posing a great risk to their safety, a lobby group said Tuesday.

According to The Cradle, the unmonitored use of technology is increasingly exposing youngsters to the risk of harm and violence. "Only 24 per cent of children in the study reported to their parents or an authority of online or cell phone harassment,” Cradle programme manager Brian Weke told journalists. The study also revealed that 77 out of the 96, who had the incidences reported to them, took no action and ignored the seriousness of the matter.


(Source: Daily Nation)

Full story

Daily Nation

Wednesday, 25 November 2009 10:51:54 (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, 24 November 2009

Four men, including the self-proclaimed "Godfather of Spam," were sentenced to prison on Monday for their roles in an email stock fraud scheme, the Justice Department said. FBI special agent said Ralsky, the self-proclaimed "Godfather of Spam," flooded email boxes with unwanted spam email and attempted to use a botnet to hijack computers to assist them in the scheme. A botnet is a network of computers infected by malicious software.

"Today's sentencing sends a powerful message to spammers whose goal is to manipulate financial transactions and the stock market through illegal email advertisements," said assistant attorney general Lanny Breuer.


(Source: AFP)

Full story



Tuesday, 24 November 2009 16:23:01 (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, 23 November 2009

A Canadian woman on long-term sick leave for depression says she lost her benefits because her insurance agent found photos of her on Facebook in which she appeared to be having fun.

Nathalie Blanchard has been on leave from her job at IBM in Bromont, Quebec, for the last year. The Canadian Broadcasting Corp. reported Saturday she was diagnosed with major depression and was receiving monthly sick-leave benefits from insurance giant Manulife. But the payments dried up this fall and when Blanchard called Manulife, she says she was told she was available to work because of Facebook.


(Source: AP)

Full story


Monday, 23 November 2009 14:53:42 (W. Europe Standard Time, UTC+01:00)  #     | 

A series of skimming crimes that hit the Nashville, TN area recently is but one of many ATM fraud schemes preying upon financial institutions and their customers.

Nashville police reported last week that they were investigating an ATM card skimming scheme where at least 600 individuals were potential victims. Investigators say five Bank of America ATMs were hit, as well as an unknown number of US Bank machines. A total of 60 people had fraudulent withdrawals from their accounts for anywhere between $100 to $5,000 dollars. Investigators suspect that the skimming schemers have now moved on to other cities. "No one vendor or ATM type is more susceptible over another," Ipson says, "so everyone needs to be aware of this threat."


(Source: Bank Info Security)

Full story

Bank Info Security

Monday, 23 November 2009 14:02:40 (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, 19 November 2009

A self-proclaimed geek from the age of 14, Andre DiMino had always been interested in computers and networking. But it wasn't until he entered his professional life many years later that he became interested in the security side of that world.

Just five years ago, hunting botnets, said DiMino, was a much different game. The botnets were fairly straightforward, he said, and the primary method of communication was the IRC (Internet Relay Chat). DiMino and other volunteers were able to act like criminals by joining a botnet, watching its traffic to get an understanding of how it was architected and learn more its particular function. They found their efforts were worthwhile as they began contacting network hosts, alerting them that were supporting the botnets and seeing them shutdown.


(Source: ComputerWorld)

Full story


Thursday, 19 November 2009 17:39:46 (W. Europe Standard Time, UTC+01:00)  #     | 

The world's biggest social networking site has brushed off criticism by a senior UK police officer responsible for preventing online bullying that it is failing to combat abuse.

Jim Gamble, head of the Child Exploitation and Online Protection (Ceop) Center, said Facebook and MySpace, which between them have more than 500 million users, could work harder to stamp out bullying. The initiative came as UK charity Beatbullying highlighted Bebo, owned by AOL, and Microsoft's instant messaging service as hotspots for bullying. In a poll of 2,094 young people across England conducted by the charity, 30 percent of 11 to 16-year-olds who had been "cyberbullied" had been targeted on Bebo.


(Source: CNN)

Full story


Thursday, 19 November 2009 11:48:17 (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, 18 November 2009

Cyber war has moved from fiction to fact, says a report. Compiled by security firm McAfee, it bases its conclusion on analysis of recent net-based attacks. Analysis of the motives of the actors behind many attacks carried out via the internet showed that many were mounted with a explicitly political aim.

It said that many nations were now arming to defend themselves in a cyber war and readying forces to conduct their own attacks. "There are at least five countries known to be arming themselves for this kind of conflict," said Greg Day, primary analyst for security at McAfee Europe. The UK, Germany, France, China and North Korea are known to be developing their own capabilities.


(Source: BBC)

Full story


Wednesday, 18 November 2009 14:56:40 (W. Europe Standard Time, UTC+01:00)  #     | 

The first applications were accepted on Monday for internationalised domain names (IDNs), in one of the most significant steps to making the Internet more accessible around the globe.

The Internet Corporation for Assigned Names and Numbers (ICANN) has opened the application process, ending the exclusive use of Latin characters for website addresses. On the first day, "we have already received six applications from around the world for three different scripts," ICANN CEO Rod Beckstrom told an Internet Governance Forum (IGF) in Egypt's Red Sea resort of Sharm el-Sheikh.


(Source: AFP)

Full story


Wednesday, 18 November 2009 10:10:45 (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, 16 November 2009

Criminal gangs are making millions of dollars out of the H1N1 flu pandemic by selling fake flu drugs over the internet, a web security firm said on Monday.

Sophos, a British security software firm said it had intercepted hundreds of millions of fake pharmaceutical spam adverts and websites this year, many of them trying to sell counterfeit antiviral drugs like Tamiflu to worried customers. Tamiflu, an antiviral marketed by Switzerland's Roche Holding and known generically as oseltamivir, is the frontline drug recommended by the World Health Organization to treat and slow the progression of flu symptoms. GlaxoSmithKline makes another antiviral for flu, known as Relenza.


(Source: Reuters)

Full story


Monday, 16 November 2009 17:32:31 (W. Europe Standard Time, UTC+01:00)  #     | 

A new spam campaign is targeting a financial transfer system that handles trillions of dollars in transactions annually and has proved to be a fertile target of late for online fraudsters.

The spam messages pretend to come from the National Automated Clearing House Association (NACHA), a U.S. nonprofit association that oversees the Automated Clearing House system (ACH). ACH is a widely used but aging system used by financial institutions for exchanging details of direct deposits, checks and cash transfers made by businesses and individuals. In 2002, ACH was used for nearly 9 billion transactions worth more than $24.4 trillion.


(Source: ComputerWorld)

Full story


Monday, 16 November 2009 16:31:37 (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, 13 November 2009

Testing a brand new copy of Windows 7 shows that malware still finds its way around inbuilt preventative measures.

Got Windows 7? Yes, we know an increasing number of you have. But you'll still need antivirus protection. A test by the security company Sophos has found that Windows 7 is, out of the box, vulnerable to 8 out of 10 viruses that dropped into its feed (its feed being gnarly viruses picked from the internet). But of those 8, the User Account Control (UAC) - meant to save you from yourself, you button-clicking obsessive, you - did stop one.


(Source: Guardian)

Full story


Friday, 13 November 2009 18:00:27 (W. Europe Standard Time, UTC+01:00)  #     | 

Nearly half of England's 14-year-olds have been a victim of bullying and cyber-bullying is now the joint most common form, according to new research.

The Government-commissioned research, conducted by the National Centre for Social Research, analysed bullying among more than 10,000 secondary school pupils in England aged 14-16. The initial findings show that 47 per cent of young people report being bullied at the age of 14. After cyberbullying - where children face taunts, threats and insults via the internet and mobile phones - and name calling, the most common type of bullying was teenagers being threatened with violence, being excluded by their friends and facing actual violence.


(Source: Telegraph)

Full story


Friday, 13 November 2009 11:06:28 (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, 12 November 2009

For the last few days, some jailbroken iPhone users have found their home screen background a little different than they remembered. A hacker, going by the name "ikee," created a worm that changes the home screen background on jailbroken iPhones whose owners failed to change the default password after installing SSH.

Simply jailbreaking your iPhone will not make you vulnerable to this sort of hack. The iPhone OS, in general, is also immune to this hack. On jailbroken iPhones, SSH is installable with a package from Cydia that allows you to connect to your phone and make changes to the filesystem.


(Source: TUAW News)

Full story


Thursday, 12 November 2009 18:14:42 (W. Europe Standard Time, UTC+01:00)  #     | 

Australian internet provider BigPond has become the latest internet company to be targeted by hackers on Twitter, after one of its accounts was hijacked as part of a phishing scam.

Affected users received a private message from BigPondTeam saying "Hey, look at this," and directing them to follow a link that asked them to enter their Twitter password. The attack was part of an attempt to steal their credentials and potentially gain access to other services they use - such as their bank accounts or email services.


(Source: Guardian)

Full story


Thursday, 12 November 2009 17:54:28 (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, 10 November 2009

THE next world war could take place in cyberspace, the UN telecommunications agency chief has warned. "The next world war could happen in cyberspace and that would be a catastrophe. We have to make sure that all countries understand that in that war, there is no such thing as a superpower,'' Hamadoun Toure said.

"Loss of vital networks would quickly cripple any nation, and none is immune to cyberattack,'' added the secretary-general of the International Telecommunications Union during the ITU's Telecom World 2009 fair in Geneva. As the internet becomes more linked with daily lives, cyberattacks and crimes have also increased in frequency, experts said.



Full story

Tuesday, 10 November 2009 10:59:27 (W. Europe Standard Time, UTC+01:00)  #     |