International Telecommunication Union   ITU
Site Map Contact us Print Version
 Wednesday, 16 December 2009

Internet users are being warned to watch out for a computer virus targeting popular social networking sites in the run up to Christmas.

Security experts say the new virus is "particularly nasty" and compels its victims to participate manually in creating a new Facebook account to help spread the worm. "The more people who use an application such as Facebook, or any other means of social networking, the more likely they are to be targeted by bad guys to send out malicious threats such as Koobface." The internet security company recommends that users do not reply to or follow links included in unsolicited Facebook messages and users should always carefully check that the URL they are entering is really that of the site they want to access.


(Source: FOX News)

Full story

FOX News

Wednesday, 16 December 2009 18:08:53 (W. Europe Standard Time, UTC+01:00)  #     | 

Thirty percent of 17-year-olds with cell phones have received sexting photos or videos, while eight percent have sent them, according to a new report from the Pew Research Center. What's more, four percent of 12- to 17-year-olds admit they have texted sexually suggestive nude or nearly nude images of themselves to someone else. Another 15 percent said they have received such images.

Meanwhile, laws and law-enforcement practices have emerged around sexting. The Pew report notes that some law-enforcement officers and district attorneys have begun prosecuting teens who create and share such images under laws generally reserved for producers and distributors of child pornography.


(Source: News Factor)

Full story

News Factor

Wednesday, 16 December 2009 14:25:19 (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, 15 December 2009

Australia said Tuesday it would push ahead with a mandatory China-style plan to filter the Internet, despite widespread criticism that it will strangle free speech and is doomed to fail.

Communications Minister Stephen Conroy said new laws would be introduced to ban access to "refused classification" (RC) sites featuring criminal content such as child sex abuse, bestiality, rape and detailed drug use. Blacklisted sites would be determined by an independent classification body via a "public complaint" process, said Conroy, admitting there was "no silver bullet solution to cyber-safety".


(Source: AFP)

Full story


Tuesday, 15 December 2009 15:23:43 (W. Europe Standard Time, UTC+01:00)  #     | 

They're the scourge of the Internet right now and the U.S. Federal Bureau of Investigation says they've also raked in more than $150 million for scammers. Security experts call them rogue antivirus programs.

The FBI's Internet Crime Complaint Center issued a warning over this fake antivirus software Friday, saying that Web surfers should be wary of sudden pop-up windows that report security problems on their computers. This software can appear almost anywhere on the Web. Typically, the scam starts with an aggressive pop-up advertisement that looks like some sort of virus scan. Often it's nearly impossible to get rid of the pop-up windows.


(Source: ComputerWorld)

Full story


Tuesday, 15 December 2009 10:19:24 (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, 14 December 2009

ISO will develop a technical report (TR) to help emerging and developing countries implement a solid and internationally harmonized health informatics system. The report will present information in an accessible way to guide and facilitate the adoption of relevant International Standards by countries with limited resources and infrastructure.

International Standards can help by providing globally harmonized specifications for establishing the architectural framework used to design eHealth systems, plan implementation, make build-or-buy decisions, decide on acquisitions and undertake related activities.


(Source: ISO)

Full story


Monday, 14 December 2009 18:22:08 (W. Europe Standard Time, UTC+01:00)  #     | 

In the EU27, 65% of households 1 had access to the internet during the first quarter of 2009, compared with 60% during the first quarter of 2008, and 56% had a broadband internet connection in 2009, compared with 49% in 2008.

The se data 2 published by Eurostat, the Statistical Office of the European Communities , represent only a small part of the results of a survey on Information and Communication Technologies (ICT) usage in households and by individuals in the EU27 Member States, the candidate countries, Norway , Iceland and Serbia . As well as internet use and broadband connections, the survey also covers other indicators such as e-shopping, e-government and advanced communication and content related services.


(Source: Euro Stat)

Full story

European Commission

Monday, 14 December 2009 18:00:21 (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, 10 December 2009

A "friendly" hacker called c0de.breaker claims to have broken into two secure internal sites at NASA's Instrument Systems and Technology and Software Engineering divisions, and snapped screen shots to prove the protected sites were intruded.

"I didn't want to make something bad!" c0de.breaker wrote in a web posting. "Only to show NASA (has) many vulnerable subdomains to SQLI (SQL injection), XSS (cross-site scripting), etc." The hacker gained access through a combination of a SQL injection and poor access controls. The National Aeronautics and Space Administration has had major problems securing its websites for years.


(Source: Gov Info Security)

Full story

Gov Info Security

Thursday, 10 December 2009 16:13:01 (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, 09 December 2009

What do phishing, instant messaging malware, DDoS attacks and 419 scams have in common? According to Cisco Systems, they're all has-been cybercrimes that were supplanted by slicker, more menacing forms of cybercrime over the past year.

In its 2009 Annual Security Report, due to be released Tuesday, Cisco says that the smart cyber-criminals are moving on. "Social media and the data-theft Trojans are the things that are really in their ascent," said Patrick Peterson, a Cisco researcher. "You can see them replacing a lot of the old-school things."


(Source: ComputerWorld)

Full story


Wednesday, 09 December 2009 10:24:01 (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, 08 December 2009

The government is preparing to set up a National Identity Management Center (NIMC) to distribute National Identity Cards (NIDC) across the country. Government officials said that the center will be located in Kathmandu and will distribute cards through thousands of government employees mobilized across the country.

Government officials are making preparations to set up the center on the basis of the recently submitted recommendations of a task force formed to study the need and structure of such a center. “We have recommended to the government to set up NIMC to distribute NIDCs as committed in the national budget and government policy and programs," Lilamani Paudel, Secretary at the Office of the Prime Minister and Council of Ministers (OPMCM), told


(Source: Republica)

Full story


Tuesday, 08 December 2009 14:25:24 (W. Europe Standard Time, UTC+01:00)  #     | 

Lessons in using the internet safely are set to become a compulsory part of the curriculum for primary school children in England from 2011.

The lessons are one element of a new government strategy being unveiled called "Click Clever, Click Safe". Children will also be encouraged to follow an online "Green Cross Code" and block and report inappropriate content. The measures have been drawn up by the UK Council on Child Internet Safety, a new body comprising 140 organisations. The campaign intends to encourage children to not give out personal information on the web, block unwanted messages on social networks and report any inappropriate behaviour to the appropriate bodies, which may include the website, teachers or even police.


(Source: BBC)

Full story


Tuesday, 08 December 2009 14:08:22 (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, 07 December 2009

The Taiwan government says it will spend 2 billion New Taiwan dollars ($65 million) to support its electronic-book industry and help makers cash in on the rapidly growing world market.

Companies can receive government subsidies of up to 40 percent of costs for programs developing related technologies, according to an Industrial Development Bureau report released Thursday. Taiwan is already a leading player in the digital book market, being the exclusive supplier of e-paper displays for Amazon's Kindle and Sony's e-Reader through collaboration with foreign firms that hold cutting-edge electronic ink technologies, officials said.


(Source: AP)

Full story


Monday, 07 December 2009 09:55:45 (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, 04 December 2009

The U.S. government and private businesses need to overhaul the way they look at cybersecurity, with the government offering businesses new incentives to fix security problems, the Internet Security Alliance said.

The alliance, in a report released Thursday, also called for permanent international cybersecurity collaboration centers, new security standards for VoIP (voice over Internet Protocol) communications and programs to educate corporate leaders about the benefits of enhanced cybersecurity efforts. Lots of groups have called for better information security education for students, but education for enterprise leaders is often overlooked, said Joe Buonomo, president and CEO of Direct Computer Resources, a data security products vendor.


(Source: ComputerWorld)

Full story


Friday, 04 December 2009 16:34:45 (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, 03 December 2009

The 13-year-old Florida girl sent a topless photo of herself to a boy in hope of gaining his attention. Instead, she got the attention of her school, as well as the high school nearby. The incessant bullying by classmates that followed when the photo spread put an emotional weight upon Hope that she ultimately could not bear.

Her death is only the second known case of a suicide linked to bullying after “sexting” — the practice of transmitting sexual messages or images electronically. In March, 18-year-old Jesse Logan killed herself in the face of a barrage of taunts when an ex-boyfriend forwarded explicit photos of her following their split. “As far as training them on the Internet and what to look at and what not to look at, yeah, we talked about it,”


(Source: MSNBC)

Full story


Thursday, 03 December 2009 10:06:19 (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, 02 December 2009

If your iPhone has been jailbroken, change your passwords now, advised Paul Ducklin, Sophos Australia's chief of technology. Ducklin said the writers of this virus included a program call "Duh", which added malicious capabilities not present in last month's ikee release.

The new password installed by this virus was "ohshit", which can be used to remove the threat of further remote attacks on an infected device. Ducklin said to clean up the device by searching the file "directory/private/var/mobile/home", type in "passwd" to initiate the command, and change the password. "Otherwise the buggers can get back in anytime they want," said Ducklin.


(Source: ZDNet Australia)

Full story

ZDNet Australia

Wednesday, 02 December 2009 17:23:29 (W. Europe Standard Time, UTC+01:00)  #     | 

Online sales in China almost doubled in the first nine months of this year, official data showed Tuesday, as the nation becomes more switched on and confident in Internet shopping.

China's enormous Internet community spent 168.9 billion yuan (25 billion dollars), a 90 percent increase from the same period last year, the government data showed. And Di Jiankai, a director-general of the commerce ministry, told reporters the total figure for the whole year was expected to exceed 260 billion yuan. He did not providing a comparative figure for 2008. "The commerce ministry pays great attention to e-commerce," he added. "It is a very important business form we can use to boost consumption."


(Source: AFP)

Full story


Wednesday, 02 December 2009 11:10:35 (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, 01 December 2009

It’s not good news for IT cities. According to a report prepared by the Computer Emergency Research Team from the Union IT ministry, a total of 692 websites have been affected in September alone.

The unit has now asked the respective state governments to secure their own websites. “We have instructed all state governments to instal security measures, especially for those sites which contain sensitive data,’’ said a senior ministry official. Of the websites hacked, a whopping 74% belong to the dotin domain Most common hacking method is to steal password from administrator Hackers also enter web server and destroy the site Another method is to try and poison the URL.


(Source: The Economic Times)

Full story

The Economic Times

Tuesday, 01 December 2009 14:02:40 (W. Europe Standard Time, UTC+01:00)  #     | 

A computer worm that China warned Internet users against is an updated version of the Panda Burning Incense virus, which infected millions of PCs in the country three years ago, according to McAfee.

The original Panda worm, also known as Fujacks, caused widespread damage at a time when public knowledge about online security was low, and led to the country's first arrests for virus-writing in 2007. The new worm variant, one of many that have appeared since late 2006, adds a malicious component meant to make infection harder to detect.


(Source: PC World)

Full story

PC World

Tuesday, 01 December 2009 13:17:37 (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, 30 November 2009

Diners who frequent a popular Downtown restaurant should review their charge-card statements because hackers broke into its computer system to loot debit- and credit-card numbers, police said today.

Between 30 and 50 people have reported fraudulent charges on their accounts, and Columbus detectives said that anyone who used a charge card at Tip Top Kitchen and Cocktails in July or August is at risk. The hackers have been traced to an overseas Internet address, and no Tip Top employees are involved, police said. The hackers found a weak point in the restaurant's computer defenses, wormed their way in, and installed "malware" that stripped the numbers.


(Source: The Columbus Dispatch)

Full story

The Columbus Dispatch

Monday, 30 November 2009 14:31:41 (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, 26 November 2009

The European Union’s first dedicated NGO Alliance for Child Safety Online (eNACSO) launched its Digital Manifesto on 14 November 2009 during the Internet Governance Forum(IGF) in Egypt. ‘The global nature of the internet places a particular responsibility on international institutions and governments to take action at national and international level to ensure children are safe online’ says Dieter Carstensen, eNACSO Chair.

The Digital Manifesto will form part of eNACSO’s ‘Agenda for Action’ document which will be launched in Brussels in May 2010.


(Source: eNACSO)

Full story



Thursday, 26 November 2009 16:24:59 (W. Europe Standard Time, UTC+01:00)  #     | 

While the Senate bogs down in negotiations over drafting major cybersecurity reform legislation, a House panel Wednesday passed a nuts-and-bolts IT security bill that would require the president to assess the government's cybersecurity workforce, including an agency-by-agency skills assessment, and provide scholarship to students who agree to work as cybersecurity specialists for the government after graduation.

"There are some very technically, sophisticated ways in enhancing cybersecurity, but there are some simple ways, also. Some aspects of computer security are rocket science and others are fairly, simple precautionary steps which most people can take."


(Source: Gov Info Security)

Full story

Gov Info Security

Thursday, 26 November 2009 15:00:07 (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, 25 November 2009

In today’s technologically advanced world, documents and correspondences that were once sent by post are now exchanged electronically. This exchange takes place smoothly until a signature is required in the transaction. Then the entire process falls back to the real ‘e-less’ world of paper documents, faxes, snail-mail and even physical presence.

Technology, however, has not ceased to search for solutions to this barrier. The result: a method that is accurate and arguably more secure than the traditional handwritten signature, which allows documents to be signed online — e-signatures.


(Source: Business Today)

Full story

Business Today

Wednesday, 25 November 2009 15:13:38 (W. Europe Standard Time, UTC+01:00)  #     | 

That television set you discourage your children from watching may not be the greatest threat to their wellbeing. Instead, the mobile phone is the gateway in introducing children to the world of cyberspace, posing a great risk to their safety, a lobby group said Tuesday.

According to The Cradle, the unmonitored use of technology is increasingly exposing youngsters to the risk of harm and violence. "Only 24 per cent of children in the study reported to their parents or an authority of online or cell phone harassment,” Cradle programme manager Brian Weke told journalists. The study also revealed that 77 out of the 96, who had the incidences reported to them, took no action and ignored the seriousness of the matter.


(Source: Daily Nation)

Full story

Daily Nation

Wednesday, 25 November 2009 10:51:54 (W. Europe Standard Time, UTC+01:00)  #     |