International Telecommunication Union   ITU
 
 
Site Map Contact us Print Version
 Monday, January 11, 2010

A wireless industry group said mobile phone conversations are safe from eavesdropping, even after a German security expert released the code for unscrambling calls made using most of the world's cell phones. Concerns spread last week that cell phone calls could easily be intercepted after encryption expert Karsten Nohl unveiled his research at Europe's largest hacking conference, in Berlin.

The London-based GSM Association said on Thursday that it has spent the past few years figuring out ways to thwart hackers who might try to tap into wireless calls using Nohl's research, which it first learned of in 2007.

 

(Source: Reuters)

Full story

Reuters

Monday, January 11, 2010 12:06:38 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, January 08, 2010

People who post intimate details about their lives on the internet undermine everybody else's right to privacy, claims an academic. Dr Kieron O'Hara has called for people to be more aware of the impact on society of what they publish online. "If you look at privacy in law, one important concept is a reasonable expectation of privacy," he said. "As more private lives are exported online, reasonable expectations are diminishing."

The rise of social networking has blurred the boundaries of what can be considered private, he believes - making it less of a defence by law. We live in an era that he terms "intimacy 2.0" - where people routinely share extremely personal information online.

 

(Source: BBC)

Full story

BBC

Friday, January 08, 2010 1:39:04 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, January 07, 2010

The new year will usher in some interesting new changes in the world of malware and cyber-attacks, according to one company's predictions for 2010. Watchful eyes will have to be kept on mobile phone apps, Google Wave accounts, file sharing and peer-to-peer networks -- cyber-criminals will target those in greater numbers, according to predictions released by Kaspersky Labs, a provider of Internet threat management solutions for combating malware.

"Given the growing sophistication of threats -- it's no longer just an e-mail saying, ‘Please click on this attachment,' and you get infected with something -- the schemes are much more elaborate than that," said Roel Schouwenberg, the company's senior malware researcher.

 

(Source: Government Technology)

Full story

Government Technology

Thursday, January 07, 2010 2:24:01 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Got an e-mail list of customers or readers and want to know more about each such as their full name, friends, gender, age, interests, location, job and education level? Facebook has just the free feature you're looking for, thanks to its recent privacy changes. The hack, first publicized by blogger Max Klein, repurposes a Facebook feature that lets people find their friends on Facebook by scanning through e-mail addresses in their contact list.

Using a simple scraping tool, a marketer could then turn a list of e-mail addresses into a rich, full-fledged set of marketing profiles, with names, pictures, ages, locations, interests, photos, wall posts, affiliations and names of your friends, depending on how users have their profiles set.

 

(Source: CNN)

Full story

CNN

Thursday, January 07, 2010 11:19:31 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, January 04, 2010

Last year, the Internet began to be seen as a basic human right and some countries have instituted legal means of guaranteeing that the vast majority of their citizens have access to a quality Internet connection. Other countries, though, are going the other way, hindering their citizen's web use and in some cases moving to disconnect them altogether. In France, the heavily criticized and disputed, so-called "three strikes" law has come into effect starting January 1st. Its backers are quick to boast the laws unabridged effectiveness, but common sense points the other way.

How exactly the agency will determine users' email addresses, or even harder, the address they are actively using remains to be seen.

 

(Source: Softpedia)

Full story

Softpedia

Monday, January 04, 2010 1:53:50 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Chinese authorities caught nearly 5,400 suspects last year in a crackdown on online pornography and have vowed to strengthen Internet policing.

Beijing's pervasive policing of cyberspace and attempts to block the Internet are already among the world's most stringent. In a statement late Thursday, the Ministry of Public Security said the "purification of the Internet" and fighting of online crime are closely tied to the country's stability. "Lewd and pornographic content seriously pollutes the online environment, depraves social morals and poisons the physical and psychological health of the masses of young people," the statement said. "It must be firmly controlled."

 

(Source: AP)

Full story

AP

Monday, January 04, 2010 1:31:30 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Thanks to efforts from Microsoft Research, criminals involved in child-exploitation will have less places to hide, especially when it comes down to the nooks and crannies of the Internet. Ernie Allen, president and CEO of National Center for Missing & Exploited Children (NCMEC) notes that while the Internet has created new opportunities for pedophiles to access content in the privacy of their own homes, and to expose themselves less to the risks associated with their illegal activities, work has been done to identify them and bring them to justice. At the same time, PhotoDNA is designed to help stop the distribution of child-exploitation images across the web.

NCMEC will be using a technology donated by Microsoft in order to produce blueprints of known images of children abuse.

 

(Source: Softpedia)

Full story

Softpedia

Monday, January 04, 2010 11:41:13 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, December 17, 2009

A court in east China has handed down jail sentences of up to three years to 11 people for their roles in online gaming scams that netted them around 140,000 dollars, state media said. Lu Yizhong and Zeng Yifu wrote malicious Trojan horse viruses to steal 5.3 million user names and passwords from online gamers, which were then used for "illegal gains", the Xinhua news agency reported late Wednesday. Defendants Yan Renhai, his girlfriend Chen Huiting and other accomplices sold or used the viruses to steal online credits, the Gulou District People's Court in Jiangsu province found, according to Xinhua.

The number of Internet gamers in China reached 217 million at the end of June, or 64.2 percent of the nation's total online population.

 

(Source: AFP)

Full story

AFP

Thursday, December 17, 2009 10:33:59 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, December 16, 2009

Internet users are being warned to watch out for a computer virus targeting popular social networking sites in the run up to Christmas.

Security experts say the new virus is "particularly nasty" and compels its victims to participate manually in creating a new Facebook account to help spread the worm. "The more people who use an application such as Facebook, or any other means of social networking, the more likely they are to be targeted by bad guys to send out malicious threats such as Koobface." The internet security company recommends that users do not reply to or follow links included in unsolicited Facebook messages and users should always carefully check that the URL they are entering is really that of the site they want to access.

 

(Source: FOX News)

Full story

FOX News

Wednesday, December 16, 2009 6:08:53 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Thirty percent of 17-year-olds with cell phones have received sexting photos or videos, while eight percent have sent them, according to a new report from the Pew Research Center. What's more, four percent of 12- to 17-year-olds admit they have texted sexually suggestive nude or nearly nude images of themselves to someone else. Another 15 percent said they have received such images.

Meanwhile, laws and law-enforcement practices have emerged around sexting. The Pew report notes that some law-enforcement officers and district attorneys have begun prosecuting teens who create and share such images under laws generally reserved for producers and distributors of child pornography.

 

(Source: News Factor)

Full story

News Factor

Wednesday, December 16, 2009 2:25:19 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, December 15, 2009

Australia said Tuesday it would push ahead with a mandatory China-style plan to filter the Internet, despite widespread criticism that it will strangle free speech and is doomed to fail.

Communications Minister Stephen Conroy said new laws would be introduced to ban access to "refused classification" (RC) sites featuring criminal content such as child sex abuse, bestiality, rape and detailed drug use. Blacklisted sites would be determined by an independent classification body via a "public complaint" process, said Conroy, admitting there was "no silver bullet solution to cyber-safety".

 

(Source: AFP)

Full story

AFP

Tuesday, December 15, 2009 3:23:43 PM (W. Europe Standard Time, UTC+01:00)  #     | 

They're the scourge of the Internet right now and the U.S. Federal Bureau of Investigation says they've also raked in more than $150 million for scammers. Security experts call them rogue antivirus programs.

The FBI's Internet Crime Complaint Center issued a warning over this fake antivirus software Friday, saying that Web surfers should be wary of sudden pop-up windows that report security problems on their computers. This software can appear almost anywhere on the Web. Typically, the scam starts with an aggressive pop-up advertisement that looks like some sort of virus scan. Often it's nearly impossible to get rid of the pop-up windows.

 

(Source: ComputerWorld)

Full story

ComputerWorld

Tuesday, December 15, 2009 10:19:24 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, December 14, 2009

ISO will develop a technical report (TR) to help emerging and developing countries implement a solid and internationally harmonized health informatics system. The report will present information in an accessible way to guide and facilitate the adoption of relevant International Standards by countries with limited resources and infrastructure.

International Standards can help by providing globally harmonized specifications for establishing the architectural framework used to design eHealth systems, plan implementation, make build-or-buy decisions, decide on acquisitions and undertake related activities.

 

(Source: ISO)

Full story

ISO 

Monday, December 14, 2009 6:22:08 PM (W. Europe Standard Time, UTC+01:00)  #     | 

In the EU27, 65% of households 1 had access to the internet during the first quarter of 2009, compared with 60% during the first quarter of 2008, and 56% had a broadband internet connection in 2009, compared with 49% in 2008.

The se data 2 published by Eurostat, the Statistical Office of the European Communities , represent only a small part of the results of a survey on Information and Communication Technologies (ICT) usage in households and by individuals in the EU27 Member States, the candidate countries, Norway , Iceland and Serbia . As well as internet use and broadband connections, the survey also covers other indicators such as e-shopping, e-government and advanced communication and content related services.

 

(Source: Euro Stat)

Full story

European Commission

Monday, December 14, 2009 6:00:21 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, December 10, 2009

A "friendly" hacker called c0de.breaker claims to have broken into two secure internal sites at NASA's Instrument Systems and Technology and Software Engineering divisions, and snapped screen shots to prove the protected sites were intruded.

"I didn't want to make something bad!" c0de.breaker wrote in a web posting. "Only to show NASA (has) many vulnerable subdomains to SQLI (SQL injection), XSS (cross-site scripting), etc." The hacker gained access through a combination of a SQL injection and poor access controls. The National Aeronautics and Space Administration has had major problems securing its websites for years.

 

(Source: Gov Info Security)

Full story

Gov Info Security

Thursday, December 10, 2009 4:13:01 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, December 09, 2009

What do phishing, instant messaging malware, DDoS attacks and 419 scams have in common? According to Cisco Systems, they're all has-been cybercrimes that were supplanted by slicker, more menacing forms of cybercrime over the past year.

In its 2009 Annual Security Report, due to be released Tuesday, Cisco says that the smart cyber-criminals are moving on. "Social media and the data-theft Trojans are the things that are really in their ascent," said Patrick Peterson, a Cisco researcher. "You can see them replacing a lot of the old-school things."

 

(Source: ComputerWorld)

Full story

ComputerWorld

Wednesday, December 09, 2009 10:24:01 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, December 08, 2009

The government is preparing to set up a National Identity Management Center (NIMC) to distribute National Identity Cards (NIDC) across the country. Government officials said that the center will be located in Kathmandu and will distribute cards through thousands of government employees mobilized across the country.

Government officials are making preparations to set up the center on the basis of the recently submitted recommendations of a task force formed to study the need and structure of such a center. “We have recommended to the government to set up NIMC to distribute NIDCs as committed in the national budget and government policy and programs," Lilamani Paudel, Secretary at the Office of the Prime Minister and Council of Ministers (OPMCM), told myrepublica.com.

 

(Source: Republica)

Full story

BBC

Tuesday, December 08, 2009 2:25:24 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Lessons in using the internet safely are set to become a compulsory part of the curriculum for primary school children in England from 2011.

The lessons are one element of a new government strategy being unveiled called "Click Clever, Click Safe". Children will also be encouraged to follow an online "Green Cross Code" and block and report inappropriate content. The measures have been drawn up by the UK Council on Child Internet Safety, a new body comprising 140 organisations. The campaign intends to encourage children to not give out personal information on the web, block unwanted messages on social networks and report any inappropriate behaviour to the appropriate bodies, which may include the website, teachers or even police.

 

(Source: BBC)

Full story

BBC

Tuesday, December 08, 2009 2:08:22 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, December 07, 2009

The Taiwan government says it will spend 2 billion New Taiwan dollars ($65 million) to support its electronic-book industry and help makers cash in on the rapidly growing world market.

Companies can receive government subsidies of up to 40 percent of costs for programs developing related technologies, according to an Industrial Development Bureau report released Thursday. Taiwan is already a leading player in the digital book market, being the exclusive supplier of e-paper displays for Amazon's Kindle and Sony's e-Reader through collaboration with foreign firms that hold cutting-edge electronic ink technologies, officials said.

 

(Source: AP)

Full story

AP

Monday, December 07, 2009 9:55:45 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, December 04, 2009

The U.S. government and private businesses need to overhaul the way they look at cybersecurity, with the government offering businesses new incentives to fix security problems, the Internet Security Alliance said.

The alliance, in a report released Thursday, also called for permanent international cybersecurity collaboration centers, new security standards for VoIP (voice over Internet Protocol) communications and programs to educate corporate leaders about the benefits of enhanced cybersecurity efforts. Lots of groups have called for better information security education for students, but education for enterprise leaders is often overlooked, said Joe Buonomo, president and CEO of Direct Computer Resources, a data security products vendor.

 

(Source: ComputerWorld)

Full story

ComputerWorld

Friday, December 04, 2009 4:34:45 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, December 03, 2009

The 13-year-old Florida girl sent a topless photo of herself to a boy in hope of gaining his attention. Instead, she got the attention of her school, as well as the high school nearby. The incessant bullying by classmates that followed when the photo spread put an emotional weight upon Hope that she ultimately could not bear.

Her death is only the second known case of a suicide linked to bullying after “sexting” — the practice of transmitting sexual messages or images electronically. In March, 18-year-old Jesse Logan killed herself in the face of a barrage of taunts when an ex-boyfriend forwarded explicit photos of her following their split. “As far as training them on the Internet and what to look at and what not to look at, yeah, we talked about it,”

 

(Source: MSNBC)

Full story

MSNBC

Thursday, December 03, 2009 10:06:19 AM (W. Europe Standard Time, UTC+01:00)  #     |