International Telecommunication Union   ITU
 
 
Site Map Contact us Print Version
 Tuesday, March 16, 2010

At the eighth Ministerial eHealth Conference in Barcelona today, EU ministers have outlined a joint vision and policy priorities on how to make eHealth more accessible, interactive and customised to patients. The Declaration outlines a vision and identifies key objectives to be achieved in the next ten years.

The Declaration calls for policy coordination amongst the various areas where eHealth can have an impact on citizens' health in order to enhance benefits for patients, healthcare systems and society. It recognises the need for stronger synergies with policy areas like competitiveness, research and regional development both at European and national levels.

 

(Source: Europe's Information Society)

Full story

Europe's Information Society

Tuesday, March 16, 2010 3:23:29 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, March 15, 2010

The government has added fresh resources to the fight against cybercrime with the launch of a £4.3m programme to help combat fraud, estimated to cost UK consumers £3.5bn per year. The programme, which aims to take down scam websites, was launched by the Department for Business, Innovation and Skills this week. Under the scheme, up to 300 of the UK's approximately 3,000 existing trading standards officers will receive "intermediate" level training in tackling cybercrime.

In addition, a new cyber enforcement team within the Office of Fair Trading (OFT) will be set up. The team will lead investigations into websites selling fake or non-existent goods, tickets or services online, and will have an attached digital forensics lab that will be available to all OFT staff.

 

(Source: Silicon)

Full story

Silicon

Monday, March 15, 2010 6:35:59 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, March 12, 2010

Reporters Without Borders issued the third annual report ahead of Friday's World Day Against Cyber Censorship, an awareness campaign organized by the Paris-based media advocacy group. Le Coz said repressive regimes seemed to be winning a technological tussle with dissidents who try to circumvent online restrictions. "Enemies of the Internet" list, got more sophisticated at censorship and overcoming dissidents' attempts to communicate online, said Reporters Without Borders' Washington director, Clothilde Le Coz.

Including Cisco Systems Inc., which has been criticized by activists who say that it sells networking equipment that could be used in official efforts to monitor and control Internet use. In a statement Thursday, the company reiterated that it does not provide any government with any special capabilities, and said products sold in China are the same ones sold elsewhere.

 

(Source: AP)

Full story

AP

Friday, March 12, 2010 6:10:12 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, March 11, 2010

Fraudsters are continuing their switch from traditional card fraud to raiding online bank accounts, according to new research. Fraud losses on UK credit and debit cards totalled £440m in 2009 - a drop of 28% compared with the previous year - the UK Cards Association said. But the number of "phishing" attacks rose by 16% in the same period. This is when fraudsters trick people into entering their personal details on a website or in an e-mail.

Overall losses from card fraud fell last year. Chip-and-pin was highlighted as the major factor behind an 11% fall in fraud on lost and stolen cards - now at its lowest for two decades.

 

(Source: BBC)

Full story

BBC

Thursday, March 11, 2010 12:55:32 PM (W. Europe Standard Time, UTC+01:00)  #     | 

From 15 to 18 March 2010 the Ministry of Health of Spain and the Regional Government of Catalonia in cooperation with the European Commission are organizing a ministerial Conference in Barcelona. It will co-locate with the World of Health IT conference. High-level eHealth conferences organised by the presiding countries since 2003 represent important annual milestones in this specific field. Spain therefore will carry on the tradition and host this Conference in Barcelona as a part of its presidency in the first half of 2010.

A platform will be provided to encourage the development of on-line health services in Europe. The politicians, health administrators, researchers and suppliers, along with health professionals, are meeting to share their experiences and to discover what is new in this fast-evolving area.

 

(Source: Europe's Information Society)

Full story

European Comission

Thursday, March 11, 2010 12:46:34 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, March 10, 2010

Twitter launched a new link-screening service on Tuesday aimed at preventing phishing and other malicious attacks against users of the popular microblogging service.

Phishing scams on Twitter usually involve attackers trying to obtain the login credentials of Twitter users, and then sending spam messages from the stolen accounts in a bid to make money, Twitter said on its blog last month. Twitter also fights phishing scams by watching for affected accounts and resetting passwords, it said. Phishing attacks ballooned on Twitter last year as the service grew in popularity. Twitter's new link-screening service comes after it last year started using Google's Safe Browsing API to check for malicious content in links posted by users.

 

(Source: PC World)

Full story

PC World

Wednesday, March 10, 2010 12:12:47 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, March 09, 2010

The Internet was built on freedom of expression. Society wants someone held accountable when that freedom is abused. And major Internet companies like Google and Facebook are finding themselves caught between those ideals. Such may have been the case when three Google executives were convicted in Milan, Italy on February 24 over a bullying video posted on the site -- a verdict greeted with horror by online activists, who fear it could open the gates to such prosecutions and ultimately destroy the Internet itself.

Matt Sucherman, a Google vice president and general counsel, wrote in a blog post that the company was "deeply troubled" by the case, saying it "attacks the very principles of freedom on which the Internet is built."

 

(Source: Reuters)

Full story

Reuters

Tuesday, March 09, 2010 12:09:57 PM (W. Europe Standard Time, UTC+01:00)  #     | 

More than three-quarters of people across the world believe access to the Internet is a fundamental right, a poll carried out for the BBC indicated Monday. The poll, which questioned more than 27,000 adults across 26 countries, suggested strong support globally for access to the web. The findings come as efforts are stepped up across the world to increase net access, with the United Nations leading a push for more people to be given the opportunity to get online. Countries including Finland and Estonia have already ruled it is a human right, said the BBC.

"The right to communicate cannot be ignored," Hamadoun Toure, secretary-general of the International Telecommunication Union, told the broadcaster. "The Internet is the most powerful potential source of enlightenment ever created."

 

(Source: AFP)

Full story

AFP

Tuesday, March 09, 2010 10:54:10 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, March 08, 2010

This three-day event fosters opportunities for IT and Telecommunication professionals to network, build relationships, and explore new ideas. It brings together IT professionals, developers, decisions and policy makers, governmental officials, experts, consultants, industry leaders, bankers, law enforcement officials, academics, networks security managers, database administrators, IT marketing executives, surveyors, etc. to share their protection experience in IT security and exchange ideas on most emerging technology trends, applications and practices.

Kuwait ICT Security Forum aims to keep you at the forefront of the latest security developments. Don't miss this opportunity to learn fresh approaches and develop innovative strategies and tactics to defeat today's biggest information security threats.

 

(Source: Kuwait ICT Security Forum)

Full story

Kuwait ICT Security Forum

Monday, March 08, 2010 11:06:03 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, March 05, 2010

Hackers breaking into businesses and government agencies with targeted attacks have not only stolen intellectual property, in some cases they have corrupted data too, the head of the U.S. Federal Bureau of Investigation said Thursday. The United States has been under assault from these targeted spear-phishing attacks for years, but they received mainstream attention in January, when Google admitted that it had been hit and threatened to pull its business out of China -- the presumed source of the attack -- as a result.

Researchers investigating the Google attack -- thought to have affected at least 100 companies including Intel, Adobe and Symantec -- say that prime targets of the hackers were the source code management systems used by software developers to build code.

 

(Source: PC World)

Full story

PC World

Friday, March 05, 2010 12:42:59 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, March 04, 2010

The government develops a new strategy to help the information technology industry cut down on waste While no one will ever confuse the polluting effects of the information and communications technology sector with, say, the oil industry, all is not green in the realm of ICT. The world throws away of hundreds of millions of mobile phones, computers, printers, batteries and gadgets annually, while energy and raw materials consumed by the industry account for more than 2% of global greenhouse gases emissions.

It is with this in mind that the Egyptian government has begun work on a green information and communication technology (ICT) strategy aimed at reducing the sector’s energy use and finding a place for the tons of hardware thrown away every year.

 

(Source: Business Today)

Full story

Business Today

Thursday, March 04, 2010 4:15:40 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, March 03, 2010

Authorities have smashed one of the world's biggest networks of virus-infected computers, a data vacuum that stole credit cards and online banking credentials from as many as 12.7 million poisoned PCs. The "botnet" of infected computers included PCs inside more than half of the Fortune 1,000 companies and more than 40 major banks, according to investigators.

Spanish investigators, working with private computer-security firms, have arrested the three alleged ringleaders of the so-called Mariposa botnet, which appeared in December 2008 and grew into one of the biggest weapons of cybercrime. More arrests are expected soon in other countries.

 

(Source: The New Zealand Herald)

Full story

The New Zealand Herald

Wednesday, March 03, 2010 5:24:59 PM (W. Europe Standard Time, UTC+01:00)  #     | 

The United Nations (UN) agency responsible for IT and telecommunications has delivered 25 satellite phones to Chile to help restore communication links vital to bringing aid to areas devastated by the massive 8.8-magnitude earthquake on Saturday. The International Telecommunication Union (ITU) said it airlifted the satellite phones out of Geneva on Monday and expected them to be in use on Tuesday. The UN agency thanked Iridium Communications, which operates a global satellite network for mobile telecommunications, for its support of the effort. International aid groups and UN agencies in Haiti are already using Iridium 9555 satellite phones in support of Haiti relief and recovery efforts.

International aid groups and UN agencies in Haiti are already using Iridium 9555 satellite phones in support of Haiti relief and recovery efforts.

 

(Source: PC World)

Full story

PC World

Wednesday, March 03, 2010 3:29:34 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, March 02, 2010

Four California men were charged on Monday with using sophisticated computer programs to fraudulently obtain more than a million tickets to concerts and sporting events and reselling them for a profit estimated at $29 million.

The company was able to snap up the best seats as soon as they were made available online because the programs were able to complete transactions more quickly than real humans vying for tickets manually. For example, Fishman said, Wiseguy bought nearly half the 440 available floor tickets for a Bruce Springsteen concert at Giants Stadium in 2008. In most cases, individual buyers are restricted to a maximum of four tickets.

 

(Source: AP)

Full story

AP

Tuesday, March 02, 2010 11:47:40 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, February 26, 2010

Security experts are split over the effectiveness of Microsoft's efforts to shut down a network of PCs that could send 1.5 billion spam messages a day. The firm persuaded a US judge to issue a court order to cripple 277 internet domains used by the Waledac botnet. Botnets are usually armies of hijacked Windows PCs that send spam or malware. "We aim to be more proactive in going after botnets to help protect the internet," said Richard Boscovich, the head of Microsoft's digital crime unit.

Security firm Symantec has estimated that over 80% of unsolicited e-mail comes from botnets.

 

(Source: BBC)

Full story

BBC

Friday, February 26, 2010 2:46:36 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, February 25, 2010

The International Women Day (8th of March), once again will provide the European Commission with an occasion to address the role of women in the ICT sector. However, this year, substantive changes have been introduced to the formula of the event, starting from the location: Cyprus. The intention is to move the discussion to Member States which have only recently joined the European Union adventure, exactly where women's potential is particularly untapped and where fresh ideas could bloom. This year the debate on women and ICT will be embedded in a broader initiative encompassing other ICT related issues. The event will comprise workshops targeting women willing to set up consortia and submit proposals for future calls.

 

(Source: Europe's Information Society)

Full story

European Comission

Thursday, February 25, 2010 12:24:56 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, February 24, 2010

Intel was the victim of a cyber attack similar to the one experienced by Google, the company revealed Monday. "We regularly face attempts by others to gain unauthorized access through the Internet to our information technology systems," Intel said in regulatory filings posted by The New York Times. "One recent and sophisticated incident occurred in January 2010 around the same time as the recently publicized security incident reported by Google."

Attacks have included people who masqueraded as authorized users or those who used "surreptitious introduction of software," Intel said. "These attempts, which might be the result of industrial or other espionage, or actions by hackers seeking to harm the company, its products, or end users, are sometimes successful."

 

(Source: PC Magazine)

Full story

PC Magazine

Wednesday, February 24, 2010 4:01:29 PM (W. Europe Standard Time, UTC+01:00)  #     | 

China has issued new restrictions on Internet use, requiring those wanting to set up a website to meet regulators and provide identity documents, in a move slammed Wednesday by one rights group. The new rules come as the United States has stepped up pressure on Beijing to break down its vast system of web controls -- the so-called "Great Firewall of China" -- for the more than 380 million people now online in the country.

Washington issued those calls after US Internet giant Google said last month it was considering pulling out of China over cyberattacks and Chinese government censorship of its search results. China's Ministry of Industry and Information Technology issued the new guidelines to local authorities on February 8 and lifted a ban imposed in December on individuals acquiring .cn domain names, state media said Tuesday.

 

(Source: AFP)

Full story

AFP

Wednesday, February 24, 2010 12:46:38 PM (W. Europe Standard Time, UTC+01:00)  #     |