International Telecommunication Union   ITU
 
 
Site Map Contact us Print Version
 Wednesday, October 06, 2010

Addiction counsellors have told Newsbeat they're seeing more cases of people worried about being hooked on playing video games. There are now calls for the gaming industry to offer more support to people who can't switch off. Technology or computer addiction isn't officially recognised as a clinical condition. But the group representing games companies admits there needs to be more research into the problem.

"Most of the people that are getting into difficulties tend to be in their teenage years and early 20s. "As that generation moves through and others come on behind, I think the problem is going to get bigger."

 

(Source: BBC)

Full story

BBC

Wednesday, October 06, 2010 4:01:37 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Appropriately for a month that concludes with a holiday designed around scary things, October has been declared Cyber Security Awareness Month. President Obama recently signed a proclamation and urged everyone to back up files, keep Internet-surfing children safe, and "play an active role in securing the cyber networks we use every day." National Cyber Security Awareness Month is part of a campaign organized by the National Cyber Security Alliance (NCSA) and backed by the Department of Homeland Security.

The government agency said, "America's competitiveness and economic prosperity in the 21st century will depend on effective cybersecurity." NCSA said October's designation is part of the first Global Online Safety Campaign, called STOP | THINK | CONNECT, which began Monday. The public-private partnership is intended to "help all digital citizens employ universal behaviors to protect themselves," the organization said.

 

(Source: NewsFactor Network)

Full story

NewsFactor Network

Wednesday, October 06, 2010 3:55:41 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, October 05, 2010

The Department of the Prime Minister and Cabinet has sponsored a new online directory of Australia's security professionals and academia, which aims to highlight leaders in the industry. The National Security Research Directory is a brain's trust of hundreds of experts operating in a burgeoning list of fields across IT security, biometrics and counter-terrorism. It includes research topic areas such as applied cryptography, physical security and "ubervelliance" — a system with the ability to automatically locate and identify individuals and predict their movements.

Deputy national security advisor Margot McCarthy said the network will tighten coordination on matters of national security in the public and private sectors. McCarthy also announced the National Security Advisor's Group within the Department of the Prime Minster and Cabinet, which will report directly to the National Security chief information officer, Rachael Noble, on issues including cybersecurity.

 

(Source: ZD Net)

Full story

ZD Net

Tuesday, October 05, 2010 12:05:15 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Nearly six-in-ten adults (58%) have done research online about the products and services they buy, and about a quarter (24%) have posted comments or reviews online about the things they buy. On a typical day, 21% of adults search for product information online.

This is an increase from 15% in 2007 and 9% in 2004. The 2010 data come from a telephone survey by the Pew Research Center’s Internet & American Life Project conducted between August 9 and September 13, 2010. The survey was administered to a sample of 3,001 adults, age 18 and older, using a combination of landline and cellular telephones. Interviews were conducted in English or Spanish. The sample margin of error is plus or minus 2.5 percentage points for the general population and plus or minus 2.9 percentage points for internet users (n=2,065). Among internet users, 78% say that they at least occasionally conduct product research and 32% report that they have posted online product comments.

 

(Source: Pew Internet Research)

Full story

Pew Internet Research

Tuesday, October 05, 2010 11:57:45 AM (W. Europe Standard Time, UTC+01:00)  #     | 

500 million users worldwide and still growing, Facebook is now ubiquitous. Because of its popularity, minors have jumped onto the social media bandwagon, too, and they use networking the same way adults do--to share pictures, connect with friends, organize events, and play social games. And that can be a problem.

For the most part, Facebook provides a fun and safe way for users of all ages to communicate with their pals. But because kids and teens are, well, kids and teens, they're the ones most at risk of falling victim to the dangers of Facebook. With a bit of strategic parental guidance, you can educate your kids about the potential hazards of social media and give them the tools they need to protect themselves from online predators, guard their personal information, preserve their online reputation, and avoid suspicious downloads that could harm your PC.

 

(Source: PC World)

Full story

PC World

Tuesday, October 05, 2010 11:42:04 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, September 23, 2010

Students awaiting loans and grants should watch out for scam emails asking for bank details, Student Finance England warns Students were today warned to beware of scam emails purporting to be about loans and grants, after it emerged that 50 phishing websites targeting young people have been shut down during the last year.

Hundreds of thousands of people are starting university in the coming weeks, and Student Finance England, which processes English students' loans and grants, today urged students to "remain vigilant" and not disclose any personal or bank details in response to email requests that look like they are from either itself or its parent company, the Student Loans Company. Student Finance England expects to make payments to more than 600,000 students this week, and fraudsters are taking advantage of the timing to target students who are waiting for money to arrive. Heather Laing, its fraud manager, said: "Students are likely to receive a great deal of correspondence from Student Finance England at this time, with payment schedule letters or letters requesting further information coming through the door. Some students may fall victim to an email request that looks to be from Student Finance England or the Student Loans Company asking for confirmation of bank details. However, we will never ask students to confirm their bank details via email. If they do receive such a request, they should forward it on to us to investigate."

 

(Source: Guardian)

Full story

Guardian

Thursday, September 23, 2010 3:23:26 PM (W. Europe Standard Time, UTC+01:00)  #     | 

For the 10th eLearning Awards, European Schoolnet and ENISA, the European Network and Information Security Agency, announce a new prize category called "Teaching online safety and citizenship".

The rapid spread of internet use among young people is making it essential to address eSafety and ePrivacy, in order to protect young people from online risks and threats and to prepare them to use digital technologies in a secure and responsible way. As a major European actor for eSafety and ePrivacy, ENISA highly encourages all teachers to address these issues with their young students. “Young people and children are today amongst the biggest user groups of online technologies in Europe. It is important to equip them with the skills and knowledge to stay safe online,” said Dr Udo Helmbrecht, Executive Director of ENISA.

 

(Source: ENISA)

Full story

ENISA

Thursday, September 23, 2010 3:06:09 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, September 21, 2010

Harrisburg University has banned these social media sites, as well as MySpace and AOL Instant Messenger, for one week on the Pennsylvania campus, starting September 13.

The ban is not because of any security or privacy issue. Rather, it is an experiment to make students and faculty members think about the significance of social media and how best to benefit from this channel in its absence. "We're not trying to stop all access to these sites," says Charles Palmer, executive director of the Center for Advanced Entertainment and Learning Technologies. "We're trying to enhance people's ability to reflect on how technology impacts their daily lives and really generate valuable conversations." According to Jeffery Mechling, a prominent author and lecturer at the Harvard Kennedy School, "People depend a lot on those they trust. Making those connections easier is powerful, as social media have demonstrated. But this is a new phenomenon, so studying and understanding better is valuable."

 

(Source: Bank Info Security)

Full story

Bank Info Security

Tuesday, September 21, 2010 4:42:46 PM (W. Europe Standard Time, UTC+01:00)  #     | 

In UK, ISPs must pay 25 per cent of the cost of implementing new anti-piracy measures, it has been announced. The process of identifying and informing broadband customers suspected of copyright infringement will be paid for partially by ISPs and copyright holders, who will pay the other 75 per cent.

The decision comes as the government attempts to thrash out the details of how some parts of the controversial Digital Economy Act will actually work in practice. Minister for Communications, Ed Vaizey, said: "Protecting our valuable creative industries, which have already suffered significant losses as a result of people sharing digital content without paying for it, is at the heart of these measures. "The Digital Economy Act serves to reduce online copyright infringement through a fair and robust process and at the same time provides breathing space to develop better business models for consumers who buy music, films and books online.

 

(Source: Webuser)

Full story

Webuser

Tuesday, September 21, 2010 3:25:52 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, September 20, 2010

The 2011 Global State of Information Security Survey is a worldwide security survey by PricewaterhouseCoopers, CIO Magazine and CSO Magazine. It was conducted online from February 19, 2010 to March 4, 2010. Readers of CIO and CSO Magazines and clients of PricewaterhouseCoopers from around the globe were invited via email to take the survey. The results discussed in this report are based on the responses of more than 12,840 CEOs, CFOs, CIOs, CSOs, vice presidents and directors of IT and information security from 135 countries. Thirty-seven percent of respondents were from Asia, 30% from Europe, 17% from North America, 14% from South America, and 2% from the Middle East and South Africa. For the main finadins please click here

 

(Source: Price Waterhouse Coopers)

Monday, September 20, 2010 12:59:31 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Germany is the first country to launch a large scale malware cleaning project backed by the government, Internet service providers and security companies.

The new Anti-Botnet Counseling Center (Anti-Botnet Beratungszentrum) is an organization dedicated to assisting German users with removing botnet infections from their computers. It was established with funding from the Federal Ministry of Interior and the technical assistance is provided by the Federal Office for Information Security (BSI). The initiative was announced late last year as a collaboration between the Federal Government and the German Internet Industry Association (eco).

 

(Source: Softpedia)

Full story

Softpedia

Monday, September 20, 2010 12:56:00 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, September 16, 2010

Sometimes it's a story of a grown woman who has chosen prostitution as a path to a better life. More often, it's a story of a woman being forced to sell her body by a pimp. And then there are the children, and the mothers that miss them.

"They told me to look on Craigslist and it almost blew my mind," the mother of one missing 12-year-old told CNN. "She was there with a wig on. She was there in a purple negligee. The same day the woman spoke to CNN, her daughter was rescued by police at a seedy hotel near Washington where she was being sold for sex. And she's not alone. The National Center for Missing and Exploited Children's website contains thousands of posters of missing children. Many are girls, classified as "endangered runaways," and the center says more than fifty of them have been pushed into the sex trade. But that's just a snapshot, a tiny indicator of the true scale of the problem.

 

(Source: CNN)

Full story

CNN

Thursday, September 16, 2010 4:57:07 PM (W. Europe Standard Time, UTC+01:00)  #     | 

An awkwardly-worded reply by Defence Secretary Liam Fox to questions in the House of Commons suggests that cuts in information security spending are not on the agenda for the Strategic Defence and Security Review (SDSR), which is due to report back in the Autumn. On the contrary, Britain is looking to boost its capabilities in the area. Cyber-security is an important element of the SDSR and has already had considerable consideration. Decisions on enhancing our capabilities will form part of the review, which we will announce to the House later this autumn.

Developing a military cyber-security policy should not be the responsibility of the Ministry of Defence alone, Fox added. Investing in better cyber-security will not be an option for the United Kingdom. What is being considered under the National Security Council as part of the SDSR is how that occurs. We will face increasing threats in cyberspace in the years ahead-the question is how we identify the weakest areas, which need to be looked at first, and how we develop the technologies so that, as the other technologies that might affect us continue to evolve, we are best protected.

 

(Source: The register)

Full story

The register

Thursday, September 16, 2010 12:42:52 PM (W. Europe Standard Time, UTC+01:00)  #     | 

The Millennium Development Goals (MDGs) are a set of targets intended to reduce global poverty and improve living standards by 2015. Specific goals target education, fighting disease and promoting gender equality. Access to communications technology is a part of one of the targets. With five years to go until the deadline to achieve the goals, progress remains uneven. Some countries have achieved many of the goals, while others - mostly in the developing world - may not realise any. Many development experts question how the goals will be achieved and how they will be paid for. Some even question whether the approach is necessary or helpful.

But Dr Toure said that he believed technologies such as broadband could be used to "accelerate" progress on the goals and help countries achieve them. "Access to broadband in an affordable manner is our greatest challenge," Dr Hamadoun Toure, secretary general of the International Telecommunications Union (ITU), told BBC News.

 

(Source: BBC)

Full story

BBC

Thursday, September 16, 2010 12:06:03 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, September 14, 2010

Make your password strong, with a unique jumble of letters, numbers and punctuation marks. But memorize it — never write it down. And, oh yes, change it every few months. These instructions are supposed to protect us. But they don’t.

Some computer security experts are advancing the heretical thought that passwords might not need to be “strong,” or changed constantly. They say onerous requirements for passwords have given us a false sense of protection against potential attacks. In fact, they say, we aren’t paying enough attention to more potent threats. Here’s one threat to keep you awake at night: Keylogging software, which is deposited on a PC by a virus, records all keystrokes — including the strongest passwords you can concoct — and then sends it surreptitiously to a remote location.

 

(Source: The New York Times)

Full story

The New York Times

Tuesday, September 14, 2010 4:10:59 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, September 13, 2010

ICT For Health Projects Exhibiting

27 September 2010 - 29 September 2010 Brussels, Belgium

The ICT for Health projects present at the ICT2010 conference. CD-Medics, Epilepsiae, HeartCycle, Hamam and Oldes will be exhibiting. Three eHealth related networking sessions will also take place on the following topics: Patient empowerment, EU-ASEAN Cooperation opportunities and Low-cost Imaging Technologies for Healthcare.

 

(Source: Europe's Information Society)

Full story

Europe's Information Society 

Monday, September 13, 2010 5:47:49 PM (W. Europe Standard Time, UTC+01:00)  #     | 

With its millions of users, the world’s most popular social network has become a perfect target for hackers exploiting such a dense concentration of potential victims. Apart from phishing attacks or spam, which are now easily recognized by many Internet users, hackers are employing new methods, which for the moment at least, are proving to be successful. What to do if your Facebook profile has been hacked

Step 1: Firstly, remove all permissions that have been given to the malicious application. This is a simple process: from Account > Application settings in the top-right corner of your Facebook profile. This ensures that the application will not continue to have access to your profile once the password is changed.

Step 2: Change the login password! To keep your identity safe, it is advisable to change your password and the user name (it’s a good idea to do this from time to time anyway). This is also easy: Go to Account > and Account Settings in the menu in the top left corner of your Facebook profile. It is also advisable to use strong passwords that cannot easily be guessed.

 

(Source: Panda Security)

Full story

Panda Security

Monday, September 13, 2010 5:45:33 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, September 10, 2010

Every week, hackers are creating 57,000 new Web addresses which they position and index on leading search engines in the hope that unwary users will click them by mistake. Those who do, will see their computers infected or any data they enter on these pages fall into the hands of criminals. To do this, they use an average of 375 company brands and names of private institutions from all over the world, all of them instantly recognizable.

eBay, Western Union and Visa top the rankings of the most frequently used keywords; followed by Amazon, Bank of America, Paypal and the US revenue service. This way, when users search for these names, a link to the malicious website will appear among the first results returned. When they visit these sites, one of two things will happen: either malware will be downloaded onto the user’s computer, with or without their knowledge, or the website spoofs the appearance of a genuine page, a bank say, and users will unwittingly enter their details which will fall into the hands of criminals.

 

(Source: Panda Security)

Full story

Panda Security

Friday, September 10, 2010 5:12:31 PM (W. Europe Standard Time, UTC+01:00)  #     | 

A booby-trapped e-mail that promises free sex movies is racking up victims around the world, warn security firms. Some variants of the Windows worm contain a link to PDF that a recipient has been told to expect. Those clicking on the link get neither movies nor documents but give the malware access to their entire Outlook address book. When installed, the worm sends copies of itself to every e-mail address it can find.

The malicious e-mail messages have a subject line saying "Here you have" and contain a weblink that looks like it connects to a PDF document. Instead it actually links to a website hosting the malware.

 

(Source: BBC)

Full story

BBC

Friday, September 10, 2010 5:08:26 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, September 09, 2010

While social media use has grown dramatically across all age groups, older users have been especially enthusiastic over the past year about embracing new networking tools. Social networking use among internet users ages 50 and older nearly doubled—from 22% in April 2009 to 42% in May 2010.

- Between April 2009 and May 2010, social networking use among internet users ages 50-64 grew by 88%--from 25% to 47%.

- During the same period, use among those ages 65 and older grew 100%--from 13% to 26%.

- By comparison, social networking use among users ages 18-29 grew by 13%—from 76% to 86%.

 

(Source: Pew Research Center)

Full story

Pew Research Center

Thursday, September 09, 2010 4:38:41 PM (W. Europe Standard Time, UTC+01:00)  #     | 

The personal details of thousands of football fans who bought World Cup tickets from official FIFA outlets have been stolen and sold for up to £500,000. Investigators are now trying to establish who purchased the information, which includes the passport details and dates of birth of up to 250,000 supporters, amid concerns it could have fallen into the hands of criminal gangs or even terrorist groups. The massive data breach, which leaves fans open to identity theft and fraud, is now the subject of a criminal investigation. It has been alleged that an employee of one ticketing agency may have been offering the information for sale. The stolen database is understood to have been compiled by FIFA, football’s world governing body, in the run-up to the 2006 World Cup in Germany.

 

(Source: Daily Mail)

Full story

Daily Mail

Thursday, September 09, 2010 4:32:48 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, July 06, 2010

The Safer Internet Forum has been organized by the Safer Internet Programme as an annual conference on safer internet issues since 2004. It brings together representatives of industry, law enforcement authorities, child welfare organizations and policy makers. The past editions of the Safer Internet Forum have welcomed guests not only from Europe, but also from countries such as Australia, Brazil or the Russian Federation.

The 2010 edition of the Safer Internet Forum will take place in Luxembourg on the 21-22 October. This year the Safer Internet Forum will focus on the results of two major research projects funded by the Safer Internet Programme: EUKidsOnline II, which surveyed children and parents in 25 European countries about internet use, and European Online Grooming Project, the first European research project that studies the characteristics and behaviour of sexual offenders who have used the internet to groom young people.

 

(Source: Europe's Information Society)

Full story

Europe's Information Society

Tuesday, July 06, 2010 10:57:02 AM (W. Europe Standard Time, UTC+01:00)  #     | 

A new targeted malware attack is threatening UK bank customers. Security firm Trusteer said that it has spotted a malware attack that compromises user credentials by creating a fake bank log-in page and then uses those credentials to perform an "authorised" monetary transfer. The attack is being spread through multiple infection methods, including web-based exploits and spam email attachments. Rather than aim to infect numerous systems around the world, however, the company said that the attack is specifically targeting the UK and focusing on very few banks at a time, anywhere from three to seven in a single run.

The UK is not the first country to be targeted for such attacks. Trusteer has spotted similar operations in South Africa and Germany.

 

(Source: v3.co.uk)

Full story

v3.co.uk

Tuesday, July 06, 2010 10:05:48 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, July 01, 2010

Americans use a range of approaches to keep informed about what is happening in their communities and online activities have been added to the mix. Face-to-face encounters and phone calls remain the most frequent methods of interaction with neighbors. At the same time, internet tools are gaining ground in community-oriented communications. In a poll conducted at the end of last year, we asked about online connections to communities and neighbors and found that in the twelve months preceding our survey:

- 22% of all adults (representing 28% of internet users) signed up to receive alerts about local issues (such as traffic, school events, weather warnings or crime alerts) via email or text messaging.

- 20% of all adults (27% of internet users) used digital tools to talk to their neighbors and keep informed about community issues.

 

(Source: Pew Research Center)

Full story

Pew Research Center

Thursday, July 01, 2010 3:37:43 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Finland has become the first country in the world to make broadband a legal right for every citizen. From 1 July every Finn will have the right to access to a 1Mbps (megabit per second) broadband connection. Finland has vowed to connect everyone to a 100Mbps connection by 2015.

Finland's communication minister Suvi Linden explained the thinking behind the legislation: "We considered the role of the internet in Finns everyday life. Internet services are no longer just for entertainment. "Finland has worked hard to develop an information society and a couple of years ago we realised not everyone had access," she said. It is believed up to 96% of the population are already online and that only about 4,000 homes still need connecting to comply with the law.

 

(Source: BBC)

Full story

BBC

Thursday, July 01, 2010 3:30:20 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, June 17, 2010

New Zealand has joined a global taskforce to fight online child exploitation. Police Superintendent Win Van Der Velde today signed an agreement with the Virtual Global Taskforce (VGT) board in Rome. VGT is made up of international law enforcement agencies, and Deputy Commissioner Rob Pope said joining strengthened an already firm resolve to tackle the online abuse of children. Police will collaborate with VGT through its Online Child Abuse Exploitation Squad (OCEANZ). VGT is chaired by the Australian Federal Police.

 

(Source: New Zealand Herald)

Full story

New Zealand Herald

Thursday, June 17, 2010 4:35:02 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Experts from nearly 40 countries gathered in the Estonian capital Tallinn to discuss the latest issues in the fight against virtual attackers. Estonian President Toomas Hendrik Ilves opened the conference with a stark warning about the seriousness of cybercrime. "Our critical infrastructure, electricity grids, transportation networks and mobile phone networks are so enmeshed and tied to the internet that any open society is open to complete and utter failure," he said. "There are no smoking guns, no foot or fingerprints in virtual reality," Estonia's Minister of Defence Jaak Aviksoo added.

Skilled hackers at the conference said malware designed to be used in attacks could be purchased for a few hundred dollars online, or even downloaded for free.

 

(Source: BBC)

Full story

BBC

Thursday, June 17, 2010 4:31:24 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, June 16, 2010

Police have arrested 178 people in Europe and the United States suspected of cloning credit cards in an international scam worth over 20 million euros ($24.52 million), Spanish police said on Tuesday. Police in fourteen countries participated a two-year investigation, initiated in Spain where police have discovered 120,000 stolen credit card numbers and 5,000 cloned cards, arrested 76 people and dismantled six cloning labs. The raids were made primarily in Romania, France, Italy, Germany, Ireland and the United States, with arrests also made in Australia, Sweden, Greece, Finland and Hungary.

 

(Source: Reuters)

Full story

Reuters

Wednesday, June 16, 2010 5:02:10 PM (W. Europe Standard Time, UTC+01:00)  #     | 

The sentence was announced by United States Attorney for the District of Maryland Rod J. Rosenstein, Special Agent in Charge Richard A. McFeely of the Federal Bureau of Investigation; Chief James W. Johnson of the Baltimore County Police Department; and Baltimore County State’s Attorney Scott Shellenberger.

This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by United States Attorneys’ Offices and the Criminal Division's Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the internet, as well as to identify and rescue victims.

 

(Source: Baltimore FBI)

Full story

Baltimore FBI

Wednesday, June 16, 2010 4:59:56 PM (W. Europe Standard Time, UTC+01:00)  #     |