In response to a report in the Wall Street Journal, the National Security Agency revealed some information about its plans for “Perfect Citizen,” which it described as a research and engineering effort around vulnerability assessment and capabilities development. The National Security Agency revealed some information about the nature of its…
Articles Posted in Cybersecurity
Cyber-Security Insurance
Many Companies Continue to Ignore the Issue (Pittsburgh Post-Gazette, 22 June 2010) – After a year of high-tech breaches at some of the nation’s biggest companies, a provision in a Senate bill calls on the White House to encourage a market for cybersecurity insurance to protect businesses from debilitating costs…
AT&T Discloses Breach of iPad Owner Data
AT&T Inc. acknowledged Wednesday that a security hole in its website had exposed iPad users’ email addresses, a breach that highlights how corporations still have problems protecting private information. A small group of computer experts that calls itself Goatse Security claimed responsibility for the intrusion, saying the group had exploited…
The FTC Supports Increased Security in the “Cloud” for the FCC’s Broadband Plan
The Federal Trade Commission (FTC) recently filed a series of comment letters with the Federal Communications Commission (FCC) supporting that agency’s consideration of privacy and data security in the development of its Broadband Plan. The first of these letters,[1] dated December 9, 2009, highlights the extent to which federal agencies,…
Google to share cyber-attack data
WASHINGTON – Internet search firm Google Inc. is finalizing a deal that would let the U.S. National Security Agency help it investigate a corporate espionage attack that may have originated in China, the Washington Post reported yesterday. The aim of the investigation is to better defend Google, the world’s largest…
Google May Leave Chinese Market
The ongoing conflict between Google and China escalated earlier this month as Google announced it had discovered that the hacking of its servers had originated from the Chinese government. The hacking code used was traced to China’s territory, but not to the Chinese government, which, not surprisingly, denies any connection…
Twitter resets passwords after phishing attack
Twitter reset passwords for an unknown number of users on Tuesday whose accounts appeared to have been compromised via phishing. “As part of Twitter’s ongoing security efforts, we reset passwords for a small number of accounts that we believe may have been compromised offsite,” the company said in a statement.…
Internet pirates find ‘bulletproof’ havens for illegal file sharing
Internet pirates are moving away from safe havens such as Sweden to new territories that include China and Ukraine, as they try to avoid prosecution for illegal file sharing, according to experts. For several years, piracy groups that run services allowing music, video and software to be illegally shared online…
Google to end China censorship after e-mail breach
SAN FRANCISCO (AP) – Google Inc. will stop censoring its search results in China and may pull out of the country completely after discovering that computer hackers had tricked human-rights activists into exposing their e-mail accounts to outsiders. The change of heart announced Tuesday heralds a major shift for the…
Changes to Facebook User Privacy Settings
Facebook Privacy Changes Claimed as Unfair and Deceptive On December 17, 2009, the Electronic Privacy Information Center (EPIC) petitioned the Federal Trade Commission claiming that changes to Facebook user privacy settings constituted an unfair and deceptive practice. In early November and December, 2009, Facebook changed the process by which users…