Rosinstrument.com: Internet censorship, security and privacy news tracking
RSS 2.0

Internet censorship, security and privacy news tracking
by Rosinstrument.com, last modified date: Friday, 20-Jan-2017 17:11:32 EST




Fri Jan 20 22:09, 2017 GMT
Last year Netflix launched an aggressive campaign to prevent its users from bypassing geo-blockades through VPN services. The crackdown has met fierce resistance around the world but is still in effect. Today we review the current state of affairs with some prominent VPN providers, many of whom voice concerns about the ongoing blocking efforts. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Netflix VPN Crackdown, A Year of Frustrations
Fri Jan 20 21:15, 2017 GMT
Today we bring you the next episode of the Steal This Show podcast, discussing renegade media and the latest file-sharing and copyright news. In this episode, we talk to Jeremy Kauffman, founder and CEO of the blockchain-based, P2P content platform LBRY. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Steal This Show S02E09: The Information Apocalypse
Fri Jan 20 15:39, 2017 GMT
A few hours ago Kim Dotcom was gearing up to make an important announcement about a new version of the defunct Megaupload service. However, with minutes left to go, the Megaupload 2.0 plans hit an "expected" roadblock, which means that the wait continues. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Megaupload 2.0 News Delayed By ‘Expected’ Roadblock
Fri Jan 20 13:30, 2017 GMT
MongoDB Hacks Spreading Fast In the past few weeks, researchers have been monitoring the steady rise of hacked MongoDB installations, now surpassing over 28,000 individual systems. While the attacks started with ransoming back... read more The post Cyber News Rundown: Edition 1/19/17 appeared first on Webroot Threat Blog .
Cyber News Rundown: Edition 1/19/17
Fri Jan 20 12:20, 2017 GMT
The Hill (blog) FCC selections matter for keeping the Open Internet The Hill (blog) We should support steps that help keep the Internet “open,” and we applaud rules that protect individual privacy . Democratic FCC Chairman Tom Wheeler made a pathway to protect the Open Internet , but it's far from perfect. Let me be clear though ... and more »
FCC selections matter for keeping the Open Internet - The Hill (blog)
Fri Jan 20 10:14, 2017 GMT
The trend towards ramping up the regulation of the media has worrying implications. The post Dunja Mijatović: Resisting the urge to over regulate the media appeared first on Index on Censorship .
Dunja Mijatović: Resisting the urge to over regulate the media
Fri Jan 20 09:07, 2017 GMT
The censoring of an artwork because of its viewpoint is a deeply disturbing and divisive act in an already polarized nation The post Groups condemn removal of police protest painting from US Capitol appeared first on Index on Censorship .
Groups condemn removal of police protest painting from US Capitol
Thu Jan 19 16:21, 2017 GMT
The post #FashionRules: Fashion is a crucial element of free expression appeared first on Index on Censorship .
#FashionRules: Fashion is a crucial element of free expression
Thu Jan 19 13:31, 2017 GMT
A coalition of more than 70 civil rights groups urges Facebook to be clearer about content it removes.
Facebook urged to be more transparent over 'censorship'
Thu Jan 19 11:06, 2017 GMT
Police recorded an 8% rise in all offences in England and Wales as a survey shows figures in cybercrime and fraud.
New figures reveal scale of cybercrime
Thu Jan 19 01:30, 2017 GMT
In an open letter, almost 80 advocacy groups say the social network needs to be more transparent about its censorship decisions.
ACLU accuses Facebook of racial bias in hate speech takedowns - CNET
Wed Jan 18 17:48, 2017 GMT
On September 22, 2016, this site was forced offline for nearly four days after it was hit with “Mirai,” a malware strain that enslaves poorly secured Internet of Things (IoT) devices like wireless routers and security cameras into a botnet for use in large cyberattacks. Roughly a week after that assault, the individual(s) who launched that attack -- using the name “Anna Senpai” -- released the source code for Mirai, spawning dozens of copycat attack armies online. After months of digging, KrebsOnSecurity is now confident to have uncovered Anna Senpai’s real-life identity, and the identity of at least one co-conspirator who helped to write and modify the malware.
Who is Anna-Senpai, the Mirai Worm Author?
Wed Jan 18 18:33, 2017 GMT
WASHINGTON (Reuters) - Nearly 80 rights groups on Wednesday accused Facebook of "racially biased censorship" and failing to be more transparent about its removal policies and cooperation with law enforcement, adding to criticism the company has faced in recent months over its management of content on its network of 1.8 billion users.
Facebook dismissive of censorship, abuse concerns, rights groups allege
Wed Jan 18 12:53, 2017 GMT
Daily Mail Fraudster calls one of Britain's leading internet experts Daily Mail This is the toe-curling moment two fraudsters tried - and failed - to rip off one of Britain's top internet security experts. Matt Horan turned the tables on the cold callers, who appear to work for one of several Asian call centres set up to pester ...
Fraudster calls one of Britain's leading internet experts - Daily Mail
Wed Jan 18 12:00, 2017 GMT
A site that chronicles animals versus the power grid makes a good point about cyberwar hype, but an attack would still be serious business. The post Squirrels Keep Menacing the Power Grid. But at Least It's Not the Russians appeared first on WIRED .
Squirrels Keep Menacing the Power Grid. But at Least It’s Not the Russians
Wed Jan 18 13:10, 2017 GMT
Imprisoned journalists make headlines, but the Turkish government has a more insidious method for controlling the media The post Turkey: Pro-government newspapers rewarded with state-sponsored advertising appeared first on Index on Censorship .
Turkey: Pro-government newspapers rewarded with state-sponsored advertising
Wed Jan 18 11:22, 2017 GMT
KIEV/MILAN (Reuters) - A power blackout in Ukraine's capital Kiev last month was caused by a cyber attack and investigators are trying to trace other potentially infected computers and establish the source of the breach, utility Ukrenergo told Reuters on Wednesday.
Ukraine's power outage was a cyber attack: Ukrenergo
Tue Jan 17 22:51, 2017 GMT
NEW YORK (Reuters) - A Florida man pleaded guilty on Tuesday to charges stemming from his employment with an unlicensed bitcoin exchange that prosecutors say was owned by an Israeli who oversaw a massive scheme to hack companies including JPMorgan Chase & Co.
Bitcoin exchange employee pleads guilty in U.S. case tied to hacking
Tue Jan 17 12:57, 2017 GMT
It's squirrels, not cyber-attacks, that pose the real threat to critical infrastructure systems, says one security expert.
Squirrel 'threat' to critical infrastructure
Mon Jan 16 10:33, 2017 GMT
The post Mapping Media Freedom: Five incidents to watch appeared first on Index on Censorship .
Mapping Media Freedom: Five incidents to watch
Sun Jan 15 13:53, 2017 GMT
MOSCOW (Reuters) - Russia is facing increased cyber attacks from abroad, a senior security official was quoted on Sunday as saying, responding to Western accusations that Moscow is aggressively targeting information networks in the United States and Europe.
Russia says facing increased cyber attacks from abroad
Sun Jan 15 10:40, 2017 GMT
During the next few weeks, ISPs in the UK will begin sending out warnings to subscribers who use BitTorrent to share pirated content. It's a curious situation. Since every major torrent site and hundreds of others are already blocked by those very same ISPs, few people should even have access to torrents. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Piracy Notices? There Shouldn’t Be Many UK Torrent Users Left to Warn
Sat Jan 14 01:16, 2017 GMT
HRW Slams Internet Censorship Laws in Southeast Asia Latin American Herald Tribune Saying governments in the region perceive the internet as a threat, he added that several new cyber-crime laws are directed at keeping people compliant so that governing elites can continue to reap the social and economic benefits of the status quo.
HRW Slams Internet Censorship Laws in Southeast Asia - Latin American Herald Tribune
Fri Jan 13 20:31, 2017 GMT
A Guardian report says WhatsApp and its parent Facebook could intercept user messages. Security experts aren't sure it's really a problem.
WhatsApp again dogged by privacy questions, but there's a fix - CNET
Fri Jan 13 03:21, 2017 GMT
KGO-TV Internet security expert suggests lying when asked for personal information online KGO-TV If you sign up online for a membership, email address, or nearly anything you'll be asked for personal information, but one security expert has some advice for those situations - lie. Privacy Expert Adam Levin says that to stay secure in the digital ...
Internet security expert suggests lying when asked for personal information online - KGO-TV
Fri Jan 13 20:09, 2017 GMT
A Guardian report says WhatsApp and its parent Facebook could intercept user messages. Security experts aren't sure it's really a problem.
Privacy questions dog WhatsApp again, but latest issue has a fix - CNET
Fri Jan 13 18:38, 2017 GMT
The Guardian view on internet privacy : technology can't fix it The Guardian In fact, the preservation of personal privacy and collective security online is a political and social task as much as it is one for the very few experts who understand the ramifications of mathematical magics like public key cryptography ...
The Guardian view on internet privacy: technology can't fix it - The Guardian
Fri Jan 13 11:38, 2017 GMT
Information about the customers of Cellebrite, an Israeli firm that markets hacking tools, is stolen in a cyber-attack.
Phone-cracking firm Cellebrite hacked
Fri Jan 13 09:22, 2017 GMT
The MPA recently filed a complaint in Norway seeking to expand a blockade of The Pirate Bay, ExtraTorrent and several other sites that was put in place during 2015. The Hollywood group aimed to add seven new ISPs and several additional sites to the country's blocklist. It has now achieved its goals but critics say that holding ISPs responsible for copyright infringement is unfair. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Hollywood Lawsuit Expands Pirate Bay & ExtraTorrent Web Blockade
Thu Jan 12 16:04, 2017 GMT
BERLIN (Reuters) - Nations in Europe, where Germany and France this year hold elections, are erecting defenses to counter possible Russian cyber attacks and disinformation to sway Western politics, but intelligence experts say this might be too little and too late.
Europe erects defenses to counter Russia's information war
Thu Jan 12 14:55, 2017 GMT
Global human rights organisations strongly condemn the abduction and torture of Azerbaijani journalist Mehman Huseynov The post Rights groups demand justice for journalist Mehman Huseynov tortured in Azerbaijan appeared first on Index on Censorship .
Rights groups demand justice for journalist Mehman Huseynov tortured in Azerbaijan
Thu Jan 12 13:58, 2017 GMT
RTI Presents "The Inside Story: Leveraging the IIC's Industrial Internet Security Framework" Complimentary Webinar Intelligent Aerospace The new framework focuses on safety, reliability, resilience, security and privacy , and is designed to help IT and OT professionals, system architects and industrial engineers define risks, assessments and threats to proactively mitigate security ... and more »
RTI Presents "The Inside Story: Leveraging the IIC's Industrial Internet Security Framework" Complimentary Webinar - Intelligent Aerospace
Thu Jan 12 13:25, 2017 GMT
LONDON (Reuters) - Shipping companies grappling with the threat of cyber attacks on vessels are finding insurance policies often fall short, officials involved in both industries say, a risk that could feed through into global prices.
Insurance gaps leave shipping exposed to growing cyber threats
Thu Jan 12 09:10, 2017 GMT
The co-chief of movie studio Village Roadshow is warning of a new wave of site blocking efforts in Australia. Graham Burke says he has a long list of sites to block when the court resumes in February. Worryingly, he has also renewed his promise to sue pirate site users. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Movie Studios Prepare New “Big Time” Wave of Aussie Site Blocks
Thu Jan 12 03:22, 2017 GMT
The Inquisitr Bella Thorne: 'Nearly Nude' Snaps, Internet Privacy , & Ex-Boyfriends The Inquisitr Bella Thorne is calling out the paparazzi for their near-harassment levels of photo coverage, and she's talking about beating the paps at their own game with her use of social media outlets like Snapchat and Instagram. Do you follow Thorne's posts online? and more »
Bella Thorne: 'Nearly Nude' Snaps, Internet Privacy, & Ex-Boyfriends - The Inquisitr
Wed Jan 11 15:27, 2017 GMT
Christian Science Monitor Will this EU privacy proposal lead to a more trustworthy internet or a more annoying one? Christian Science Monitor The European Commission, the executive arm of the 28-nation bloc, submitted the proposed legislation on Tuesday, dubbing it the Regulation on Privacy and Electronic Communications. The European Parliament and member states must approve it before it ... European Commission's telco privacy laws may soon also cover internet firms Digital Trends Telecoms firms and internet services like WhatsApp face tougher new privacy rules EurActiv Commission proposes high level of privacy rules for all electronic communications EU News The Guardian  - EU News all 75 news articles »
Will this EU privacy proposal lead to a more trustworthy internet or a more annoying one? - Christian Science Monitor
Wed Jan 11 12:08, 2017 GMT
I am a Turkish activist, a human rights defender, a dissident, and currently I feel like a lab rat trapped in a maze, trying to find an exit to freedom. The post Turkey: “The worst time is when the ruler and the evil of the people are united” appeared first on Index on Censorship .
Turkey: “The worst time is when the ruler and the evil of the people are united”
Wed Jan 11 12:04, 2017 GMT
A power cut that hit part of Kiev is judged a cyber-attack by researchers investigating the incident.
Ukraine power cut 'was cyber-attack'
Wed Jan 11 06:58, 2017 GMT
Sputnik International See No Evil: Italy's Leaders to Use Internet Censorship as 'Trojan Horse' Sputnik International The Italian government recently called for the introduction of Internet censorship in their country as political elites struggle to accept last year's historic events, including Brexit and the failure of the Italian referendum, according to independent ...
See No Evil: Italy's Leaders to Use Internet Censorship as 'Trojan Horse' - Sputnik International
Tue Jan 10 23:03, 2017 GMT
Christian Science Monitor Will an EU privacy proposal lead to a more trustworthy or annoying internet ? Christian Science Monitor The European Commission, the executive arm of the 28-nation bloc, submitted the proposed legislation on Tuesday, dubbing it the Regulation on Privacy and Electronic Communications. The European Parliament and member states must approve it before it ... European Commission's telco privacy laws may soon also cover internet firms Digital Trends Telecoms firms and internet services like WhatsApp face tougher new privacy rules EurActiv EU privacy proposal could dent Facebook, Gmail ad revenue Reuters EU News  - The Guardian  - Novinite.com all 54 news articles »
Will an EU privacy proposal lead to a more trustworthy or annoying internet? - Christian Science Monitor
Tue Jan 10 19:22, 2017 GMT
The government agency releases 100 pages of documents on how it broke into the smartphone, but censors the most important information.
FBI docs tell how it hacked San Bernardino shooter's iPhone, kind of - CNET
Tue Jan 10 18:06, 2017 GMT
Tens of thousands of personal and possibly proprietary databases that were left accessible to the public online have just been wiped from the Internet, replaced with ransom notes demanding payment for the return of the files. Adding insult to injury, it appears that virtually none of the victims who have paid the ransom have gotten their files back because multiple fraudsters are now wise to the extortion attempts and are competing to replace each other's ransom notes.
Extortionists Wipe Thousands of Databases, Victims Who Pay Up Get Stiffed
Tue Jan 10 12:29, 2017 GMT
Surely David Cameron will be remembered as one of the most ham-fisted prime ministers in British history. For party political (ie, personal) reasons he staged the European Union referendum. After making a hash of the remain campaign, he watched more than half the population defy him by opting for Brexit. Then, with the nation divided, […] The post Section 40 – David Cameron’s ticking time-bomb under the press (The Guardian) appeared first on Index on Censorship .
Section 40 – David Cameron’s ticking time-bomb under the press (The Guardian)
Tue Jan 10 11:45, 2017 GMT
Could you be landed with a crippling bill for telling the truth? It’s hard to believe it could happen in a free country but there’s a serious risk that it could happen here. Read the full article The post Time running out to help stop new law on the media (News & Star) appeared first on Index on Censorship .
Time running out to help stop new law on the media (News & Star)
Tue Jan 10 10:21, 2017 GMT
The press industry in Britain is under threat like never before. The future of journalism in the UK could be effectively killed off if controversial legislation is enacted. Read the full article The post The stories which would NOT have been told under controversial new press law (Birmingham Mail) appeared first on Index on Censorship .
The stories which would NOT have been told under controversial new press law (Birmingham Mail)
Mon Jan 9 23:59, 2017 GMT
A proposed piece of legislation threatens to bring press freedom to a halt – and news organisations are right to take a stand in defence of true democracy, Tim Crook says. Read the full article The post Why Fleet Street is right to fight Government-backed regulation of the press (Independent) appeared first on Index on Censorship .
Why Fleet Street is right to fight Government-backed regulation of the press (Independent)
Mon Jan 9 18:13, 2017 GMT
Anti-censorship groups have warned new press gagging laws will be a “gift to the corrupt”. Read the full article The post Press gagging laws will be a ‘gift to the corrupt’ as deadline looms (Mirror) appeared first on Index on Censorship .
Press gagging laws will be a ‘gift to the corrupt’ as deadline looms (Mirror)
Mon Jan 9 14:47, 2017 GMT
Several major literature and anti-censorship organizations have signed a statement defending publisher Simon and Schuster’s “right to publish” MILO’s upcoming book Dangerous, which has seen many others threaten to boycott the company. Read the full article The post Free Speech Groups, Literature Associations, English Teachers Declare Support for MILO Book Publisher (Breitbart News) appeared first on Index on Censorship .
Free Speech Groups, Literature Associations, English Teachers Declare Support for MILO Book Publisher (Breitbart News)
Tue Jan 10 14:02, 2017 GMT
The post Index on Censorship magazine: Talking fashion and freedom appeared first on Index on Censorship .
Index on Censorship magazine: Talking fashion and freedom
Tue Jan 10 08:42, 2017 GMT
HONG KONG (Reuters) - Nintendo's hit smartphone app, Pokemon Go, and other augmented reality games are unlikely to be rolled out in China any time soon, after the state censor said it would not license them until potential security risks had been evaluated.
China not to license Pokemon Go, similar games as it weighs security risks
Sat Jan 7 13:20, 2017 GMT
Q&A: FTC's Edith Ramirez on internet security, agency under Trump - Chicago Daily Herald. FTC Charges D-Link Put Consumers' Privacy at Risk Due to the Inadequate Security of Its Computer Routers and ...
Q&A: FTC's Edith Ramirez on internet security, agency under Trump - Chicago Daily Herald
Sun Jan 8 12:03, 2017 GMT
France warns hackers are attacking its defence systems and this year's election could be a target.
France thwarts 24,000 cyber-attacks against defence targets
Mon Jan 9 14:24, 2017 GMT
Rolling Back Obama's Internet Privacy Rules Independent Women's Forum (blog) American consumers and internet providers may get some relief from cumbersome online privacy -related opt-ins and red tape passed last fall by the Obama Administration. An association of internet providers has filed a petition to have onerous and ... and more »
Rolling Back Obama's Internet Privacy Rules - Independent Women's Forum (blog)
Mon Jan 9 11:31, 2017 GMT
LONDON (Reuters) - The British government said on Monday it is launching a national inquiry into cyber security to assess the extent to which the UK is protected from an ever-increasing tide of attacks worldwide.
After U.S. intel report on Putin, British government launches cyber security review
Mon Jan 9 12:06, 2017 GMT
Local newspapers have an extremely important role in shining a light on corruption, danger and crime in their communities. The post Section 40: Local newspapers respond to “dangerous lunacy” appeared first on Index on Censorship .
Section 40: Local newspapers respond to “dangerous lunacy”
Mon Jan 9 09:33, 2017 GMT
The post Portugal: Low wages and job insecurity threaten media freedom appeared first on Index on Censorship .
Portugal: Low wages and job insecurity threaten media freedom
Sun Jan 8 16:19, 2017 GMT
Russian President Vladimir Putin directed a massive propaganda and cyber attack operation aimed at discrediting Hillary Clinton and getting Donald Trump elected, the top U.S. intelligence agencies said in a remarkable yet unshocking report released on Friday.
DNI: Putin Led Cyber, Propaganda Effort to Elect Trump, Denigrate Clinton
Sun Jan 8 15:10, 2017 GMT
(Reuters) - President-elect Donald Trump accepts the U.S. intelligence community's conclusion that Russia engaged in cyberattacks aimed at disrupting the U.S. elections, his incoming chief of staff Reince Priebus said on Sunday, adding that "actions may be taken" in response.
Trump accepts U.S. intelligence on Russia hacking: chief of staff
Sat Jan 7 17:10, 2017 GMT
High Speed Internet Security And Safety ISBuzz News While the primary drivers for updating the HTTP protocol were improved performance and support for richer web applications, the inclusion of default security requirements promises a great benefit to the privacy and integrity of Internet traffic. Among ...
High Speed Internet Security And Safety - ISBuzz News
Sat Jan 7 13:50, 2017 GMT
Ask any pirate if site-blocking works and the answer will probably be a resounding "no." Ask them if ISP warnings or DMCA notices have much of an effect and it's likely they'll give the same answer. However, a range of weak measures has a cumulative effect and the ability to make piracy frustrating. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
A Bunch of Weak Anti-Piracy Measures Are Still a Pest to Pirates
Sat Jan 7 13:26, 2017 GMT
Cable companies pushing to repeal internet privacy rules - Chicago Daily Herald. WASHINGTON -- Some of America's biggest cable companies are asking the government to roll back a landmark set of privacy regulations it approved last fall -- kicking off an effort by the industry and its allies to dismantle key internet policies of the ...
Cable companies pushing to repeal internet privacy rules - Chicago Daily Herald
Fri Jan 6 10:03, 2017 GMT
The malware asks for 222 Bitcoin but will not honor promises to decrypt files after payment is made.
$247,000 KillDisk ransomware demands a fortune, forgets to unlock files
Fri Jan 6 19:54, 2017 GMT
WASHINGTON (Reuters) - President-elect Donald Trump said he had a "constructive" meeting with members of U.S. intelligence agencies on Friday and plans to appoint a team to give him a plan to combat cyber attacks within 90 days of taking office on Jan. 20.
Trump to order anti-hacking plan within 90 days of taking office: statement
Fri Jan 6 19:15, 2017 GMT
An Energy Department report seeks new powers to deal with attacks and other emergencies.
​US warns of 'imminent' cyberattack threat on electrical grid - CNET
Fri Jan 6 15:15, 2017 GMT
NEW YORK (Reuters) - Donald Trump's top aides said he would have an open mind on Friday when he is briefed on what U.S. intelligence agencies have concluded were Russian cyber attacks during the 2016 election campaign, despite rising tensions between the president-elect and the nation's spy agencies.
Trump's aides say president-elect open to Russian hack info
Fri Jan 6 13:20, 2017 GMT
The post Azerbaijan: Regime targets musician through his family appeared first on Index on Censorship .
Azerbaijan: Regime targets musician through his family
Fri Jan 6 12:00, 2017 GMT
A new kind of hedge fund bets that bitcoin is way more valuable if you don't think about it mainly as money. The post Bitcoin Will Never Be a Currency—It's Something Way Weirder appeared first on WIRED .
Bitcoin Will Never Be a Currency—It’s Something Way Weirder
Fri Jan 6 12:00, 2017 GMT
The Hill (blog) Lawmakers must clarify privacy protections for the Internet of Things The Hill (blog) If a victim, or the subject of an investigation, has a Nest security camera, can police subpoena the video files from Google? If a house has a smart thermometer, can police subpoena the temperature data to determine whether a suspect is ... Amendments ... and more »
Lawmakers must clarify privacy protections for the Internet of Things - The Hill (blog)
Fri Jan 6 11:20, 2017 GMT
Section 40 does not protect “ordinary” individuals as its advocates claim. It protects the rich and powerful and is a gift to the corrupt and conniving to silence investigative journalists – particularly media outfits that don’t have very deep pockets. The post What is Section 40 of the Crime and Courts Act 2013? appeared first on Index on Censorship .
What is Section 40 of the Crime and Courts Act 2013?
Fri Jan 6 10:29, 2017 GMT
The post Threats to boycott publishers undermine intellectual freedom and harm readers and writers appeared first on Index on Censorship .
Threats to boycott publishers undermine intellectual freedom and harm readers and writers
Fri Jan 6 10:08, 2017 GMT
On 7 January 2015, two gunmen entered the offices of Charlie Hebdo and murdered 12 people, including most of the senior editorial staff. The attack was in reprisal for the satirical magazine's publishing cartoons of the prophet Mohammed. The post Charlie Hebdo: Two years on appeared first on Index on Censorship .
Charlie Hebdo: Two years on
Thu Jan 5 21:31, 2017 GMT
Under Trump, Lobbyists Are Poised To Dismantle Internet Privacy ... Vocativ In October, the Federal Communications Commission (FCC) passed rules that prevent large telecommunications companies from profiting from customers' ... and more »
Under Trump, Lobbyists Are Poised To Dismantle Internet Privacy ... - Vocativ
Thu Jan 5 21:35, 2017 GMT
New York Law Journal (registration) Conflicting Needs of International Bankruptcy Cases and Internet Privacy New York Law Journal (registration) You have the right to not send that email, but if you do, anything you say can be used against you in a court of law. Business professionals do not need a Miranda warning to understand that their email correspondences can be subject to the discovery ... and more »
Conflicting Needs of International Bankruptcy Cases and Internet Privacy - New York Law Journal (registration)
Thu Jan 5 15:40, 2017 GMT
Campus Safety Magazine Internet Security and Privacy Advice for 2017 Campus Safety Magazine This is particularly dangerous for privacy , since lesser security features means easier backdoor access. When one device is compromised, the hacker can easily overtake the whole system of interconnected devices. Smart devices shipped out in 2017 may ... and more »
Internet Security and Privacy Advice for 2017 - Campus Safety Magazine
Thu Jan 5 11:54, 2017 GMT
CNBC Security concerns are rising in the age of the internet of things CNBC The internet of things, where ordinary physical objects become connected to the internet , will have a big impact on our home lives, but all of these connected devices could become a target for hackers and cybercriminals. Cybercrime is a huge problem ... and more »
Security concerns are rising in the age of the internet of things - CNBC
Thu Jan 5 13:03, 2017 GMT
UK schools are the latest victims of ransomware, according to the UK's national cybercrime centre.
UK schools targeted by web fraudsters
Thu Jan 5 08:50, 2017 GMT
Index award-winning human rights activist Nabeel Rajab’s pre-trial detention was renewed for a further 15 days by Bahrain's Public Prosecution on 5 January according to Nabeel’s lawyer. The post Bahrain renews detention of human rights activist Nabeel Rajab appeared first on Index on Censorship .
Bahrain renews detention of human rights activist Nabeel Rajab
Thu Jan 5 00:01, 2017 GMT
PYMNTS.com Internet Privacy Rules At Risk Amid Politics? PYMNTS.com In a world where corporate regulations are being targeted across most industries by the newly installed Republican Congress and the incoming new administration in the White House, the rumble may become a roar for Internet privacy regulations. ... of ... It's begun: Internet providers are pushing to repeal Obama-era privacy rules Washington Post Ad Groups Petition Consumer Internet Privacy Rules, Call Opt-In ... MediaPost Communications all 16 news articles »
Internet Privacy Rules At Risk Amid Politics? - PYMNTS.com
Wed Jan 4 19:40, 2017 GMT
The pope and Internet security : Putting tape over the camera Standard-Examiner To that group of privacy -conscious Internet users we can now add the pope, who has proven his social media chops but evidently has a knack for online security , as well. A photo spread Tuesday by Collin Anderson, a hacking researcher, showed Pope ... and more »
The pope and Internet security: Putting tape over the camera - Standard-Examiner
Wed Jan 4 18:33, 2017 GMT
Washington Post Why a years-old photo of the pope is suddenly making the rounds again Washington Post To that group of privacy -conscious Internet users we can now add the pope, who has proven his social media chops but evidently has a knack for online security , as well. A photo spread Tuesday by Collin Anderson, a hacking researcher, showed Pope ... and more »
Why a years-old photo of the pope is suddenly making the rounds again - Washington Post
Wed Jan 4 18:01, 2017 GMT
STLtoday.com Cable companies are pushing to repeal Obama-era Internet privacy rules STLtoday.com WASHINGTON • Some of America's biggest cable companies are asking the government to roll back a landmark set of privacy regulations it approved last fall — kicking off an effort by the industry and its allies to dismantle key Internet policies of the ... Ad Groups Petition Consumer Internet Privacy Rules, Call Opt-In Requirement 'Onerous' MediaPost Communications all 9 news articles »
Cable companies are pushing to repeal Obama-era Internet privacy rules - STLtoday.com
Wed Jan 4 17:56, 2017 GMT
One of the biggest cybersecurity stories of 2016 was the surge in online attacks caused by poorly-secured "Internet of Things" (IoT) devices such as Internet routers, security cameras, digital video recorders (DVRs) and smart appliances. Many readers here have commented with ideas about how to counter vulnerabilities caused by out-of-date software in IoT devices, so why not pitch your idea for money? Who knows, you could win up to $25,000 in a new contest put on by the U.S. Federal Trade Commission (FTC).
The FTC’s Internet of Things (IoT) Challenge
Wed Jan 4 16:37, 2017 GMT
Washington Post It's begun: Cable companies are pushing to repeal Obama-era Internet privacy rules Washington Post Some of America's biggest cable companies are asking the government to roll back a landmark set of privacy regulations it approved last fall — kicking off an effort by the industry and its allies to dismantle key Internet policies of the Obama years ... Ad Groups Petition Consumer Internet Privacy Rules, Call Opt-In Requirement 'Onerous' MediaPost Communications Telecom Lobbyists Trying To Overturn New Privacy Rules, Eventually Gut Net Neutrality Consumerist all 9 news articles »
It's begun: Cable companies are pushing to repeal Obama-era Internet privacy rules - Washington Post
Wed Jan 4 01:35, 2017 GMT
Over the past few weeks, I've been inundated with questions from readers asking why I haven't written much about two stories that have consumed the news media of late: The alleged Russian hacking attacks against the Democratic National Committee (DNC) and, more recently, the discovery of malware on a laptop at a Vermont power utility that has been attributed to Russian hacker groups. I've avoided covering these stories mainly because I don't have any original reporting to add to them, and because I generally avoid chasing the story of the day -- preferring instead to focus on producing original journalism on cybercrime and computer security.
The Download on the DNC Hack
Wed Jan 4 01:47, 2017 GMT
MediaPost Communications Ad Groups Petition Consumer Internet Privacy Rules, Call Opt-In Requirement 'Onerous' MediaPost Communications The major U.S. ad trade associations Tuesday evening jointly submitted a petition for to the Federal Communications Commission to reconsider its order mandating opt-in privacy requirements by Internet service providers. The petition, which was ... and more »
Ad Groups Petition Consumer Internet Privacy Rules, Call Opt-In Requirement 'Onerous' - MediaPost Communications
Tue Jan 3 21:04, 2017 GMT
A new cybersecurity regulatory regime will go into effect this year in New York – the world’s financial capital and home to many banking, insurance and financial services organizations. The new cybersecurity regulation, known as 23 NYCRR 500 , has grabbed the attention of impacted companies doing business in New York, and others who might be anticipating cybersecurity requirements in other jurisdictions and industries. New York Governor Andrew Cuomo announced the new "first-in-the-nation"  cybersecurity regulation in September 2016, saying it is necessary to "guarantee the financial services industry upholds its obligation to protect consumers and ensure that its systems are sufficiently constructed to prevent cyber-attacks to the fullest extent possible."  You may be wondering what the regulation says and how to comply. We put together this brief FAQ to help you understand whether and how this regulation affects your organization, what the regulation covers from a security standpoint, and what protections you should consider to meet compliance requirements. Although this doesn’t constitute legal advice, we hope this FAQ helps you begin the process of planning your next steps for compliance. What is 23 NYCRR 500? The new cybersecurity regulation issued by the New York State Department of Financial Services (DFS) is officially known as Part 500 of Title 23 of the Official Compilation of Codes, Rules and Regulations of the State of New York, or 23 NYCRR 500 for short. Who is covered? The DFS is the regulatory body that oversees financial services companies licensed by or operating in New York State . Organizations covered by the new cybersecurity regulation include banks and trust companies, insurance companies, mortgage lenders, investment companies, brokers and other financial services providers. There are some exemptions for some smaller organizations. When does it go into effect? The regulation took effect as of January 1, 2017. There is a 180-day grace period for companies to comply, therefore, covered entities must be in compliance by June 30, 2017. A further requirement to provide a Certification of Compliance to the DFS commences on January 15, 2018. What does the regulation require? The regulation includes a comprehensive list of requirements for protecting information systems from cybersecurity threats and unauthorized access of “non-public information.” Below is a partial list of some of the main requirements. Covered entities must: Implement a cybersecurity program with written policies and an audit trail Employ a Chief Information Officer and dedicated cybersecurity personnel Identify cyber risks and conduct penetration testing at least annually and vulnerability assessment at least quarterly Secure applications by ensuring the use of secure development practices for in-house developed applications, and implement procedures for assessing and testing the security of all externally developed applications Assess risk to non-public information and information systems accessible or held by third parties, and conduct third-party security assessments at least annually Provide and require all personnel attend regular cybersecurity awareness training Implement controls, including encryption, to protect non-public data in transit and at rest Establish an incident response plan, including notification of regulatory agencies How might you meet compliance? Strategic organizations understand that they cannot treat compliance as an end in itself, but as the outcome of an ongoing process. The Veracode Application Security Platform provides a variety of methods to assess application security, compliance and development team reporting, and secure development training. Veracode helps deliver continuous compliance by: Providing application security testing that integrates into your software development lifecycle Conducting regular discovery scans of the web applications in your domain, including temporary marketing sites, international domains and sites obtained via M&A Continuously monitoring your production web applications for vulnerabilities Providing virtual patching for your web application firewalls based on the security intelligence from your application assessments Below are some possible security solutions you should consider when assessing your risk and compliance requirements. Veracode's Application Security Platform can provide a secure audit trail of your compliance processes, including critical information such as application security scores; listings of all discovered flaws; and flaw status information (new, open, fixed, or re-opened). Summary data is also included for third-party assessments, including scores and top risk categories Veracode Static Analysis can ensure that your applications are not vulnerable to attack through exploits such as SQL injection and Cross-Site Scripting, preventing potential data loss, brand damage, and ransomware infections Veracode Static Analysis can help meet the requirement to protect non-public information by assessing your applications’ cryptographic code for known vulnerabilities and ensuring encryption is implemented correctly Veracode Vendor Application Security Testing provides security testing of outsourced and vendor code without compromising vendor intellectual property Veracode Manual Penetration Testing complements Veracode's automated scanning technologies with best-in-class penetration testing services You should check with your compliance and legal departments for complete information on how you may be required to comply.
FAQs About the New York DFS Cybersecurity Regulation
Tue Jan 3 19:21, 2017 GMT
Tackle Internet censorship directly — not through antitrust law The Hill (blog) Sewlyn Duke's recent op-ed for The Hill, “Antitrust should be used to break up partisan tech giants like Facebook, Google,” addresses the serious problem of how a few privately owned internet companies have unprecedented control over the distribution ...
Tackle Internet censorship directly — not through antitrust law - The Hill (blog)
Mon Jan 2 22:55, 2017 GMT
Commentary: It's acceptable for the city of Bologna, but Facebook apparently thinks it's rude.
Facebook censors nude Neptune statue, writer says - CNET
Mon Jan 2 11:07, 2017 GMT
Stuff Tech Resolutions #5: why I'm finally getting smart about internet privacy Stuff Despite being quite tech-savvy, I've still been winging it with these basics. I'm lazy, like many. But I've also realised waiting for something to go wrong is like waiting to be robbed before you buy home contents insurance. Internet privacy and ...
Tech Resolutions #5: why I'm finally getting smart about internet privacy - Stuff
Sat Dec 31 14:02, 2016 GMT
Digital Trends 2016 was the year internet security died – so what can you do about it? Digital Trends A single phishing email compromised a major presidential campaign, and one of the United States' two main political parties suffered a security intrusion that compromised hundreds of thousands of emails. Many of the world's largest ... Our privacy was ...
2016 was the year internet security died – so what can you do about it? - Digital Trends
Thu Dec 29 12:00, 2016 GMT
In a previous blog post , we explored how software is “eating the world,” and how applications have gone from a nice-to-have to a critical part of running a business. As enterprises are forced to develop and buy more and more software – and at a lightning pace in order to keep up with the competition – what are the security implications? Cyberattackers are increasingly targeting the application layer to breach organizations and gain access to sensitive, confidential — and lucrative – data. At the same time, organizations can’t stop using software, or develop it more slowly. What does this mean for security? Security Implications of the Increase in Number of Apps The proliferating number of applications, combined with the decentralized way applications are now developed and purchased, mean it’s increasingly difficult to get a handle on your application landscape . For example, digital marketing has become one of the most important ways that companies interact with their target market and customers. Marketing departments are often spinning up new web pages and incorporating new technologies, and not communicating with IT security. Bottom line: It’s hard to secure what you don’t know about. The nature of this new application landscape means visibility comes before security. When we work with customers on this problem, we typically find that they have 30 percent to 40 percent more websites than they originally report having. The solution? Look for application security solutions that can accurately inventory your entire web perimeter . Security Implications of the Need for Speed You don’t just need to develop apps to keep up with the competition in today’s digital world – you need to develop them fast . This emphasis on speed means that developing apps from scratch is nearly impossible, and developers are increasingly relying on third-party applications and components to meet deadlines. A recent IDG study found that among enterprise applications, 28 percent are typically developed externally, 34 percent are procured from software vendors and 38 percent are developed internally (source: IDG Study, “Majority of Internally Developed Apps not Assessed for Critical Security Vulnerabilities,” June 2014). The problem is that it’s hard to keep track of these third-party additions and their security status. But you can keep up with the competition without sacrificing security. Consider application security solutions that: Inventory and report on the security of open-source components Help you assess applications sourced from independent software suppliers with a program for managing third-party software risk Security Implications of Apps Connecting to Your Most Sensitive Data As applications increasingly play a pivotal role in interacting with customers, prospects and partners and making business decisions, they are also increasingly standing in front of your most critical data. Gartner describes applications and application security with the analogy of a crown jewel in a treasure chest: the sensitive information is the crown jewel, and the applications are the treasure chest . And when apps are the treasure chest: Cyberattackers take notice: The bad guys know that your network layer is most likely secure, that your app layer is not, and that your apps are the key to some highly valuable data . Regulators take notice: Numerous regulations now require controls regarding application security , including PCI, NIST, HIPAA and MAS. Customers take notice: Your customers will increasingly ask questions about your application security practices . Expect to not only be asked about security, but to provide proof of your efforts. The security implication here? Neglecting application security is risky business – you risk losing customers, paying regulatory fines and suffering a damaging breach. There’s a lot riding on your app layer, and application security needs to be a part of your security mix. A New Digital Landscape Requires a Security Pivot Security “business as usual” won’t cut it in this new digital world. You need to pivot your strategy to focus where the risk is – and that is increasingly at the app layer. For more, get Gartner’s take on the security implications of a digital world in their new report, Managing Risk and Security at the Speed of Digital Business .
Applications Have a New Role in Today’s Digital World: What Are the Security Implications?
Wed Dec 28 12:00, 2016 GMT
It seems so tempting. Solve your application security problem by throwing an appliance at it. After all, if web applications are the most common form of attack, why not just protect them the same way you protect your network and email servers, and be done with it? Why should you spend time hunting down vulnerabilities in your code and figuring out how to fix them? The “appliance throwing” approach would be viable if WAFs were perfect, but protecting your app layer with only a WAF leaves a lot of holes. WAFs, at their heart, are black-box protection technologies that rely on inspecting incoming traffic for known attack patterns – and that’s often not enough. There are circumstances where WAFs will leave you vulnerable to attack, for instance: Missed attack due to new patterns A WAF tries to use known attack patterns to protect an application. It can be tuned via writing rules, but attackers are coming up with new patterns all the time. In fact, creating WAF bypasses is something of a cottage industry for security researchers, to the point that you can download a cheat sheet for conducting SQL injection via WAF bypass from the OWSP project . Missed attack due to application changes Based on the results of a penetration test or other evaluation of an application, you can make a WAF very accurate by creating rules that focus on specific input fields and types of vulnerability. However, you have to maintain these rules every time the application is changed. The SANS Institute notes, "During the WAF deployment, everyone involved understands exactly which form fields and inputs are vulnerable and to which attack categories, but over time, this knowledge fades. Many organizations lack the in-house expertise to conduct penetration tests every time they change the web application or WAF configuration (and miss the opportunity to ensure a vulnerability was not introduced).” Missed attack due to configuration complexity The same SANS report notes that it’s not uncommon for WAFs to be extended to cover more applications than they can handle or to fail under high load, or to have a high number of false positives. For this reason, some organizations configure their WAFs only to alert in the event of a potential attack, rather than try to block it — which means that a successful attack will likely be missed in the midst of other alerts from the WAF. There are definitely still benefits to deploying WAFs, including avoidance of denial of service attacks and—when properly configured—providing some protection against an attack. But at best, they slow an attacker down. No application security silver bullet Effective application security requires multiple technologies that protect apps in different ways and in different stages of their lifecycle. If you’re going to use a WAF, you won’t be protecting your products from attack indefinitely. So use the time a WAF gives you wisely; figure out where the underlying vulnerabilities are in your application and fix them. For instance, consider an automated application security solution that integrates into your SDLC, allowing developers to find and remediate security-related defects early in the development process. But in the end, perfect prevention is not possible: You should also consider supplementing both your efforts to secure code in the SDLC and your WAF with technology designed to specifically protect applications in production, such as runtime application security protection . Cyberattackers are increasingly focused on the application layer; it’s critical to understand both how this layer is being exploited, and which solutions protect it most effectively. To find out more, start with tips and advice on application security from someone who’s been there – check out 5 Lessons From an Application Security Pro .
Application Security? But I Have a WAF!
Wed Dec 21 20:20, 2016 GMT
We recently conducted a survey of developers and development managers to find out what’s on their minds and how their concerns compare to those of application security teams. The results contain some surprises. What’s not surprising is that development teams are feeling pressured to meet productivity goals, while still meeting requirements for quality and stability. Add to that the growing threat of cyberattacks, and penalties – both legal and market-based – for companies that suffer from a breach, and developers are feeling squeezed from all sides. In this pressure cooker environment, AppSec is suffering, with more than 60 percent of applications failing OWASP top 10 policy on initial assessment, according to Veracode’s State of Software Security 2016. With that in mind, here are the top takeaways from the Veracode Secure Development Survey . 1. Preventing data breaches and cyberattacks is developers’ number one challenge and concern Over the years, developers have been stereotyped as caring mainly about features, with little regard for security. That may be changing. Veracode’s survey asked a sample of 350 developers and 150 development managers to rank their top challenges and concerns. Preventing data breaches and cyberattacks was rated the number one concern by 37 percent of developers. By contrast, only 23 percent of developers said meeting customer or regulatory compliance was their top challenge or concern, while 21 percent said meeting budget and delivery schedules, and 19.4 percent said delivering secure code to pass internal audits. 2. More developers are testing early in the development cycle Perhaps as a result of this shifting mindset about security, more developers are testing the security of their code at the programming stage (40 percent) than any other stage of the software lifecycle. Another 21 percent of developers said they incorporate security testing at the design stage. Research by the National Institute of Standards and Technology has found that securing applications at later stages increases the cost of fixing defects by orders of magnitude: fixing defects in production is 30 times more expensive than doing so in architecture/requirements. 3. Developers worry that security testing slows them down Developers are still dealing with security programs that impede their development efforts – 52 percent of developers feel application security testing often delays development and threatens deadlines. And, fewer than 25 percent of developers feel they have authority over decisions regarding application security. There were some regional differences between respondents in our survey. Developers in the U.S. identified security delaying development as a challenge (56 percent) more often than their counterparts in the UK and Germany (46 percent). 4. Sensitive data exposure is the most concerning vulnerability More than half of developers identified sensitive data exposure as a vulnerability they are concerned about (53 percent) – more than any other vulnerability cited in the survey. No other vulnerability was cited by a majority of developers as a top concern. According to Veracode analysis in the State of Software Security 2016 , 65 percent of applications have cryptographic issues and 41 percent have credentials management vulnerabilities, showing that developers’ concerns about sensitive data exposure are well-placed. However, less than a third of developers (28.5 percent) cite using components with known vulnerabilities as a major concern, despite the high prevalence of vulnerabilities in open source components. For example, Veracode analysis found that 97 percent of Java applications had at least one component with a known vulnerability. 5. Secure DevOps is the future Although nearly a quarter of developers say their teams don’t have authority over application security (24 percent), 22 percent of development organizations now share responsibility for AppSec with another team, and the security team reports to development in 16 percent of organizations. This indicates that more organizations are shifting to DevOps, with development, security and operations working in integrated teams. Download the complete Veracode Secure Development Survey to find out more about what developers and development managers are saying about their top application security challenges and concerns.  What the Data Says: Veracode Secure Development Survey .cta {background-color:#8fbc48; width: 95%; margin: 15px auto 15px auto; padding:15px 0px 15px 0px; border:solid 1px #000; text-align:center;} .cta a{color:#fff; font-size: 20px; font-weight: 800; font-family: "Gotham SSm A","Gotham SSm B",Helvetica,Arial,sans-serif;} .cta a:hover{color:#eee;}
Top Takeaways From Veracode’s Developer Survey
Mon Dec 19 15:16, 2016 GMT
Do you think you don’t need application security? Maybe you think application security is too complex, or too expensive. Maybe you think, we haven’t been breached yet, what are the chances? And even if someone tries, we have a WAF. It might seem more cost-effective to simply “do nothing” rather than invest in application security. But you should be aware that there is indeed a cost associated with “doing nothing” when it comes to application security. Chance of a breach is high … You do have a good chance of suffering a breach through the app layer – no matter your size or industry. Verizon recently studied 2,260 confirmed data breaches across 82 countries and found that 40 percent resulted directly from web app attacks , by far the largest category. In addition, according to Akamai’s Q3 2015 State of the Internet Security Report , attacks at the application layer are growing by more than 25 percent annually. … so is the cost A recent blog post on pcicomplianceguide.org observed that “ the average consolidated total cost of a data breach is $3.8 million . With each lost or stolen record costing an average of $174, even 500 compromised payment records can exceed $75,000 in liability for a breached merchant.” And that’s a conservative number considering that breach-related costs include:   Lost revenue: This might result from stolen corporate data, lowered sales volumes (if consumers get scared) or falling stock prices. Money spent on investigation and cleanup Cost of downtime: A recent Information Age article estimated that every hour of downtime costs businesses $100,000. In addition, time spent fixing a breach means time diverted away from development and innovation. Brand damage: A recent Deloitte study found that security is the second leading risk to a company's brand , behind ethical issues and ahead of risks related to safety, health and the environment. A breach is not the only cost Many regulators, in many different industries, now require some application security controls be put into place. And with the increase in breaches through the app layer, they’re paying closer attention to application security controls. Regulations that now require application security controls include: PCI-DSS NIST MAS HIPAA What’s the cost of failing to comply? Here are two examples: HIPAA: Noncompliance fees are up to $50,000 per violation . In addition, attorney generals can also issue HIPAA fines, and criminal penalties could even result from HIPAA violations. PCI: Fines for noncompliance vary on the discretion of the card brands and acquiring banks, and can range from $5,000 to $100,000 per month for the merchant. Network security not protecting your app layer You might think you are “doing something” to protect your app layer if you’re relying on network security solutions, but, in fact, you are “doing nothing.” Protecting the network layer is not the same as protecting the application layer, and network solutions do not protect your organization against application-layer attacks. But most organizations continue to focus their budgets on blocking attacks at the network/infrastructure layer, while neglecting today’s real threats. Cyberattackers know this and are taking advantage of the insecure app layer. A web application firewall is not an adequate application security solution either. Firewalls were designed to handle network-events, such as finding and blocking botnets and remote access exploits. Some can address application-level events — but not as well as application-layer solutions, and only with significant effort to configure and monitor them. Ultimately, they don’t fix application-layer vulnerabilities, but rather, simply mitigate them. Effective application security requires an application security program that involves multiple technologies designed specifically to assess the security of the application layer, and addresses the security of applications from development through to production. “Doing nothing” is not a cost saver Neglecting to address application security will not save you money. In fact, it will cost you, most likely a significant amount, in the future. Applications play a pivotal role in today’s digital role, and need a correspondingly pivotal place in your security plan. To find out more about how digital business is changing the security landscape and how your security initiatives need to pivot accordingly, check out Gartner’s new report, Managing Risk and Security at the Speed of Digital Business .
What's the Worst That Can Happen? The Cost of a "Do Nothing" AppSec Plan
Fri Dec 30 21:49, 2016 GMT
International Business Times Internet Censorship : Governments Shut Down The Internet More Than 50 Times In 2016 International Business Times Deji Olukotun, the senior global advocacy manager at Access Now, told the Inter Press Service an internet shutdown was imposed in Uganda by President Yoweri Museveni–including a blackout of social media sites like Facebook and Twitter —on the ...
Internet Censorship: Governments Shut Down The Internet More Than 50 Times In 2016 - International Business Times
Fri Dec 30 19:54, 2016 GMT
MOSCOW (Reuters) - President Vladimir Putin refrained on Friday from retaliating for the U.S. expulsion of 35 suspected Russian spies, putting the onus on Donald Trump to help solve a crisis over Russian cyber attacks when he takes over the White House next month.
Russia will not expel anyone over U.S. sanctions, to wait for Trump
Thu Dec 29 21:43, 2016 GMT
The US expels 35 Russian diplomats in the wake of cyber attacks related to the US election.
US expels Russian diplomats over cyber attack allegations
Thu Dec 29 21:53, 2016 GMT
The US will deport dozens of diplomats, and has named specific individuals implicated in the cyberattacks. The post Obama’s Russian Hacking Retaliation Is Biggest “Since the Cold War" appeared first on WIRED .
Obama’s Russian Hacking Retaliation Is Biggest “Since the Cold War”
Thu Dec 29 12:00, 2016 GMT
Setting up a password manager may sound tedious and awful, but taking control of your personal security and privacy is doable. And it's going to be more important than ever in 2017. The post Your 5 Totally Achievable Security Resolutions for the New Year appeared first on WIRED .
Your 5 Totally Achievable Security Resolutions for the New Year
Thu Dec 29 05:35, 2016 GMT
Andrew Torba Talks Fighting Internet Censorship and His New Site 'Gab' FrontPage Magazine Andrew Torba Talks Fighting Internet Censorship and His New Site 'Gab' ... And the nature of censorship is that you don't know that it's happening until it's already too late because you're not seeing things because they're being censored. .... So ... and more »
Andrew Torba Talks Fighting Internet Censorship and His New Site 'Gab' - FrontPage Magazine
Wed Dec 28 19:20, 2016 GMT
Security Sales & Integration Predictions and Internet Security Advice for 2017 Security Sales & Integration Predictions and Internet Security Advice for 2017. VPN service provider NordVPN analyzes online privacy conditions and offers predictions for the year ahead. Learning about internet ... privacy infringements. Consider the rash of major corporate hacks ... Only a quarter of world's Internet users got free access in 2016 The Hindu all 2 news articles »
Predictions and Internet Security Advice for 2017 - Security Sales & Integration
Wed Dec 28 18:50, 2016 GMT
The Data Center Journal Internet Privacy in 2017: Predictions and Security Advice The Data Center Journal ... ever in online privacy , considering increasingly restrictive surveillance laws of governments around the world, major online hacks—such as compromised accounts of over a million Yahoo users—and authoritarian regimes blocking Internet to restrict ... Only a quarter of world's Internet users got free access in 2016 The Hindu all 2 news articles »
Internet Privacy in 2017: Predictions and Security Advice - The Data Center Journal
Wed Dec 28 15:59, 2016 GMT
RIGA/TALLINN (Reuters) - Russia and its president Vladimir Putin should expect tough sanctions after cyber attacks during the presidential election won by Donald Trump, U.S. Republican Senator Lindsey Graham said on Wednesday.
U.S. senator says Russia can expect sanctions after cyber attacks
Wed Dec 28 15:16, 2016 GMT
Nabeel Rajab, the prominent Bahraini human rights activist who has been held in prison for the past seven months, was due to be released on bail but remains in Jau prison. The post Bahrain: Nabeel Rajab remains in prison despite court order for his release appeared first on Index on Censorship .
Bahrain: Nabeel Rajab remains in prison despite court order for his release
Wed Dec 28 14:50, 2016 GMT
Wccftech Best of 2016: Trust the World's Fastest VPN with Your Internet Security & Freedom Wccftech Whether you want to secure your browsing experience on your mobile phone, or connect a gaming console or a smart TV – PureVPN is the true answer to internet security and user privacy . One of the most sought-after deals of 2016, Wccftech Deals is now ...
Best of 2016: Trust the World's Fastest VPN with Your Internet Security & Freedom - Wccftech
Wed Dec 28 00:32, 2016 GMT
Electronic Frontier Foundation Tries to Raise Awareness on Internet Privacy The Merkle While millions of people are still trying to assimilate the fact that Donald Trump won the election, in the United States a movement of concerned activists is trying to warn the incoming administration and the general public about the dangers of ...
Electronic Frontier Foundation Tries to Raise Awareness on Internet Privacy - The Merkle
Tue Dec 27 21:38, 2016 GMT
Israel Jumps On The Internet Censorship Band Wagon - Daily Caller. Will Israeli internet censorship law prevent the next terror attack ...
Israel Jumps On The Internet Censorship Band Wagon - Daily Caller
Tue Dec 27 18:10, 2016 GMT
HAMBURG (Reuters) - Major travel booking systems lack a proper way to authenticate air travelers, making it easy to hack the short code used on many boarding passes to alter flight details or steal sensitive personal data, security researchers warned on Tuesday.
Flight booking systems lack basic privacy safeguards, researchers say
Tue Dec 27 14:49, 2016 GMT
InfoWorld The real reason we can't secure the internet InfoWorld Now think about trying to get the entire world to agree on how to fix internet security , particularly when most of the internet was created and deployed before it went global. Over the last two ... All governments invade privacy in the name of ... and more »
The real reason we can't secure the internet - InfoWorld
Tue Dec 27 05:03, 2016 GMT
Zeman rejects internet censorship in reaction to ministry's plan Prague Daily Monitor Lany, Central Bohemia, Dec 26 (CTK) - Czech President Milos Zeman rejected any attempts to apply censorship to the Internet in his Christmas speech on Monday and said he does not wish the Interior Ministry to become a modern Konias, probably in ...
Zeman rejects internet censorship in reaction to ministry's plan - Prague Daily Monitor
Mon Dec 26 03:25, 2016 GMT
Lessons For The Left: How China Handles Fake News And Cuts Off 700 Million Web Users From The World Daily Caller Ongoing efforts in the United States to censor the internet in response to a liberal outcry over “fake news” follow in the footsteps of a country notorious for its internet censorship practices. There is a growing controversy in the U.S. over the issue ... and more »
Lessons For The Left: How China Handles Fake News And Cuts Off 700 Million Web Users From The World - Daily Caller
Mon Dec 26 02:37, 2016 GMT
Will Israeli Internet Censorship Law Prevent the Next Terror Attack? Haaretz “The problem with the law is that it is designed to block the Israeli public from viewing content but does not to prevent people from posting things that could harm the security of the country. This is a law that will let the police obtain an order ... and more »
Will Israeli Internet Censorship Law Prevent the Next Terror Attack? - Haaretz
Sun Dec 25 12:00, 2016 GMT
In uncertainty times, these non-profits need your year-end charity to protect privacy and civil liberties online. The post Where to Donate to Protect the Internet in 2017 appeared first on WIRED .
Where to Donate to Protect the Internet in 2017
Wed Dec 21 03:07, 2016 GMT
Human Rights Watch Thailand: Cyber Crime Act Tightens Internet Control | Human Rights ... Human Rights Watch (New York) – Thailand's new Computer-Related Crime Act (CCA) gives overly broad powers to the government to restrict free speech, enforce surveillance and ... and more »
Thailand: Cyber Crime Act Tightens Internet Control | Human Rights ... - Human Rights Watch
Fri Dec 23 12:16, 2016 GMT
The value of the Bitcoin virtual currency has hit a three-year high with each one now worth about $900 (£730).
Bitcoin enjoys end of year price surge
Fri Dec 23 08:05, 2016 GMT
The post Poland’s new laws on surveillance have “enormous implications for media freedom” appeared first on Index on Censorship .
Poland’s new laws on surveillance have “enormous implications for media freedom”
Thu Dec 22 18:09, 2016 GMT
Bitcoin bounces back after a mid-2016 currency hack by posting its highest-ever valuation.
Bitcoin reaches highest total valuation of $14 billion - CNET
Thu Dec 22 17:45, 2016 GMT
District beefs up internet security Gustine Press-Standard The new Securly filtering system, which was scheduled to be rolled out this week, will allow the district to more precisely filter sites which students can access on their district-issued Chromebooks and offers a number of other security enhancements ...
District beefs up internet security - Gustine Press-Standard
Thu Dec 22 17:47, 2016 GMT
Huffington Post How Will Internet Security Threats Change Over the Coming Years? Huffington Post Smart phones are actually much more secure than computers. They have fairly bad privacy problems, but from a security point of view, they are clearly superior to computers. This is mostly because of the app store model, as you can't just run random ...
How Will Internet Security Threats Change Over the Coming Years? - Huffington Post
Thu Dec 22 16:16, 2016 GMT
Mobile & Apps How Signal App Can Win Against Internet Censorship Mobile & Apps This way, if the government-sponsored censorship tools want to block the request, it has to block the entire Google system. It can also shut down its ... The Signal app, which is now available in Google PlayStore, can circumvent from censorship tools ... Encryption App 'Signal' Fights Censorship With a Clever Workaround WIRED all 19 news articles »
How Signal App Can Win Against Internet Censorship - Mobile & Apps
Thu Dec 22 14:42, 2016 GMT
VILNIUS (Reuters) - The Baltic state of Lithuania, on the frontline of growing tensions between the West and Russia, says the Kremlin is responsible for cyber attacks that have hit government computers over the last two years.
Lithuania said found Russian spyware on its government computers
Tue Dec 20 14:54, 2016 GMT
Freedom of expression magazine Index on Censorship has negotiated rights to translate a short story from Haroldo Conti, an Argentine writer who was “disappeared” by the state in the 1970s during the Argentine military dictatorship. Read the full article The post ‘Index’ translates work of murdered Argentine writer (The Bookseller) appeared first on Index on Censorship .
‘Index’ translates work of murdered Argentine writer (The Bookseller)
Thu Dec 22 10:35, 2016 GMT
A Syrian citizen journalist on the realities of reporting in a country where a pseudonym and bulletproof vest offer little protection from constant danger The post Inside Syria’s war: The extreme dangers faced by local reporters appeared first on Index on Censorship .
Inside Syria’s war: The extreme dangers faced by local reporters
Thu Dec 22 08:21, 2016 GMT
A final inquiry report published by the Australian government's Productivity Commission is steadfastly maintaining the position that citizens should have the right to use VPNs to access geo-restricted content. The advisory body is also unmoved when it comes to delivering fair use exceptions, stating that rightsholder objections are based on flawed and "self-interested" assumptions. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Australian Govt Advisory Body Digs in Over Fair Use & Geo-Unblocking
Thu Dec 22 05:34, 2016 GMT
WASHINGTON (Reuters) - A hacking group linked to the Russian government and high-profile cyber attacks against Democrats during the U.S. presidential election likely used a malware implant on Android devices to track and target Ukrainian artillery units from late 2014 through 2016, according to a new report released Thursday.
Russian hackers tracked Ukrainian artillery units using Android implant: report
Wed Dec 21 20:01, 2016 GMT
A technique called "domain fronting" makes the app's encrypted traffic look no different from a Google search. The post Encryption App 'Signal' Fights Censorship With a Clever Workaround appeared first on WIRED .
Encryption App ‘Signal’ Fights Censorship With a Clever Workaround
Wed Dec 21 18:22, 2016 GMT
BRUSSELS (Reuters) - The mass retention of data is illegal, the European Union's highest court said on Wednesday, dealing a blow to Britain's newly passed surveillance law and signaling that security concerns do not justify excessive privacy infringements.
EU court says mass data retention illegal
Wed Dec 21 12:18, 2016 GMT
Section 40 of the Crime and Courts Act 2013 is a danger to a free press. We urge you to take action. The post Section 40 jeopardises press freedom appeared first on Index on Censorship .
Section 40 jeopardises press freedom
Wed Dec 21 09:44, 2016 GMT
Join us 18-20 January at the Arcola Theatre to kick off the Truth to Power Cafe 2017. The post Truth to Power Cafe 2017 appeared first on Index on Censorship .
Truth to Power Cafe 2017
Wed Dec 21 09:39, 2016 GMT
Linguist and newspaper columnist, Sevan Nişanyan has found himself being locked up for 16 years after being subjected to a torrent of lawsuits relating to a mathematics village he was building The post Free speech locked up appeared first on Index on Censorship .
Free speech locked up
Wed Dec 21 07:42, 2016 GMT
Firstpost Turkey's answer to most problems is Internet censorship as it blocked Tor and social media Firstpost Turkey has blocked social media websites such as Facebook, YouTube, Twitter and WhatsApp along with Tor – the popular network used to browse the Internet without being traced or tracked. According to reports by Turkey Blocks, an internet monitoring ... Turkey maintains Tor block , flicks social networks offline for 12 hours TechCrunch all 2 news articles »
Turkey's answer to most problems is Internet censorship as it blocked Tor and social media - Firstpost
Tue Dec 20 20:01, 2016 GMT
Hack Read Anonymous Shut Down Thai Sites Against Internet Censorship , Surveillance Law Hack Read Anonymous Shut Down Thai Sites Against Internet Censorship , Surveillance Law. A series of ... The government of Thailand has been under the hammer of internet activist groups since the parliament approved an amendment to the 2007 Computer Protection ... and more »
Anonymous Shut Down Thai Sites Against Internet Censorship, Surveillance Law - Hack Read
Tue Dec 20 16:06, 2016 GMT
KIEV (Reuters) - Ukraine is investigating a suspected cyber attack on Kiev's power grid at the weekend, the latest in a series of strikes on its energy and financial infrastructure, the head of the state-run power distributor said on Tuesday.
Ukraine investigates suspected cyber attack on Kiev power grid
Tue Dec 20 16:01, 2016 GMT
New research suggests that an elaborate cybercrime ring is responsible for stealing between $3 million and $5 million worth of revenue from online publishers and video advertising networks each day. Experts say the scam relies on a vast network of cloaked Internet addresses, rented data centers, phony Web sites and fake users made to look like real people watching short ad segments online.
Report: $3-5M in Ad Fraud Daily from ‘Methbot’
Tue Dec 20 15:33, 2016 GMT
Forty-nine international human rights and free expression organisations have written to the United Nations on behalf of Bahraini human rights activist Nabeel Rajab. The post Groups urge UN to call on Bahrain to release human rights defender appeared first on Index on Censorship .
Groups urge UN to call on Bahrain to release human rights defender
Tue Dec 20 11:25, 2016 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout the European Union and neighbouring countries. Here are five recent reports that give us cause for concern. The post Mapping Media Freedom: In review 9-15 December appeared first on Index on Censorship .
Mapping Media Freedom: In review 9-15 December
Tue Dec 20 09:03, 2016 GMT
Telstra has become the very first Australian ISP to block The Pirate Bay, a move designed to crack down on piracy in the country. However, the blocking method chosen by the ISP is the most basic option permitted under the Federal Court's order. As a result, it's been defeated in seconds. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
First Aussie Pirate Bay Block Gets Defeated in Seconds
Tue Dec 20 06:52, 2016 GMT
Index on Censorship is delighted to announce CNN as its media partner for the 2017 Freedom of Expression Awards. The post CNN announced as media partner for Freedom of Expression Awards 2017 appeared first on Index on Censorship .
CNN announced as media partner for Freedom of Expression Awards 2017
Tue Dec 20 05:50, 2016 GMT
Internet privacy ? Forget it Alaska Dispatch News The right to internet privacy seems to be anchored in arguments for common decency, the almost universal belief that what you have to say via email is nobody's business except yours and the people you choose to share it with. WikiLeaks advocates ...
Internet privacy? Forget it - Alaska Dispatch News
Tue Dec 20 00:55, 2016 GMT
Mashable Turkey's internet censorship is starting to look like China's 'Great Firewall' Mashable The Turkish government is strengthening its already tight grip on the country's internet . In the past, government officials have blocked Twitter, Facebook and other social networks where Turkish residents often discuss politics. These blocks have no ... and more »
Turkey's internet censorship is starting to look like China's 'Great Firewall' - Mashable
Mon Dec 19 19:27, 2016 GMT
New Poll: Internet Censorship Is Gov't and Social Media Responsibility Church Militant DETROIT (ChurchMilitant.com) - Information gatekeepers complain people are being inundated with fake news, and many Americans think something should be done about it. The new mainstream media fury over so-called fake news has become one of the ...
New Poll: Internet Censorship Is Gov't and Social Media Responsibility - Church Militant
Mon Dec 19 09:00, 2016 GMT
It's been an exciting year for the MIT CSAIL lab with ingestible origami robots, AI acting as oracles and cyberattack detection research only the tip of the iceberg.
The most exciting, innovative MIT projects in 2016
Mon Dec 19 14:15, 2016 GMT
Collective Evolution Google Is Battling Global Censorship In Canada's Supreme Court Collective Evolution Google Is Battling Global Censorship In Canada's Supreme Court ... Because of this impact, Internet censorship continues to be a question of implementation in order to control or suppress what can be accessed, published, or viewed on the Internet . This ...
Google Is Battling Global Censorship In Canada's Supreme Court - Collective Evolution
Mon Dec 19 13:36, 2016 GMT
Turkey has blocked direct access to the Tor anonymous browsing network as part of a wider crackdown on the ways people circumvent official internet censorship.
Turkey blocks access to Tor anonymising network
Mon Dec 19 12:04, 2016 GMT
LONDON (Reuters) - Additional rules may be needed to monitor growth in Big Data, or collection of high volumes of information, which could pose security, privacy and accountability risks, European Union regulators said on Monday.
EU financial regulators say more rules may be needed for Big Data
Mon Dec 19 10:24, 2016 GMT
ExtraTorrent has taken steps to block unofficial proxy sites from "stealing" traffic and thus, their revenue. This will also help to keep users safe from rogue sites that may cause other kinds of harm. Of course, ExtraTorrent users are still welcome to use any of the official proxies to bypass ISP blockades. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
ExtraTorrent Takes on ‘Leeching’ Proxy Sites
Mon Dec 19 08:24, 2016 GMT
Journalists and columnists in The Netherlands are dealing with threats when writing about the controversial black-faced children’s character Black Pete. The post The Netherlands: Journalists face threats in heated Black Pete racism debate appeared first on Index on Censorship .
The Netherlands: Journalists face threats in heated Black Pete racism debate
Mon Dec 19 07:46, 2016 GMT
Malaysian cartoonist Zulkiflee Anwar Ulhaque, aka Zunar, was arrested on Saturday 17 December during a fund-raising event to recoup losses related to the seizure of 20 of his artworks. The post Malaysia: Cartoonist arrested for second time in three weeks appeared first on Index on Censorship .
Malaysia: Cartoonist arrested for second time in three weeks
Mon Dec 19 00:29, 2016 GMT
LONDON (Reuters) - Britain's intelligence agencies need to do more to help regulators to protect the financial services industry from cyber crime, the head of an influential parliamentary committee said on Monday.
Britain urged to increase cyber security in financial services
Sun Dec 18 20:54, 2016 GMT
WASHINGTON (Reuters) - U.S. Republican and Democratic senators called on Sunday for a special bipartisan panel to investigate cyber attacks against the United States by foreign countries with a focus on Russia's alleged efforts to influence the U.S. presidential election.
Senators call for probe of cyber attacks by Russia
Sun Dec 18 19:14, 2016 GMT
This week pirate site blocking arrived in Australia after years of planning and negotiations. We take a look at some of the lesser-discussed points from the Federal Court's ruling which allow for the rapid expansion of site blocking based on the trusted words of rightsholders. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
The Future of Aussie Pirate Site Blocking: Six Additional Facts
Sat Dec 17 20:45, 2016 GMT
The Pirate Bay and other sites must be blocked by local Internet providers, an Australian court ruled this week. While the measures have yet to be implemented, many pirates are already trying to find ways around them. Data from Google shows a big surge in "VPN" searches and VPN services also report a significant increase in Aussie interest. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Australia’s Pirate Site Blockade Boosts Demand For VPNs
Fri Dec 16 14:15, 2016 GMT
Breitbart News Academic: Former Stasi Secret Police Informant Unfit to Lead Government Internet Censorship Task Force Breitbart News The Ministry of Justice has come under renewed pressure to cut ties with Anetta Kahane after a Stasi expert declared her unfit to lead a “sensitive task like controlling the internet ” based on her history working with the Communist secret police. A ...
Academic: Former Stasi Secret Police Informant Unfit to Lead Government Internet Censorship Task Force - Breitbart News
Fri Dec 16 10:12, 2016 GMT
ISTANBUL (Reuters) - Hackers targeted Turkish lender Akbank in a cyber attack on the SWIFT global payment system, the bank said, adding it faced a liability of up to $4 million from the incident but no customer information was compromised.
Turkey's Akbank says targeted by hackers, faces up to $4 million liability
Fri Dec 16 09:26, 2016 GMT
The post Editorial: The censor’s new clothes appeared first on Index on Censorship .
Editorial: The censor’s new clothes
Fri Dec 16 09:26, 2016 GMT
The post Contents: Fashion rules appeared first on Index on Censorship .
Contents: Fashion rules
Fri Dec 16 09:26, 2016 GMT
The post Fashion rules appeared first on Index on Censorship .
Fashion rules
Fri Dec 16 08:26, 2016 GMT
The post Fashion Rules winter magazine launch appeared first on Index on Censorship .
Fashion Rules winter magazine launch
Fri Dec 16 08:56, 2016 GMT
This letter appeared in The Times on 16 December 2016 Sir, Index on Censorship has published stories by censored writers for more than four decades. Now we ourselves face the prospect of censorship via legal action in the UK. As it stands, legislation on the statute means that we — as an independent publisher that […] The post Freedom of the press and a state regulator appeared first on Index on Censorship .
Freedom of the press and a state regulator
Fri Dec 16 06:16, 2016 GMT
The Pirate Bay has been chased around the world, and now Australia's internet service providers have been ordered to block it Down Under, along with a raft of other torrent sites.
Australian ISPs ordered to block The Pirate Bay by year's end - CNET
Thu Dec 15 23:20, 2016 GMT
Outspoken Overstock CEO Patrick Bryne delivers the stock market's "Sputnik moment." The post Overstock Begins Trading Its Shares Via the Bitcoin Blockchain appeared first on WIRED .
Overstock Begins Trading Its Shares Via the Bitcoin Blockchain
Thu Dec 15 12:49, 2016 GMT
International Business Times Cyberattacks 2016: With Yahoo Breach And US Election Hack , 5 Times Internet Security Was Compromised International Business Times Cyberattacks have seen an upsurge in 2016. Governments, private companies and even internet service providers (ISPs) have suffered from several cyberattacks in 2016. They have impacted social media websites and are believed to have affected the ... and more »
Cyberattacks 2016: With Yahoo Breach And US Election Hack, 5 Times Internet Security Was Compromised - International Business Times
Thu Dec 15 10:21, 2016 GMT
BANGKOK (Reuters) - Thai Prime Minister Prayuth Chan-ocha on Thursday defended a decision to amend a cyber-crime law to increase the military government's ability to remove online content as authorities seeks to tighten control on dissent.
Thai PM defends cyber controls as censorship concerns rise
Thu Dec 15 09:59, 2016 GMT
Internet Privacy Rules Take Effect Jan. 3 Light Reading The FCC has announced that the controversial privacy regulations will go into effect on January 3, although certain new data security obligations will not be effective until March 2, and some customer notification and approval elements of the ruling ... and more »
Internet Privacy Rules Take Effect Jan. 3 - Light Reading
Thu Dec 15 08:56, 2016 GMT
Following a case brought by several prominent rightsholders, the Australian Federal Court has ordered dozens of local Internet service providers to block The Pirate Bay, Torrentz, TorrentHound, IsoHunt, SolarMovie, plus many proxy and mirror services. The event marks the start of mass-blocking Down Under. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
The Pirate Bay and Other Pirate Sites Will Be Blocked in Australia
Thu Dec 15 08:39, 2016 GMT
The post Bahrain: Nabeel Rajab’s trial postponed for fifth time appeared first on Index on Censorship .
Bahrain: Nabeel Rajab’s trial postponed for fifth time
Wed Dec 14 23:33, 2016 GMT
(Reuters) - Yahoo Inc warned it had uncovered yet another massive cyber attack, saying data from more than 1 billion user accounts was compromised in August 2013, making it the largest breach in history.
Yahoo says one billion accounts exposed in newly discovered security breach
Wed Dec 14 22:59, 2016 GMT
The company, already besieged by cybersecurity and privacy woes, says Wednesday that a separate hack in 2013 compromised vast amounts of personal data, affecting more than 1 billion users.
Yahoo reveals another, even bigger hack - CNET
Wed Dec 14 21:22, 2016 GMT
The browser now will supply ads for Bitcoin info site CoinDesk, an encouraging sign for the startup and those looking for an internet free of intrusive ads.
​Brave gets first paying partner for privacy-protected ads - CNET
Wed Dec 14 14:19, 2016 GMT
Parliamentarians today joined in calling on the UK government to call for the release of jailed activist Nabeel Rajab. The post Bahrain: Parliamentary pressure mounts on Theresa May to call for Nabeel Rajab’s release appeared first on Index on Censorship .
Bahrain: Parliamentary pressure mounts on Theresa May to call for Nabeel Rajab’s release
Tue Dec 13 22:55, 2016 GMT
Amnesty International Ethiopia: Government blocking of websites during protests widespread, systematic and illegal Amnesty International The Ethiopian government systematically and illegally blocked access to social media and news websites in its efforts to crush dissent and prevent reporting of attacks on protesters by security forces during the wave of protests that started in ... and more »
Ethiopia: Government blocking of websites during protests widespread, systematic and illegal - Amnesty International
Tue Dec 13 17:51, 2016 GMT
Federal investigators in the United States and Europe last week arrested nearly three-dozen people suspected of patronizing so-called "booter" services that can be hired to knock targeted Web sites offline. The global crackdown is part of an effort by authorities to weaken demand for these services by impressing upon customers that hiring someone to launch cyberattacks on your behalf can land you in jail.
‘Operation Tarpit’ Targets Customers of Online Attack-for-Hire Services
Tue Dec 13 15:17, 2016 GMT
Bahraini human rights activist Nabeel Rajab, an Index award winner, has been imprisoned for tweeting about the Bahraini government, and could face up to 15 years in jail. The post Bahraini human rights activist to face trial appeared first on Index on Censorship .
Bahraini human rights activist to face trial
Tue Dec 13 10:21, 2016 GMT
A poem by Meltem Arikan on the current state of Turkey: The piece of land surrounded by water on three sides is turning into a country where blood-sucking spirits conquer people’s bodies The post Turkey is a country of blood-sucking spirits appeared first on Index on Censorship .
Turkey is a country of blood-sucking spirits
Tue Dec 13 07:35, 2016 GMT
Harry Potter actor Noma Dumezweni will join a panel of judges that also includes lawyer Caiolfhionn Gallagher, who represented the families of those killed in the Hillsborough disaster, and former Vanity Fair editor Tina Brown to decide this year’s Index on Censorship Freedom of Expression Award winners. The post #IndexAwards2017: Harry Potter actor Noma Dumezweni to judge leading free speech awards appeared first on Index on Censorship .
#IndexAwards2017: Harry Potter actor Noma Dumezweni to judge leading free speech awards
Mon Dec 12 21:52, 2016 GMT
LONDON/BOSTON (Reuters) - Cyber attacks on the global banking system have continued - and succeeded - since February’s heist of $81 million from the Bangladesh central bank, underscoring the continuing vulnerability of the SWIFT messaging network, a SWIFT official told Reuters.
Exclusive: SWIFT confirms new cyber thefts, hacking tactics
Mon Dec 12 12:00, 2016 GMT
They can't see his data. He can't see them. But Richard Craib believes the blind can lead the blind to a better hedge fund. The post 7,500 Faceless Coders Paid in Bitcoin Built a Hedge Fund's Brain appeared first on WIRED .
7,500 Faceless Coders Paid in Bitcoin Built a Hedge Fund’s Brain
Mon Dec 12 10:29, 2016 GMT
We are looking for enthusiastic young people between that ages of 16 and 25 who can commit to monthly meetings and contribute fresh ideas to the discussion The post Join Index on Censorship’s youth advisory board appeared first on Index on Censorship .
Join Index on Censorship’s youth advisory board
Mon Dec 12 09:12, 2016 GMT
The French music industry is continuing its efforts to make torrent sites unavailable. After obtaining a blocking injunction against The Pirate Bay, it has now managed to do the same with LimeTorrents, TorrentHound, TorrentReactor, and TorrentFunk. The effect of the blockade will be relatively limited though, as two of the sites have already shut down. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Court Orders French ISPs to Block (Dead) Torrent Sites
Sun Dec 11 20:27, 2016 GMT
Two major Swedish ISPs are warning that a possible court-ordered Pirate Bay blockade will introduce a dangerous and unwarranted form of censorship. Instead, they encourage copyright holders to collaborate with them to find better solutions to the piracy problem. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
ISPs: Blocking The Pirate Bay is Dangerous Censorship
Fri Dec 9 10:56, 2016 GMT
ESET launches new internet security products for home users Business Standard With the new line of products, ESET highlights the need for privacy when operating PCs and laptops. For example, ESET Webcam Protection available with both ESET Smart Security Premium and ESET Internet Security regulates access to the camera so the ... and more »
ESET launches new internet security products for home users - Business Standard
Fri Dec 9 11:08, 2016 GMT
Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout the Europe. Here are five recent reports that give us cause for concern. The post Mapping Media Freedom: Recent roundup appeared first on Index on Censorship .
Mapping Media Freedom: Recent roundup
Fri Dec 9 09:49, 2016 GMT
Prominent human rights defenders Razan Zaitouneh, Samira Al-Khalil, Wa’el Hamada and Nazim Hammadi – the Douma four – should be released immediately, 32 human rights organisations said today, on the third anniversary of their abduction.  On 09 December 2013, a group of armed men stormed into the office of the Violations Documentation Centre in Syria, […] The post Syria: Whereabouts of four abducted activists unknown appeared first on Index on Censorship .
Syria: Whereabouts of four abducted activists unknown
Thu Dec 8 22:38, 2016 GMT
The accused ringleader of a cyber fraud gang that allegedly rented out access to a criminal cloud hosting service known as "Avalanche" is now a fugitive from justice following a bizarre series of events in which he shot at Ukrainian police, was arrested on cybercrime charges and then released from custody.
‘Avalanche’ Crime Ring Leader Eludes Justice
Thu Dec 8 22:02, 2016 GMT
WASHINGTON (Reuters) - The White House said on Thursday that it raised concerns about China's new cyber security law during a meeting with a Chinese official after the latest round of talks between the two countries on cyber crime.
White House voices concerns about China cyber law
Thu Dec 8 10:37, 2016 GMT
INFORMATION WARFARE: Chinese Software Supports Subtle Censorship Strategy Page December 8, 2016: In one area of military technology China has taken the lead and that is the development and employment of Internet censorship software and techniques. The latest feature is the use of artificial intelligence (AI) software to ...
INFORMATION WARFARE: Chinese Software Supports Subtle Censorship - Strategy Page
Thu Dec 8 16:09, 2016 GMT
The post Forbidden songs: Where there is power, there is censorship appeared first on Index on Censorship .
Forbidden songs: Where there is power, there is censorship
Thu Dec 8 15:07, 2016 GMT
Dixie Sun News DSU honors internet privacy Dixie Sun News As part of the IT department's attempt to keep DSU students and employees safe and free, the school requires its internet users to login using a username and password, said Information Security Officer Andrew Goble. “This is consistent with standard ...
DSU honors internet privacy - Dixie Sun News
Thu Dec 8 12:00, 2016 GMT
A major bitcoin exchange has decided to stop selling the digital currency that was supposed to transform money on the internet. So what happens next? The post The Future of Bitcoin Is Not as a Digital Currency appeared first on WIRED .
The Future of Bitcoin Is Not as a Digital Currency
Wed Dec 7 20:45, 2016 GMT
NEW YORK (Reuters) - U.S.-based Circle Internet Financial Ltd, a social payments app backed by Goldman Sachs, said on Wednesday it will no longer allow customers to buy and sell bitcoin because it has failed to become a meaningful part of its business.
Payments start-up Circle moves away from bitcoin business
Wed Dec 7 07:24, 2016 GMT
SC Magazine Reboot 2016 Influencers: Larry Clinton, president and CEO, Internet Security Alliance SC Magazine “We also addressed six cross-cutting issues that need to be addressed: the evolving nature of corporate boards; how cyberauditing needs to be reformed; the use of cyberinsurance; resolving the tensions between the privacy , security and intelligence ...
Reboot 2016 Influencers: Larry Clinton, president and CEO, Internet Security Alliance - SC Magazine
Wed Dec 7 03:09, 2016 GMT
Complaint with FTC alleges that internet-connected toys are recording and transmitting kids' conversations in violation of children's privacy rules.
Kids' talking toys accused of sharing their secrets - CNET
Tue Dec 6 20:40, 2016 GMT
WASHINGTON (Reuters) - The U.S. failure to retaliate strongly for the 2014 cyber attack against Sony Pictures may have helped inspire Russian hackers who sought to interfere in the 2016 U.S. election, a senior congressional Democrat said on Tuesday.
U.S. lawmaker: Sony hack may have inspired Russian election hacking
Tue Dec 6 18:08, 2016 GMT
Index on Censorship is deeply concerned about plans outlined by technology companies to share information about, and collectively remove, extremist content. The post Tech companies’ data-sharing agreement presents threat to free expression appeared first on Index on Censorship .
Tech companies’ data-sharing agreement presents threat to free expression
Tue Dec 6 17:04, 2016 GMT
Center for Internet Security expert offers a simple equation to manage cyber risk Healthcare IT News BOSTON – Tony Sager, senior vice president at the Center for Internet Security , promised to help simplify security – if not necessarily make it easy – at the HIMSS Health Privacy Forum on Tuesday. Sager, who spent nearly four decades at the National ...
Center for Internet Security expert offers a simple equation to manage cyber risk - Healthcare IT News
Tue Dec 6 12:48, 2016 GMT
Technology Zimbabwe The Gambia joins Africa's politically inspired internet censorship club – here's why Zimbabwe could be next Technology Zimbabwe While countries like Ghana have expressed plans to shut down social media during their elections, nations like Uganda, Mali, the DRC, Zambia and Gabon have all experienced some form of internet censorship that's been triggered by political tension ... and more »
The Gambia joins Africa's politically inspired internet censorship club – here's why Zimbabwe could be next - Technology Zimbabwe
Tue Dec 6 15:10, 2016 GMT
The government of Azerbaijan is carrying out a multi-pronged attack on freedom of expression. The post Azerbaijan must stop crackdown on freedom of expression appeared first on Index on Censorship .
Azerbaijan must stop crackdown on freedom of expression
Tue Dec 6 11:38, 2016 GMT
Theresa May has been urged to confirm she will put human rights reform on her agenda when she meets Saudi and Bahraini leaders on Tuesday, after announcements on her two-day trip to the Gulf were squarely focused on trade and security. Read the full article The post Theresa May urged to raise human rights concerns on Gulf visit (Guardian) appeared first on Index on Censorship .
Theresa May urged to raise human rights concerns on Gulf visit (Guardian)
Tue Dec 6 11:30, 2016 GMT
Bitcoin hasn't freed currency from the grip of governments just yet. But cross-border commerce may be the blockchain's killer app in the here-and-now. The post Stellar Emerges From Shadow of Bitcoin to Find a Home Overseas appeared first on WIRED .
Stellar Emerges From Shadow of Bitcoin to Find a Home Overseas
Tue Dec 6 11:00, 2016 GMT
Everyone's favorite supercomputer takes off its cybercrime training wheels. The post IBM’s Watson Now Fights Cybercrime in the Real World appeared first on WIRED .
IBM’s Watson Now Fights Cybercrime in the Real World
Mon Dec 5 05:00, 2016 GMT
MIT Technology Review Security Experts Warn Congress That the Internet of Things Could ... MIT Technology Review Poorly secured webcams and other Internet-connected devices are already being used as tools for cyberattacks. Can the government prevent this from ... Blockchain IoT startup Sensify Security joins Industrial Internet Consortium EconoTimes Principles For Securing The Internet Of Things Global Trade Magazine (blog) Cyber criminals could become mass murderers by hacking into 'smart' devices Daily Mail NewsMaker (press release) all 46 news articles »
Security Experts Warn Congress That the Internet of Things Could ... - MIT Technology Review
Tue Dec 6 10:06, 2016 GMT
In 2015, a coalition of copyright holders lost a court case which demanded an ISP blockade of The Pirate Bay in Sweden. A year later and Universal Music, Sony Music, Warner Music and Nordisk Film are back, hoping for a victory in a brand new court that could open the floodgates for widespread website blocking. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Pirate Bay Blocking Case Heads Back to Court in Sweden
Mon Dec 5 19:38, 2016 GMT
EU Threatens Massive Internet Censorship If Big Tech Won't Come To Heel Daily Caller The European Commission urged the biggest U.S. technology companies — like Facebook, Twitter, Microsoft, YouTube and Google — to crack down on online hate speech themselves Sunday, or it will enact legislation forcing them to do so. Several ... and more »
EU Threatens Massive Internet Censorship If Big Tech Won't Come To Heel - Daily Caller
Mon Dec 5 23:27, 2016 GMT
Addressing distributed denial-of-service (DDoS) attacks designed to knock Web services offline and security concerns introduced by the so-called "Internet of Things" (IoT) should be top cybersecurity priorities for the 45th President of the United States, according to a newly released blue-ribbon report commissioned by President Obama.
DDoS, IoT Top Cybersecurity Priorities for 45th President
Mon Dec 5 20:18, 2016 GMT
4shared, one of the largest file-hosting services on the Internet, is building its own 'fingerprint' database of pirated music. Since the major rightholder groups are unwilling to participate, 4shared has taken the matter into its own hands. According to the site, this has helped to significantly reduce the number of takedown requests it receives. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
4shared’s Piracy ‘Fingerprint’ Tool Helps to Reduce Takedown Notices
Mon Dec 5 18:49, 2016 GMT
Commentary: Encryption be damned. British police created novel tactic to get past Apple's insistence on privacy and security. They grab the phone while it's being used.
Police 'mug' suspect to get into iPhone while he's using it - CNET
Mon Dec 5 16:43, 2016 GMT
Slate Magazine Why Russia Is Using the Internet to Undermine Western Democracy Slate Magazine Now, I live in the United Kingdom, where the state does more surveillance than any other functioning democracy and requires extra-legal and untransparent censorship by internet service providers (because “Won't somebody think of the children?”). But ... and more »
Why Russia Is Using the Internet to Undermine Western Democracy - Slate Magazine
Sun Dec 4 17:00, 2016 GMT
The Bahraini authorities’ orchestrated attack on the rights to free expression, assembly and association, has seriously undermined the prospects of a political solution to Bahrain’s domestic unrest. The post The UK government must do more to address human rights situation in Bahrain appeared first on Index on Censorship .
The UK government must do more to address human rights situation in Bahrain
Mon Dec 5 11:00, 2016 GMT
The women around me are more alert to the Turkey’s situation than the men are. The comfortable male universe is full of denial. The post Ece Temelkuran: “Make Turkey so-so again!” appeared first on Index on Censorship .
Ece Temelkuran: “Make Turkey so-so again!”
Sun Dec 4 11:17, 2016 GMT
RadioFreeEurope/RadioLiberty Q&A: Russia, China Swapping Cybersecurity, Censorship Tips RadioFreeEurope/RadioLiberty A series of joint events by Russia and China on cybersecurity has prompted speculation that Moscow is looking to the architect of the Great Firewall of China for inspiration on how to censor and otherwise regulate the Internet . But it's a ... In ...
Q&A: Russia, China Swapping Cybersecurity, Censorship Tips - RadioFreeEurope/RadioLiberty
Sun Dec 4 10:44, 2016 GMT
The Digital Economy Bill is currently at the report stage. It hasn't yet become law and could still be amended. However, as things stand those who upload any amount of infringing content to the Internet could face up to 10 years in jail. With the latest bill now published, we take a look at how file-sharers could be affected. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Ten Years in Jail For UK Internet Pirates: How the New Bill Reads
Sat Dec 3 10:51, 2016 GMT
A group of prominent legal scholars has warned that the EU Commission's plans to modernize copyright law in Europe appear to be incompatible with EU law. One of the main problems is the mandatory piracy filter Internet services are required to use, which largely ignore existing case law and human rights. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Mandatory Piracy Filters May Violate EU Law, Scholars Warn
Fri Dec 2 20:02, 2016 GMT
NextShark Russia Asks China for Help in Censoring The Internet NextShark Currently, China's internet censorship is one of the most stringent in the world. The government, through its Great Firewall has been able to block many general Internet sites, as well as websites that discuss the Dalai Lama, the 1989 crackdown on ... and more »
Russia Asks China for Help in Censoring The Internet - NextShark
Fri Dec 2 20:09, 2016 GMT
MOSCOW (Reuters) - Hackers stole more than 2 billion rubles ($31 million) from correspondent accounts at the Russian central bank, the bank said on Friday, the latest example of an escalation of cyber attacks on financial institutions around the globe.
Russian central bank loses $31 million in cyber attack
Fri Dec 2 07:18, 2016 GMT
The post Mapping Media Freedom: In review 25 November-1 December appeared first on Index on Censorship .
Mapping Media Freedom: In review 25 November-1 December
Thu Dec 1 11:28, 2016 GMT
Doha News says access to its website has been blocked in an apparent act of government censorship.
Qatar accused of blocking Doha News website
Fri Dec 2 12:00, 2016 GMT
The Law that Could Allow Trump to Shut Down the U.S. Internet Forbes So, in Edger's estimation, we need to take seriously Trump's statements and what they might portend for the future of internet security and privacy . I think this is a wise move. But certainly our laws and bureaucracy would prevent efforts to surveil ... and more »
The Law that Could Allow Trump to Shut Down the U.S. Internet - Forbes
Fri Dec 2 08:51, 2016 GMT
MOSCOW (Reuters) - Russia said on Friday it had uncovered a plot by foreign spy agencies to sow chaos in Russia's banking system via a coordinated wave of cyber attacks and fake social media reports about banks going bust.
Russia says foreign spies plan cyber attack on banking system
Fri Dec 2 08:38, 2016 GMT
A site that was outlawed following mass court action against more than 150 domains has been cleared on appeal. Kisstube embeds movies, some of them infringing, hosted on other platforms such as YouTube. However, the Rome Court of Appeal found that according to an EU ruling, merely embedding pirated content is not illegal. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Court Overturns ‘Pirate’ Site Blockade Based on EU Ruling
Fri Dec 2 09:09, 2016 GMT
My gut tells me that this time Turkey’s turmoil may turn out to be long-lasting and leave a more harmful imprint on the nation’s soul. The post Yavuz Baydar: In exile you spend your days in a fog appeared first on Index on Censorship .
Yavuz Baydar: In exile you spend your days in a fog
Thu Dec 1 19:17, 2016 GMT
Forbes The Entire Internet Is Being Archived In Canada For Safekeeping Forbes Throughout history, libraries have fought against terrible violations of privacy —where people have been rounded up simply for what they read, [and] we are fighting to protect our readers' privacy in the digital world … ... During Trump's campaign ... Internet Archive seeking to backup entire web in Canada over Donald Trump fears International Business Times UK The Internet Archive is building a Canadian copy to protect itself from Trump The Verge The Entire Internet Will Be Archived In Canada to Protect It From Trump Motherboard Digital Trends  - Mobile Business Insights (blog)  - Gothamist all 99 news articles »
The Entire Internet Is Being Archived In Canada For Safekeeping - Forbes
Thu Dec 1 18:50, 2016 GMT
In what's being billed as an unprecedented global law enforcement response to cybercrime, federal investigators in the United States, United Kingdom and Europe today say they've dismantled a sprawling cybercrime machine known as "Avalanche" -- a distributed, cloud-hosting network that for the past seven years has been rented out to fraudsters for use in launching countless malware and phishing attacks.
‘Avalanche’ Global Fraud Ring Dismantled
Thu Dec 1 17:14, 2016 GMT
Center for Research on Globalization The “Fake News” Furor and the Threat of Internet Censorship Center for Research on Globalization There is more than a whiff of McCarthyism in this crusade against “fake news” on social media and the Internet , with online publications critical of US wars of aggression and other criminal activities being branded as Russian propaganda outlets ... and more »
The “Fake News” Furor and the Threat of Internet Censorship - Center for Research on Globalization
Thu Dec 1 17:18, 2016 GMT
(Reuters) - The U.S. Commodity Futures Trading Commission failed to verify whether futures and swaps brokerage firms have adequate policies to help ward off cyber attacks, an internal CFTC audit found.
CFTC failed to verify brokers have proper cyber policies: watchdog
Thu Dec 1 15:47, 2016 GMT
BERLIN (Reuters) - One of the world's biggest networks of hijacked computers, which is suspected of attacking online banking customers, has been targeted by police swoops in 10 countries, German police said on Thursday
Worldwide cyber-crime network hit in coordinated raids
Wed Nov 30 15:22, 2016 GMT
One of IWPR’s long-term contributors from Kazakstan, Gaziza Baituova, has been nominated for the Index on Censorship Journalism Award 2017. Read the full article The post IWPR Contributor Nominated for Prestigious Freedom of Expression Award (IWPR) appeared first on Index on Censorship .
IWPR Contributor Nominated for Prestigious Freedom of Expression Award (IWPR)
Thu Dec 1 15:33, 2016 GMT
The Post Office says about 100,000 customers have had their internet access hit by a malware attack.
Post Office broadband users hit by cyber-attack
Thu Dec 1 14:00, 2016 GMT
Free speech campaigners Index on Censorship will host a night of forbidden music on December 7 to raise money for censored artists. The post Index on Censorship to host a night of forbidden songs appeared first on Index on Censorship .
Index on Censorship to host a night of forbidden songs
Wed Nov 30 07:47, 2016 GMT
International Business Times UK Internet Archive seeking to backup entire web in Canada over Donald Trump fears International Business Times UK During his campaign, Trump had taken a rigid stance on internet censorship and even mentioned that the tech industry needs to "close that internet up" to stop the spread of extremism. "Somebody will say, 'Oh, freedom of speech, freedom of speech. These ... The Entire Internet Will Be Archived In Canada to Protect It From Trump Motherboard The Internet Archive is building a Canadian copy to protect itself from Trump The Verge The Internet Archive gears up for the Trump era by creating a backup in Canada Digital Trends Huffington Post Canada  - Gothamist  - BBC News all 82 news articles »
Internet Archive seeking to backup entire web in Canada over Donald Trump fears - International Business Times UK
Tue Nov 29 16:20, 2016 GMT
Deutsche Welle Deutsche Telekom hack part of global internet attack Deutsche Welle Deutsche Telekom's head of IT security and the German Office for Information Security (BSI) said on Tuesday that the outages appeared to be tied to a botched attempt to commandeer customers' routers to disrupt internet traffic around the world. "The ... Sunday's major internet outage in Germany was probably a botched hack attack Digital Trends Hack Suspected as Deutsche Telekom Customers Fail to Access Internet SPAMfighter News (press release) 900000 Routers Knocked Offline in Germany amid Rumors of Cyber -Attack BleepingComputer Reuters all 152 news articles »
Deutsche Telekom hack part of global internet attack - Deutsche Welle
Tue Nov 29 09:24, 2016 GMT
We discuss the situation in Aleppo, the re-emergence of populism in the West, how music can fight against censorship, and the luxuries and private lives of world leaders. Plus: today’s business news, an interview with Hong Kong interior designer André Fu and a review of the day’s newspapers. Listen to the full podcast The post How music can fight against censorship (Monocle Radio 24) appeared first on Index on Censorship .
How music can fight against censorship (Monocle Radio 24)
Thu Dec 1 07:57, 2016 GMT
Besides the difficulty in determining truth from opinion to a bald-faced lie, the inherent limiting of ideas, including criminalising them, makes us all suffer a little bit. The post Dunja Mijatović: Why bother? A quick take on lying on social media appeared first on Index on Censorship .
Dunja Mijatović: Why bother? A quick take on lying on social media
Thu Dec 1 06:08, 2016 GMT
The “fake news” furor and the threat of Internet censorship World Socialist Web Site There is more than a whiff of McCarthyism in this crusade against “fake news” on social media and the Internet , with online publications critical of US wars of aggression and other criminal activities being branded as Russian propaganda outlets ...
The “fake news” furor and the threat of Internet censorship - World Socialist Web Site
Thu Dec 1 01:54, 2016 GMT
Federal judge grants request for "John Doe" summons, demanding three years of customer records from the bitcoin exchange.
Coinbase ordered to turn over customers' records to IRS - CNET
Wed Nov 30 17:20, 2016 GMT
HowStuffWorks NOW How People in China Get Around Internet Censorship HowStuffWorks NOW In free locales such as Western Europe, in contrast, VPN usage dips to 15 percent; there, people use the servers mainly to ensure privacy . While VPNs are often banned in countries with restrictive internet service, citizens are generally not fined or ... and more »
How People in China Get Around Internet Censorship - HowStuffWorks NOW
Wed Nov 30 20:44, 2016 GMT
CIO How Internet of Things Companies Can Fix Their Security Mess ConsumerReports.org Experts say that many connected devices, which make up the growing Internet of Things, or IoT, are putting consumers' privacy at risk. Unfortunately, consumers have few tools to judge whether a router, a smart thermostat, or another device they buy was ... 2017 security predictions CIO 5-Point Checklist for Investing in the Internet of Things Motley Fool Two Hackers Appear To Have Created a New Massive Internet of Things Botnet Motherboard MediaPost Communications  - Security Intelligence (blog) all 104 news articles »
How Internet of Things Companies Can Fix Their Security Mess - ConsumerReports.org
Wed Nov 30 12:20, 2016 GMT
Russia turns to China for help on surveillance, Internet censorship , data storage DatacenterDynamics (registration) Earlier this year, Russia's security council secretary, Nikolai Patrushev, had two meetings with Chinese politburo members on information security , while this June, Chinese President Xi Jinping and Russia's Vladimir Putin pledged an “unswerving ... and more »
Russia turns to China for help on surveillance, Internet censorship, data storage - DatacenterDynamics (registration)
Wed Nov 30 10:17, 2016 GMT
The post 8 Dec: In defence of the demos appeared first on Index on Censorship .
8 Dec: In defence of the demos
Tue Nov 29 17:10, 2016 GMT
Motherboard The Entire Internet Will Be Archived In Canada to Protect It From ... Motherboard A pro-censorship regime could spell trouble for the Internet Archive. The Internet Archive is building a Canadian copy to protect itself from Trump The Verge The internet's historical archive wants to build a back up site in Canada to protect itself from Donald Trump Business Insider The Internet Archive is building a replica database in Canada in ... VentureBeat The Daily Dot  - Computerworld  - Boing Boing all 26 news articles »
The Entire Internet Will Be Archived In Canada to Protect It From ... - Motherboard
Tue Nov 29 20:44, 2016 GMT
FRANKFURT (Reuters) - A cyber attack on routers of nearly 1 million Deutsche Telekom customers is part of a bigger campaign targeting web-connected devices around the globe, the German government and security researchers said on Tuesday.
Deutsche Telekom attack part of global campaign on routers
Tue Nov 29 19:19, 2016 GMT
CW33 NewsFix The Internet Is Full of Your Personal Information CW33 NewsFix INDIANAPOLIS, Ind.-- Some say internet privacy has become a contradiction in terms and claim once you go online, you automatically reveal information about yourself that can't remain hidden. There is a national debate happening right now to determine ...
The Internet Is Full of Your Personal Information - CW33 NewsFix
Tue Nov 29 13:31, 2016 GMT
Організація Index on Censorship відзначила посилення ворожого ставлення по відношенню до ЗМІ по всьому світу. Поширення подібних настроїв призводить до зростання нападів на працівників ЗМІ а також загрожує свободі слова. Read the full article The post Index on Censorship зафіксував посилення глобального тиску на журналістів (Media Sapiens) appeared first on Index on Censorship .
Index on Censorship зафіксував посилення глобального тиску на журналістів (Media Sapiens)
Mon Nov 28 13:32, 2016 GMT
A group of data experts have attacked the provisions for data sharing in the UK digital economy bill ahead of its report stage and third reading in the House of Parliament today. In a letter to The Telegraph on Friday experts warned of their concerns on information sharing. Read the full article The post Digital Economy Bill enters report stage and third reading – experts attack data sharing provision (Computer Business Review) appeared first on Index on Censorship .
Digital Economy Bill enters report stage and third reading – experts attack data sharing provision (Computer Business Review)
Mon Nov 28 13:22, 2016 GMT
Journalists are facing an “unprecedented” wave of attacks around the world with increased hostility to the media leading to assaults on individuals as well as press freedom, according to a new report. A series of crackdowns on media workers and news outlets in Europe as well as elsewhere has confirmed 2016 as one of the […] The post Index on Censorship: journalists now under ‘unprecedented’ attack (Guardian) appeared first on Index on Censorship .
Index on Censorship: journalists now under ‘unprecedented’ attack (Guardian)
Fri Nov 25 13:35, 2016 GMT
Information specialists call for removal of personal data sharing proposals ‘in their entirety’ if necessary technical and legal safeguards cannot be embedded in current Bill and codes of practice. Read the full article The post Telegraph letter turns up heat over Digital Economy Bill data sharing proposals (Government Computing) appeared first on Index on Censorship .
Telegraph letter turns up heat over Digital Economy Bill data sharing proposals (Government Computing)
Tue Nov 29 10:48, 2016 GMT
Germany's spy chief warns Russia could seek to disrupt next year's election with cyber attacks.
German spy chief Kahl warns Russia 'could disrupt elections'
Tue Nov 29 12:48, 2016 GMT
BERLIN (Reuters) - German Chancellor Angela Merkel said on Tuesday she had no information on where a cyber attack on Deutsche Telekom, which hit its network on Sunday and Monday, came from.
Merkel says no details on origin of cyber attack on Deutsche Telekom
Tue Nov 29 12:17, 2016 GMT
HONG KONG (Reuters) - Cyber attacks on Chinese companies have soared in the past two years, according to a survey, with new technologies that connect household items to the internet and allow them to receive and send data seen as particularly vulnerable.
Chinese firms hit by huge increase in cyber attacks: survey
Tue Nov 29 10:40, 2016 GMT
BERLIN (Reuters) - Germany's spy chief warned that Russian hackers may target next year's German election with campaigns of misinformation that could undermine the democratic process, echoing concerns voiced by the country's domestic intelligence director.
Spy chief adds to warnings of Russian cyber attacks on Germany
Tue Nov 29 09:40, 2016 GMT
With your help, each year we are able to support more writers, journalists and artists at the free speech front line – wherever they are in the world. The post Defend free speech: Donate to Index on Censorship today appeared first on Index on Censorship .
Defend free speech: Donate to Index on Censorship today
Tue Nov 29 08:23, 2016 GMT
The cybercrime unit of the French military police has shut down the country's largest pirate site, Zone-Telechargement. In addition, the popular download site DL-Protect has also gone offline. With millions of regular visitors, both download portals have been a prime target of local copyright holders for years. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Police Shut Down France’s Largest Pirate Site (Updated)
Tue Nov 29 05:45, 2016 GMT
An unprecedented series of crackdowns on media professionals and news outlets took place during the third quarter of 2016, recorded by Index on Censorship’s Mapping Media Freedom project. Between 1 July and 30 September MMF’s network of correspondents, partners and other sources submitted a total of 406 verified reports of threats to press freedom, a […] The post Media freedom comes under unprecedented crackdown in 3Q 2016 appeared first on Index on Censorship .
Media freedom comes under unprecedented crackdown in 3Q 2016
Mon Nov 28 13:35, 2016 GMT
MoneyMakingArticles Ooma Introduces Internet Security to Make Home Networks Safer and More Secure Business Wire (press release) Ooma Internet Security provides unmatched security and threat detection by blocking viruses, malware and phishing attempts triggered by browsing the internet . It also provides users the choice to block many categories of potentially objectionable web ... Ooma adds Internet security service to VoIP platform | Network World Network World all 5 news articles »
Ooma Introduces Internet Security to Make Home Networks Safer and More Secure - Business Wire (press release)
Mon Nov 28 20:30, 2016 GMT
It's available in Ford's VR app, as well as on its YouTube page.
Watch Ken Block's Gymkhana 9 video in 360-degree VR - Roadshow
Mon Nov 28 16:35, 2016 GMT
Malaysian cartoonist Zulkiflee Anwar Ulhaque, aka Zunar, was arrested on 26 November under the Sedition Act for his cartoons which are deemed insulting to the country's prime minister Najib Razak. The post Malaysia: Cartoonist Zunar arrested on charges of sedition appeared first on Index on Censorship .
Malaysia: Cartoonist Zunar arrested on charges of sedition
Mon Nov 28 13:43, 2016 GMT
Jodie Ginsberg, CEO of Index on Censorship, spoke about hate speech at the 30th anniversary of the Rafto Forum, Bergen, 2016 The post Jodie Ginsberg: The question of hate speech appeared first on Index on Censorship .
Jodie Ginsberg: The question of hate speech
Sun Nov 27 10:22, 2016 GMT
Are you wondering when the latest blockbuster movies will leak online? Then Squawkr might be something for you. The new service allows people to maintain a watchlist of films and sends alerts when a high-quality scene release appears online. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Squawkr Alerts You When a Pirated Movie Leaks Online
Sat Nov 26 20:24, 2016 GMT
Toronto Star UK passes snooping law – now, residents can kiss their Internet privacy goodbye Toronto Star After months of wrangling, Parliament has passed a contentious new snooping law that gives authorities — from police and spies to food regulators, fire officials and tax inspectors — powers to look at the Internet browsing records of everyone in the ... The 48 organisations that can see your entire online browsing history Daily Mail No Privacy For Online Surfing In The UK Anymore? Investigatory Powers Bill Passes, Giving Orgs The Right To Browse ... Gamenguide UK Government Can Ask Internet Providers for Citizens Browsing History legal Insurrection (blog) The Sun  - Fossbytes  - Gloucestershire Live all 37 news articles »
UK passes snooping law – now, residents can kiss their Internet privacy goodbye - Toronto Star
Sat Nov 26 05:21, 2016 GMT
Antiwar.com Trump's New Security Aide Wants to Use Internet to Sow Unrest in Iran Antiwar.com Most recently, her focus has been on Iran, loudly condemning the P5+1 nuclear deal and urging the US to forcibly remove Iran's Internet censorship as an attempt to fuel dissent in the country, on the grounds that a large percentage of Iran's population ... Trump's newest security aide wants to stir up discontent in Iran Sacramento Bee all 193 news articles »
Trump's New Security Aide Wants to Use Internet to Sow Unrest in Iran - Antiwar.com
Fri Nov 25 18:06, 2016 GMT
Zulkiflee Anwar Haque, aka Zunar, a Malaysian political cartoonist, continues to face harassment from the government and its supporters due to his work. The post Malaysia: Cartoonist Zunar attacked by “pro-government thugs” appeared first on Index on Censorship .
Malaysia: Cartoonist Zunar attacked by “pro-government thugs”
Fri Nov 25 16:51, 2016 GMT
Author Ece Temelkuran brings Index up to date about the latest developments in Turkey. The post Ece Temelkuran: It is really amazing here! appeared first on Index on Censorship .
Ece Temelkuran: It is really amazing here!
Fri Nov 25 10:07, 2016 GMT
The post Letter: Hands off our data appeared first on Index on Censorship .
Letter: Hands off our data
Wed Nov 23 17:14, 2016 GMT
Huffington Post UK UK wants to censor 'non-conventional' sex videos TechCrunch Britain's recent pre-occupation with Internet censorship is at once harmless and alarming. It's abundantly clear that any effort to block porn in the UK is short-sighted and nearly every proposed punishment – from ISP controls to payment blocking – are ... UK to censor online videos of 'non-conventional' sex acts The Guardian 'Blocking Extreme Porn' Is A Gateway To Internet Censorship Huffington Post UK Britain ruins the internet , starts porn censorship plan Happy (press release) (registration) (blog) International Business Times UK  - Metro all 33 news articles »
UK wants to censor 'non-conventional' sex videos - TechCrunch
Wed Nov 23 17:10, 2016 GMT
Gospel Herald Facebook May Adhere to China's Internet Censorship to Enter Country Gospel Herald The Chinese government is very strict and censorship has become their staple. International companies would have to comply with China's conditions otherwise they will be banned from the country. Facebook seems to change its tunes. Apparently, the tech ... How and Why Facebook Might Accept Censorship to Get Back Into China Fortune Facebook Said to Create Censorship Tool to Get Back Into China New York Times Facebook has built tool to censor posts in China, report says Washington Post Gamenguide  - ValueWalk  - International Business Times, India Edition all 155 news articles »
Facebook May Adhere to China's Internet Censorship to Enter Country - Gospel Herald
Wed Nov 23 09:43, 2016 GMT
International Business Times UK UK to censor online videos of 'non-conventional' sex acts The Guardian Even some who back age verification questioned such strict censorship . “It's mad that we regulate such material that aren't even criminal acts,” said Prof Clare McGlynn, an expert on pornography laws at Durham University and co-founder of the Centre ... Internet provider can block porn site without age verification system under new UK government plans International Business Times UK 'Non-conventional' porn will be banned from all websites in the UK, BBFC warns Metro all 16 news articles »
UK to censor online videos of 'non-conventional' sex acts - The Guardian
Wed Nov 23 11:14, 2016 GMT
To far too many crooked governments, evil despots, corrupt moguls or power-mad militias, a journalist is more of a threat than even an armed opponent. The post The pen is not a menace: Protecting journalists and journalism appeared first on Index on Censorship .
The pen is not a menace: Protecting journalists and journalism
Wed Nov 23 10:46, 2016 GMT
In India, a court has gone to extreme lengths to protect a new movie distributed by Viacom 18. A so-called John Doe order filed against at least 40 ISPs instructs them to block a minimum of 1,250 websites that might make the newly released Force 2 available to the public. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Viacom 18 Obtains Court Order to Block 1,250 ‘Pirate’ Sites
Wed Nov 23 01:23, 2016 GMT
(Reuters) - Facebook Inc has quietly developed a censorship tool that could persuade China to allow the world's biggest social media network to re-enter the world's second largest economy after a seven-year ban, the New York Times reported on Tuesday.
Facebook builds censorship tool to attain China re-entry: NYT
Wed Nov 23 00:16, 2016 GMT
New software prevents posts from appearing in users' feeds in specific regions, The New York Times reports.
Facebook reportedly created censorship tool for China - CNET
Tue Nov 22 23:21, 2016 GMT
JD Supra (press release) Policing Internet Privacy : FCC's New Frontier JD Supra (press release) Unwilling to be left behind by the likes of Google and Facebook, Internet Service Providers are increasingly exploring how they may capitalize on the high-value targeted advertising market. In November 2016, AT&T explained that targeted advertising is ... and more »
Policing Internet Privacy: FCC's New Frontier - JD Supra (press release)
Tue Nov 22 19:05, 2016 GMT
The Opera web browser feature 'Turbo Mode' is designed to speed up browsing. As a side effect, it also bypasses website blocks, something popular with pirates. However, it appears that the company has been in talks to integrate a blacklist which could stop access to blocked domains. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Opera Browser Asked to Blacklist Pirate Sites in “Turbo Mode”
Tue Nov 22 17:41, 2016 GMT
Julia Farrington, associate arts producer at Index on Censorship, will discuss art and censorship at Hackney Wick at the independent bar and creative space Grow. The post Julia Farrington talks art and censorship appeared first on Index on Censorship .
Julia Farrington talks art and censorship
Tue Nov 22 12:50, 2016 GMT
Fossbytes Top 10 Countries With Highest Internet Censorship in 2016 Fossbytes Short Bytes: The Freedom on the Net 2016 report published by Freedom House brings some insight to the level of internet censorship in the world. Almost 67% internet population uses censored internet . Here are the top 10 countries with highest internet  ... The 5 Worst Places To Be An Internet User In Southeast Asia Forbes all 3 news articles »
Top 10 Countries With Highest Internet Censorship in 2016 - Fossbytes
Tue Nov 22 12:55, 2016 GMT
A Russian cybersecurity company warns of a spate of remotely coordinated attacks on cash machines.
Malware is making ATMs 'spit cash'
Tue Nov 22 10:13, 2016 GMT
BANGKOK (Reuters) - Thailand's military government, which has cracked down on online dissent since seizing power in 2014, is pushing ahead with cyber security bills that rights groups say could mean more extensive online monitoring, raising concerns over privacy protection.
Thailand seeks to tighten cyber security, raising questions about privacy protection
Tue Nov 22 08:16, 2016 GMT
Forbes The 5 Worst Places To Be An Internet User In Southeast Asia Forbes Internet freedom has declined around the world for the sixth year in a row thanks to censorship and government monitoring of messaging apps. While there are worse places to use the internet than Southeast Asia – such as blogging about religious freedom ...
The 5 Worst Places To Be An Internet User In Southeast Asia - Forbes
Tue Nov 22 08:39, 2016 GMT
PC Advisor BullGuard Internet Security v17 PC Advisor There's a strong antivirus engine, of course. A firewall detects and blocks network attacks. The vulnerability scanner highlights missing updates for your applications. The spam filter keeps your Inbox clean, browsing protection prevents you accessing ... and more »
BullGuard Internet Security v17 - PC Advisor
Tue Nov 22 00:42, 2016 GMT
Bitcoin exchange calls agency's request for "John Doe" summons overly broad.
Coinbase fights IRS efforts to obtain customer records - CNET
Mon Nov 21 17:37, 2016 GMT
Common Dreams (press release) Whose Fake News Gets a Pass? NYT Advocates Internet Censorship Common Dreams (press release) In its lead editorial on Sunday, The New York Times decried what it deemed “The Digital Virus Called Fake News” and called for Internet censorship to counter this alleged problem, taking particular aim at Facebook founder Mark Zuckerberg for letting ... Facebook's Plan To Stop "Fake News" Borders On Censorship ETF Daily News (blog) all 391 news articles »
Whose Fake News Gets a Pass? NYT Advocates Internet Censorship - Common Dreams (press release)
Mon Nov 21 12:38, 2016 GMT
A series of attacks and death threats towards journalists and broadcasters has stirred unrest amongst journalists in Europe’s youngest country The post Kosovo: Violence, threats and impunity continue to plague the media appeared first on Index on Censorship .
Kosovo: Violence, threats and impunity continue to plague the media
Sun Nov 20 07:29, 2016 GMT
International Business Times Facebook Fake News Stories: China Calls For More Censorship On Internet Following Social Media's Alleged Role In ... International Business Times China's vision of a more secure cyberspace with rigid censorship comes at a time when the West is debating on the fake news surge and if smartphone companies should cooperate with federal agents to help them gain access to private information in phones ... Rights Groups Warn Tech Firms Over China's Harsh New Internet Regime Radio Free Asia China Presses Tech Firms to Police the Internet Wall Street Journal China says terrorism, fake news impel greater global internet curbs The Indian Express Xinhua  - Patently Apple all 7 news articles »
Facebook Fake News Stories: China Calls For More Censorship On Internet Following Social Media's Alleged Role In ... - International Business Times
Sun Nov 20 19:52, 2016 GMT
NYT Advocates Internet Censorship Consortium News In its lead editorial on Sunday, The New York Times decried what it deemed “The Digital Virus Called Fake News” and called for Internet censorship to counter this alleged problem, taking particular aim at Facebook founder Mark Zuckerberg for letting ... and more »
NYT Advocates Internet Censorship - Consortium News
Sun Nov 20 09:51, 2016 GMT
UK Internet providers have added close to 500 URLs to the national pirate site blocklist. The expansion follows a request from copyright holders who frequently add new proxies for sites that have previously been barred. Despite this mass-update, the ongoing blocking whack-a-mole is far from over. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
UK Piracy Blocklist Silently Expands With Hundreds of Domains
Sat Nov 19 02:00, 2016 GMT
PCMag India F-Secure Internet Security (2017) PCMag India F-Secure Internet Security (2017) enhances its antivirus protection with those browser-safety features, and it includes an easy-to-use spam filter and simple parental control, too. But this collection of components doesn't quite make a top-notch suite ...
F-Secure Internet Security (2017) - PCMag India
Fri Nov 18 18:50, 2016 GMT
The FTC Should Regulate Internet Privacy Heritage.org In an October 25 blog commentary posted at this site, Geoffrey Manne and Kristian Stout argued against a proposed Federal Communications Commission (FCC) ban on the use of mandatory arbitration clauses in internet service providers' consumer service ... and more »
The FTC Should Regulate Internet Privacy - Heritage.org
Fri Nov 18 16:58, 2016 GMT
Washington Post 60 percent of Russians think Internet censorship is necessary, poll finds Washington Post Sixty percent of Russians believe that Internet censorship — in particular, the banning of certain websites and material — is necessary, according to a new poll. Just 25 percent opposed the idea; the rest of the respondents didn't know or declined to ...
60 percent of Russians think Internet censorship is necessary, poll finds - Washington Post
Fri Nov 18 14:19, 2016 GMT
Students at City University of London, home to one of the country’s most respected journalism schools, have voted to ban the Sun, Daily Mail and Express from its campus. Read the full article The post City University students vote for campus ban on Sun, Mail and Express (Guardian) appeared first on Index on Censorship .
City University students vote for campus ban on Sun, Mail and Express (Guardian)
Fri Nov 18 13:21, 2016 GMT
Slate Magazine The U.S. Needs to Stop Lecturing the Rest of the World About Internet Values Slate Magazine Back in 2005 and 2006, there was a series of scandals when U.S. tech firms colluded with internet censorship in China—Yahoo, Microsoft, and Google. In the most infamous case, Yahoo's collaboration was said to have resulted in the imprisonment of a ... Internet freedom on downfall, Ethiopia worst eNCA Pakistan among 10 worst countries for internet freedom The Express Tribune all 8 news articles »
The U.S. Needs to Stop Lecturing the Rest of the World About Internet Values - Slate Magazine
Thu Nov 17 15:34, 2016 GMT
The post Mapping Media Freedom: In review 10-17 November appeared first on Index on Censorship .
Mapping Media Freedom: In review 10-17 November
Fri Nov 18 08:33, 2016 GMT
MOSCOW (Reuters) - Russia's decision to block public access to networking site LinkedIn creates a precedent that could be used to justify blocking access to other sites operating in Russia, RIA news agency quoted the U.S. embassy in Moscow as saying.
U.S. concerned over Russia blocking access to LinkedIn: RIA
Thu Nov 17 17:19, 2016 GMT
WISD focuses on internet security Herald-Banner As classrooms become more technology-driven, a host of security challenges await in the age of the internet for the student population. Whether it be sexting, information security , school filters or educating staff and students on how to navigate such ...
WISD focuses on internet security - Herald-Banner
Thu Nov 17 19:36, 2016 GMT
NBC4i.com 'Better Call Jackson' protects your internet privacy NBC4i.com Internet Explorer – Go to the Privacy tab and click the Advanced button. Check the “Override automatic cookie handling” option, and then set “Third-party Cookies” to “ Block .” Click the OK button. Google Chrome – In the Privacy section, click on the ...
'Better Call Jackson' protects your internet privacy - NBC4i.com
Thu Nov 17 13:32, 2016 GMT
Christians in the UK believe their views are being “shut down” by wider society, the CEO of Index on Censorship Jodie Ginsberg has said. Speaking at Spiked’s ‘Enemies of the state: Religious freedom and the new repression’ event in London on Wednesday, Ginsberg said it was “vital” for everyone to be able to express their […] The post Christians feel their views are being ‘shut down’ says CEO of Index on Censorship (Premier) appeared first on Index on Censorship .
Christians feel their views are being ‘shut down’ says CEO of Index on Censorship (Premier)
Thu Nov 17 14:00, 2016 GMT
Firefox Focus blocks software that website ads use to track your behavior online. Also, say goodbye to tabs and no menus.
​Firefox's new iPhone browser hides you from advertisers' eyes - CNET
Thu Nov 17 07:30, 2016 GMT
WISD focuses on internet security Corsicana Daily Sun As classrooms become more technology-driven, a host of security challenges await in the age of the internet for the student population. Whether it be sexting, information security , school filters or educating staff and students on how to navigate such ... and more »
WISD focuses on internet security - Corsicana Daily Sun
Wed Nov 16 18:07, 2016 GMT
After - unverified - reports of a direct request by North Korea to China to stamp out nicknames referring to Kim Jong-un's weight, social media users are trying to get around the censors.
China clamps down on Kim Jong-un 'fatty' jokes
Thu Nov 17 08:35, 2016 GMT
MOSCOW (Reuters) - Russia's Roskomnadzor communications watchdog said on Thursday it had sent a request to Internet providers to block the website of social media network Linkedin.
Russia begins process to block Linkedin website
Wed Nov 16 21:13, 2016 GMT
WISD focuses on internet security Cleburne Times-Review As classrooms become more technology-driven, a host of security challenges await in the age of the internet for the student population. Whether it be sexting, information security , school filters or educating staff and students on how to navigate such ... and more »
WISD focuses on internet security - Cleburne Times-Review
Wed Nov 16 01:50, 2016 GMT
CNNMoney China holds 'World Internet Conference' as censorship intensifies CNNMoney China's goal "poses a real threat to the global and open nature of the internet ," said Patrick Poon, a researcher at Amnesty International. Amnesty has documented a marked uptick in censorship and restriction of freedom of expression in China over the ... Facebook, Microsoft, LinkedIn and others must resist China's Orwellian vision of the internet Amnesty International China's Xi Jinping Opens Tech Conference With Call for 'Cyber Sovereignty' Wall Street Journal China's Xi urges cooperation among nations in governance of global interne... Reuters CCTV all 48 news articles »
China holds 'World Internet Conference' as censorship intensifies - CNNMoney
Wed Nov 16 21:08, 2016 GMT
WISD focuses on internet security Palestine Herald Press As classrooms become more technology-driven, a host of security challenges await in the age of the internet for the student population. Whether it be sexting, information security , school filters or educating staff and students on how to navigate such ...
WISD focuses on internet security - Palestine Herald Press
Wed Nov 16 16:14, 2016 GMT
Quartz Internet freedom in Ethiopia is the fourth worst in the world Quartz Ethiopia's internet is among the least free in the world. According to a new index released by the nonprofit Freedom House, Ethiopia ranked ahead of only Iran, Syria, and China, out of 65 countries in terms of access to the internet , censorship , and ... and more »
Internet freedom in Ethiopia is the fourth worst in the world - Quartz
Wed Nov 16 15:23, 2016 GMT
Women’s rights defender, writer and blogger Ghada Jamsheer remains in jail in Bahrain The post Bahrain: Human rights defender Ghada Jamsheer remains in jail despite poor health appeared first on Index on Censorship .
Bahrain: Human rights defender Ghada Jamsheer remains in jail despite poor health
Wed Nov 16 13:21, 2016 GMT
Important year for freedom of expression coverage is being recognised in this BSME award, says Jolley. The post Rachael Jolley, editor of Index magazine, receives Editor of the Year award appeared first on Index on Censorship .
Rachael Jolley, editor of Index magazine, receives Editor of the Year award
Wed Nov 16 08:59, 2016 GMT
A complaint from the MPAA has led the cyber-crime division of Ukraine's National Police to raid FS.to, one of the country's most popular pirate sites. Thus far 60 servers have been seized and 19 people have been arrested, but police fear the site could reappear since some individuals are on the run and a mirror site may be standing by in Russia. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Police Raid Pirate Site & Seize 60 Servers Following MPAA Complaint
Wed Nov 16 01:39, 2016 GMT
WISD focuses on internet security Weatherford Democrat As classrooms become more technology-driven, a host of security challenges await in the age of the internet for the student population. Whether it be sexting, information security , school filters or educating staff and students on how to navigate such ...
WISD focuses on internet security - Weatherford Democrat
Tue Nov 15 17:17, 2016 GMT
Fortune Two-Thirds of the World Live Under Government Internet Censorship Fortune S&P Index data is the property of Chicago Mercantile Exchange Inc. and its licensors. All rights reserved. Terms & Conditions. Powered and implemented by Interactive Data Managed Solutions. © 2016 Time Inc. All rights reserved. Fortune.com is a part of ...
Two-Thirds of the World Live Under Government Internet Censorship - Fortune
Tue Nov 15 08:28, 2016 GMT
Bahrain’s public prosecution yesterday charged leading opposition politician Ebrahim Sharif under article 165 of the penal code with “inciting hatred against the regime”. The post Bahrain charges Ebrahim Sharif for AP interview after Prince Charles visit appeared first on Index on Censorship .
Bahrain charges Ebrahim Sharif for AP interview after Prince Charles visit
Tue Nov 15 05:12, 2016 GMT
Is Your Kid Learning About Internet Privacy ? The Interrobang Six year old Claire knows not to share her full name on the internet , but does your child? While we're at it, let's also teach them not to be obnoxious trolls, not to send non consensual dick pics, and stop sharing photos of their brunch… You know ... and more »
Is Your Kid Learning About Internet Privacy? - The Interrobang
Mon Nov 14 23:20, 2016 GMT
Breitbart News Report: Two-Thirds of Planet Live Under Internet Censorship Breitbart News Two-thirds of people on the planet live under government Internet censorship , while Internet freedom has declined for the sixth consecutive year, according to a report from Freedom House. Freedom House discovered that around 67% of Internet users live ... Freedom House warns that internet privacy is eroding fast Inquirer Two-thirds of the world's internet users live under government ... The Verge Global Internet Freedom Declines for 6th Straight Year Morning Consult NPR  - Voice of America  - Economic Times  - Freedom House all 14 news articles »
Report: Two-Thirds of Planet Live Under Internet Censorship - Breitbart News
Mon Nov 14 14:07, 2016 GMT
ITProPortal Is internet security fundamentally flawed? ITProPortal What is the current state of enterprise security ? As it has been for the past several years, the state of enterprise security is badly broken. We are seeing situations with great asymmetry between attacker (some script kiddies) and victim (much of the ... How voice recognition will affect privacy in the Internet of Things CIO The Internet Of Things, DNS Weaknesses, Or Trump: Which Will Sink The Internet ? Forbes IoT security attacks: a timeline of the internet of things' darkest hours RCR Wireless News IDTechEx.com (press release)  - V3.co.uk all 47 news articles »
Is internet security fundamentally flawed? - ITProPortal
Thu Nov 10 17:25, 2016 GMT
Malware threats are ever-present in mobile and this needs to be a top concern for IT execs, as they continue to issue millions of mobile devices to enterprise workers daily. An interesting piece ran in late October at TechTarget examining the protections—or lack of same—that exist for Android apps. It was a legitimate exploration of the issue and it noted that protections are much better in North America, Europe, Japan and Australia than in the rest of the world. The reason for those geographic security differences are that the places listed is where Google itself screens and monitors the apps. And that, ladies and gentlemen, is the real problem. It's about conflict of interest coupled with priorities. As for the conflict, do you really want to leave your security to a search engine firm that makes almost all of its money by selling your data to advertisers? As for the priorities, let's be honest. How much money and resources do you think a Google exec can justify protecting the apps before you can download them? Although it's true that Google has an interest in minimizing embarrassing security leak stories, it has a much greater business incentive in housing as many apps as possible. At the very least, Google wants to offer as many—if not more— apps than their rivals in the iOS offices at Apple. After all, IT managers supporting Android are always looking at Apple, in the same way that IT folk supporting Apple are always looking at Android. Where does this leave things on security? It means that Google will do the bare minimal effort on security—just enough to ferret out the most obvious offenders, so they can say that they did that. If it's of any comfort, Apple does the same level of effort for iOS apps. Apple's priority is selling hardware, software and services—none of which are security. Back to that TechTarget piece on Android. The story offered two other reasons to be comfortable with Android security, two reasons that should actually make you far more nervous. "Google’s statistics claim that 0.16 percent of the apps that users attempted to install from the Play Store in 2015 were found to be malicious. And various studies show that the average Android user only installs about one app per month," the story noted. "Basically, you really need to be unlucky to install a malicious app out of the 2.4 million available in the Play Store." First, enterprise employees download a lot more than one app per month, on an individual basis. But the company overall? It's a mammoth figure. That's because BYOD (Bring Your Own Device) efforts are coupled with corporate-owned devices being distributed. Either way, these devices are going to house a plethora of corporate apps right alongside personal apps. A handful of companies create rock-solid (or so they hope) partitions that supposedly provides some degree of separation between personal and corporate data. This allows for the company to backup corporate data onto their servers, while leaving personal data and apps alone. Even when that works—which isn't often—that does nothing for security risks. Any personal app that is downloaded with malware will have no respect for such a barrier and will infect corporate data with ease, which will then be backed up and do its nefarious damage across your LAN and then your WAN. Partitions are designed for privacy, not security. Secondly, that stat assumes that all apps are created equal, which they are not. When identity thieves or cyber assailants want to infiltrate enterprise networks, they will specifically target the kinds of apps most likely to be used. Indeed, some will target specific companies and research what apps are likely to be installed for those employees. Hence, that 0.16 percent number shouldn't provide any comfort. The story also offers seemingly comforting thoughts about how hard it is to work outside the Android environment. "Going outside of the Play Store does bump up your risk factor, but there is still a process to installing a malicious app that news about Android malware tends to gloss over. The vast majority of Android malware is delivered to devices via 'side loading,' which is to say the app has to be actively installed by the user outside of the Google Play Store environment. This is not a simple process," it noted. "In order to be able to side load an app, a user must first go into the device settings and turn on the option to install apps from 'Unknown Sources' and tap OK on the dialog that pops up warning the user that side loading apps makes 'your phone and personal data more vulnerable to attack.'" For a determined tech-comfortable employee, that's not difficult. And for a determined teenage offspring of said employee? It's a lot more fun than homework. To be fair, though, this misses the point. This suggests that it's safe staying within the Google control mechanism, in the same way that it's presumably safer to stay within Apple's environment. I'll concede that it's safer. It's simply not nearly safe enough. A company needs to control its own security and that means retaining the services of an operation whose priority is maintaining security. If it's a minor hobby far removed from how they make almost all of their money, that's not who you want checking your apps.
How Safe Is It Letting Google And Apple Be Your App Security Team?
Mon Nov 14 17:16, 2016 GMT
Inquirer Freedom House warns that internet privacy is eroding fast Inquirer The Chinese government's crackdown on free expression under president Xi Jinping's 'information security ' policy is taking its toll on the digital activists who have traditionally fought back against censorship and surveillance," said Freedom House ... Two-thirds of the world's internet users live under government censorship : report The Verge Internet Freedom Wanes As Governments Target Messaging, Social Apps NPR Internet freedom on the decline in India: Report Economic Times Estonian World (press release) (blog)  - Phys.Org  - The Memo all 10 news articles »
Freedom House warns that internet privacy is eroding fast - Inquirer
Tue Nov 8 16:15, 2016 GMT
As France continues to push the envelope in terms of enforcing a worldwide “right to be forgotten,” free press advocates in the U.S. have stepped in to help Google defend itself from an order to delist content across the global Internet.  Read the full article The post Journalism groups oppose French global delisting order (Reporters Committee) appeared first on Index on Censorship .
Journalism groups oppose French global delisting order (Reporters Committee)
Mon Nov 14 09:35, 2016 GMT
The post Indian sociologist accused of murder in case she says is retaliation for her work appeared first on Index on Censorship .
Indian sociologist accused of murder in case she says is retaliation for her work
Mon Nov 14 05:43, 2016 GMT
Two-thirds of the world's internet users live under government censorship : report The Verge Two-thirds of the world's internet users live under regimes of government censorship , according to a report released today. The report from Freedom House, a pro-democracy think tank, finds that internet freedom across the globe declined for a sixth ...
Two-thirds of the world's internet users live under government censorship: report - The Verge
Sun Nov 13 10:20, 2016 GMT
DMCA takedown notices are designed to take down infringing content, but they regularly target legitimate content as well. Just recently a local distributor of Dreamworks' "Trolls" movie tried to have several TorrentFreak links removed from Google for merely referencing "copyright trolls." Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
“Trolls” Try to Censor TorrentFreak’s Copyright Trolls Coverage…
Sun Nov 13 03:03, 2016 GMT
Hong Kong Free Press China is the obstacle to Google's plan to end internet censorship Hong Kong Free Press Our 2013 suggestions to Google on how they might end online censorship in China are no longer valid, largely because the Chinese authorities moved to completely block everything Google. Our premise at the time was that Google was too big for the ...
China is the obstacle to Google's plan to end internet censorship - Hong Kong Free Press
Sat Nov 12 09:18, 2016 GMT
Dazeinfo (blog) Facebook Buys Leaked Password on the Internet to Ensure Data Security Dazeinfo (blog) Moreover, Facebook provides tools to its users for tightening up their account's security and maintaining privacy . Some of ... While Facebook is doing everything possible to secure their users' accounts, several hackers continue to keep trying to hack ... and more »
Facebook Buys Leaked Password on the Internet to Ensure Data Security - Dazeinfo (blog)
Sat Nov 12 11:07, 2016 GMT
File-sharers are often portrayed as destroyers of the creative industries but new research suggests that isn't the case. According to the survey, 60% of music pirates also buy music, a figure that drops to 44% among non-sharers. Movie pirates continue the trend by being much more likely to pay than their law-abiding counterparts. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Internet Pirates More Likely to Pay Than Law-Abiding Counterparts
Fri Nov 11 21:01, 2016 GMT
The Pirate Bay and other pirate sites risk a "repeat offender" ban from Google, but not over copyright infringements. Google has updated its safe browsing service, used by modern browsers such as Chrome, Firefox, and Safari, which will now block websites for a minimum of thirty days after being repeatedly marked as harmful. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Pirate Bay Risks “Repeat Offender” Ban From Google
Thu Nov 10 15:26, 2016 GMT
Newsweek How Donald Trump could dismantle net neutrality and the rest of Obama's Internet legacy Washington Post In particular danger are key initiatives of the Obama years, including net neutrality and a pivotal series of Internet privacy regulations that came along with it. ... Providers cannot block or slow videos, for instance, in order to favor email traffic ... What a Trump Presidency Means for Cybersecurity, Net Neutrality and Internet Freedom Newsweek Editorial: Smart privacy protections for Internet users Tampabay.com Net neutrality is suddenly on the chopping block The Verge all 67 news articles »
How Donald Trump could dismantle net neutrality and the rest of Obama's Internet legacy - Washington Post
Fri Nov 11 20:01, 2016 GMT
Your online identity is at risk now more than ever. This week’s cyber news update covers the growing threat of online banking attacks and phishing scams across the globe. Tesco Bank Hacked For Millions... read more The post Cyber News Rundown: Edition 11/11/2016 appeared first on Webroot Threat Blog .
Cyber News Rundown: Edition 11/11/2016
Fri Nov 11 17:26, 2016 GMT
MOSCOW (Reuters) - Two of Russia's largest banks, Sberbank and Alfa Bank, say they have been hit by cyber attacks in recent days.
Two major Russian banks say hit by cyber attacks
Fri Nov 11 08:54, 2016 GMT
The post Mapping Media Freedom: In review 28 October-9 November appeared first on Index on Censorship .
Mapping Media Freedom: In review 28 October-9 November
Fri Nov 11 01:19, 2016 GMT
Bloomberg What a Trump Presidency Means for Internet Privacy Bloomberg Jamil Jaffer, George Mason University director of homeland security law, discusses the impact of a Trump presidency on Internet privacy and cybersecurity. He speaks with Bloomberg's Emily Chang on "Bloomberg Technology." (Source: Bloomberg) ...
What a Trump Presidency Means for Internet Privacy - Bloomberg
Thu Nov 10 23:12, 2016 GMT
NEW YORK (Reuters) - A Florida man is the latest individual to face criminal charges in connection with what U.S. prosecutors say was an illegal bitcoin exchange owned by an Israeli accused of being behind hacking attacks on companies including JPMorgan Chase & Co.
U.S. charges Florida man in case linked to JPMorgan hacking probe
Thu Nov 10 23:58, 2016 GMT
Washington Post Could better Internet security have prevented Trump's shocking win? Washington Post These twin forces — fear and regret — are fueling demands for the tech industry to push a new wave of security and privacy upgrades that would build on those adopted by the tech industry in the aftermath of the revelations by former National Security ... and more »
Could better Internet security have prevented Trump's shocking win? - Washington Post
Thu Nov 10 20:24, 2016 GMT
LONDON (Reuters) - Dutch Bank ABN-AMRO considered sending undercover security staff amid employees to help improve cyber security but has decided not to follow this practice, officials said.
ABN looked at using undercover security staff to prevent cyber attacks
Thu Nov 10 00:00, 2016 GMT
Bitcoin Knots CVE-2016-8889 Local Information Disclosure Vulnerability
Vuln: Bitcoin Knots CVE-2016-8889 Local Information Disclosure Vulnerability
Thu Nov 10 16:25, 2016 GMT
Five Russian banks were hit by a a series of cyber-attacks on 8 November, said the country's banking regulator.
Russia banks hit by cyber-attack
Thu Nov 10 14:12, 2016 GMT
MOSCOW (Reuters) - A Russian court on Thursday upheld a decision to block the website of social networking company LinkedIn, Interfax news agency reported.
Court upholds ban on LinkedIn website in Russia: Ifax
Thu Nov 10 12:32, 2016 GMT
Concentrated media market gives business owners influence over the news The post Exploring Ireland’s decline in media plurality appeared first on Index on Censorship .
Exploring Ireland’s decline in media plurality
Wed Nov 9 15:56, 2016 GMT
Newsweek What a Trump Presidency Means for Cybersecurity, Net Neutrality and Internet Freedom Newsweek “This in turn may lead to more aggressive cyber security policies, faster response to cyber attack campaigns, and greater investment in cyber security defenses.” It remains unclear how clued up Trump is on the actual issues and specific threats facing ... Trump's plan: Tariffs on electronics, ban on skilled tech migrants, cyber-weapons The Register all 18 news articles »
What a Trump Presidency Means for Cybersecurity, Net Neutrality and Internet Freedom - Newsweek
Wed Nov 9 19:25, 2016 GMT
The Mary Sue Internet Privacy 101: VPNs, Encrypted Messaging, and Anonymous Browsing The Mary Sue For no particular reason at all, here are some inexpensive and simple ways that you can beef up the security surrounding your internet presence. Let's just say, totally hypothetically, that you end up living in a country with a fascist regime that ...
Internet Privacy 101: VPNs, Encrypted Messaging, and Anonymous Browsing - The Mary Sue
Tue Nov 8 23:43, 2016 GMT
Corporate Counsel (registration) China Passes Controversial Internet Security Law Corporate Counsel (registration) The Standing Committee of the National People's Congress, China's top legislature, approved the new Cybersecurity Law, which was created for reasons of national security and to curb internet fraud. It will take effect in June 2017. Overseas criticism ...
China Passes Controversial Internet Security Law - Corporate Counsel (registration)
Thu Oct 27 14:54, 2016 GMT
Variety FCC Approves Contentious New Internet Privacy Rules Variety He said that what the FCC was doing was a “common sense step to move forward to protect internet privacy .” “Before today there were no protections,” he said, adding that they were extending to the internet the same concepts that they have extended to ...
FCC Approves Contentious New Internet Privacy Rules - Variety
Wed Nov 9 07:15, 2016 GMT
China's internet censorship is throttling software development Business Standard If you've ever been to mainland China, chances are you're familiar with the Great Firewall, the country's all-encompassing internet censorship apparatus. You know the despair of not being able to open Facebook, the pain of going mute on Twitter. But ...
China's internet censorship is throttling software development - Business Standard
Tue Nov 8 17:11, 2016 GMT
All too often, application development professionals believe that application security is not their responsibility. To make matters worse, this belief is shared by their managers and CIOs, and reinforced by organizational structures and job descriptions. When asked about application security, developers might say: They are responsible only for application functionality and quality. They are not security specialists. They do not have the time or skills to address application security. Their work is not driven by security concerns. Security is not their priority. Their priority is to deliver required application functionality by a deadline and under budget. When asked who should take care of application security, they point to the security team. Asking the security team the same question, you will often hear: Its team members are busy with installing, operating and tuning network firewalls, antivirus software, web gateways, data loss prevention systems, etc. They are not programmers and don’t know programming languages and application development methodologies. Therefore, they cannot be held responsible for application security. At best, they whitelist applications for end-point protection systems. When asked who should be responsible for application security, they point to the development team. Unfortunately, cyberattackers often know security better than application developers, and know application development better than security specialists. Both Dev and Sec feel that they are successful with their objectives, but when it comes to application security, this success is false. The gaps that exist between security and development teams have traditionally resulted in a situation when neither Dev nor Sec addressed application security completely, leaving security gaps exploited by cyberattackers. Bridging the AppSec Gap We believe that, with the emergence and advancement of DevOps and CI/CD, application security can be integrated into these processes, and a great deal of AppSec responsibility can be handed over to development teams without slowing down software development or delivery. Development teams can start by learning and adopting secure coding practices through educational organizations or application security testing vendors. Best practices for secure coding can also be found on websites of organizations such as OWASP. Developers should adopt manual code reviews and, more importantly, automated code reviews conducted by technologies such as static application security testing (SAST) that analyze application code in pre-production states for security vulnerabilities, point to their origin, and offer remediation advice. Developers should also adopt software composition analysis (SCA) technologies that analyze applications for the presence of third-party (mostly open source) components with known security vulnerabilities. At test phases near production, applications should be tested with dynamic testing technologies (DAST) that discover vulnerabilities in running tested applications. Those technologies – SAST, SCA, and DAST – have often been too complex for developers to operate, leaving dedicated experts to operate them. Over time, a few changes have occurred, making it easier for developers to take advantage of them: These technologies are now available as cloud services. Developers do not need to install or operate them. They only need to request their execution from cloud services, which will test applications on developers’ behalf, so that developers will only need to remediate vulnerabilities detected by the services. These technologies can be invoked programmatically via APIs at the defined events, such as upon completion of compilation or build process. These technologies have been evolving to support individual developers, enabling their invocation out of IDEs and returning test results back to IDEs. DevOps has the opportunity to become DevSecOps. It can be rapid, incremental and continuous. And it can be driven by development and operation specialists. It should be their responsibility to ensure that application security processes are invoked at proper phases of the software lifecycle, and that detected vulnerabilities are fixed and protected. If we do that, we close the gaps between great software and great security, and we’re all better off.
The Gap Between Development and Security Specialists Should Be Closed
Tue Nov 8 17:05, 2016 GMT
The EU has in recent years used trade agreements as a venue for promotion of human rights, notably freedom of speech.  Yet, as trade negotiators seek to wrap up trade negotiations on the Trade in Services Agreement (TiSA), the EU seems to have abandoned its promotion of freedom of expression. Read the full article The post Is the EU abandoning its promotion of freedom of expression via trade agreements? (Disruptive Competition Project) appeared first on Index on Censorship .
Is the EU abandoning its promotion of freedom of expression via trade agreements? (Disruptive Competition Project)
Tue Nov 8 14:53, 2016 GMT
LONDON (Reuters) - Britain's National Crime Agency (NCA) is leading a criminal investigation into the theft of money from thousands of bank accounts at Tesco Bank, a unit of Tesco Plc , according to a statement from the National Cyber Security Center (NCSC).
UK's National Crime Agency investigating Tesco Bank cyber attack
Tue Nov 8 12:39, 2016 GMT
Details of people's sexual preferences, health and surfing history have been shared by a browser add-on that rates website privacy and security policies.
Secure browser add-on pulled after privacy lapse
Tue Nov 8 11:23, 2016 GMT
Reuters After cyber attacks, Internet of Things wrestles with making smart devices... Reuters "The harsh reality is that cyber security is not even on the radar of many manufacturers," said Trent Telford, CEO of Covata (CVT.AX), an internet security firm. " Security will eventually become more of a priority, but it may well be too late for this ... and more »
After cyber attacks, Internet of Things wrestles with making smart devices... - Reuters
Tue Nov 8 09:56, 2016 GMT
The post Moddi copy appeared first on Index on Censorship .
Moddi copy
Mon Nov 7 15:09, 2016 GMT
As a Customer Success Manager at Veracode, I work with over 60 clients to help optimize their application security programs. Security programs come in all shapes and sizes, as they should, because not every organization is built the same. However, I’ve worked with enough clients to say that, regardless of whether your organization is in the Fortune 500 or Tom, Dick & Harry, Ltd., there are steps that any company can take to operationalize a successful AppSec program. 1 - Understand Your Application Portfolio First and foremost, understanding your application layer will be the first step to understanding where to focus your remediation efforts. I always tell my customers “you don’t know what you don’t know,” and as your organization introduces more and more applications into the environment, the “don’t know” starts to outweigh the “know” quickly when it comes to potential risk. It’s fairly typical for even the most mature AppSec programs to focus their efforts on web-facing applications or any apps that process critical data (PCI, PII, HIPPA, etc.). However, legacy applications, marketing websites, third-party/open source apps and even internally facing apps comprise some portion of your risk. At the very least, having awareness into your overall application inventory will help your team prioritize its remediation efforts. 2 - Institute Security Into Dev Culture Building a culture of secure coding is an alien concept to a lot of organizations, especially since functionality and deadlines usually trump all else. With that said, more and more security personnel that I speak to are working to institute a culture of security within the development environment by providing their developers context around what secure code actually entails. Many young developers just entering the workforce haven’t been exposed to the nuances of cybercrime, since it is not a major component of many computer science programs. Considering all of this, instituting a programmatic Developer Training curriculum can help bolster the understanding of the inherent risks of software vulnerabilities and how to go about fixing them. This can come in the form of a thorough eLearning program catered to specific programming technologies or, even better, live instructor-led seminars focusing on a specific area of AppSec that is relative to your dev team. There are also a slew of security conferences and roadshows that pop up in almost every major US city (OWASP, BlackHat, DefCon, etc.). It’s never a bad idea to get people out of the office to network with other like-minded security professionals to discuss experiences and best practices. 3 - Establish an Achievable Security Policy Part of instituting a security-minded culture is to make security testing as seamless as possible. I can tell you that instituting a draconian “fix everything” security policy is a surefire way to bring your AppSec program to a screeching halt. Security policies are meant to be aggressive, but attainable, as not every flaw is necessarily exploitable. Setting up a solid application security policy is often an iterative process. Starting with basic policy rules such as disallowing any high- or critical-severity flaws is a good starting point as it provides an actionable baseline without discouraging developers altogether. Over time, as your developers become more accustomed to security testing, you can fine-tune your policy to scale with your program as it matures. Instead of keeping the bar set at disallowing only highs and above, raise the bar to include medium-severity flaws and require more frequent scans before pushing to production. Developer adoption is one of the top reasons why AppSec programs stall, so it pays to minimize the barrier of entry, at least until you can gain traction and promote value across your dev teams. 4 - Integrate Security Testing into the Software Lifecycle Organizations have varying approaches to implementing security testing into their application deployment. Some choose to run tests just prior to launch while others take a more proactive approach and integrate directly into their development lifecycle. I speak to enough developers to know that the last thing they want to do is log into yet another portal to run a scan on their app in hopes of passing policy. They often ask how they can make security testing as streamlined as possible, and my answer always involves incorporating it directly into their development process. Incorporating testing as early in the SDLC as possible is the best way to minimize friction with security teams and ensure that your team is shipping safe code without sacrificing speed to market. That is why I push my more agile customers to integrate testing directly into their CI tools, like Jenkins, so that security scans are automated with each build. This enables dev teams to fix flaws as they find them. Granted, not everyone builds code the same way, but there is almost always a way to incorporate testing at each phase of the development process; it is just a matter of what makes sense for your team. What does success mean for your application security program? We’d love to hear how you’ve leveraged these tactics as well as any others to gain traction with your program.  In addition, you can get more detailed information on how our customers are finding success with their AppSec programs in our recently published State of Software Security report (based on our Platform data).
Tips From the Front Lines: 4 Surefire Ways to Ensure a Successful AppSec Program
Mon Nov 7 22:53, 2016 GMT
Wall Street Journal FBI Warns Internet Online Attacks on Private Industry Will Continue Wall Street Journal The FBI issued the bulletin five days after hackers used a network—called Mirai—of internet -connected devices including cameras and digital-video recorders to launch an attack on internet service provider Dynamic Network Services Inc., known as Dyn ... Hack attacks cut internet access in Liberia BBC News Massive cyber-attack grinds Liberia's internet to a halt The Guardian Massive DDoS Attacks Disable Internet Access Throughout Liberia eSecurity Planet TeenVogue.com  - TopExaminer  - Rappler all 143 news articles »
FBI Warns Internet Online Attacks on Private Industry Will Continue - Wall Street Journal
Mon Oct 31 19:22, 2016 GMT
Before you do anything on your new iPhone or iPad, you should lock it down. This is how you do it.
For privacy and security, change these iOS 10 settings right now
Mon Nov 7 12:38, 2016 GMT
What is worse: intelligence services gathering data without any legal basis or secret services operating within a legal framework that allows them to obtain vast amounts of personal information? The post Tailor-made laws: The state of surveillance in Germany appeared first on Index on Censorship .
Tailor-made laws: The state of surveillance in Germany
Mon Nov 7 07:57, 2016 GMT
The post Arts Fellow 2016 appeared first on Index on Censorship .
Arts Fellow 2016
Mon Nov 7 04:23, 2016 GMT
The post The Unnamed appeared first on Index on Censorship .
The Unnamed
Mon Nov 7 03:42, 2016 GMT
The post Awards 2017 appeared first on Index on Censorship .
Awards 2017
Mon Nov 7 01:43, 2016 GMT
The post ipulse test appeared first on Index on Censorship .
ipulse test
Mon Nov 7 17:51, 2016 GMT
WARSAW (Reuters) - Poland's digital economy minister accused Facebook of censorship on Monday after the company suspended some users' profiles for using a little-known far-right symbol.
Polish minister accuses Facebook of censorship over right-wing symbol
Mon Nov 7 16:55, 2016 GMT
Yes, the government and the cybersecurity industry are on high alert. But they don't expect an attack to bring down the internet. The post Your Government Isn't That Worried About An Election Day Cyberattack appeared first on WIRED .
Your Government Isn’t That Worried About An Election Day Cyberattack
Mon Nov 7 15:09, 2016 GMT
China passes Internet censorship law Washington Examiner (blog) China passes Internet censorship law. By Rudy ... Subscribe today to get intelligence and analysis on defense and national security issues in your Inbox each weekday morning from veteran journalists Jamie McIntyre and Jacqueline Klimas. Sorry, there ...
China passes Internet censorship law - Washington Examiner (blog)
Mon Nov 7 11:35, 2016 GMT
LONDON (Reuters) - The banking arm of Britain's biggest retailer Tesco was scrambling on Monday to deal with an online attack over the weekend on 40,000 customers' accounts, 20,000 of which had money removed.
Cyber fraudsters take money out of 20,000 Tesco Bank accounts
Mon Nov 7 08:08, 2016 GMT
Reuters China passes far-reaching Internet security law The Nation ... on Monday that the new internet security measures should not be seen as a barrier to trade. "This is a misunderstanding, a bias," Zhao said, adding that the law was not designed to limit foreign technology and standards. Tags; China · Internet ... China adopts cyber security law in face of overseas opposition Reuters International Business|China's Internet Controls Will Get Stricter, to Dismay of Foreign Business New York Times China's new cybersecurity law sparks fresh censorship and espionage fears The Guardian Casper Star-Tribune Online  - Geo News, Pakistan all 28 news articles »
China passes far-reaching Internet security law - The Nation
Mon Nov 7 05:20, 2016 GMT
The Guardian China adopts cybersecurity law in face of overseas opposition Reuters Overseas critics of the law argue it threatens to shut foreign technology companies out of various sectors deemed "critical", and includes contentious requirements for security reviews and for data to be stored on servers located in China. Rights ... China adopts controversial cybersecurity law: Xinhua Yahoo News China Approves Law to Tighten Control on Internet Use ABC News China's new cybersecurity law sparks fresh censorship and espionage fears The Guardian The News International all 16 news articles »
China adopts cybersecurity law in face of overseas opposition - Reuters
Sat Nov 5 00:58, 2016 GMT
The Cheat Sheet 4 of the Most Shocking Internet Privacy Laws The Cheat Sheet Many of us still believe outdated privacy myths about our activities online. Most of us aren't sure exactly how we should be protecting our personal information on the internet , and we might not know exactly what laws protect our privacy and our ... and more »
4 of the Most Shocking Internet Privacy Laws - The Cheat Sheet
Fri Nov 4 17:18, 2016 GMT
Nationwide restrictions have been placed on Twitter, WhatsApp, Facebook, YouTube and other social media networks.
Turkish government blocks access to social networks following detention of pro-Kurdish lawmakers - CNET
Fri Nov 4 12:38, 2016 GMT
BBC News Hack attacks cut internet access in Liberia BBC News Liberia has been repeatedly cut off from the internet by hackers targeting its only link to the global network. Recurrent attacks up to 3 November flooded the cable link with data, making net access intermittent. Researchers said the attacks showed ... Massive cyber-attack grinds Liberia's internet to a halt The Guardian FBI: New Malware to Spur More Large-Scale Cyber Attacks Washington Free Beacon The largest DDoS attack ever was probably pulled off by bored teens VICE News New Straits Times Online  - Boing Boing  - IT PRO all 57 news articles »
Hack attacks cut internet access in Liberia - BBC News
Fri Nov 4 10:13, 2016 GMT
WASHINGTON (Reuters) - Federal and state authorities are beefing up cyber defenses against potential electronic attacks on voting systems ahead of U.S. elections on Nov. 8, but taking few new steps to guard against possible civil unrest or violence.
U.S. boosting cyber defenses, but not police presence, for election
Thu Nov 3 19:16, 2016 GMT
The Guardian Massive cyber -attack grinds Liberia's internet to a halt The Guardian The previous target was Dyn, a company that controls a large number of domain name service infrastructure that acts as a switchboard for internet traffic, through which the attack brought down major internet services across Europe and the US including ... Mirai botnet: Massive 'test' cyberattack temporarily knocks out Liberia's internet International Business Times UK How the Mirai botnet almost took down an entire country, and what your business can learn TechRepublic Internet of Things botnet threatens to knock the entire country of Liberia offline Boing Boing Telegraph.co.uk  - ZDNet  - PC Magazine all 23 news articles »
Massive cyber-attack grinds Liberia's internet to a halt - The Guardian
Fri Nov 4 06:00, 2016 GMT
ISTANBUL (Reuters) - Access to social media sites Twitter and Whatsapp was blocked in Turkey on Friday, an internet monitoring group said, following the detentions of 11 pro-Kurdish lawmakers in the mainly Kurdish southeast overnight.
Turkey blocks access to Twitter, Whatsapp: internet monitoring group
Thu Nov 3 08:35, 2016 GMT
The popular movie streaming site 123movies has started redirecting UK and Indian traffic to a new domain name to circumvent local blocking orders. The site's operators are keen to keep their service accessible around the globe to the best of their ability. Taking a page from Pirate Bay's playbook, they're also considering the launch of a network of proxy sites. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
123Movies Circumvents ISP Blocking With New .GS Domain
Wed Nov 2 17:38, 2016 GMT
14 leading press freedom groups urge officials to end abuses under state of emergency The post Turkey: International coalition slams Cumhuriyet arrests and media closures appeared first on Index on Censorship .
Turkey: International coalition slams Cumhuriyet arrests and media closures
Wed Nov 2 15:47, 2016 GMT
Een opmerking van VVD-parlementariër Han ten Broeke over “het nut van publicatie” OneWorld is gesignaleerd door het internationale project Index on Censorship. Ten Broeke vond het vreemd dat het (met overheidsgeld gesubsidieerde) OneWorld regelmatig opinies van activist Quinsy Gario promoot. Read the full article The post Bemoeienis VVD met OneWorld in censuurindex (Villamedia) appeared first on Index on Censorship .
Bemoeienis VVD met OneWorld in censuurindex (Villamedia)
Wed Nov 2 14:26, 2016 GMT
Citing a computer virus outbreak, a hospital system in the United Kingdom has canceled all planned operations and diverted major trauma cases to neighboring facilities. The incident came as U.K. leaders detailed a national cyber security strategy that promises billions in cybersecurity spending, new special police units to pursue organized online gangs, and the possibility of retaliation for major attacks.
Computer Virus Cripples UK Hospital System
Wed Nov 2 13:42, 2016 GMT
To mark the International Day to End Impunity for Crimes Against Journalists, members of Index on Censorship’s youth board prepared a video statement outlining a particular case of impunity The post Index on Censorship’s youth board explores unpunished crimes against journalists appeared first on Index on Censorship .
Index on Censorship’s youth board explores unpunished crimes against journalists
Wed Nov 2 12:36, 2016 GMT
Today is the International Day to End Impunity for Crimes against Journalists. Since 2006, 827 journalists have been killed for their reporting The post #NoImpunity: Those who attack journalists must be held to account appeared first on Index on Censorship .
#NoImpunity: Those who attack journalists must be held to account
Tue Nov 1 20:31, 2016 GMT
(Reuters) - Microsoft Corp said on Tuesday that a hacking group previously linked to the Russian government is behind recent cyber attacks that exploit a newly discovered flaw in its Windows operating system.
Microsoft says Russia-linked hackers exploiting Windows flaw
Tue Nov 1 17:44, 2016 GMT
The British government is investing nearly £2 billion in cybersecurity and vows to respond aggressively when faced with online attacks.
Our cyberdefense will punch back, UK leaders say - CNET
Tue Nov 1 13:56, 2016 GMT
The App Economy is streamrolling along and has the very legitimate potential to rewrite so much of how businesses use technology. Uber obliterated Yellow Taxis, Pandora and Spotify has all but made FM radio irrelevant and streaming video has forced TV and movie theaters to sit in the back seat. But here's the frightening part: Security has also been demoted. Consider a recent study where, according to Dark Reading :  "Researchers surveyed 1,770 senior business and IT executives, including more than 100 CSOs and CISOs, to investigate how their security operations affect business performance. Results indicate businesses view IT security as a business enabler but struggle to deliver stronger protection under the pressure of the app economy. Sixty-eight percent of respondents admit they compromise on security to get apps to market faster." We are seeing a similar lack of security focus with the Internet of Things , although the reasons are a bit more complicated for IoT. Part of this problem comes from the remarkable speed of growth for the App Economy. Even Amazon recently got caught cutting back on its app testing . The truth, though, is that security and apps don't have to be rivals for corporate resources and attention. IT must get comfortable with dealing with both, which will require compromises. To be clear: One compromise that is unacceptable is diluting security protections. But can security operations be more accommodating of apps without undermining their role as chief protector of a company's assets? Absolutely. Much of the conflict between the two is the natural result of a lack of communication and cooperation. When the app team takes their development all the way through and then gets the change requests and/or signoff from every constituent (marketing, various germane line of business managers, even non-IT C-levels) before contacting Security or IT, the trainwreck is inevitable. Security asks for privacy/data-protection changes and the appdev teams resists because the project is 99 percent complete. This casts security as an outsider blocking progress. What if it happens quite differently? What if Security is involved at the very earliest stages, before any coding happens? That way, their suggestions could be made at that earliest stage and it doesn't require anyone to redo work that has been approved by a dozen people. This is all about making Security a key part of the process. That simply organizational/structural change could allow security to be dealt with, but at dramatically less disruption to anyone. App Security doesn't have to equal friction—unless the app team chooses to make it happen that way.
Can Security And The App Economy Learn To Get Along?
Tue Nov 1 16:07, 2016 GMT
After years of legal battles, YouTube and German music rights group GEMA have reached a landmark licensing agreement. As a result, Germans now have access to tens of thousands of music videos that were previously "not available" in their country. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
YouTube Signs Landmark Deal to End Music Video Blocking in Germany
Tue Nov 1 13:40, 2016 GMT
The UK must have the capability to respond in kind to hack attacks says its chancellor.
UK must retaliate versus cyber-attacks says chancellor
Tue Nov 1 10:50, 2016 GMT
LONDON (Reuters) - Russia is pushing its foreign policy in increasingly aggressive ways including cyber-attacks and espionage, posing a growing threat to Britain and the rest of Europe, the head of Britain's internal intelligence agency MI5 has said.
UK spy chief sees growing threat from Russian cyber-attacks, espionage
Tue Nov 1 09:55, 2016 GMT
On 11 September, the people of Belarus elected the lower house of parliament, the House of Representatives. Speaking about the media environment surrounding the elections The post Belarus: Equal media access denied to opposition candidates during election appeared first on Index on Censorship .
Belarus: Equal media access denied to opposition candidates during election
Fri Oct 21 22:50, 2016 GMT
Entertainment Weekly Technology|Hackers Used New Weapons to Disrupt Major Websites Across US New York Times The company, Dyn, whose servers monitor and reroute internet traffic, said it began experiencing what security experts called a distributed denial-of-service attack just after 7 a.m. Reports that many sites were inaccessible started on the East Coast ... Hacked Cameras, DVRs Powered Today's Massive Internet Outage Krebs on Security Widespread cyberattack takes down sites worldwide CNNMoney Mass Internet hack the butt of Black Mirror viral marketing jokes Entertainment Weekly TameBay  - iT News  - The Mercury News  - Krebs on Security all 1,635 news articles »
Technology|Hackers Used New Weapons to Disrupt Major Websites Across US - New York Times
Mon Oct 31 18:19, 2016 GMT
Supporters of GOP presidential nominee Donald Trump apparently create a misspelled hashtag to possibly avoid censorship by the social network.
No typo here: Hashtag #HillaryForPrision is trending on Twitter - CNET
Mon Oct 31 17:07, 2016 GMT
Morning Consult The Effects of the Forthcoming FCC Privacy Rules on Internet Security Freedom to Tinker Although the forthcoming rulemaking targets the collection, use, and sharing of customer data with “third parties”, an important—and oft-forgotten—facet of this discussion is that (1) ISPs rely on the collection, use, and sharing of CPNI to operate ... FCC Holds Off on Security Mandates for Internet of Things Morning Consult The FCC's sweeping new rules to protect your online privacy Chicago Daily Herald How Not to Regulate the Internet Bloomberg CBS Local  - Gizmodo Australia all 68 news articles »
The Effects of the Forthcoming FCC Privacy Rules on Internet Security - Freedom to Tinker
Mon Oct 31 18:13, 2016 GMT
Index on Censorship strongly condemns the recent wave of arrests and forced closures of media outlets in Turkey. The post Index condemns Turkey’s “deteriorating environment for free speech” appeared first on Index on Censorship .
Index condemns Turkey’s “deteriorating environment for free speech”
Mon Oct 31 16:20, 2016 GMT
The trial of prominent Bahraini human rights activist Nabeel Rajab – president of the Bahrain Centre for Human Rights – has been postponed for a fourth consecutive time The post Bahrain: Trial of Nabeel Rajab postponed until 15 December appeared first on Index on Censorship .
Bahrain: Trial of Nabeel Rajab postponed until 15 December
Sat Oct 29 17:47, 2016 GMT
Switzerland's national rail service will begin selling the digital currency Bitcoin at ticket machines.
Swiss railway ticket machines to sell Bitcoin digital currency
Mon Oct 31 08:03, 2016 GMT
iTech Post Can Advanced Tech Protect Internet Security ? iTech Post All these top internet companies have invested heavily in cyber security defenses. For them, it may be surprising how could have been possible to be taken down by a bunch of $100 devices. The latest major cyber attack should be a wake-up call for the ... Last week's record-breaking Internet attack came from 100000 enslaved Web devices Los Angeles Times Attack of the Internet of Things Science Friday Internet Providers Could Be the Key to Securing All the IoT Devices Already out There WIRED Daily Caller  - Dyn  - Arbor Networks all 186 news articles »
Can Advanced Tech Protect Internet Security? - iTech Post
Fri Oct 28 17:24, 2016 GMT
Abccolumbia.com Rules to Protect Internet Privacy Abccolumbia.com Consumer– Power to the consumer, that's what the Federal Communications Commission says its' new rules on internet usage will provide. The commission voting to include rules that require internet providers get a customers' permission to use sensitive ... and more »
Rules to Protect Internet Privacy - Abccolumbia.com
Fri Oct 28 20:24, 2016 GMT
Common Dreams (press release) Internet Privacy In The Age Of WikiLeaks Forbes Newspapers such as the New York Times and Washington Post are today trumpeting with front-page headlines the Federal Communications Commission's decision to crack down on Internet Service Providers all in the name of online consumer “ privacy . The Federal Government's Appropriate Role in Internet Privacy Regulation Heritage.org FCC Passes Sweeping Internet Privacy Rules in 'Big Win for Civil Rights' Common Dreams (press release) The FCC just passed sweeping new rules to protect your online privacy Washington Post Newsmax  - Los Angeles Times  - USA TODAY  - Federal Communications Commission all 250 news articles »
Internet Privacy In The Age Of WikiLeaks - Forbes
Fri Oct 28 19:10, 2016 GMT
Windows Report ESET releases new Internet Security 10 and Smart Security Premium 10 products Windows Report The first product, ESET Internet Security 10, is a product most people that use ESET services will be familiar with. Similar to Smart Security , it provides additional features such as an anti-spam filter, parental surveillance control features for ...
ESET releases new Internet Security 10 and Smart Security Premium 10 products - Windows Report
Fri Oct 28 17:39, 2016 GMT
Aseem Trivedi will join Martin Rowson in London to discuss, draw and debate freedom of expression and solidarity across borders. The post 18 Nov: Satire on the front line appeared first on Index on Censorship .
18 Nov: Satire on the front line
Fri Oct 28 16:56, 2016 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout the European Union and neighbouring countries The post Mapping Media Freedom: In review 21-27 October appeared first on Index on Censorship .
Mapping Media Freedom: In review 21-27 October
Fri Oct 28 12:45, 2016 GMT
The European Court of Justice (ECJ) has just heard a long-running case involving The Pirate Bay, Dutch anti-piracy group BREIN, and a pair of local ISPs. Should the infamous torrent site be blocked at the ISP level, even though it may not be a direct infringer itself? Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Pirate Bay Blocking Case Heard By European Court of Justice
Fri Oct 28 10:07, 2016 GMT
Index readers and contributors gathered to listen to writer Cory Doctorow and tech journalist Geoff White lay out the importance of online privacy and protecting personal data. The post Index magazine launch: “We have reached peak indifference to surveillance” appeared first on Index on Censorship .
Index magazine launch: “We have reached peak indifference to surveillance”
Fri Oct 28 09:04, 2016 GMT
The Government of Bahrain continues to arbitrarily detain Nabeel Rajab, president of the Bahrain Center for Human Rights, founding director of the Gulf Centre for Human Rights The post Urgent appeal to EU to call for the release of Nabeel Rajab appeared first on Index on Censorship .
Urgent appeal to EU to call for the release of Nabeel Rajab
Fri Oct 28 07:56, 2016 GMT
The UK website blocking efforts continue with the High Court adding over a dozen new "pirate" sites to the country’s unofficial ban list. The new order, requested by the Motion Picture Association, requires ISPs to block access to several streaming portals including the popular 123movies.to. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
UK Piracy Blocklist Expands With 123movies and Other Streaming Sites
Thu Oct 27 13:31, 2016 GMT
Amateur hackers probably caused Friday's Internet meltdown, researchers say - Chicago Tribune. Some have worried that the massive cyberattack that disrupted the Internet on Friday was the work of Russian government-backed hackers, politically motivated hacktivists or sophisticated cybercriminals. But researchers at cyber-intelligence ... The ...
Amateur hackers probably caused Friday's Internet meltdown, researchers say - Chicago Tribune
Thu Oct 27 23:10, 2016 GMT
Recent cyber-attacks using botnet armies of hacked "internet of things" devices highlights the pressing need for improved security.
Smart home threat
Thu Oct 27 20:02, 2016 GMT
Common Dreams (press release) The FCC just passed sweeping new rules to protect your online privacy Washington Post Federal officials delivered a landmark ruling in favor of online privacy Thursday, limiting how Internet providers use and sell customer data, while asserting that customers have a right to control their own personal information. Under the Federal ... FCC Passes Sweeping Internet Privacy Rules in 'Big Win for Civil Rights' Common Dreams (press release) The Federal Government's Appropriate Role in Internet Privacy Regulation Heritage.org FCC Approves Contentious New Internet Privacy Rules Newsmax Yahoo News  - hays Post  - Wall Street Journal  - Federal Communications Commission all 124 news articles »
The FCC just passed sweeping new rules to protect your online privacy - Washington Post
Thu Oct 27 21:32, 2016 GMT
Editorial: Is ' internet privacy ' an oxymoron? The Bucknellian October marks National Cyber Security Awareness Month in the United States. Ironically, these past few weeks have revealed WikiLeaks of the Clinton campaign's emails, videos from 2005 coming back to bite Donald Trump, and Ken Bone's Reddit paper trail ... and more »
Editorial: Is 'internet privacy' an oxymoron? - The Bucknellian
Thu Oct 27 17:42, 2016 GMT
Common Dreams (press release) FCC Passes Sweeping Internet Privacy Rules in 'Big Win for Civil Rights' Common Dreams (press release) The Federal Communications Commission (FCC) on Thursday passed sweeping new privacy rules designed to keep broadband providers from giving customers' private data to third parties. The rules, approved by a vote of 3-2, require Internet Service ... The Federal Government's Appropriate Role in Internet Privacy Regulation Heritage.org The FCC just passed sweeping new rules to protect your online privacy Washington Post FCC Approves Contentious New Internet Privacy Rules Newsmax Yahoo News  - hays Post  - Wall Street Journal  - Federal Communications Commission all 114 news articles »
FCC Passes Sweeping Internet Privacy Rules in 'Big Win for Civil Rights' - Common Dreams (press release)
Thu Oct 27 16:36, 2016 GMT
Internet service providers will now have to abide by strict FCC rules when it comes to sharing your personal data with third party advertisers.
FCC adopts controversial online privacy rules - CNET
Thu Oct 27 15:17, 2016 GMT
It may soon become easier for Internet service providers to anticipate and block certain types of online assaults launched by Web-based attack-for-hire services known as "booter" or "stresser" services, new research released today suggests.
Are the Days of “Booter” Services Numbered?
Thu Oct 27 15:38, 2016 GMT
KRASNAYA POLYANA (Reuters) - Russian President Vladimir Putin said on Thursday that cyber attacks or other types of interference in other countries' internal affairs were intolerable.
Russia's Putin says cyber attacks are unacceptable
Thu Oct 27 14:44, 2016 GMT
WASHINGTON (Reuters) - The U.S. Federal Communications Commission on Thursday voted 3-2 to adopt new privacy rules that will subject broadband internet service providers to more stringent requirements than websites like Facebook Inc, Twitter Inc or Alphabet Inc's Google site.
FCC votes to approve new broadband service privacy rules
Thu Oct 27 15:01, 2016 GMT
The Verge The Federal Government's Appropriate Role in Internet Privacy Regulation Heritage.org The Federal Communications Commission (FCC) has proposed a rule that would impose intrusive privacy regulation on broadband Internet service providers (but not other Internet companies), without regard to consumer harm. If implemented, the FCC's rule ... FCC Approves Contentious New Internet Privacy Rules Yahoo News Internet providers will soon need permission to share your web browsing history The Verge Internet provider planning to use or share your personal data? Not so fast, government says Los Angeles Times Forbes all 37 news articles »
The Federal Government's Appropriate Role in Internet Privacy Regulation - Heritage.org
Thu Oct 27 11:00, 2016 GMT
Spain's new "gag law" criminalizes the unauthorized use of police photos. Daniel Mayrit couldn't fight the law, so he decided to exploit it instead. The post Trolling Spanish Cops by Censoring All Their Photos appeared first on WIRED .
Trolling Spanish Cops by Censoring All Their Photos
Thu Oct 27 12:07, 2016 GMT
The undersigned organisations call on Turkey's national assembly to end the recently extended state of emergency, and take immediate steps to repair the damage to freedom of expression The post Turkey: Parliament must defend the health of democracy appeared first on Index on Censorship .
Turkey: Parliament must defend the health of democracy
Wed Oct 26 21:48, 2016 GMT
If a website is suffering from a cyberattack, don't keep trying to get to it.
How we may've made Friday's massive internet outage worse - CNET
Wed Oct 26 16:39, 2016 GMT
NEW YORK (Reuters) - U.S. prosecutors are expected to obtain their second guilty plea in a case related to what they say was an illegal bitcoin exchange owned by an Israeli behind a series of hacking attacks on organizations such as JPMorgan Chase & Co.
U.S. to secure guilty plea in case tied to JPMorgan hack probe
Tue Oct 25 18:42, 2016 GMT
Washington Post Can anyone keep us safe from a weaponized ' Internet of Things?' Washington Post That's what some experts are warning in the wake of a massive cyberattack Friday that used compromised Internet -connected devices like security cameras to disrupt many popular web sites. “These attacks are not going away,” said Ben ... The type of ... Internet Outage Shows How Sophisticated Attacks Can Target Your Home NBCNews.com Who's Responsible When Your DVR Launches a Cyberattack? The Atlantic Your DVR Didn't Take Down the Internet —Yet WIRED Macworld  - Government Technology  - iTech Post  - Krebs on Security all 117 news articles »
Can anyone keep us safe from a weaponized 'Internet of Things?' - Washington Post
Tue Oct 25 23:38, 2016 GMT
Internet block caused by 'non-state actor,' intel director says New York Daily News National Intelligence Director James Clapper says it appears that a “non-state actor” was behind a massive cyberattack last week that briefly blocked access to websites including Twitter and Netflix. Clapper says investigators are gathering a lot of ... and more »
Internet block caused by 'non-state actor,' intel director says - New York Daily News
Tue Oct 25 18:01, 2016 GMT
Cybersecurity professionals are some of the most highly sought after candidates in the job market. With most businesses taking advantage of web applications to streamline their operations, every company is a software company - and they all need security. Before now, the position of security professional remained a bit cryptic. More traditional roles in marketing or sales demonstrated obvious needs and measurable effects toward a successful business. However, as data breaches become more common, leaving companies and their customers vulnerable to attacks, cybersecurity candidates have rocketed to the top of the c-suite’s necessary hires. While all of this seems positive for protecting businesses and consumers at large, there is a sizeable problem.  Despite the opportunities to be had in this burgeoning field, 200,000 cybersecurity positions are unfilled and remain unfillable . This is due to the major education gap in the skills required for security professionals, and the skills taught to computer science, information systems, and engineering students at the university level.   Dark Reading notes a study done by CloudPassage, which found that none of the top 10 computer science or engineering programs require cybersecurity courses for students to get their degree - and that 3 of those schools offer no cybersecurity courses at all. Another study done by Raytheon and the National Cyber Security Alliance found that many millennials don’t seek to enter the cybersecurity industry because they simply do not know what the jobs entail  - especially women. 61% of global participants, as well as US participants, say they are unaware of the typical responsibilities of a cyber career, while 62% of global participants and 64% of US participants say that no mentor or career counselor ever mentioned cybersecurity as a possible career option. As entry level cybersecurity positions require a more robust skill set than others, the first step to fixing this problem is to close the education gap. Given the current job market and trajectory for security professionals - high level security executives are the fastest growing jobs in the cybersecurity space - colleges and universities should be taking steps to ensure students are aware of the full breadth of their options.  Here are five basic steps that higher education institutions can take to place their students in these high-demand jobs with room for professional growth.   Require students in appropriate majors to take cybersecurity courses. Additionally, offer security electives for students in related fields. Make sure your campus career center staff is aware of what a cybersecurity position entails, and what majors and interests lend themselves well to these careers. Have them discuss cybersecurity jobs with students who are interested, or those who may not know how their course of study can fit into the security industry. Invite cybersecurity companies and professionals to campus career fairs to give students a firsthand look at the range of businesses employing these positions. Host a career event with a panel of cybersecurity professionals to talk about the typical responsibilities and career path of the profession. Have professors encourage students in majors such as computer science or engineering to attend. Offer internships or work study programs within the university’s own security team to give students hands-on experience in the field, and a better idea of how they fit. Giving students information and experience in this field will make them more capable while pursuing a cybersecurity careers.  Even if students do not choose to enter the security field, a background in security can also make students more desirable in a host of other jobs, such as developers , as hacks in the application layer become more prolific.
Bridging the Cybersecurity Information Gap in Higher Education
Tue Oct 25 20:22, 2016 GMT
Despite KickassTorrents being taken offline during the summer, the battle to have clones and copies blocked by ISPs continued this week in the Australian Federal Court. Music industry groups and service providers argued over the implementation of blockades, with an old classic raising its head once again. Who will pay to protect the labels' copyrights? Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Aussie KickassTorrents Blocking Battle Continues, Despite Takedown
Tue Oct 25 17:40, 2016 GMT
The Verge Will the Dyn DDoS Attack Lead to Better Internet Security ? Knowledge@Wharton The cyberattacks on October 21 that denied web users access to popular websites such as Twitter, PayPal, Netflix and others was a stark reminder of weak security in an increasingly internet -driven world. The attacks on internet DNS (domain name ... Why it was so easy to hack the cameras that took down the web CNET What Happened to the Internet Last Week -- and Why It Matters ABC News Hacked webcams that helped shut down the internet last week are being recalled The Verge NBCNews.com  - TCC  - The Boston Globe all 389 news articles »
Will the Dyn DDoS Attack Lead to Better Internet Security? - Knowledge@Wharton
Tue Oct 25 16:04, 2016 GMT
SINGAPORE (Reuters) - Singapore telecom operator StarHub Ltd said on Tuesday intentional cyber attacks had caused web connection disruptions for some of its home broadband customers on October 22 and October 24.
Singapore telecoms group StarHub says hit by cyber attacks
Tue Oct 25 00:16, 2016 GMT
CNET Why it was so easy to hack the cameras that took down the web CNET Security experts have been warning for a few years that internet -connected devices are susceptible to hacking. They just didn't know exactly what hackers might do once they broke into your connected television, refrigerator or thermometer, for example. Who's Responsible When Your DVR Launches a Cyberattack? The Atlantic Your DVR Tried To Shut Down The Internet Gearbrain (blog) all 10 news articles »
Why it was so easy to hack the cameras that took down the web - CNET
Tue Oct 25 16:08, 2016 GMT
Your baby monitor may have contributed to last week's massive internet hack MarketWatch One 2014 study from Avast found that 79% of home internet networks were at risk of hacking due to poor privacy practices like easily guessable or default passwords on routers. ... Anthony Grieco, senior director of security and trust organization at ... and more »
Your baby monitor may have contributed to last week's massive internet hack - MarketWatch
Tue Oct 25 15:32, 2016 GMT
Impress has been recognised as an approved regulator by the Press Regulation Panel under the Royal Charter. The post Section 40 of Crime and Courts Act 2013 poses threat to press freedom appeared first on Index on Censorship .
Section 40 of Crime and Courts Act 2013 poses threat to press freedom
Tue Oct 25 10:23, 2016 GMT
The Crime and Courts Act 2013, as it stands, is a danger to a free press. Under the act, a publisher can be ordered to pay both sides' costs in a dispute if the publisher is not a member of an approved regulator. The post Letter: Crime and Courts Act 2013 danger to free press appeared first on Index on Censorship .
Letter: Crime and Courts Act 2013 danger to free press
Tue Oct 25 04:26, 2016 GMT
Morning Consult Internet Privacy : Just the Facts Hightech Forum In my last post, I reported on a press call by Senator Markey and a group of activists in support of the FCC's Internet Privacy NPRM. I found the call extremely unhelpful because of significant factual gaps and errors in the story the activists told ... How the Broadband Industry Could Challenge FCC's Privacy Rules Morning Consult all 4 news articles »
Internet Privacy: Just the Facts - Hightech Forum
Mon Oct 24 09:11, 2016 GMT
NBCNews.com Internet Outage Shows How Sophisticated Attacks Can Target Your Home NBCNews.com Cyber crime has moved closer to home than ever. The cyber attack that slowed many popular websites to a crawl last week is attracting new scrutiny to the security of the so-called " Internet of Things." The attack last week used a new type of malware ... Cyber-Attack Harnesses " Internet of Things" to Shut Down Websites Democracy Now! Hackers Used New IoT Weapon For Friday's Internet Attack iTech Post How Your Internet -Enabled Device Could Be Hijacked to Launch Cyber-Attacks ABC News Fortune  - BankInfoSecurity.com (blog)  - Recode all 64 news articles »
Internet Outage Shows How Sophisticated Attacks Can Target Your Home - NBCNews.com
Tue Oct 25 01:34, 2016 GMT
SAN FRANCISCO (Reuters) - Obama administration officials sought on Monday to reassure the public that it was taking steps to counter new types of cyber attacks such as the one Friday that rendered Twitter, Spotify, Netflix and dozens of other major websites unavailable.
U.S. takes aim at cyber attacks from connected devices as recalls mount
Mon Oct 24 23:23, 2016 GMT
Hackers exploited connected "smart" devices for massive cyberattack CBS News Federal investigators believe the attackers used malware called “mirai” to access devices in people's homes that are connected to the internet , like thermostats, fitness trackers, smart TVs and even baby monitors. “People tend to put these devices on ... and more »
Hackers exploited connected "smart" devices for massive cyberattack - CBS News
Mon Oct 24 23:19, 2016 GMT
Are hack attacks aimed at the technology behind Bitcoin and other virtual currencies undermining confidence in the digital cash world?
Blockchain bandits hit crypto start-ups
Mon Oct 24 17:16, 2016 GMT
Macworld What Happened to the Internet Last Week -- and Why It Matters ABC News He has since consulted for private companies on cyber issues and is the author of the book “Cyber War: The Next Threat to National Security and What to Do About It.”] Somebody finally did what internet experts have been fearing for years. That somebody ... Why the Internet broke and you couldn't do anything about it Macworld Internet Outage Shows How Sophisticated Attacks Can Target Your Home NBCNews.com ​How to defend against the internet's doomsday of DDoS attacks ZDNet iTech Post  - CircleID  - Yahoo News all 151 news articles »
What Happened to the Internet Last Week -- and Why It Matters - ABC News
Mon Oct 24 11:44, 2016 GMT
Macworld Why the Internet broke and you couldn't do anything about it Macworld The promise of the Internet of Things (IoT) is that everything that does something in your home will have an Internet connection. So your thermostat, security camera, alarm system, television set, DVR, kitchen scale and bathroom scale, refrigerator ... ​How to defend against the internet's doomsday of DDoS attacks ZDNet Internet Outage Shows How Sophisticated Attacks Can Target Your Home NBCNews.com Cyber-Attack Harnesses " Internet of Things" to Shut Down Websites Democracy Now! iTech Post  - IT World Canada  - eWeek all 102 news articles »
Why the Internet broke and you couldn't do anything about it - Macworld
Mon Oct 24 14:38, 2016 GMT
Democracy Now! Cyber-Attack Harnesses " Internet of Things" to Shut Down Websites Democracy Now! The attack employed thousands of web cameras, DVRs and other internet -enabled household devices, which were infected by malware. Internet security experts have long warned that devices on the so-called " Internet of Things" are poorly protected and ... and more »
Cyber-Attack Harnesses "Internet of Things" to Shut Down Websites - Democracy Now!
Mon Oct 24 13:17, 2016 GMT
Award-winning Malaysian cartoonist Zunar, who faces up to 43 years imprisonment for tweeting his cartoons criticising his country’s leaders reported on 17 October that he has had a travel ban imposed blocking him from travelling outside the country. The post Malaysia imposes travel ban on award-winning cartoonist appeared first on Index on Censorship .
Malaysia imposes travel ban on award-winning cartoonist
Mon Oct 24 08:00, 2016 GMT
After the brutal murders of other writers in his country, Ananya Azad moved to Germany when he began to receive death threats. The post “I have a name”: A Bangladeshi blogger on why he risked his life letting his identity be known appeared first on Index on Censorship .
“I have a name”: A Bangladeshi blogger on why he risked his life letting his identity be known
Sun Oct 23 21:00, 2016 GMT
On April 15, 2015, a network engineer noticed a strange signal emanating from the US Office of Personnel Management. That was just the tip of the iceberg. The post Inside the Cyberattack That Shocked the U.S. Government appeared first on WIRED .
Inside the Cyberattack That Shocked the U.S. Government
Sat Oct 22 01:03, 2016 GMT
Cyberattacks on key internet firm disrupt internet services Orlando Sentinel Withering cyberattacks on server farms of a key internet firm repeatedly disrupted access to major websites and online services including Twitter, Netflix and PayPal across the United States on Friday. The White House called the disruption malicious ... and more »
Cyberattacks on key internet firm disrupt internet services - Orlando Sentinel
Sat Oct 22 16:04, 2016 GMT
legal Insurrection (blog) Internet security expert: “We believe this attack was just a test, and more attacks will come” legal Insurrection (blog) The ONLY long term fix is to have major internet players (Google, Facebook, Twitter, etc.) threaten to block ALL traffic from non-compliant ISPs. 16. We believe this attack was just a test, and more attacks will come (most likely on different targets). Hacked Cameras, DVRs Powered Today's Massive Internet Outage Krebs on Security Hackers Used New Weapons to Disrupt Major Websites Across US New York Times Homeland Security Is 'Investigating All Potential Causes' of Internet Disruptions TIME WIRED  - CNNMoney  - Entertainment Weekly  - Gizmodo all 957 news articles »
Internet security expert: “We believe this attack was just a test, and more attacks will come” - legal Insurrection (blog)
Sat Oct 22 11:42, 2016 GMT
CBS News New World Hackers group claims responsibility for internet disruption CBS News Withering cyberattacks on server farms of a key internet firm repeatedly disrupted access to major websites and online services including Twitter, Netflix and PayPal across the United States on Friday. The White House called the disruption malicious ... and more »
New World Hackers group claims responsibility for internet disruption - CBS News
Sat Oct 22 09:28, 2016 GMT
By now, most UK Internet users have gotten used to pirate sites being blocked by their ISPs. However, instead of 'going legal' it turns out that many people simply move on to unblocked sites, or find other tricks to circumvent the restrictions. Today, we take a look at the most used 'pirate' sites in the UK, with some surprising results. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Pirate Sites Remain Popular in the UK, Despite Website Blockades
Fri Oct 21 22:09, 2016 GMT
Krebs on Security Hacked Cameras, DVRs Powered Today's Massive Internet Outage Krebs on Security As I noted in The Democratization of Censorship , to address the threat from the mass-proliferation of hardware devices such as Internet routers, DVRs and IP cameras that ship with default-insecure settings, we probably need an industry security ... Global internet outages continue as second wave of cyber attack cripples web servers Telegraph.co.uk Widespread cyberattack takes down sites worldwide CNNMoney A massive cyberattack blocked your favorite websites; FBI and Homeland Security are investigating Los Angeles Times Entertainment Weekly  - iT News  - Windows IT Pro  - Gizmodo all 670 news articles »
Hacked Cameras, DVRs Powered Today's Massive Internet Outage - Krebs on Security
Fri Oct 21 19:16, 2016 GMT
Warren Lends Support to FCC Internet Privacy Rules Morning Consult Progressive favorite Sen. Elizabeth Warren (D-Mass.) came out in support of the Federal Communications Commission's new privacy regulations for broadband service providers, set for an agency vote next week. “Right now we have no #broadband # privacy  ...
Warren Lends Support to FCC Internet Privacy Rules - Morning Consult
Fri Oct 21 20:49, 2016 GMT
  DDoS Attack on Dyn Crippled the Internet A portion of the internet went down after suffering a crippling blow from a series of global attacks on a cloud-based Internet Performance Management (IPM) company,... read more The post Cyber News Rundown: Edition 10/21/2016 appeared first on Webroot Threat Blog .
Cyber News Rundown: Edition 10/21/2016
Fri Oct 21 20:59, 2016 GMT
USA TODAY East coast Internet service attacks 'coming in waves' USA TODAY SAN FRANCISCO — Multiple waves of online attacks blocked many major websites Friday, at times making it impossible for users on the East Coast to access Twitter, Spotify , Netflix, Amazon, Tumblr, Reddit and other sites. The cause was a large-scale ... Internet Attack Disrupts Major Websites New York Times What We Know About Friday's Massive East Coast Internet Outage WIRED Blame the Internet of Things for today's web blackout Engadget Entertainment Weekly  - TIME  - Techworm  - Gizmodo all 500 news articles »
East coast Internet service attacks 'coming in waves' - USA TODAY
Fri Oct 21 20:44, 2016 GMT
NBC New York 3rd Cyberattack 'Has Been Resolved' After Hours of Major Outages: Company NBC New York A third wave of denial-of-service attacks on a key piece of internet plumbing was resolved by late Friday, said the company that was targeted. Internet infrastructure company Dyn Inc. told CNBC earlier in the day that the third wave was underway ... and more »
3rd Cyberattack 'Has Been Resolved' After Hours of Major Outages: Company - NBC New York
Fri Oct 21 21:31, 2016 GMT
Daily Mail Twitter, Spotify and Reddit are among major sites taken OFFLINE in massive shock cyber attack Daily Mail A massive co-ordinated series of cyber attacks has forced hundreds of major websites from Amazon to Twitter offline across the globe - and WikiLeaks believes its supporters were responsible. It urged its backers to 'stop taking down the US internet ... and more »
Twitter, Spotify and Reddit are among major sites taken OFFLINE in massive shock cyber attack - Daily Mail
Fri Oct 21 21:32, 2016 GMT
Twitter, Spotify, Reddit, Soundcloud and several other sites have been affected by three web attacks.
Cyber attacks briefly knock out top sites
Fri Oct 21 17:35, 2016 GMT
Hackers disrupt Internet service of major websites with multiple attacks - Chicago Tribune. Cyberattacks on a key internet firm repeatedly disrupted the availability of popular websites across the United States Friday, according to analysts and company officials. The White House described the disruption as malicious. Members of a hacker group ...
Hackers disrupt Internet service of major websites with multiple attacks - Chicago Tribune
Fri Oct 21 19:36, 2016 GMT
(Reuters) - PayPal Holdings Inc said on Friday that it has experienced some service disruptions due to the cyber attack on Dyn that caused Internet outages for its customers.
PayPal says some customers unable to make payments due to cyber attack on Dyn
Fri Oct 21 13:29, 2016 GMT
Slate Magazine (blog) This Is Probably Why a Whole Lot of the Internet Went Down This Morning Slate Magazine (blog) Update, October 21, 11:00 a.m.: Internet infrastructure company Dyn acknowledged that a distributed denial of service attack against its systems had caused disruptions. According to Dyn's post, the disruptions primarily affected customers throughout ... US Internet Repeatedly Disrupted by Cyberattacks on Key Firm ABC News What We Know About Friday's Massive East Coast Internet Outage WIRED Reported hack disrupts internet across East Coast WQAD.com CBS News all 25 news articles »
This Is Probably Why a Whole Lot of the Internet Went Down This Morning - Slate Magazine (blog)
Fri Oct 21 09:33, 2016 GMT
Russia’s recent elections have been described as “the dullest in recent memory”. But as Index on Censorship’s Mapping Media Freedom project shows there was no shortage of media violations The post Russia’s recent election was awash with media violations appeared first on Index on Censorship .
Russia’s recent election was awash with media violations
Fri Oct 21 13:47, 2016 GMT
(Reuters) - Some major internet companies suffered service disruptions on Friday due to what internet infrastructure provider Dyn said was a cyber attack that affected some sites, mainly for users on the U.S. East Coast.
U.S. web provider says probing East Coast cyber attack
Fri Oct 21 11:09, 2016 GMT
For the good of society, American cartoonist Mike Diana was jailed without bail in 1994. So ruled a jury at the Pinellas County court in Florida, taking just 90 minutes to find him guilty of obscenity following a week-long trial in March of that year. Diana was the first – and to date, only – […] The post New documentary looks at the only cartoonist to be jailed for obscenity in the USA appeared first on Index on Censorship .
New documentary looks at the only cartoonist to be jailed for obscenity in the USA
Fri Oct 21 08:15, 2016 GMT
The Wire Internet Censorship : Making the Hidden Visible The Wire When YouTube relayed this decision back to the Pakistan Telecommunications Authority (PTA), the decision was made to block YouTube. Although Pakistan has been intermittently blocking content since 2006, a more persistent blocking ... “The goal of a ...
Internet Censorship: Making the Hidden Visible - The Wire
Wed Oct 19 22:24, 2016 GMT
iNews US Urged Ecuador to Act Against WikiLeaks Leader Assange NBCNews.com Quiet pressure from the U.S. government played a role in Ecuador's decision to block WikiLeaks founder Julian Assange from using the internet at Ecuador's London embassy, U.S. officials told NBC News. "It was a bit of an eviction notice," said a senior ... How is the Ecuadorian Embassy blocking Julian Assange from using the internet ? iNews Ecuador confirms it 'temporarily' shut off Julian Assange's internet Wired.co.uk WikiLeaks founder Julian Assange increasingly isolated as Ecuador blocks his internet access The Australian Twitter  - Twitter  - Associated Press all 327 news articles »
US Urged Ecuador to Act Against WikiLeaks Leader Assange - NBCNews.com
Thu Oct 20 16:34, 2016 GMT
How dangerous are your app security holes? Sadly, they are quite dangerous and getting far more so. In a study released Tuesday (Oct. 18) that examined billions of lines of code from 300,000 assessments performed over the last 18 months, a stunning 97 percent of Java applications contained at least one component with a known vulnerability. To be fair, that probably isn't that surprising. Nor should it surprise any veteran security specialist that 60 percent of apps fail security testing in the first scan or that more than half of the examined apps were affected by misconfigured secure communications. What is surprising is the lax approach that so many companies are taking with such a monumental security nightmare. Today, a cybercriminal can focus on a single vulnerability in one component to exploit millions of applications. Software components are used by every industry and for software of all kinds, and given our dependence on applications, the ease at which millions of applications can be breached has the potential to create havoc in our digital infrastructure and economy. ~ Brian Fitzgerald, CMO, Veracode Here's more non-surprises: Standard time-tested (but unexciting) security tactics—things like remediation coaching, sandbox testing, continuous scanning and eLearning—were found to improve security as much as six-fold. These approaches do work, when dealt with in a rigorous and serious manner. In so many ways, security effectiveness is about attitude. A simple and consistent approach of using known security monitoring and testing tools really does work. That, however, requires company management to first accept that these holes are real and dangerous to the company in a litany of ways. The tools are here today. The attitudes, frighteningly enough, are what's lagging. "The prevalent use of open source components in software development is creating unmanaged, systemic risks across companies and industries," said Brian Fitzgerald , CMO of Veracode, which performed the study. "Today, a cybercriminal can focus on a single vulnerability in one component to exploit millions of applications. Software components are used by every industry and for software of all kinds, and given our dependence on applications, the ease at which millions of applications can be breached has the potential to create havoc in our digital infrastructure and economy." Let's drill down into one of these key defenses: continuous scanning. Whether the app is operating at the desktop or mobile level, there are two entirely distinct areas of security concern: what the itself can do—it's code alone—of security concern and what it actually does when interacting with the OS and networks and other apps. As for the first element—which we'll call code at rest—that is dangerous enough, especially when the code is open-source or third party. You don't even need to get into the issue if you trust the company that provided the app. If malware is lurking inside, the ISV may not know it, either. And remember that there are two kinds of security holes: deliberate efforts (aka malware): and unintended privacy/security holes, where data can leak. Both are troublesome but it's the second that bypass standard security safeguards. That's precisely why watching the data while it is interacting with everything it has to work with—battlefield conditions, if you will—is so critical and that is what continuous scanning is all about. Sandbox testing is essential as it will isolate the app while testing. Otherwise, you could release malware into your network a split-second before you discover it. Or, for that matter, a split-second after. None of this is especially helpful, of course, unless your people know what to look for and what to do about it when they find it, which is where e-learning and remediation coaching come in. It's critical to understand that this is a winning battle, but your people have to set aside the resources to do it properly. Cyberthieves are so very much hoping you don’t. Read the full report here: https://www.veracode.com/soss blockquote.full-width:before { position: absolute; top: 10px; left: 0px; content: "\f10d"; font: 2em "FontAwesome"; color: #808080; } blockquote.full-width { position: relative; border: none; width: 90%; padding-left: 40px; padding-bottom: 10px; margin:auto; } blockquote.full-width p{ font-size: 20px; font-style: italic; font-weight: 800; line-height: 20px; color: #808080; }
The App Security Battle Is Winnable, But Only If You Suit Up
Thu Oct 20 16:44, 2016 GMT
Index on Censorship believes that everyone has the right to express their opinion, no matter how vile or offensive those views, unless their words directly incite violence. The post IPSO right to reject Channel 4 complaint appeared first on Index on Censorship .
IPSO right to reject Channel 4 complaint
Thu Oct 20 11:09, 2016 GMT
Ukrainian rock musician and activist Andriy Klyvynyuk spoke to Index on Censorship of his support for Oleg Sentsov and the other Ukrainian political prisoners held by Russia. The post Andriy Klyvynyuk voices support for Ukrainian political prisoners in Russia appeared first on Index on Censorship .
Andriy Klyvynyuk voices support for Ukrainian political prisoners in Russia
Thu Oct 20 10:27, 2016 GMT
I remember the happy clowns of my childhood when the family would sit in front of the TV during the festive holidays to delight at the magnificent The post Manick Govinda: Defending the free expression of creepy clowns appeared first on Index on Censorship .
Manick Govinda: Defending the free expression of creepy clowns
Wed Oct 19 19:45, 2016 GMT
Internet Privacy Week: Sign The Bill Of Rights & Raise Money For The EFF Techdirt We've teamed up with Namecheap and the EFF to promote Internet Privacy Week and continue the fight to protect your privacy online. Show your support by signing and sharing the new Internet Privacy Bill of Rights. and more »
Internet Privacy Week: Sign The Bill Of Rights & Raise Money For The EFF - Techdirt
Wed Oct 19 15:23, 2016 GMT
This week’s National Cyber Security Awareness Month theme of “recognizing and combating cybercrime” brings up an elementary but crucial point about why our efforts to fight cybercrime seem inadequate for the challenge: it can be really difficult to fix what’s broken even when we know exactly what the problem is. Here’s an example. When a sick patient comes to a doctor complaining about pain, it’s important to immediately address the patient’s suffering. A good doctor will want to understand what caused the pain in the first place. With abdominal pain, for example, is it temporary – such as gas caused by an unhealthy diet? Or is it a chronic condition like Crohn’s disease? When the problem is identified, the doctor can prescribe the right medication and advise the patient on preventive measures to promote ongoing good health. But then the real challenge begins. The patient has to go forth and actually follow doctor’s orders, make health-conscious decisions and change lifestyles. Cybercrime is a huge and growing problem, with many types of attacks – from financially-motivated crime like 419 email scams and insidious ransomware, to politically-motivated hacktivist attacks and state-sponsored advanced persistent threat schemes. One of the most persistent and widespread problems in cybersecurity is application vulnerabilities – application-layer attacks are the most common source of confirmed breaches, according to the 2016 Verizon Data Breach Investigation Report . Although we have diagnosed the source of the application-layer threat – vulnerabilities that result from coding weaknesses – we still fail in our efforts to address the threats with preventive measures. Veracode research shows the enormous scale of the problem. More than 60 percent of applications fail to pass the OWASP Top 10 security policies on initial assessment, according to the latest Veracode State of Software Security report.   If addressing failures in application security were simply a matter of throwing enough money and resources at the problem, you might expect big, resource-rich companies to have it under control. But that is simply not the case. Even the biggest and brightest stars in the high-tech galaxy, like Facebook and Google, struggle with vulnerabilities in their applications. Just recently, a security researcher discovered that the French version of Google’s website had a Cross-Site Scripting vulnerability that bad actors could have exploited to steal private information or take over a victim user’s browser. The cause of common but preventable application vulnerabilities like Cross-Site Scripting (or XSS) is deep-seated and systemic – symptomatic of the way applications are built and how developers are trained. The vast majority of applications are built using third-party and open source components, so when there is defective code in commonly-used components, vulnerabilities are widely distributed. Developers may not be aware that they are using components with defective code and organizations may not know what components they are using and where. In addition, developers aren’t trained in secure coding. Even though XSS is an OWASP Top 10 vulnerability, just 11 percent of developers know how to prevent XSS, according to a 2014 Denim Group study . Is it really surprising that Veracode research shows 50% of applications have at least one XSS vulnerability on initial assessment? Given the systemic nature of these problems, the solution to application risks must be a systematic approach to security, including: A comprehensive application security (AppSec) program that includes static and dynamic testing of all code, including software composition analysis of open-source, third-party components and vendor-supplied software. A developer-friendly training program , such as online courses and video tutorials, to help developers recognize common coding weaknesses and learn preventive, secure coding practices. Of course, it’s not possible to eliminate all risk. People and programs are fallible. Mistakes happen. Applications we think are secure today may turn out to have built-in defects we won’t recognize until tomorrow. But there are some things we can control, particularly with developer training. It’s possible to get that low-hanging fruit and cut down on easily preventable errors. Online learning is proven to work: according to the 2016 State of Software Security report , development teams with an eLearning program reduce flaw density by 55 percent from initial to subsequent scans, on average. That’s opposed to just a 9 percent reduction in flaw density for teams without an eLearning program. If you have a developer training program, how could you make it better ? And if you don’t, what better time to begin your focus on developer training than National Cyber Security Awareness Month? If you want to know more about how Veracode is helping developers learn secure coding skills, watch a short video demonstration of our eLearning platform . And you can register to see a free sample course in XSS , which demonstrates a basic XSS attack and provides remediation training for Java and .NET developers.  
Why Even Google Is Susceptible to the Most Basic Website Vulnerabilities
Wed Oct 19 15:23, 2016 GMT
BRUSSELS (Reuters) - Website owners are free to store users' internet addresses to prevent cyber attacks, the European Union's top court said on Wednesday, rejecting a claim from a German privacy activist who sought to stop the practice.
Websites free to store IP addresses to prevent cyber attacks: EU court
Wed Oct 19 15:33, 2016 GMT
Nigerian writer Ken Saro-Wiwa Junior has died in London, aged 47, following a stroke. The writer and presidential adviser had recently written for Index on Censorship The post Ken Saro-Wiwa Junior dies, age 47 appeared first on Index on Censorship .
Ken Saro-Wiwa Junior dies, age 47
Wed Oct 19 14:03, 2016 GMT
WASHINGTON (Reuters) - U.S. bank regulators on Wednesday outlined cyber security standards meant to protect financial markets and consumers from online attacks against the nation's leading financial firms.
U.S. calls on banks to set higher cyber security standards
Wed Oct 19 13:55, 2016 GMT
We, the undersigned organisations, recognise that the Turkish government has the right and responsibility to investigate the violent events of the July 2016 coup attempt and to bring all those responsible to justice. The post Turkey: State of emergency provisions violate human rights and should be revoked appeared first on Index on Censorship .
Turkey: State of emergency provisions violate human rights and should be revoked
Wed Oct 19 10:58, 2016 GMT
MUMBAI (Reuters) - Axis Bank Ltd, India's third-biggest private sector lender by assets, said on Wednesday there was no loss to its customers from a recent cyber attack.
India's Axis Bank says no loss from cyber attack
Wed Oct 19 09:15, 2016 GMT
At it's best, trolling is a form of satire. But those who reduce it to nasty and humourless online threats don’t deserve the title. The post Alex Krasodomski-Jones: Where have all the good trolls gone? appeared first on Index on Censorship .
Alex Krasodomski-Jones: Where have all the good trolls gone?
Wed Oct 19 05:04, 2016 GMT
Digital Trends WikiLeaks: Ecuador says it blocked Assange's internet over U.S. election meddling Digital Trends As Julian Assange sits in the Ecuadorian Embassy in London twiddling his thumbs and contemplating life without the internet , his WikiLeaks site is continuing to dump masses of sensitive material on the web for everyone and his dog to peruse. ... to ... Ecuador admits it has 'temporarily restricted' Assange's Internet access USA TODAY Wikileaks: Ecuador Cut Off Assange's Internet Access PC Magazine Ecuador Cuts Internet of Julian Assange, WikiLeaks' Founder New York Times The Daily Dot  - Breitbart News  - VentureBeat  - Twitter all 710 news articles »
WikiLeaks: Ecuador says it blocked Assange's internet over U.S. election meddling - Digital Trends
Wed Oct 19 02:16, 2016 GMT
USA TODAY Ecuador admits it has 'temporarily restricted' Assange's Internet access USA TODAY Ecuador acknowledged Tuesday that it has “temporarily restricted” Internet access for WikiLeaks founder Julian Assange at its embassy in London, after his whistleblowing site published documents from Hillary Clinton's presidential campaign. Ecuador's ... WikiLeaks: Ecuador says it blocked Assange's internet over U.S. election meddling Digital Trends Wikileaks: Ecuador Cut Off Assange's Internet Access PC Magazine Ecuador Cuts Internet of Julian Assange, WikiLeaks' Founder New York Times The Daily Dot  - Breitbart News  - VentureBeat all 710 news articles »
Ecuador admits it has 'temporarily restricted' Assange's Internet access - USA TODAY
Fri Oct 14 18:02, 2016 GMT
Corporate execs are understandably worried these days about all of their electronic communications. Whether messages can be intercepted by corporate spies working for the opposition, government investigators snooping for terrorists or cyberthieves looking to steal what they can get, anything that is intercepted can wind up somewhere else. See Edward Snowden. It's therefore quite understandable why there is much corporate enthusiasm for instant message systems that boast point-to-point encryption. Note that we're not saying end-to-end encryption because, technically, that can't exist. Well, it could exist, but then no one on either end could read anything. Point to point is the better way to reference messages that are encrypted after they are sent and then unencrypted right before they are opened by the intended recipient. The next decision companies must make are whether to go outside for encryption services and, if so, what they will ask those vendors to do. Going outside for the encryption effort itself will be the choice for almost all companies that don't happen to have—as companies including Target, Boeing and Chase do—teams of cryptographers on the payroll. So, for most, they will indeed need outside help. The thornier decision is where the company will house the encrypted files and where the decrypting keys will reside. That will speak to the security of the enduser company—in other words, how equipped are they to securely protect such data and keys—and the perceived security and trust level of that outside vendor. There is no right answer to that question as both options have serious pros and cons. On the one hand, an outside company that specializes in data protection would, theoretically, be able to justify a much greater security investment, both in systems and specialized personnel. The problem is trust. That's not merely trust in that vendor's employees and contractors. It's also trust that they can protect their data from attackers. With a few exceptions, companies that house the data and decryption keys for lots of customers will be more high-valued targets than the typical individual company. This is for the same reason that payments processors and credit card companies are bigger targets than their retail customers. There are obviously exceptions, such as the largest retailers (Walmart could easily house more payment credentials than many smaller payments processors) and companies with especially valuable data, such as military contractors who are constantly attacked by well-financed government spies for hostile countries. But there's another trust consideration. Does the vendor have any business interests that would make them tempted to look at—and leverage—your data? As absurd as that they sound, companies have been known to trust their most sensitive data to just such a firm. And that brings us to Google. Google has recently started pushing an encrypted version of its Allo messenging service to businesses. Why not? Many of those companies are already trusting Google's Gmail with oceans of their most sensitive e-mails. But in this aspect of app security, endusers may have really good reasons to consider a pure security company, rather than a marketing firm that desperately wants to access their data. Consider this excerpt from a Washington Post story about Google's Allo efforts : "Google started offering users end-to-end encryption for the first time Wednesday with its new Allo instant-messaging app. The move makes Google the latest company to follow a tech trend that has privacy advocates cheering but some law enforcement officials worried. Conversations in Allo are not automatically protected by that extra secure form of encryption, which allows only those who send and receive messages to unlock them. Rather, users can choose to have 'incognito' conversations that feature the security measure — much like a system that Facebook is testing in its Messenger app. Other conversations in Allo are still encrypted between the app and Google's servers, but that means the tech company will be able to access the content of those messages." Let's bottom line that. Unless customers happen to use this "incognito" option—and it must be done individually, as opposed to with a master setting done by a company's IT operation—the encrypted messages can all be seen by Google. That's a pretty scary default setting. Forget about what happens if a cyberthief breaks into Google's systems or if a Google employee/contractor goes rogue and tries selling the data to the highest bidder—all of which are quite plausible scenarios. Google itself might love to mine your data and then resell access to that data to quite a few of its customers. That is their primary revenue source, after all. Security firms at least have a business model focused solely on security—and sometimes specifically app security. That's worth a big chunk of your consideration if you really want to keep your messaging contents secret.
Message Encryption Is Great—Depending On Who Has The Key
Fri Oct 14 15:30, 2016 GMT
Application security is an emerging and critical aspect of a security program; however, all AppSec attitudes are not created equal. Unlike other security initiatives, application security affects a lot of different people in your organization – and in different ways. A developer’s attitude toward and concerns about an application security program will not be the same as a member of the legal department, and a CTO’s will be completely different. Understanding the different priorities of the groups that will be affected by AppSec, and what they are going to need from the initiative, will go a long way toward AppSec success. Here’s what each team cares about and how AppSec affects those priorities. Dev: All About Deadlines Beyond the security team, AppSec affects developers more than any other individuals in your organization. Developers want their code to be secure, but not at the expense of their deadlines. Application security can’t be a development roadblock, or it will simply be overlooked or bypassed. Application security solutions should work the way developers work, and developers should have a voice in the planning of any application security program. C-Level: All About the Bottom Line What’s the ROI? Will it save us money, time, make us more efficient? Will it reduce our risk? These are the questions the C-suite will want answered around AppSec. Because of their focus on the health of the business and the bottom line, this group doesn’t want to hear about the technology of the solution, but about the business impacts. Talk to them about the numbers surrounding AppSec, and you’ll increase your chances of getting their support. Legal: All About Words Make your legal team an AppSec helper, rather than hindrance. If you’re a software vendor, or if you are including third-party applications in your AppSec program, the legal team will want to make sure the words are right – whether it’s a contract for applications you are purchasing, or a contract for software you are selling. The legal team will need to be part of any contract negotiation to ensure your requests of vendors are legal, and your practices for testing third-party applications do not breach your customer contract. In addition, the legal team will help you craft language around your own security posture in situations where you are the software vendor. Marketing: All About Reaching the Market Marketing is all about outreach, which today means a heavy use of new technology and tools to connect and share information with prospects and customers. Marketing departments are spinning up websites and landing pages, purchasing and creating mobile apps, hiring third-party contractors to help with automation and purchasing applications from third-party vendors. But introducing all this technology also frequently means they are introducing lots of risk. Make sure marketing is aware of application security, corporate AppSec policies and the implications of their innovations. Do you have a plan for working with the various groups in your organization on AppSec? Get more details with our guide, Joining Forces: Why Your Application Security Initiative Needs Stakeholder Buy-In .
AppSec: From the Breakroom to the Boardroom
Tue Oct 18 10:45, 2016 GMT
ITWeb Internet ' censorship ' Bill may see changes ITWeb The Bill, labelled by some as the " Internet Censorship Bill", has come under fierce scrutiny since it was first gazetted, with many calling for it to be overhauled for infringing on freedom of speech. Opponents of the Bill have voiced concerns over the ... and more »
Internet 'censorship' Bill may see changes - ITWeb
Tue Oct 18 08:00, 2016 GMT
We, the undersigned organisations, write to you regarding the systematic targeting of journalists, human rights defenders and online activists by the Internal Security Service (ISS) in Oman. The post Joint letter to the Sultan of Oman on the right of press freedom and the targeting of journalists and human rights defenders appeared first on Index on Censorship .
Joint letter to the Sultan of Oman on the right of press freedom and the targeting of journalists and human rights defenders
Mon Oct 17 17:08, 2016 GMT
Plus, we discuss Samsung testing the Galaxy Note 7's explosive batteries in-house, along with the tech behind marijuana.
Was Julian Assange censored by a government? (The 3:59, Ep. 124) - CNET
Mon Oct 17 16:08, 2016 GMT
76 Groups Urge FCC to Move on Internet Privacy , Set-Top Box Rules Morning Consult Consumer advocates such as Public Knowledge, Consumers Union and the New America Foundation's Open Technology Institute are among 76 groups that on Monday called on the Federal Communications Commission to advance rules aimed at opening ... and more »
76 Groups Urge FCC to Move on Internet Privacy, Set-Top Box Rules - Morning Consult
Mon Oct 17 12:00, 2016 GMT
We live in serious times, what with civil wars, US elections and the threat of Marmite rationing. But there's always room in the news for outrage about a joke. The post Timandra Harkness: I prefer comedy that challenges the audience appeared first on Index on Censorship .
Timandra Harkness: I prefer comedy that challenges the audience
Sun Oct 16 23:00, 2016 GMT
Cambridge Network Internet censorship : making the hidden visible Cambridge Network Despite being founded on ideals of freedom and openness, censorship on the internet is rampant, with more than 60 countries engaging in some form of state-sponsored censorship . A research project at the University of Cambridge is aiming to uncover the ...
Internet censorship: making the hidden visible - Cambridge Network
Thu Oct 6 22:36, 2016 GMT
Los Angeles Times FCC revises Internet privacy proposal; UN deal reached on aircraft emissions Washington Post A privacy proposal unveiled Thursday will require broadband providers such as Verizon and Comcast to get your permission before sharing with advertisers your phone or computer data. The Federal Communications Commission has changed its broadband ... FCC proposal would let Internet providers share your 'non-sensitive' data without your permission Los Angeles Times The FCC wants ISPs to get permission before sharing your data Engadget FCC Chairman's Privacy Plan Lets Consumers Govern ISP Data Tracking Deadline Federal Communications Commission  - Federal Communications Commission all 137 news articles »
FCC revises Internet privacy proposal; UN deal reached on aircraft emissions - Washington Post
Fri Oct 14 18:27, 2016 GMT
InfoWorld ISPs mind their MANRS to block DDoS attacks | InfoWorld InfoWorld The Internet Society's MANRS initiative improves Internet security by asking ISPs to clean up their routing rules and check network traffic. and more »
ISPs mind their MANRS to block DDoS attacks | InfoWorld - InfoWorld
Fri Oct 14 16:56, 2016 GMT
Slate Magazine (blog) What Ken Bone's Porn Preferences Tell Us About Internet Privacy Today Slate Magazine (blog) Ken Bone—undecided voter, red sweater aficionado, star of the second presidential debate—likes pregnancy porn. He also thinks the killing of Trayvon Martin was “justified” and allegedly committed felony insurance fraud. We know all this because Bone ... and more »
What Ken Bone's Porn Preferences Tell Us About Internet Privacy Today - Slate Magazine (blog)
Fri Oct 14 17:06, 2016 GMT
French TV Network Brought Down By Hacker Group Earlier this year, it was reported that TV5Monde fell victim to a cyberattack that nearly caused the demise of the network. Rather than gain access... read more The post Threat Recap: Week of October 10 appeared first on Webroot Threat Blog .
Threat Recap: Week of October 10
Fri Oct 14 09:11, 2016 GMT
MINSK (Reuters) - A Belarussian court started on Friday a closed trial of a blogger - known for his fierce criticism of Russia - who is accused of inciting hatred and distributing pornography in a case activists say is politically motivated.
Anti-Russia blogger stands trial in Belarus
Thu Oct 6 14:54, 2016 GMT
The Economist The internet of stings The Economist Edith Ramirez, chairwoman of America's Federal Trade Commission, said as much in January 2015 when she delivered a polite but blistering speech about privacy and security practices at one of the electronic industry's main trade meetings, the Consumer ... When smart goes bad: Why internet security does not just refer to computers Lexology (registration) ​Death of the internet : GIF at 11 ZDNet Hackers Release Botnet Code, Raising Specter of More Attacks Wall Street Journal CSO Online  - Naked Security  - Krebs on Security  - Krebs on Security all 77 news articles »
The internet of stings - The Economist
Fri Oct 14 10:02, 2016 GMT
After 29 years of circulation, Himal Southasian, which claims to be the only analytical and regional news magazine for South Asia, will cease to publish as of November 2016. The post Leading Nepal editor speaks out about independent media facing censorship in South Asia appeared first on Index on Censorship .
Leading Nepal editor speaks out about independent media facing censorship in South Asia
Thu Oct 13 17:25, 2016 GMT
The RIAA has submitted its most recent overview of "notorious markets" to the U.S. Government. As usual, the music industry group lists various torrent sites, download portals and stream ripping sites as direct threats. In addition, it points out that these sites are becoming harder to take enforcement action against, since they increasingly use CloudFlare. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
RIAA: CloudFlare Shields Pirates and Frustrates Blocking Efforts
Thu Oct 13 13:02, 2016 GMT
Multiple stories published here over the past few weeks have examined the disruptive power of hacked "Internet of Things" (IoT) devices such as routers, IP cameras and digital video recorders. This post looks at how crooks are using hacked IoT devices as proxies to hide their true location online as they engage in a variety of other types of cybercriminal activity -- from frequenting underground forums to credit card and tax refund fraud.
IoT Devices as Proxies for Cybercrime
Thu Oct 13 08:13, 2016 GMT
South China Morning Post China's internet censors target video viewers' live comments South China Morning Post The move reflects the increasingly intrusive and pre-emptive internet censorship on the mainland, as authorities get more assertive about controlling online information. The decree, released by the internet security department of the Shanghai Public ...
China's internet censors target video viewers' live comments - South China Morning Post
Wed Oct 12 19:09, 2016 GMT
Ball State Daily Child pornography cases lead to internet privacy concerns Ball State Daily ... on intellectual freedom and the right to inquiry and digital privacy . The lecture was prompted by faculty concerns about how much access the Office of Information Security Services has to internet search information on computers using the Ball ...
Child pornography cases lead to internet privacy concerns - Ball State Daily
Wed Oct 12 15:38, 2016 GMT
On Monday 10 October, Belarus Free Theatre hosted Freedom of Expression in Ukraine, an event at the House of Commons in solidarity with Oleg Sentsov The post Russia: Belarus Free Theatre calls for the release of jailed Ukranian filmmaker Oleg Sentsov appeared first on Index on Censorship .
Russia: Belarus Free Theatre calls for the release of jailed Ukranian filmmaker Oleg Sentsov
Tue Oct 11 23:54, 2016 GMT
ABC Local What does the hack on the BOM website tell us about Australia's internet security ? The 2016 Australian Cyber ... ABC Local Details of an overseas internet attack on the Australian Bureau of Meteorology's computer system have been revelaed in the 2016 Australian Cyber Security Centre Threat report. A foreign power managed to install malicious software known as malware ... and more »
What does the hack on the BOM website tell us about Australia's internet security? The 2016 Australian Cyber ... - ABC Local
Wed Oct 12 02:15, 2016 GMT
SYDNEY (Reuters) - A malware attack against Australia's Bureau of Meteorology which might have spread into other government networks originated from a foreign intelligence service, an official report by the country's cyber defense agency said on Wednesday.
Australia government cyber attack came from foreign intelligence service: report
Wed Oct 12 03:07, 2016 GMT
An official report into a 2015 cyber attack on the Australian Bureau of Meteorology concludes it was carried out by foreign spies.
Australia weather bureau hacked by foreign spies, says report
Tue Oct 11 14:46, 2016 GMT
WASHINGTON (Reuters) - The Group of Seven industrial powers agreed to guidelines on how to protect the financial sector from cyber attacks, Japan's finance ministry said on Tuesday.
G7 sets cybersecurity guidelines for financial sector
Tue Oct 11 13:05, 2016 GMT
(Reuters) - Cyber-security firm Symantec Corp said on Tuesday that a second hacking group has sought to rob banks using fraudulent SWIFT messages, the same approach that yielded $81 million in the high-profile February attack on Bangladesh's central bank.
Second hacker group targets SWIFT users, Symantec warns
Tue Oct 11 08:19, 2016 GMT
In this extract from Index on Censorship's Autumn issue, Mark Frary looks at some of the tactics you can use to remain safe and invisible when browsing The post How to stay anonymous online appeared first on Index on Censorship .
How to stay anonymous online
Tue Oct 11 08:57, 2016 GMT
HANOI (Reuters) - Vietnamese police have detained a prominent blogger for posting anti-state reports, including one about civilians dying in police custody, which they said undermined trust in the ruling Communist Party.
Vietnam detains blogger after police custody deaths post
Tue Oct 11 03:54, 2016 GMT
Breitbart News MILO: Obama is Handing The Internet Over To 'Kebabs, Censorship , And Religious Fanatics' Breitbart News In a speech entitled “Obama Just Handed The Internet Over To Monsters,” MILO explained why President Obama's plans to hand over control of the internet to an unknown unaccountable organisation will be a disaster for freedom of speech. and more »
MILO: Obama is Handing The Internet Over To 'Kebabs, Censorship, And Religious Fanatics' - Breitbart News
Mon Oct 10 22:46, 2016 GMT
US intelligence officials have accused Russia of trying to influence the outcome of the US presidential election by deploying cyber-attacks.
Did Russia hack the US Democrats?
Mon Oct 10 20:45, 2016 GMT
Your lack of internet privacy is part of Yahoo's business plan - Chicago Tribune. What's perhaps more remarkable, though, is how little privacy American internet users demand. First came news ... Before resigning, Yahoo's chief information security officer, Alex Stamos, pushed for the company to adopt end-to-end encryption. This ...
Your lack of internet privacy is part of Yahoo's business plan - Chicago Tribune
Mon Oct 10 14:39, 2016 GMT
BERLIN (Reuters) - A nuclear power plant became the target of a disruptive cyber attack two to three years ago, and there is a serious threat of militant attacks on such plants, the head of the United Nations nuclear watchdog said on Monday.
IAEA chief: Nuclear power plant was disrupted by cyber attack
Mon Oct 10 12:43, 2016 GMT
Access to online storage systems, including DropBox, GitHub and Microsoft OneDrive, was blocked in Turkey on Saturday.
Turkey blocks web drives after email leak
Mon Oct 10 10:42, 2016 GMT
Naija247news Nigerian Users' Privacy under the Protection of new Kaspersky Internet Security – multi-device Naija247news Kaspersky.co.za) announces the availability of the new version of its flagship security solution, Kaspersky Internet Security – multi-device in Nigeria, which provides users with additional opportunities to manage their Internet protection and to ... and more »
Nigerian Users' Privacy under the Protection of new Kaspersky Internet Security – multi-device - Naija247news
Mon Oct 10 10:15, 2016 GMT
Asena Günal, the program coordinator of Depo which is a center for arts and culture at Tophane, Istanbul, looks at how Turkey's art community has come under increasing pressure in the past year The post Turkey: Art in troubled times appeared first on Index on Censorship .
Turkey: Art in troubled times
Mon Oct 10 05:22, 2016 GMT
A powerful cyber-attack came close to destroying a French TV network, its director-general tells the BBC.
How France's TV5 was almost destroyed
Sat Oct 8 20:25, 2016 GMT
Running a fully functional website in a regular browser without any central servers being involved sounds complicated, but with Web2Web it isn't. The project, powered by WebTorrent and bitcoin, allows anyone to create updatable websites that are as resilient as it gets. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Web2Web: Serverless Websites Powered by Torrents & Bitcoin
Sat Oct 8 09:33, 2016 GMT
Faced with the possibility that website blocking may not achieve its goals, Russia is now considering fresh opportunities for decreasing online file-sharing. Sources familiar with negotiations say that authorities are mulling a system of fines which would target individual downloaders. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Russia Mulls Downloading Fines if Site Blocking Fails
Sat Oct 8 09:54, 2016 GMT
MOSCOW (Reuters) - U.S. accusations that Russia was responsible for cyber attacks against Democratic Party organizations lack any proof and are an attempt by Washington to fan "unprecedented anti-Russian hysteria", the Foreign Ministry in Moscow said.
Russia says U.S. cyber attack claims fan anti-Russian hysteria
Fri Oct 7 19:43, 2016 GMT
WASHINGTON (Reuters) - The U.S. government on Friday formally accused Russia of a campaign of recent cyber attacks against Democratic Party organizations.
U.S. accuses Russia of hacking attempts on political groups
Fri Oct 7 09:19, 2016 GMT
On Thursday 6 October, human rights groups gathered outside the UK's Foreign and Commonwealth Office to hold a vigil for imprisoned Bahraini human rights advocate, Nabeel Rajab The post Bahrain: Protesters call for Nabeel Rajab’s release appeared first on Index on Censorship .
Bahrain: Protesters call for Nabeel Rajab’s release
Fri Oct 7 14:07, 2016 GMT
Russian authorities have reportedly arrested Maxim Ryabyko, the head of one of the leading anti-piracy agencies. Several sources suggest that he offered to help drop a criminal investigation against an Internet entrepreneur with alleged connections to the pirate site Lib.rus.ec, in exchange for 50 million rubles. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Russian Anti-Piracy Chief Arrested in ‘Fraud’ Investigation
Fri Oct 7 11:47, 2016 GMT
Museums are increasingly under pressure from funders, the press and donors to change their programming, displays and events. As part of the Museum Association's annual conference Index on Censorship's Julia Farrington will tale about Index's guides for arts organisations dealing with controversial exhibitions. The post 7 Nov: Museums are increasingly under pressure appeared first on Index on Censorship .
7 Nov: Museums are increasingly under pressure
Fri Oct 7 11:15, 2016 GMT
Just before my last trip to Chechnya in mid-September my colleagues at Novaya Gazeta began to receive threats and were told to pass on the message that I shouldn’t go to Chechnya any more. If I did, my life would be in danger. As always, our paper has its ‘own people’ on the general staff and the ministry of defence — people who broadly share our views The post Anna Politkovskaya: Standing alone appeared first on Index on Censorship .
Anna Politkovskaya: Standing alone
Fri Oct 7 08:29, 2016 GMT
Writing in the latest Index on Censorship magazine, fellow Russian journalist Andrey Arkhangelsky reflects on Anna Politkovskaya's legacy The post Andrey Arkhangelsky reflects on Anna Politkovskaya’s legacy appeared first on Index on Censorship .
Andrey Arkhangelsky reflects on Anna Politkovskaya’s legacy
Fri Oct 7 09:34, 2016 GMT
On 24 September Index on Censorship’s CEO, Jodie Ginsberg, gathered with former BBC chief news correspondent Kate Adie and 2016 Index award-winning journalist Zaina Erhaim The post Podcast: How are women journalists shaping war reporting today? appeared first on Index on Censorship .
Podcast: How are women journalists shaping war reporting today?
Fri Oct 7 07:19, 2016 GMT
Forcing ISPs to block pirate sites can be both time-consuming and expensive but it doesn't have to be that way. A voluntary scheme in Portugal has streamlined the process and won the backing of the MPAA, who say that the system is the best international example of anti-piracy practices. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
MPAA Says Portugal’s Pirate Site-Blocking System is World Leader
Thu Oct 6 20:42, 2016 GMT
The agency backs away from imposing stricter data collection rules on broadband and wireless companies than on Facebook, Twitter and Google.
FCC's internet privacy proposal just got a little weaker - CNET
Thu Oct 6 18:18, 2016 GMT
CNET FCC revises internet privacy rule proposal CNET In a major shift in policy, the agency said Thursday Wheeler has changed his proposal for regulating privacy practices of internet service providers to keep them in line with the Federal Trade Commission's approach. The FCC's proposal is considered the ... Internet service providers would need customer permission to share sensitive data under FCC proposal Los Angeles Times These are the privacy rules your Internet provider might soon have to live by Washington Post FCC to vote this month on privacy rules for internet providers The Hill ABC News  - Deadline all 31 news articles »
FCC revises internet privacy rule proposal - CNET
Mon Oct 3 08:58, 2016 GMT
Graham Cluley Security News Download the Mirai source code, and you can run your own Internet of Things botnet Graham Cluley Security News ... to change, to weak or non-existent encryption, to no infrastructure for updating devices if a vulnerability is found at a later date. As I explain in the video below, an internet of things which doesn't treat security and privacy as a priority puts ... Here are the 61 passwords that powered the Mirai IoT botnet CSO Online Source Code for IoT Botnet 'Mirai' Released Krebs on Security KrebsOnSecurity Hit With Record DDoS Krebs on Security Ars Technica  - Wikipedia  - MalwareTech all 108 news articles »
Download the Mirai source code, and you can run your own Internet of Things botnet - Graham Cluley Security News
Thu Oct 6 17:38, 2016 GMT
Los Angeles Times Internet service providers would need customer permission to share sensitive data under FCC proposal Los Angeles Times But AT&T Inc., Charter Communications Inc, Verizon Communications Inc. and other providers of high-speed Internet service would not have to get a user's approval before sharing any other “non-sensitive” data, such as a person's name and address ... FCC Proposal: Internet Providers Must Ask to Share Your Data New York Times FCC Chairman's Privacy Plan Lets Consumers Govern ISP Data Tracking Deadline FCC Moves to Let You Control How ISPs Use Your Data PC Magazine all 17 news articles »
Internet service providers would need customer permission to share sensitive data under FCC proposal - Los Angeles Times
Thu Oct 6 10:11, 2016 GMT
CSO Online Taking down the internet : possible but how probable? CSO Online You may not have to imagine it, according to Bruce Schneier, CTO of Resilient Systems, cryptography guru, blogger and international authority on internet security . In a recent post titled, "Someone is Learning How to Take Down the Internet ," he wrote ... When smart goes bad: Why internet security does not just refer to computers Lexology (registration) Hackers Release Botnet Code, Raising Specter of More Attacks - WSJ Wall Street Journal The Internet of Things: How Vulnerable Is It? Government Technology CEPro  - Sky Valley Chronicle  - Naked Security all 27 news articles »
Taking down the internet: possible but how probable? - CSO Online
Thu Oct 6 10:49, 2016 GMT
Ahead of the anniversary of her murder, Index has compiled a reading list of articles written for the magazine both by Politkovskaya and about her The post Index remembers Anna Politkovskaya appeared first on Index on Censorship .
Index remembers Anna Politkovskaya
Thu Oct 6 09:18, 2016 GMT
Chrome and Firefox are again blocking direct access to The Pirate Bay's download pages. According to Google's safe browsing program, ThePirateBay.org is a "deceptive site" that may steal user information. The TPB crew has been alerted to the issue and hope it will be resolved soon. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Chrome and Firefox Brand The Pirate Bay As a “Phishing” Site…..Again
Thu Oct 6 09:35, 2016 GMT
Bahrain's judicial harassment of award-winning human rights defender must end The post Bahrain: Nabeel Rajab sentencing postponed to 31 Oct appeared first on Index on Censorship .
Bahrain: Nabeel Rajab sentencing postponed to 31 Oct
Wed Oct 5 17:36, 2016 GMT
I am not a developer, I’m a writer. However, it has become clear to me that these two professions have more in common than I had originally thought. Really, we are doing the same thing - just in different languages, and to different ends. The gratification that comes from starting with a blank page, building something that didn't exist before, and achieving a purpose, is the same. I write quickly. I get excited about an idea and take off without a second thought. The end result? Pages of content that convey a message, but also a lot of typos, misplaced commas, and dangling modifiers - an English teacher's nightmare. At this point I must sift back through my work - read it to myself, read it aloud, ask others to read it - and then finally, hours or days later, I have my finished, polished content. If my writing was checked as I went, my editing process could have been easier, more efficient, and more accurate. But to do that without interrupting my creative flow requires automation. The same is true for developers. Developers write code quickly because they too are in a creative flow, and because deadlines loom . In today’s fast paced market, there is precious little time to devote to reviewing every line of code, despite the consensus that code review is a best practice. Security is often the last thing on a developer’s mind, after functionality and performance. However, not “proofreading” code with an eye toward security defects can lead to the proliferation of vulnerabilities within software that can have an enormously detrimental business effect should there be a breach. Today every business builds or purchases software to streamline business operations. While many are aware that cybersecurity is important, there is an information gap when understanding how application security works. Vulnerabilities highlighted earlier in software development are easier and less expensive to fix. Fortunately, there are a variety of tools that can assist programmers in creating high-quality code quickly, without leaving security testing to the last minute. The end goal is a strong, integrated security program that allows developers to easily identify and fix threats during the production and use of their software. As with writers, there are a number of tools available and emerging to help developers deliver secure software without slowing them down: Static Analysis, Autocorrect This is like autocorrect – highlighting and making suggestions where you may have spelled something wrong, or meant something different. Static analysis integrates into the development team’s existing process and toolset, and scans code frequently during the development process to identify potential errors. Static analysis scans code and highlights potential vulnerabilities without actually executing the code.   Composition Analysis, the Automated Fact Checker This might be compared to a writer fact-checking their sources to ensure that contributors are reliable. Composition Analysis inventories elements of the code that were created by third parties and reused by the developer. The inventory is then compared to databases of known vulnerabilities to highlight potential risks in these third party libraries. Dynamic Analysis, the Automated Editor I wish this existed for writers (any of you developers want to take a shot?) Dynamic Analysis probes executing code and highlights areas that might be vulnerable to a hacker that is probing in a similar way. This would be like simulating a reader to make sure they understand the context of the story and are taking away the intended meaning. 30% of companies do not scan for vulnerabilities during code development. This either leaves themselves and their clients open to attacks, or slows down software deployment by running tests late in the process. An author would not write a book, then go back and add the periods and commas later. If they did, the result would likely be poor quality, or a missed deadline. This same risk exists if you do not scan for vulnerabilities during software development. The good news is that tools today can help automate the ongoing editing process.  For software developers, there are even more tools available that enable quality, security and speed. Is your company leveraging these tools in the software development lifecycle?
Software Grammar 101
Tue Oct 4 16:51, 2016 GMT
Fortune The malware that's pwning the Internet of Things is terrifyingly amateurish Boing Boing If mediocre malware can power some of the largest DDoS attacks ever, and considering the sad state of security of the Internet of Things in general, we should probably brace for more cyberattacks powered by our easy-to- hack “smart” Internet of Things, ... Why a Hacker Dumped Code Behind Colossal Website-Trampling Botnet Fortune Why the internet of things is the new magic ingredient for cyber criminals The Guardian Source Code for IoT Botnet 'Mirai' Released Krebs on Security The Register  - Ars Technica  - newsBTC  - Krebs on Security all 108 news articles »
The malware that's pwning the Internet of Things is terrifyingly amateurish - Boing Boing
Wed Oct 5 14:12, 2016 GMT
Bolo Bhi is continuing its fight against Pakistan's recently enacted cyber crimes bill. The post Bolo Bhi will continue to fight Pakistan’s cyber crimes law appeared first on Index on Censorship .
Bolo Bhi will continue to fight Pakistan’s cyber crimes law
Wed Sep 21 19:53, 2016 GMT
Morning Consult Internet , Ex-Im Provisions Likely in Spending Bill Morning Consult A pair of legislative provisions involving internet domain names and the Export-Import Bank are working their way into a wide-ranging bill to fund the government past Sept. 30, according to senators involved in the negotiations. Senate Republican ... Trump Opposes President Obama's Plan to Surrender American Internet Control to Foreign Powers | Donald J Trump ... Donald Trump Ted Cruz is wrong about how free speech is censored on the Internet Washington Post Sen. Cruz: Obama's Internet Handover Endangers Free Speech Online | Ted Cruz | U.S. Senator for Texas Ted Cruz PolitiFact  - New York Times all 136 news articles »
Internet, Ex-Im Provisions Likely in Spending Bill - Morning Consult
Fri Sep 23 15:17, 2016 GMT
Washington Post How Donald Trump's Internet policy could benefit Russia Washington Post So it may seem surprising to hear the Trump campaign suddenly change its tone on Russia this week over an obscure battle on Internet policy. Taking a swipe at Russia's support for Internet censorship , a Trump policy adviser warned Wednesday against ... Internet , Ex-Im Provisions Likely in Spending Bill Morning Consult Trump Opposes President Obama's Plan to Surrender American Internet Control to Foreign Powers | Donald J Trump ... Donald Trump Ted Cruz is wrong about how free speech is censored on the Internet Washington Post Ted Cruz  - PolitiFact  - New York Times all 136 news articles »
How Donald Trump's Internet policy could benefit Russia - Washington Post
Tue Oct 4 08:03, 2016 GMT
Mozilla team-up with Tor to improve internet privacy InSerbia News “CDT looks forward to working with Mozilla on the Polaris program and advising on issues like combating Internet censorship and protecting online anonymity, which are vital to promoting free expression online.” said Justin Brookman of ... Although Tor ...
Mozilla team-up with Tor to improve internet privacy - InSerbia News
Tue Oct 4 00:00, 2016 GMT
In a shocking announcement last month, Yahoo confirmed that data on 500 million user accounts was compromised in 2014, the largest data breach in history. Could it also become the most expensive?" Yahoo is in the final phases of a deal with Verizon to sell itself to the telecom giant for a mind-boggling sum of $4.8 billion. The breach bombshell can’t have gone over well in Verizon corporate headquarters. The companies announced the sale in July, the same month Yahoo claims it discovered the two-year-old breach. Yet Yahoo only told Verizon about the breach in September, two days before it came clean publicly. The sequence of events generated boatloads of brand-damaging media attention and set off a wave of speculation in the financial press that the deal could stall. Senior senators in Washington are talking about launching investigations into what Yahoo knew and whether it concealed the breach from Verizon to keep it from sinking the deal or lowering its offering price. In the wake of the Yahoo breach and the ongoing fallout, it’s not hard to imagine scenarios where a data breach or cyberattack could cost billions of dollars. Perhaps a merger or acquisition deal falls through. Or the acquiring company’s stock takes a major hit, devaluing the company and hurting investors. Investors are certainly paying attention to cybersecurity these days. Given the recent history of punitive fines and lawsuits against breached companies, it’s not unreasonable for risk-averse investors to steer clear or sell shares when companies are compromised. And now there’s a new investment strategy that sees risk in the potential for breaches based on security vulnerabilities. In early September, the medical device manufacturer St. Jude Medical was blindsided by short-sellers betting against its stock value, after a security research firm tipped off the trading firm Muddy Waters that vulnerabilities in St. Jude’s implantable devices could lead to product recalls. St. Jude took a hit on its stock price, which fell by 5 percent in one day. And the company’s value dropped 7 percent below the $25 billion asking price in St. Jude’s acquisition by another company. The financial arrangement between Muddy Waters and the security firm, MedSec Holdings, raises serious ethical questions. MedSec, which was founded by a former hedge fund manager, spent more than a year probing for vulnerabilities in St. Jude’s pacemakers and connected monitoring devices. The security firm had no intention of responsibly disclosing its findings to St. Jude before taking them public. Instead, MedSec provided the information to Muddy Waters, waiting until the investment firm shorted the stock before coming out with its findings. Muddy Waters principal Carson Block later told media that the public disclosure was a benefit to consumers, who could have been harmed by attackers launching a “mass attack” against the devices using insecure protocols connecting pacemakers to home monitors and physicians. Yet MedSec’s research findings seem to have more holes than St. Jude’s devices . St. Jude said MedSec’s findings were based on false assumptions and describe an attack that would be almost impossible to carry out. MedSec justified not disclosing to St. Jude because the “devices are so poorly protected,” it was likely the result of “gross negligence over many years,” and even if they told St. Jude the device manufacturer would “sweep it under the rug,” Block told Bloomberg news. “St. Jude has been putting profits before patients,” Block said. Not surprisingly, St. Jude is now suing Muddy Waters and MedSec . In the end, it doesn’t matter if the St. Jude devices were actually vulnerable to real-world attacks or not. Muddy Waters’ short of St. Jude’s stock was self-fulfilling, which should give us pause to consider the possibility that unscrupulous “researchers” could pull this trick based on even less. Even the false perception of risk could be enough to drive investor behavior and put companies in a vise. The St. Jude story underscores the importance of companies doing as much as possible to reduce the risk of vulnerabilities in every piece of software they use. For development teams, that means baking in security throughout the software lifecycle, beginning with systematic assessment of code as soon as developers write it, and continuous monitoring of applications in production. There’s no excuse or forgiveness for ignorance of what’s in third-party code or software products either. Companies need to assess the code quality in open source components they use in developing their own software. And they may want to consider requiring software vendors to commit to an assessment of their code before purchasing their products. The cost of breaches – and merely the possibility for security incidents – is becoming too great to take a chance on doing the bare minimum. A complete application security strategy is becoming a requirement. Customers expect it, lawmakers require it and investors demand it. You don’t want to be the next St. Jude or the next Yahoo. When it comes to application risk, no company is too big, or too small, to fail.
How Soon Will We See the First Billion-Dollar Security Vulnerability?
Tue Oct 4 16:58, 2016 GMT
A California federal court has thrown up a roadblock for filmmakers who want to obtain the personal details of an alleged BitTorrent pirate. The judge refused to issue a subpoena, twice, because it's not clear if the rightsholder obtained the geolocation details at the time of the infringement or after the fact. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Judge: Vague IP-Address Evidence is Not Enough to Expose BitTorrent ‘Pirates’
Tue Oct 4 11:57, 2016 GMT
In April 2016 the US government called China’a Great Firewall a barrier to trade. It came in the months following the US criticising China over its cyber spying on American The post GreatFire: Tear down China’s Great Firewall appeared first on Index on Censorship .
GreatFire: Tear down China’s Great Firewall
Tue Oct 4 08:10, 2016 GMT
U.S. universities in China get academic freedom, but face internet censorship – report Study International News U.S. universities operating in China say they are given the freedom to teach what they like in class, but face restrictions such as internet censorship , according to a report by an independent, nonpartisan U.S. agency. In the recent report released by ... and more »
U.S. universities in China get academic freedom, but face internet censorship – report - Study International News
Tue Oct 4 01:37, 2016 GMT
American Center for Law and Justice Internet Censorship as UN Intervenes into American Society The Market Oracle Soon the internationalists will push into high gear censorship of voices of opposition and resistance to the consolidation of global compliance and force a climate of universal surrender to authoritarian elites. So with the Obama-UN Internet Takeover ... Federal Judge Clears Way for President Obama's Internet Giveaway – But Case May Not be Over American Center for Law and Justice all 2 news articles »
Internet Censorship as UN Intervenes into American Society - The Market Oracle
Mon Oct 3 23:28, 2016 GMT
The Republican presidential candidate offered his most detailed---and hawkish---prescriptions yet on American cybersecurity. The post Trump Calls For 'Crippling' Cyberwar Attack Capabilities appeared first on WIRED .
Trump Calls For ‘Crippling’ Cyberwar Attack Capabilities
Mon Oct 3 20:49, 2016 GMT
Morning Consult FCC's Final Internet Privacy Rules Will Likely Align With FTC Morning Consult The FTC, the agency tasked with policing internet companies' privacy practices, has required those companies to receive explicit consent from consumers before accessing “sensitive” data, which includes Social Security numbers, geolocation information ... USTelecom Launches Ad Campaign Against FCC's Privacy Rules Morning Consult Can the FTC control the privacy of the IoT ( Internet of Things)? Lexology (registration) all 5 news articles »
FCC's Final Internet Privacy Rules Will Likely Align With FTC - Morning Consult
Mon Oct 3 20:14, 2016 GMT
The Republican presidential candidate says his administration would strengthen the US's defenses against hacking attacks.
Trump: Cybersecurity should be a top priority - CNET
Mon Oct 3 16:12, 2016 GMT
Business Insider A major Internet of Things hack has shown the importance of cybersecurity Business Insider The hackers utilized a collection of connected devices to generate data and webpage requests that took their targets offline, according to security experts. The size and scope of the attacks are what made the hack particularly noteworthy. The hackers ... and more »
A major Internet of Things hack has shown the importance of cybersecurity - Business Insider
Mon Oct 3 16:18, 2016 GMT
Lifesite Critics fear censorship as Obama hands control of the internet to multi-national body Lifesite Countries such as China, Russia and Iran, which have shown hostility to the open Internet by blocking websites and restricting Web access from their own citizens, now have the power to block particular websites from users worldwide, and the U.S. will ... ICANN transition moves forward, despite last-minute attempt to block it PCWorld Oversight Transition Isn't Giving Away the Internet , But Won't Fix ICANN's Problems EFF Obama's Giveaway of Internet Disturbing Newsmax WIRED  - Digital Trends all 24 news articles »
Critics fear censorship as Obama hands control of the internet to multi-national body - Lifesite
Mon Oct 3 15:49, 2016 GMT
Russian blogger and entrepreneur Anton Nosik has been found guilty of extremism by a Russian court over comments about Syria.
Russian blogger Anton Nosik convicted of extremism
Mon Oct 3 11:13, 2016 GMT
Join Index on Censorship, English Pen and the Bahrain Institute for Rights and Democracy for a vigil outside the Foreign and Commonwealth Office at 12 pm on Thursday 6 October to mark the trial of Bahraini human rights activist Nabeel Rajab, who could be sentenced to up to 15 years in prison. The Index on […] The post 6 Oct: Join us to tell the UK to help free Bahraini Nabeel Rajab appeared first on Index on Censorship .
6 Oct: Join us to tell the UK to help free Bahraini Nabeel Rajab
Mon Oct 3 07:13, 2016 GMT
Join us with writer Cory Doctorow and tech journalist Geoff White to debate the importance of anonymity, and find out more on how to protect your own identity online The post 25 Oct: Does anonymity need defending? Index magazine launch appeared first on Index on Censorship .
25 Oct: Does anonymity need defending? Index magazine launch
Mon Oct 3 04:41, 2016 GMT
Are reactions against offensive comics part of healthy debate over where we draw the line or is there something uniquely censorious in the reaction of audiences and comics alike? The post 23 Oct: Comedy and censorship at the Battle of Ideas appeared first on Index on Censorship .
23 Oct: Comedy and censorship at the Battle of Ideas
Fri Sep 30 15:34, 2016 GMT
Kansas City Star Here's Why AT&T Internet Customers Won't Pay Extra for Privacy Anymore Fortune AT&T is ending a controversial program that charged extra to high-speed Internet customers if they didn't agree to let the carrier track their online activity to sell targeted advertising. Under AT&T's Gigapower high-speed Internet service, customers ... AT&T to stop tracking internet habits of high-speed Web surfers Kansas City Star AT&T to end targeted ads program, give all users lowest available price Ars Technica AT&T stops tracking internet activity of GigaPower customers FierceTelecom all 8 news articles »
Here's Why AT&T Internet Customers Won't Pay Extra for Privacy Anymore - Fortune
Fri Sep 30 21:24, 2016 GMT
WASHINGTON (Reuters) - Yahoo's disclosure that hackers stole user data from at least 500 million accounts in 2014 has highlighted shortcomings in U.S. rules on when cyber attacks must be revealed and their enforcement.
Yahoo hack may become test case for SEC data breach disclosure rules
Fri Sep 30 20:51, 2016 GMT
  Another week, another threat recap. And this week wasn’t without its fair share of cyber incidents. Voter registration misstep? Check. New ransomware? Check. KrebsOnSecurity attack? Check! Here are five of the major security... read more The post Threat Recap: Week of September 26th appeared first on Webroot Threat Blog .
Threat Recap: Week of September 26th
Fri Sep 30 20:42, 2016 GMT
A popular YouTuber is experimenting with torrent-based technology in order to take control of his content and avoid third-party censorship. Bluedrake says that the potential for freedom when using WebTorrent "blows his mind" and has already carried out tests to get the project underway. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Popular YouTuber Experiments With WebTorrent to Beat Censorship
Fri Sep 30 10:04, 2016 GMT
Norwegian musician Moddi's new album, Unsongs, is made up of renditions of songs from around the world that had been banned, censored or silenced The post Twitter Q&A: Norwegian musician Moddi stands #WithTheBanned appeared first on Index on Censorship .
Twitter Q&A: Norwegian musician Moddi stands #WithTheBanned
Thu Sep 29 20:05, 2016 GMT
Wall Street Journal Hackers Infect Army of Cameras, DVRs for Massive Internet Attacks Wall Street Journal Attackers used an army of hijacked security cameras and video recorders to launch several massive internet attacks last week, prompting fresh concern about the vulnerability of millions of “smart” devices​in homes and businesses connected to the internet . Cybersecurity expert Brian Krebs was silenced by a huge hacker attack. That should terrify you. Los Angeles Times Record-breaking DDoS reportedly delivered by >145k hacked cameras Ars Technica Why a massive DDoS attack on a blogger has internet experts worried Naked Security all 23 news articles »
Hackers Infect Army of Cameras, DVRs for Massive Internet Attacks - Wall Street Journal
Thu Sep 29 17:28, 2016 GMT
Fraudsters who hack corporate bank accounts typically launder stolen funds by making deposits from the hacked company into accounts owned by "money mules," willing or unwitting dupes recruited through work-at-home job scams. The mules usually are then asked to withdraw the funds in cash and wire the money to the scammers. Increasingly, however, the mules are being instructed to remit the stolen money via Bitcoin ATMs.
‘Money Mule’ Gangs Turn to Bitcoin ATMs
Thu Sep 29 10:09, 2016 GMT
Breitbart News Meet the New Authoritarian Masters of the Internet Breitbart News Russia's “top cop,” Alexander Bastrykin, explicitly stated Russia needs to stop “playing false democracy” and abandon “pseudo-liberal values” by following China's lead on Internet censorship , instead of emulating the U.S. example. Like China's censors ... and more »
Meet the New Authoritarian Masters of the Internet - Breitbart News
Thu Sep 29 12:02, 2016 GMT
Burkinabe rapper and activist with Le Balai Citoyen, Smockey, became the inaugural Music in Exile Fellow at the Index on Censorship Freedom of Expression Awards in April 2016. The post Smockey: “We would like to trust the justice of our country” appeared first on Index on Censorship .
Smockey: “We would like to trust the justice of our country”
Thu Sep 29 05:00, 2016 GMT
SINGAPORE (Reuters) - A Singapore court sentenced 17-year-old blogger Amos Yee to six weeks in jail on Thursday for "wounding religious feelings", the second jail term for the teenager who was convicted on similar charges last year.
Singapore court sends teen blogger back to jail for criticizing religion
Wed Sep 28 22:54, 2016 GMT
The country's outdated, offline voting machines could actually save the election from cyberattacks, say experts at a Congressional hearing.
How to thwart Election Day hackers: Vote the old-fashioned way - CNET
Thu Sep 22 15:36, 2016 GMT
For the London Press Club’s monthly social evening, Index on Censorship has teamed up with the Frontline Club to present a discussion examining the changing role of the foreign correspondent The post 1 November: Redefining foreign correspondence appeared first on Index on Censorship .
1 November: Redefining foreign correspondence
Wed Sep 28 11:31, 2016 GMT
Banned Books Week was launched in 1982 in response to a surge in book censorship in schools, bookshops and libraries. Since then, over 11,300 books have been banned The post Banned Books Week: What are the censors so afraid of? appeared first on Index on Censorship .
Banned Books Week: What are the censors so afraid of?
Wed Sep 28 06:11, 2016 GMT
THE HAGUE (Reuters) - Cybercriminals offering contract services for hire offer militant groups the means to attack Europe but such groups have yet to employ such techniques in major attacks, EU police agency Europol said on Wednesday.
At your service: cyber criminals for hire to militants, EU says
Tue Sep 27 21:50, 2016 GMT
No, Mr. Trump, the US is not turning over control of the Internet to Russia and China - Los Angeles Times. ICANN has no authority over Internet content or government policies within borders; it can't stop Russia or China from imposing censorship on their own citizens, and they're unable to export censorship externally. ICANN manages technical standards, but ...
No, Mr. Trump, the US is not turning over control of the Internet to Russia and China - Los Angeles Times
Tue Sep 27 09:44, 2016 GMT
ITWeb Committee aims to finalise Internet 'censorship' Bill | ITWeb ITWeb The portfolio committee on communications says it is satisfied with the progress in processing the Films and Publications Amendment Bill. Parliament' and more »
Committee aims to finalise Internet 'censorship' Bill | ITWeb - ITWeb
Mon Sep 26 18:26, 2016 GMT
Internet security bill may help small businesses Salt Lake Tribune The Improving Small Business Cyber Security Act of 2016, which now goes to the Senate, calls on the Small Business Administration and Department of Homeland Security to create a strategy to increase business owners' awareness of internet attacks. and more »
Internet security bill may help small businesses - Salt Lake Tribune
Tue Sep 27 20:07, 2016 GMT
Middletown Transcript MAKING CENTS: We all need to be concerned with internet security Middletown Transcript In either case, there are basic rules that we all should follow to protect the privacy of everyone we connect with online. Some seem obvious, yet they are still the leading causes of breaches and other internet security issues. Even if you're not ...
MAKING CENTS: We all need to be concerned with internet security - Middletown Transcript
Tue Sep 27 14:23, 2016 GMT
On Sunday 25 September Nabeel Rajab was transferred from the West Riffa Police Station to solitary confinement in the East Riffa Police Station ahead of his sentencing next week. The post Bahrain: Nabeel Rajab put in isolation ahead of 6 October trial appeared first on Index on Censorship .
Bahrain: Nabeel Rajab put in isolation ahead of 6 October trial
Tue Sep 27 12:38, 2016 GMT
2016 Index on Censorship Freedom of Expression Journalism Award-winner Zaina Erhaim discussess the ongoing war in Syria. The post Zaina Erhaim: Balancing work and family in times of war appeared first on Index on Censorship .
Zaina Erhaim: Balancing work and family in times of war
Fri Sep 23 12:45, 2016 GMT
Huffington Post Donald Trump Doubles Down on Internet Ignorance Huffington Post Scare tactics aside, the transfer to ICANN will have no influence over the internet - censorship decisions of countries like China, Iran, Russia and Turkey. The repressive behavior of these countries is a huge problem, but it's not tied to the service ... How Donald Trump's Internet policy could benefit Russia Washington Post Trump Opposes Plan for US to Cede Internet Oversight Fortune Cruz internet crusade left out of Senate spending bill Dallas Morning News Morning Consult  - Morning Consult  - Donald Trump  - Washington Post all 136 news articles »
Donald Trump Doubles Down on Internet Ignorance - Huffington Post
Mon Sep 26 22:39, 2016 GMT
Brian Krebs' website had been largely unreachable for the past week, the victim of a "record" flood of fake requests for traffic.
Google shields security reporter targeted by massive cyberattack - CNET
Mon Sep 26 17:39, 2016 GMT
To mark the release of Norwegian musician Moddi’s new album, Unsongs, Index on Censorship is proud to announce a special series of appearances by currently banned voices from around the world The post October 2016: Norwegian musician Moddi stands #WithTheBanned appeared first on Index on Censorship .
October 2016: Norwegian musician Moddi stands #WithTheBanned
Mon Sep 26 16:51, 2016 GMT
Get Started: Internet security bill may aid small businesses San Francisco Chronicle The Improving Small Business Cyber Security Act of 2016, which now goes to the Senate, calls on the Small Business Administration and Department of Homeland Security to create a strategy to increase business owners' awareness of internet attacks. and more »
Get Started: Internet security bill may aid small businesses - San Francisco Chronicle
Mon Sep 26 14:40, 2016 GMT
On 24 September Index on Censorship’s CEO, Jodie Ginsberg, gathered with former BBC chief news correspondent Kate Adie and 2016 Index award-winning journalist Zaina Erhaim in Kew Gardens to discuss journalism in war zones The post Women on the front line: Zaina Erhaim and Kate Adie on the challenges of war reporting appeared first on Index on Censorship .
Women on the front line: Zaina Erhaim and Kate Adie on the challenges of war reporting
Mon Sep 26 11:28, 2016 GMT
Foreign correspondents often rely on "fixers" to help them report from war-torn countries. But, as Caroline Lees reveals in the new issue of Index on Censorship magazine, they can be targeted as spies if their names become known locally. The post Iraqi fixer on danger of accepting bylines in foreign media appeared first on Index on Censorship .
Iraqi fixer on danger of accepting bylines in foreign media
Mon Sep 26 00:00, 2016 GMT
Cyber Security a Top Concern in Asia Pacific, says Internet Society Survey Business Wire (press release) Moreover, 58% of respondents in the 2016 survey thought cybercrime was an issue that needed to be addressed by government, followed by connectivity (47%), data protection (45%) and privacy (44%). As connectivity has improved over ... “The results of ... and more »
Cyber Security a Top Concern in Asia Pacific, says Internet Society Survey - Business Wire (press release)
Tue Sep 20 05:20, 2016 GMT
Control Design IIC Releases Industrial Internet Security Framework RTInsights (press release) (blog) According to the September 19 announcement, the IISF focuses on five specific industrial IoT (IIoT) characteristics: safety, security , privacy , reliability and resilience. The characteristics help define trustworthiness, risk, threats, performance ... IIC Delivers Industrial Internet Security Framework IoT Evolution World (blog) IIC publishes the Industrial Internet Security Framework Control Design Industrial Internet Security Framework published by Industrial Internet Consortium Embedded Computing Design Plant Services  - iTWire  - SiliconANGLE (blog) all 27 news articles »
IIC Releases Industrial Internet Security Framework - RTInsights (press release) (blog)
Sun Sep 25 12:00, 2016 GMT
Ahead of Monday's debate, we look at how the candidates stack up on cybersecurity, privacy, STEM and other topics affecting tech.
Where Clinton, Trump stand on 7 big tech issues - CNET
Sun Sep 25 11:58, 2016 GMT
John Gilmore, an American entrepreneur and civil libertarian, once famously quipped that “the Internet interprets censorship as damage and routes around it”. This notion undoubtedly rings true for those who see national governments as the principal threats to free speech. However, events of the past week have convinced me that one of the fastest-growing censorship threats on the Internet today comes not from nation-states, but from super-empowered individuals who have been quietly building extremely powerful cyber weapons with transnational reach.
The Democratization of Censorship
Sun Sep 25 08:35, 2016 GMT
Robotics and Automation News (press release) (registration) Industrial Internet Consortium agrees security framework for robotics and automation systems connectivity Robotics and Automation News (press release) (registration) The organizations says IISF emphasizes the importance of five IIoT characteristics – safety, reliability, resilience, security and privacy – that help define “trustworthiness” in IIoT systems. The IISF also defines risk, assessments, threats, metrics ...
Industrial Internet Consortium agrees security framework for robotics and automation systems connectivity - Robotics and Automation News (press release) (registration)
Fri Sep 23 23:54, 2016 GMT
BBC News Akamai breaks ties with security expert The Boston Globe Akamai Technologies Inc. provides computer security services for some of the world's biggest companies. But this week, the Cambridge company broke ties with prominent Internet security researcher Brian Krebs, after his website became the target of a ... Why the silencing of KrebsOnSecurity opens a troubling chapter for the 'Net Ars Technica The Biggest Internet Attack in History Lawfare (blog) Massive web attack hits security blogger BBC News all 44 news articles »
Akamai breaks ties with security expert - The Boston Globe
Sat Sep 24 07:33, 2016 GMT
YouTube has faced its fair share of copyright controversies, one even more absurd than the others. In what appears to be an indirect censorship effort, the German National Library is now claiming copyright on the 87-year-old Nazi anthem, taking down a historical documentary in the process. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
German Library Claims Copyright on “Nazi Anthem,” Censors Documentary on YouTube
Thu Sep 22 03:08, 2016 GMT
Business Insider Akamai Releases Second Quarter 2016 State of the Internet / Security Report Yahoo Finance 22, 2016 /PRNewswire/ -- Akamai Technologies, Inc. (AKAM), the global leader in content delivery network (CDN) services, today released its Second Quarter, 2016 State of the Internet / Security Report. The report, using data gathered from the Akamai ... Cybercrooks 1, Akamai 0 The Boston Globe Why the silencing of KrebsOnSecurity opens a troubling chapter for the 'Net Ars Technica The Biggest Internet Attack in History Lawfare (blog) Twitter all 40 news articles »
Akamai Releases Second Quarter 2016 State of the Internet / Security Report - Yahoo Finance
Fri Sep 23 12:38, 2016 GMT
The target of raising £100,000 created by a blogger Anna Swabey, who was killed by brain cancer, is met on the day of her funeral.
Cancer blogger Anna Swabey fundraising target met
Thu Sep 22 19:48, 2016 GMT
Opera's Free VPN Takes On Internet Privacy Challenge LinuxInsider.com Users can enable the Opera VPN in the privacy and security subsetting, found either in the settings or preferences menu, depending on the OS the browser is running in. The VPN can be toggled on and off after being set up, and users can select their ...
Opera's Free VPN Takes On Internet Privacy Challenge - LinuxInsider.com
Fri Sep 23 10:28, 2016 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout the European Union and neighbouring countries The post Mapping Media Freedom: In review 16-22 September appeared first on Index on Censorship .
Mapping Media Freedom: In review 16-22 September
Fri Sep 23 09:28, 2016 GMT
The award-winning improvised musical Showstopper! has partnered with Index on Censorship to celebrate free expression this autumn. The post Showstopper! The Improvised Musical – special benefit performances in support of Index on Censorship appeared first on Index on Censorship .
Showstopper! The Improvised Musical – special benefit performances in support of Index on Censorship
Thu Sep 22 15:09, 2016 GMT
Security Intelligence (blog) Industrial Internet Consortium Develops an IoT Security Framework Security Intelligence (blog) In the document, IIC noted that an Industrial Internet of Things (IIoT) system exhibits five key end-to-end characteristics: security , safety, reliability, resilience and privacy . Other characteristics, such as scalability, usability, maintainability ... Intel: Security For The Internet Of Things Is More Critical Now Than Ever CRN all 26 news articles »
Industrial Internet Consortium Develops an IoT Security Framework - Security Intelligence (blog)
Thu Sep 22 23:28, 2016 GMT
Internet Privacy is a Three-Headed Dragon - Hightech Forum. Policy discourse on Internet privacy has been stagnant since it started in the 20th century. There are distinct battle lines and a working consensus about the obligations of current Internet data collectors, but that's it. The FTC Act excludes common ...
Internet Privacy is a Three-Headed Dragon - Hightech Forum
Thu Sep 22 21:16, 2016 GMT
NPR Yahoo Reveals Massive Data Breach; Internet Fixates On Fantasy Football NPR Yahoo says it's notifying all the affected users and taking other steps to beef up security to block any authorized access to any accounts. But also: "We are ... Even if there was good timing to reveal a big hack , for Yahoo this wouldn't be it. The ... Half a billion Yahoo users' data stolen in 'state-sponsored' hack Telegraph.co.uk 500 million Yahoo accounts breached USA TODAY Hackers steal data from 500 million Yahoo accounts Reuters Huffington Post  - Belfast Telegraph  - Recode all 428 news articles »
Yahoo Reveals Massive Data Breach; Internet Fixates On Fantasy Football - NPR
Thu Sep 22 18:55, 2016 GMT
Yahoo says a cyber attack in 2014 stole data from at least 500 million users and may have been state-sponsored.
Attack on Yahoo hit 500 million users
Thu Sep 22 15:54, 2016 GMT
Internet Blackouts, Elections Increasingly Linked in African Countries Voice of America Gabon is the latest country to employ internet censorship during a closely contested election, but other countries, including Uganda, Burundi, Ethiopia, Chad, Mali, Zimbabwe and the Republic of Congo have used the tactic this year, either during ...
Internet Blackouts, Elections Increasingly Linked in African Countries - Voice of America
Thu Sep 22 11:23, 2016 GMT
One of the biggest web attacks ever seen has been aimed at a security blogger after he exposed hackers who carry out such attacks for cash.
Massive web attack hits security blogger
Thu Sep 22 11:08, 2016 GMT
On 3 September 2015, a group of Houthi rebels convened a meeting at al-Najah School in the al-Haima district of Bani Waleed, a village, 72 kilometres west of Yemen’s capital, Sanaa. The post Artist Murad Subay worries about the future for Yemen’s children appeared first on Index on Censorship .
Artist Murad Subay worries about the future for Yemen’s children
Thu Sep 22 01:10, 2016 GMT
Gizmodo Surprise, Donald Trump Has No Idea How Internet Censorship Works Gizmodo Back in December, Donald Trump suggested fighting terrorism online by “closing the internet in some way,” openly mocking potential First Amendment concerns. Since then, the alleged computer user seems to have changed his mind, joining Ted Cruz's ... Internet , Ex-Im Provisions Likely in Spending Bill Morning Consult Trump opposes plan for US to cede internet oversight Reuters Trump backs Ted Cruz's Internet domain crusade Washington Post Morning Consult  - Boing Boing  - Politico all 63 news articles »
Surprise, Donald Trump Has No Idea How Internet Censorship Works - Gizmodo
Wed Sep 21 16:56, 2016 GMT
Control Design IIC publishes the Industrial Internet Security Framework Control Design The IISF emphasizes the importance of five IIoT characteristics – safety, reliability, resilience, security and privacy. IIC Delivers Industrial Internet Security Framework IoT Evolution World (blog) Industrial Internet Security Framework published by Industrial Internet Consortium Embedded Computing Design IIC Releases Industrial Internet Security Framework RTInsights (press release) (blog) iTWire  - Plant Services  - SiliconANGLE (blog) all 28 news articles »
IIC publishes the Industrial Internet Security Framework - Control Design
Wed Sep 21 15:27, 2016 GMT
The prince will visit in November as part of a tour aimed at "strengthening relations" in the region. The post Prince Charles to visit Bahrain: Here are some things he should consider appeared first on Index on Censorship .
Prince Charles to visit Bahrain: Here are some things he should consider
Wed Sep 21 14:43, 2016 GMT
To mark Banned Books Week, Vicky Baker, deputy editor of Index on Censorship magazine, will chair an online discussion with three authors on 29 September, followed by a Q&A. The post 29 Sept: Banned books webinar appeared first on Index on Censorship .
29 Sept: Banned books webinar
Wed Sep 21 13:58, 2016 GMT
In their latest task the Index on Censorship youth advisory board look at anonymous art around the world The post Street artists use anonymity to accentuate the message appeared first on Index on Censorship .
Street artists use anonymity to accentuate the message
Wed Sep 21 17:29, 2016 GMT
Knight Center for Journalism in the Americas (blog) Digital rights organizaton wants to map internet censorship affecting Latin American journalists Knight Center for Journalism in the Americas (blog) The first half of the project consists of an anonymous survey, available in Spanish and Portuguese, that is intended for journalists or activists who have experienced some form of internet censorship . It includes things like threats of violence, DDoS ...
Digital rights organizaton wants to map internet censorship affecting Latin American journalists - Knight Center for Journalism in the Americas (blog)
Wed Sep 21 14:34, 2016 GMT
Huffington Post Canada U of T's Citizen Lab implicates Canadian company in Bahrain Internet censorship News@UofT Researchers at the University of Toronto's Citizen Lab found detailed evidence that the Kingdom of Bahrain is censoring access to the Internet using technology from Canadian company Netsweeper, Inc. Internet censorship is growing globally, and many ... Canadian tech company Netsweeper helped Bahrain censor ... - CBC CBC.ca Canadian Company Netsweeper Is Helping Bahrain Censor The Internet : Report Huffington Post Canada all 5 news articles »
U of T's Citizen Lab implicates Canadian company in Bahrain Internet censorship - News@UofT
Tue Sep 20 16:54, 2016 GMT
Join Index on Censorship for a vigil outside the Turkish embassy in support of Ayşe Çelik, a Turkish teacher facing charges. The post 23 Sept: Vigil for Turkish teacher Ayşe Çelik appeared first on Index on Censorship .
23 Sept: Vigil for Turkish teacher Ayşe Çelik
Tue Sep 20 20:32, 2016 GMT
Morning Consult Internet Domain Name Squabble Could Hold Up Spending Bill Morning Consult GOP opposition to the U.S. government's plan to cede control of an internet governance body is emerging as a key stumbling block as party leaders continue negotiations over a must-pass government funding bill. The discussions could take the Senate into ... Web's inventor and MIT prof explain ICANN to Ted Cruz, using small words Boing Boing ICANN to Change the Internet's Locks PC Magazine Ted Cruz is wrong about how free speech is censored on the Internet Washington Post Los Angeles Times  - Daily Signal  - Motherboard all 25 news articles »
Internet Domain Name Squabble Could Hold Up Spending Bill - Morning Consult
Tue Sep 20 16:37, 2016 GMT
More than two-thirds of all millennials admit to having downloaded or streamed pirated content, a new survey from Anatomy Media finds. The same group also has a high preference for ad-blocking, which is believed to be directly related to the high prevalence of invasive ads on pirate sites. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Most Young Millennials Love Piracy and Ad-Blockers
Tue Sep 20 15:38, 2016 GMT
A Norwegian newspaper editor wants answers on censorship from Facebook's founder himself.
Zuckerberg gets a 'frenemy' request after 'Napalm Girl' flap - CNET
Tue Sep 20 09:51, 2016 GMT
ITWeb DA blasts Internet ' censorship ' Bill ITWeb The Films and Publications Amendment Bill, labelled by some as the " Internet Censorship Bill", is being discussed by the parliamentary portfolio committee on communications today. The Democratic Alliance (DA) has however come out strongly against the ... DA blasts new ' Censorship Bill' Citizen Censorship Bill under fire IT-Online all 5 news articles »
DA blasts Internet 'censorship' Bill - ITWeb
Tue Sep 20 09:59, 2016 GMT
Sitelock, one of the world's leading website security companies, is using the DMCA to silence a vocal critic. Web design and services outfit White Fir Design has published several articles about Sitelock, but now the company has hit back by filing DMCA notices against screenshots included in White Fir's reports. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Web Security Firm Sitelock Uses DMCA to Censor Critics
Mon Sep 19 22:28, 2016 GMT
NEW YORK (Reuters) - Bitcoin qualifies as money, a federal judge ruled on Monday, in a decision linked to a criminal case over hacking attacks against JPMorgan Chase & Co and other companies.
Bitcoin is money, U.S. judge says in case tied to JPMorgan hack
Mon Sep 19 14:51, 2016 GMT
AllAfrica.com South Africa: Internet Censorship Bill Unconstitutional - DA AllAfrica.com The amendment, dubbed the Internet Censorship Bill, will be deliberated in Parliament on Tuesday and it is, according to the DA, "simply bad news". ... In addition, the bill also infringes on individuals' right to privacy , according to the DA. A ... DA tears Internet Censorship Bill apart iAfrica.com The Internet Censorship Bill must be blocked – Phumzile Van Damme Politicsweb Van Damme vows DA will fight censorship of internet and social-media websites BDlive all 4 news articles »
South Africa: Internet Censorship Bill Unconstitutional - DA - AllAfrica.com
Mon Sep 19 13:15, 2016 GMT
Gender-selection services are illegal in India, which has one of the worst gender imbalances in the world.
Google, Microsoft and Yahoo to block ads for selecting the sex of babies in India - CNET
Mon Sep 19 11:36, 2016 GMT
iAfrica.com DA tears Internet Censorship Bill apart iAfrica.com A day before the Films and Publications (FPB) Amendment Bill - also known as the Internet Censorship Bill by the public - is set to be deliberated in Parliament, the Democratic Alliance has slammed the legislation. "This Bill, tabled in Parliament in ... Van Damme vows DA will fight censorship of internet and social-media websites BDlive all 2 news articles »
DA tears Internet Censorship Bill apart - iAfrica.com
Mon Sep 19 11:30, 2016 GMT
Why does it matter? Why don’t we just ban it or make it illegal if it can be used for all these harmful purposes? The post Anonymity: worth defending appeared first on Index on Censorship .
Anonymity: worth defending
Mon Sep 19 11:30, 2016 GMT
Former CIA agent Valerie Plame Wilson writes on the damage done when her cover was blown, journalist John Lloyd looks at how terrorist attacks have affected surveillance needs worldwide, Bangladeshi blogger Ananya Azad explains why he was forced into exile after violent attacks on secular writers, philosopher Julian Baggini looks at the power of literary aliases through the ages, Edward Lucas shares The Economist's perspective on keeping its writers unnamed The post Does anonymity need to be defended? Autumn magazine 2016 appeared first on Index on Censorship .
Does anonymity need to be defended? Autumn magazine 2016
Mon Sep 19 09:56, 2016 GMT
In the past two months three threats to media freedom involving the mayor of Kolasin, a town in Montenegro, have been reported to Mapping Media Freedom. The post Montenegro: Mayor accused of repeatedly undermining press freedom appeared first on Index on Censorship .
Montenegro: Mayor accused of repeatedly undermining press freedom
Mon Sep 19 07:44, 2016 GMT
How does censorship affect the language of the body? Are there things we cannot say, even when not using language? The post 19 Oct: How does a climate of censorship affect art? appeared first on Index on Censorship .
19 Oct: How does a climate of censorship affect art?
Thu Sep 15 12:00, 2016 GMT
Telegiz News ZeroNet: Hungarian Developer Creates new P2P Internet to Enhance Internet Privacy Telegiz News "The internet is getting more and more centralized, which allows easier surveillance and censorship . So we have to come up with ideas that do the opposite of this," Kocsis told IBTimes UK. "The main goal is to remove as many middlemen as possible.
ZeroNet: Hungarian Developer Creates new P2P Internet to Enhance Internet Privacy - Telegiz News
Fri Sep 16 16:36, 2016 GMT
CNNMoney Gabon is taking an unprecedented step in internet censorship - Sep ... CNNMoney Gabon is the latest country to turn off the internet in response to protests and dissent. and more »
Gabon is taking an unprecedented step in internet censorship - Sep ... - CNNMoney
Fri Sep 16 05:54, 2016 GMT
Liverpool John Moores University officially opened its Infidel exhibition, a display of photographs by Tim Hetherington, on Wednesday night. The Liverpool-born photojournalist, who died in Libya under mortar fire in 2011, took the photos during the year he spent embedded with the US Army in Afghanistan’s Korangal Valley while shooting his 2010 Oscar-nominated documentary Restrepo. […] The post Tim Hetherington’s Infidel exhibition opens in Liverpool appeared first on Index on Censorship .
Tim Hetherington’s Infidel exhibition opens in Liverpool
Fri Sep 16 16:35, 2016 GMT
This African country is taking an unprecedented step in internet censorship WPTZ An unprecedented internet blackout in the Central African country of Gabon is the latest in a trend of communication censorship . On August 31 ... "It's difficult to block individual pieces of content on channels, so they have to block everything or ... and more »
This African country is taking an unprecedented step in internet censorship - WPTZ
Fri Sep 16 11:05, 2016 GMT
TechRepublic Cybersecurity: Two-thirds of CIOs say threats increasing, cite growth of ransomware TechRepublic "The number and sophistication of the internet security threats is steadily increasing, and markedly up from last year," said Keith Golden, CIO, Econolite Group, Inc. "Well-crafted spear phishing attacks are now an everyday occurrence across our ...
Cybersecurity: Two-thirds of CIOs say threats increasing, cite growth of ransomware - TechRepublic
Fri Sep 16 13:03, 2016 GMT
internet censorship Glossy News (satire) Following several minutes of quasi-careful consideration, AOL/Time-Warner has bowed to the pressures of several of it's members, and gleefully, obligingly deleted the inflamatory news website, GlossyNews.com. AOL has had no option, but to comply with ... and more »
internet censorship - Glossy News (satire)
Fri Sep 16 13:20, 2016 GMT
The forthcoming issue of Index on Censorship magazine explores anonymity through a range of in-depth features, interviews and illustrations from around the world. The special report looks at the pros and cons of masking identities from the perspective of a variety of players, from online trolls to intelligence agencies, whistleblowers, activists, artists, journalists, bloggers and […] The post Coming soon: Index on Censorship magazine’s anonymity issue appeared first on Index on Censorship .
Coming soon: Index on Censorship magazine’s anonymity issue
Fri Sep 16 11:32, 2016 GMT
India Today Highly sophisticated hackers are planning to “take down the internet ”, security expert warns ThaiVisa News Renowned online security expert Bruce Schneier has warned that hackers have stepped up cyber attacks against the key organisations whose job it is to keep the internet online. These highly sophisticated cyber attacks are said to be part of an ongoing ... China preparing to bring down whole internet ? Security researcher says it is possible India Today Akamai Releases Second Quarter 2016 State of the Internet / Security Report Technuter (blog) Expert Warns That Internet Could Be Taken Down : Tech : iTech Post iTech Post The Tech Portal  - The Register  - Schneier on Security  - Verisign all 46 news articles »
Highly sophisticated hackers are planning to “take down the internet”, security expert warns - ThaiVisa News
Fri Sep 16 10:12, 2016 GMT
It initially sounded like a joke; gradually it got serious and then tragic. A decade and a half later, it is catastrophe. The post Abraham Zere: After 15 years of fear Eritreans read between the lines appeared first on Index on Censorship .
Abraham Zere: After 15 years of fear Eritreans read between the lines
Fri Sep 16 07:12, 2016 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout Europe. The post Mapping Media Freedom: In review 9-15 September appeared first on Index on Censorship .
Mapping Media Freedom: In review 9-15 September
Fri Sep 16 05:14, 2016 GMT
India Today China preparing to bring down whole internet ? Security researcher says it is possible India Today At a time when cyber attacks are getting more common, a respected cyber security researcher has warned that someone, possibly China or some other country, is working on a blueprint to bring down the whole internet in the matter of hours. Cyber security  ... Akamai releases second quarter 2016 state of the internet / security report Hindu Business Line Expert Warns That Internet Could Be Taken Down : Tech : iTech Post iTech Post Distributed denial of service(DDoS) attacks on a rise, India among top 10 source countries: Akamai The Tech Portal The Register  - Schneier on Security  - Verisign  - Lawfare all 40 news articles »
China preparing to bring down whole internet? Security researcher says it is possible - India Today
Thu Sep 15 20:11, 2016 GMT
I shared a meal not long ago with a source who works at a financial services company. The subject of ransomware came up and he told me that a server in his company had recently been infected with a particularly nasty strain that spread to several systems before the outbreak was quarantined. He said the folks in finance didn't bat an eyelash when asked to authorize several payments of $600 to satisfy the Bitcoin ransom demanded by the intruders: After all, my source confessed, the data on one of the infected systems was worth millions -- possibly tens of millions -- of dollars, but for whatever reason the company didn't have backups of it. This anecdote has haunted me because it speaks volumes about what we can likely expect in the very near future from ransomware -- malicious software that scrambles all files on an infected computer with strong encryption, and then requires payment from the victim to recover them.
Ransomware Getting More Targeted, Expensive
Thu Sep 15 18:54, 2016 GMT
Chrome and Firefox are actively blocking direct access to the The Pirate Bay's download pages. According to Google's Safe Browsing diagnostics service TPB contains "harmful programs," most likely triggered by malicious advertisements running on the site. Comodo DNS also showed a "hacking" warning but this disappeared after a few hours. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Chrome and Firefox Block Pirate Bay Over “Harmful Programs”
Thu Sep 15 12:24, 2016 GMT
Rights groups wrote to the governments of 50 states urging them to publicly call for the release of Bahraini human rights defender Nabeel Rajab, who faces up to 15 years’ imprisonment for comments he made on Twitter. The post Rights groups urge 50 nations to call for Nabeel Rajab’s release appeared first on Index on Censorship .
Rights groups urge 50 nations to call for Nabeel Rajab’s release
Thu Sep 15 09:50, 2016 GMT
Between 2013 and 2015, 10 Bulgarian municipalities spent $1.54 million on positive coverage of their activities The post Bulgaria: Regional media outlets dependent on local governments appeared first on Index on Censorship .
Bulgaria: Regional media outlets dependent on local governments
Thu Sep 15 10:58, 2016 GMT
Russia's media watchdog Roskomnadzor blocks access to two of the world's largest pornography websites.
Russia extends porn site ban
Wed Sep 14 20:45, 2016 GMT
Telecom, Internet Groups Call FCC's Privacy Rules 'Unnecessary and Unjustified' Morning Consult A group of eight telecom and internet groups pressed leaders of the Senate Commerce Committee to look into the Federal Communications Commission's proposal to regulate the privacy practices of service providers. In a Wednesday letter to Chairman John ... and more »
Telecom, Internet Groups Call FCC's Privacy Rules 'Unnecessary and Unjustified' - Morning Consult
Wed Sep 14 19:16, 2016 GMT
Inquirer Official: UK exploring national internet filter Salt Lake Tribune London • The head of Britain's newly formed cybersecurity agency says authorities are exploring the creation of a national internet filter to block malicious software and rogue websites, a proposal that has raised eyebrows among internet freedom ... Senior official says UK exploring national internet filter U.S. News & World Report UK government wants Great Firewall of Britain to keep out foreign invaders Inquirer GCHQ creating national firewall to stop cyber criminals Telegraph.co.uk all 52 news articles »
Official: UK exploring national internet filter - Salt Lake Tribune
Wed Sep 14 18:16, 2016 GMT
Dallas Morning News Cruz says he's fighting for internet freedom; critics warn he'll help overseas regimes Dallas Morning News The issue deals with a clerical function performed by ICANN, they said, and has nothing to do with internet censorship . What's more, the long-planned transfer to the private sector is designed to protect internet freedom, they said, and delaying or ... Internet Transition May Derail Over Property Question Bloomberg BNA all 87 news articles »
Cruz says he's fighting for internet freedom; critics warn he'll help overseas regimes - Dallas Morning News
Wed Sep 14 16:46, 2016 GMT
Telegraph.co.uk Senior Official Says UK Exploring National Internet Filter ABC News Ciaran Martin, the chief executive of Britain's new National Cyber Security Center, told a conference in Washington that his agency was working on a flagship project which would block Britons from coming into contact with "known malware and bad ... GCHQ creating national firewall to stop cyber criminals Telegraph.co.uk UK government wants Great Firewall of Britain to keep out foreign invaders Inquirer all 49 news articles »
Senior Official Says UK Exploring National Internet Filter - ABC News
Wed Sep 14 16:45, 2016 GMT
Reuters Senior official says UK exploring national internet filter Fox Business Ciaran Martin, the chief executive of Britain's new National Cyber Security Center, told a conference in Washington that his agency is working on a flagship project which would block Britons from coming into contact with "known malware and bad addresses.". Britain's GCHQ looks at creating nationwide internet firewall Reuters GCHQ creating national firewall to stop cyber criminals Telegraph.co.uk all 44 news articles »
Senior official says UK exploring national internet filter - Fox Business
Wed Sep 14 11:00, 2016 GMT
Brand new social media platform Gab will not censor you. So does that make it a free speech utopia, or just troll heaven? The post Gab, the Alt-Right's Very Own Twitter, Is The Ultimate Filter Bubble appeared first on WIRED .
Gab, the Alt-Right’s Very Own Twitter, Is The Ultimate Filter Bubble
Wed Sep 14 11:34, 2016 GMT
If made out of the right stuff a journalist is a tough nut. Some of us are, you may say, born that way. Our profession lives in our cells. We are compelled to do what our DNA instructs us to do. The post Turkey: Think you are free? Think again appeared first on Index on Censorship .
Turkey: Think you are free? Think again
Tue Sep 13 23:15, 2016 GMT
CNET Internet -connected vibrator connects with privacy lawsuit CNET An internet -connected vibrator is rubbing at least one consumer the wrong way. A lawsuit, filed earlier this month in a Chicago federal court, alleges Standard Innovation's We-Vibe secretly collects "highly intimate and sensitive" data and transmits it ... Sex toys and the Internet of Things collide—what could go wrong? Ars Technica all 8 news articles »
Internet-connected vibrator connects with privacy lawsuit - CNET
Tue Sep 13 15:05, 2016 GMT
DoJ Announces Team To Oversee Security Of Internet of Things Dark Reading The US Department of Justice (DoJ) has announced the formation of a threat analysis team to oversee the security of the “ internet of things” in order to protect national interest from cyberattacks and terrorist threats, reports Reuters. The group of ... John Carlin: DOJ to Assess National Security Risks Linked to ' Internet of Things' ExecutiveGov all 8 news articles »
DoJ Announces Team To Oversee Security Of Internet of Things - Dark Reading
Tue Sep 13 11:02, 2016 GMT
Following an outcry over censorship, the social media giant promises that it will learn from the mistake.
Facebook apologizes to Norway's prime minister, sorry its algorithm deleted 'Napalm Girl' photo - CNET
Tue Sep 13 10:04, 2016 GMT
I had not imagined that a state could become no better than a criminal syndicate. But the Turkish state has become one. The post Can Dündar: “We have your wife. Come back or she’s gone” appeared first on Index on Censorship .
Can Dündar: “We have your wife. Come back or she’s gone”
Mon Sep 12 21:08, 2016 GMT
NBCNews.com Alan Gross: More Internet Access in Cuba Will Make Censorship Tougher NBCNews.com MIAMI — Alan Gross, the American subcontractor who was jailed in Cuba for five years, joined independent journalists, digital innovators and other personalities from the island here for the first Cuba Internet Freedom Conference. "Its probably easier ... and more »
Alan Gross: More Internet Access in Cuba Will Make Censorship Tougher - NBCNews.com
Mon Sep 12 19:01, 2016 GMT
Quartz Nothing pixelated will stay safe on the internet Quartz It's becoming much easier to crack internet privacy measures, especially blurred or pixelated images. Those methods make it ... “In security and privacy , people do not fully appreciate the power of machine learning,” says Shmatikov. “Until somebody ...
Nothing pixelated will stay safe on the internet - Quartz
Mon Sep 12 18:00, 2016 GMT
The Facebook-owned photo sharing service is introducing a new feature that will allow users to filter and block offensive words in comments of their posts.
Instagram allows users to block nasty comments - CNET
Mon Sep 12 16:08, 2016 GMT
Avoiding an Internet Security Breach Just Got Easier With Google's New Tools Samsung Business Insights (blog) The proliferation of connected devices, coupled with the rise of the cybercriminal, has made protecting your business and your customers in the digital world increasingly difficult. One of the most powerful tools to fight cybercrime is knowledge, and ...
Avoiding an Internet Security Breach Just Got Easier With Google's New Tools - Samsung Business Insights (blog)
Mon Sep 12 14:28, 2016 GMT
International Business Times UK ZeroNet: A revolutionary new decentralised p2p internet for a privacy conscious generation International Business Times UK Tired of censorship and lack of privacy on the open web, more internet users are turning to ZeroNet. Mary-Ann ... and the government? Perhaps you should try out ZeroNet, an alternative decentralised solution aimed at curtailing internet ...
ZeroNet: A revolutionary new decentralised p2p internet for a privacy conscious generation - International Business Times UK
Mon Sep 12 03:00, 2016 GMT
Beginning today, nominations for the Index on Censorship Freedom of Expression Awards Fellowship are open. The post Nominations open for 2017 Index on Censorship Freedom of Expression Awards appeared first on Index on Censorship .
Nominations open for 2017 Index on Censorship Freedom of Expression Awards
Fri Sep 9 23:41, 2016 GMT
Wall Street Journal US Lawmakers Aim to Block Obama's Internet Giveaway The New American Among other serious concerns, lawmakers have been warning that giving up control of ICANN, which manages the assignment of website domains, could open the door to Internet censorship by the UN and its oftentimes totalitarian member governments. GOP Lawmakers Launch Effort to Block Internet Handoff Wall Street Journal Is Ted Cruz Wrong About the Internet ? Inverse Here's Why Internet Privatization Scares Republican Leaders Fortune CIO  - The Hill  - Washington Examiner (blog)  - Politico all 45 news articles »
US Lawmakers Aim to Block Obama's Internet Giveaway - The New American
Fri Sep 9 21:38, 2016 GMT
Facebook will make mistakes. But it should at least show us why the mistakes are made. The post Norway Is Right to Be Pissed at Facebook Over Photo Censorship appeared first on WIRED .
Norway Is Right to Be Pissed at Facebook Over Photo Censorship
Fri Sep 9 19:29, 2016 GMT
OSLO/SAN FRANCISCO (Reuters) - Facebook Inc on Friday reinstated a Vietnam War-era photo of a naked girl fleeing a napalm attack, after a public outcry over its removal of the image including harsh criticism from Norway's prime minister.
Facebook reinstates Vietnam photo after outcry over censorship
Fri Sep 9 17:25, 2016 GMT
The front page of Norway's largest newspaper features the Vietnam War photo that Facebook deleted and a harsh letter to the social network's CEO.
Zuckerberg, you censored again: Norway's miffed over 'napalm girl' photo - CNET
Fri Sep 9 14:45, 2016 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout Europe The post Mapping Media Freedom: In review 2-8 September appeared first on Index on Censorship .
Mapping Media Freedom: In review 2-8 September
Fri Sep 9 10:59, 2016 GMT
Index on Censorship fully supports the action of Norway's Aftenposten newspaper in refusing a request from Facebook to remove an iconic photo of the Vietnam War that features a naked child The post Facebook undermines media freedom by removing Vietnam War photo appeared first on Index on Censorship .
Facebook undermines media freedom by removing Vietnam War photo
Fri Sep 9 11:02, 2016 GMT
A newspaper editor has accused Mark Zuckerberg of "an abuse of power" after an iconic war image was removed from a Facebook post on the grounds of nudity.
Newspaper fury over Facebook 'Napalm girl' censorship
Fri Sep 9 08:10, 2016 GMT
In June, it was revealed that uTorrent's forums had been hacked, putting at risk the personal details of hundreds of thousands of users. Now it being reported that the database has been put up for sale on a darknet marketplace. The package is said to contain almost 395,000 accounts but data is cheap. The asking price? Just one bitcoin. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
395,000 uTorrent Forum Accounts Put Up For Sale By Hackers
Thu Sep 8 23:21, 2016 GMT
Inverse Is Ted Cruz Wrong About the Internet ? Inverse ... Ted Cruz and a handful of other Republicans have claimed that the impending transition of internet stewardship — from United States oversight to a multi-stakeholder, international association — will endanger national security , lead to internet ... GOP Lawmakers Launch Effort to Block Internet Handoff Wall Street Journal Cruz slams internet transition plan on Senate floor The Hill Obama's Radical Proposal Could Result in Censorship Online Daily Signal Politico  - The Register all 24 news articles »
Is Ted Cruz Wrong About the Internet? - Inverse
Thu Sep 8 16:49, 2016 GMT
The Hill Cruz slams internet transition plan on Senate floor The Hill A national security expert on a pro-transition conference call refuted this, saying that the transition wouldn't affect .mil or .gov names. According to the expert, these are already under the jurisdiction of the federal government and would remain ... GOP Lawmakers Launch Effort to Block Internet Handoff Wall Street Journal Obama's Radical Proposal Could Result in Censorship Online Daily Signal Cruz slams Obama for ' internet giveaway' Politico The Register all 23 news articles »
Cruz slams internet transition plan on Senate floor - The Hill
Thu Sep 8 15:03, 2016 GMT
Global Voices Online Netizen Report: With Gabon's Internet Shutdown, Activists Confront Challenges of Circumventing Censorship Global Voices Online The government of Gabon blocked access to the Internet shortly after protesters began contesting results of recent presidential elections in which incumbent President Ali Bongo appears to have won by a narrow margin. ... Security researchers Claudio ... and more »
Netizen Report: With Gabon's Internet Shutdown, Activists Confront Challenges of Circumventing Censorship - Global Voices Online
Thu Sep 8 12:14, 2016 GMT
We know Europeans want something to be terrorism. Living in a perpetual state of fear is not the natural consequence of living in 21st century liberal democracies. But neither is living in a police state. The post Dunja Mijatović: The fight against terror should not be a fight against basic human rights appeared first on Index on Censorship .
Dunja Mijatović: The fight against terror should not be a fight against basic human rights
Thu Sep 8 12:00, 2016 GMT
Sputnik International 'Snowden' Film to Change Personal Internet Security Perceptions Sputnik International MOSCOW (Sputnik) — The upcoming "Snowden" film about former National Security Agency (NSA) contractor-turned-whistleblower Edward Snowden will make people re-evaluate their views on Internet privacy and social media, Igor Lopatonok, the film's ... and more »
'Snowden' Film to Change Personal Internet Security Perceptions - Sputnik International
Thu Sep 8 07:27, 2016 GMT
Swedish Internet service provider Bahnhof continues to fight against copyright holders that target alleged file-sharers. The company explains that it has setup its logging policies in such as way that it can refuse requests for IP-address information from so-called copyright trolls, suggesting that other ISPs should follow suit. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
ISP Deletes IP-address Logs to Fend Off Piracy “Extortion Letters”
Wed Sep 7 20:58, 2016 GMT
Global Voices Online Angered by Mobile App Censorship , Saudis Ask: 'What's the Point of Having Internet ?' Global Voices Online The blocking of LINE angered Saudi users who took to Twitter to protest the conservative kingdom's Internet censorship policies. The sudden absence of LINE's calling features, alongside blocked services like Skype and Facetime, prompted user Abdelaziz ... and more »
Angered by Mobile App Censorship, Saudis Ask: 'What's the Point of Having Internet?' - Global Voices Online
Wed Sep 7 03:21, 2016 GMT
Business 2 Community The Global State of Internet Censorship [Infographic] Business 2 Community Despite the generally prevailing norm of freedom of free speech and right to information, it is widely debatable whether certain type of information should be restricted to certain people in certain times. A good example is the recent publication by ...
The Global State of Internet Censorship [Infographic] - Business 2 Community
Wed Sep 7 04:05, 2016 GMT
WASHINGTON (Reuters) - The U.S. Office of Personnel Management (OPM) did not follow rudimentary cyber security recommendations that could have mitigated or even prevented major attacks that compromised sensitive data belonging to more than 22 million people, a congressional investigation being released on Wednesday has found.
U.S. personnel management hack preventable, congressional probe finds
Tue Sep 6 15:26, 2016 GMT
Robotics video-blogger Simone Giertz gives Colbert a demo of her robots, which aren't really good at doing anything.
Stephen Colbert tests out crappy robots on 'The Late Show' - CNET
Tue Sep 6 11:13, 2016 GMT
An international delegation of civil society organisations visited Istanbul to demonstrate solidarity with writers, journalists and media outlets in Turkey. The post International organisations condemn crackdown on freedom of expression in Turkey appeared first on Index on Censorship .
International organisations condemn crackdown on freedom of expression in Turkey
Tue Sep 6 07:59, 2016 GMT
The High Court of Bombay has clarified that simply viewing a pirated file won't land people in jail. This question was raised after a blocking message shown by many Indian ISPs made this claim. The court ordered ISPs to show an updated message. In addition, providers should consider an ombudsman to prevent overblocking and other problems that may arise. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Scary Torrent Site Blocking Message Has to Change, Judge Rules
Mon Sep 5 15:15, 2016 GMT
Bahrain’s Public Prosecutor today charged prominent human rights activist, Nabeel Rajab, after the New York Times published his letter from prison. The post Bahrain: Prominent rights activist charged for New York Times letter appeared first on Index on Censorship .
Bahrain: Prominent rights activist charged for New York Times letter
Mon Sep 5 15:04, 2016 GMT
Richard Neville, who co-founded the 1960s counterculture magazine Oz, has died. The satirical magazine poked fun at socially-conservative Austrailia and tackled taboo subjects The post Richard Neville, co-founder of Oz magazine, dies aged 74 appeared first on Index on Censorship .
Richard Neville, co-founder of Oz magazine, dies aged 74
Mon Sep 5 17:05, 2016 GMT
A British parenting blogger says she has been denied working tax credits because she is unable to prove her working hours.
Blogger fury over tax credit rejection
Mon Sep 5 13:29, 2016 GMT
On Monday, 5 September a Bahraini court delayed the trial of Index award-winning human rights campaigner Nabeel Rajab. The post Bahrain delays court date for human rights campaigner for third time appeared first on Index on Censorship .
Bahrain delays court date for human rights campaigner for third time
Mon Sep 5 11:14, 2016 GMT
What can be made of recent events in Turkey where a coup attempt was stopped by people on the streets? Asia House is pleased to welcome acclaimed writer Kaya Genç The post 12 Sept: Turkey beyond the headlines appeared first on Index on Censorship .
12 Sept: Turkey beyond the headlines
Mon Sep 5 09:45, 2016 GMT
Striking the right balance between strengthening national security measures and safeguarding civil liberties is a challenge faced by any attempt to counter terrorism. The post 4 Oct: Balancing security, democracy and civil liberties in an age of terrorism appeared first on Index on Censorship .
4 Oct: Balancing security, democracy and civil liberties in an age of terrorism
Mon Sep 5 09:21, 2016 GMT
In his new book, Under the Shadow: Rage and Revolution in Modern Turkey, Index on Censorship magazine contributing editor Kaya Genç explores the country’s struggles through the eyes of Gezi Park protesters, pro-government conservatives, artists, censored journalists and more. The post Kaya Genç: “This is your future … if your generation does not fight for it, it will be a disastrous one” appeared first on Index on Censorship .
Kaya Genç: “This is your future … if your generation does not fight for it, it will be a disastrous one”
Sun Sep 4 16:52, 2016 GMT
NewsOK.com 9 ways to protect your internet privacy NewsOK.com Internet privacy isn't a way to hide some kind of wrongdoing. And you don't have to be a tech wizard to take steps to protect your online activity. “You might not think you have anything to hide, but that doesn't mean you shouldn't enjoy the benefits ...
9 ways to protect your internet privacy - NewsOK.com
Sat Sep 3 08:53, 2016 GMT
After Russia's leading search engine Yandex failed to remove links to pirate books from its search results, publisher Eksmo filed a complaint with the Moscow Court. Technically, Yandex could've found itself blocked nationwide for copyright non-compliance but in the end, cooler heads prevailed. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Publishers Fail to Block Russia’s Top Search Engine Over Pirate Links
Fri Sep 2 12:08, 2016 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout Europe The post Mapping Media Freedom: In review 19 August-1 September appeared first on Index on Censorship .
Mapping Media Freedom: In review 19 August-1 September
Fri Sep 2 11:41, 2016 GMT
Index on Censorship joins international call for release of Nabeel Rajab The post Groups urge Bahrain to release prominent human rights defender appeared first on Index on Censorship .
Groups urge Bahrain to release prominent human rights defender
Fri Sep 2 10:00, 2016 GMT
Vocativ In Kashmir, Conspiracies Fester Under Internet Censorship Vocativ The story goes that Burhan Wani ran away from his family in 2010 at the age of 15 and joined militants after being beaten by Indian security forces. He eventually went on to become commander of the Hizbul Mujahideen, a separatist group considered ... and more »
In Kashmir, Conspiracies Fester Under Internet Censorship - Vocativ
Thu Sep 1 16:35, 2016 GMT
The Brave Payments system, now in beta testing, uses bitcoin technology to let people pay for sites they like -- if Brave can convince site publishers to collect the money.
​Ad-blocking Brave lets you contribute cash to your favorite websites instead - CNET
Thu Sep 1 13:58, 2016 GMT
rabble.ca Quebec's Bill 74 puts us all on a slippery slope toward Internet censorship rabble.ca Internet censorship . Website block lists. Stiff financial penalties for Internet providers who allow their customers to view sites forbidden by the government. This may the stuff of day-to-day life in authoritarian regimes, but it's certainly not the ... and more »
Quebec's Bill 74 puts us all on a slippery slope toward Internet censorship - rabble.ca
Thu Sep 1 15:46, 2016 GMT
Human rights organisations gathered at the Bahrain Embassy in London to support one of the Middle East’s most prominent human rights defenders The post Bahrain: Protestors celebrate Nabeel Rajab’s birthday and call for his release appeared first on Index on Censorship .
Bahrain: Protestors celebrate Nabeel Rajab’s birthday and call for his release
Thu Sep 1 15:04, 2016 GMT
Index on Censorship joins international NGOs to call on Turkey to drop charges against five journalists. The post Turkey: Charges must be dropped in high-profile trial of journalists following failed coup appeared first on Index on Censorship .
Turkey: Charges must be dropped in high-profile trial of journalists following failed coup
Thu Sep 1 11:00, 2016 GMT
One of the biggest security threats is that enterprise mobile app testing is overwhelmingly focused on functionality and not security. Pen testing of apps to see what data they—or some third-party app it is integrated with—are actually retaining is hardly ever done prior to deployment, if then. Why? It's simply not in the mindset of line-of-business managers. They want/need the apps to perform certain functions, all of which are directly or indirectly tied into a revenue stream. The people who do focus on security—typically the CISO's team—are rarely brought in because they are a cost. How can this self-destructive pattern be fixed? Appdev talent must insist on aggressively doing such testing as a standard part of the gig. There's only one problem with that solution: Typically, app developers are just as apathetic about security as their LOB bosses/clients. To fix that requires that we address it at a much earlier stage. In colleges and high schools across the country, security testing must be trained as an essential part of coding. No app developer would ever write a piece of code without then testing it, right? Security testing must become just as second-nature as functionality testing is. The easier path would be to get LOB managers to universally insist on it and be willing to pay for it, but I am afraid to report that that simply won't happen. The sad reality is that those LOB managers—and their C-Level bosses—absolutely will end up paying for the lack of security testing, but that eventual pain and the initial negligence are separated by too much time to be connected. Heck, with corporate turnover what it is today, the people who will endure the punishment of a massive security/privacy hole may not even be the same people who oversaw the app's development. This sobering education approach was touched on recently in an interesting piece in CSO Online . The column argued that academia is where such training and attitude adjustments must happen. The piece "suggested some type of gamification which was intended to be an innovative marketing campaign but they keep getting approached by enterprises to customize the game for them. It's fun and offers different ways to educate developers on secure coding. There is a set of five questions that show snippets of vulnerable code. You find the vulnerability. You can play with friends, and it is completely free." This is a good technique, but I think we first must conquer the current lack of a perceived need to do this at all. This group testing idea has two flaws in it, though. First, data-retention is never going to be spotted by its user-victims. The user types a password in and gains access. How is that user to know that the password is being retained, let alone being retained in clear text? The second flaw is that looking for security holes by examining the app's code is far too limited. Many of the pen-testing-uncovered data-retention security/privacy holes I have worked with are what should be considered interact holes. The app might work fine on its own, but the problems kick in when it interacts with a third-party app (such as crash-detection software that gave Starbucks so many headaches ), other mobile apps or even the mobile OS itself. That's why it is essential to create a security sandbox that can examine the app in a realistic replication of how it will actually be used and the many other bags of code that it will have to work with.  Back to education. Something that is normally a great thing about university training is that it's based on reality, with many of the professors and lecturers coming in with with extensive realworld experience. But this is not helpful when we're trying to change how companies look at app security. Companies need to do outreach to universities. Today, that also means outreach to specialty schools, high schools and even middle schools. We have to get to developers as early as possible. Security has been a corporate afterthought for far too long. To fix it, we have to go back to the classroom—literally—and rethink how programming is taught.
If Security Isn't A Priority For Appdev, What Chance Does A Deployed App Have?
Wed Aug 31 18:45, 2016 GMT
Government Technology Investigation of FBI's Child Pornography Operations Sparks Controversy Over Internet Privacy Government Technology Mozilla, the company that offers the Tor browser, asked the FBI to reveal its methods so it can be patched, warning in a court motion that, “absent great care, the security of millions of individuals using Mozilla's Firefox internet browser could be ... and more »
Investigation of FBI's Child Pornography Operations Sparks Controversy Over Internet Privacy - Government Technology
Wed Aug 31 16:35, 2016 GMT
Playwright David Hare, author Monica Ali, comedian Shazia Mirza and MP Keir Starmer are among those who have written to Prime Minister Theresa May asking the UK government to call on Bahrain to release a campaigner imprisoned for just tweeting his opinions. The post Index award winners and judges call for release of Bahraini campaigner appeared first on Index on Censorship .
Index award winners and judges call for release of Bahraini campaigner
Wed Aug 31 12:22, 2016 GMT
Join us in at the Bahrain Embassy in London to mark Nabeel Rajab's birthday and call for his immediate release The post 1 Sept: Protest on Nabeel Rajab’s birthday to call for his release appeared first on Index on Censorship .
1 Sept: Protest on Nabeel Rajab’s birthday to call for his release
Wed Aug 31 00:07, 2016 GMT
(Reuters) - SWIFT, the global financial messaging system, on Tuesday disclosed new hacking attacks on its member banks as it pressured them to comply with security procedures instituted after February's high-profile $81 million heist at Bangladesh Bank.
Exclusive: SWIFT discloses more cyber thefts, pressures banks on security
Tue Aug 30 19:07, 2016 GMT
Ars Technica The most absurd Internet privacy class-action settlement ever Ars Technica In 2013, Yahoo announced that it would begin scanning its users' e-mail for targeted advertising purposes—just as Google does. As is par for the course, class-action lawsuits were filed. The Silicon Valley media giant, according to one of the lawsuits ...
The most absurd Internet privacy class-action settlement ever - Ars Technica
Tue Aug 30 14:52, 2016 GMT
“When I understood that I was to be detained by a directive given from the top, my fear vanished,” novelist and journalist Aslı Erdoğan told the daily Cumhuriyet The post Turkey: Losing the rule of law appeared first on Index on Censorship .
Turkey: Losing the rule of law
Tue Aug 30 09:02, 2016 GMT
NEW YORK (Reuters) - Six U.S. senators have urged President Barack Obama to prioritize cyber crime at this weekend's Group of 20 summit in China, in the wake of the theft of $81 million from Bangladesh's central bank, according to a letter obtained by Reuters.
Exclusive: Six U.S. senators urge Obama to prioritize cyber crime at G20 summit
Mon Aug 29 20:43, 2016 GMT
NEW YORK (Reuters) - Six U.S. senators have urged President Barack Obama to prioritize cyber crime at a this weekend's G20 summit in China in the wake of the $81-million heist from Bangladesh's central bank, according to a letter obtained by Reuters.
Exclusive: Six senators urge Obama to prioritize cyber at G20 in China
Mon Aug 29 17:57, 2016 GMT
The Guardian The Guardian view on internet security : a huge and growing problem The Guardian A dissident in the UAE appears to have had his iPhone hijacked by a very sophisticated piece of malware produced by a security company and sold legally, if in secret, to regimes that want to spy on their enemies. This offers its controllers complete ...
The Guardian view on internet security: a huge and growing problem - The Guardian
Mon Aug 29 11:34, 2016 GMT
NEW YORK (Reuters) - When hackers penetrated a secure authentication system at a bitcoin exchange called Bitfinex earlier this month, they stole about $70 million worth of the virtual currency.
Cyber threat grows for bitcoin exchanges
Mon Aug 29 10:55, 2016 GMT
Internet security vital for protecting youth Global Times If the young girl hadn't received the scam phone call, 18-year-old Xu Yuyu would be on her way to college now. The death of Xu, caused by a heart attack after her tuition fee was stolen by total strangers who claimed to be issuing a student loan, has ... and more »
Internet security vital for protecting youth - Global Times
Sat Aug 27 19:53, 2016 GMT
In her latest clip, robotics video-blogger Simone Giertz proves that a robot is no match for a stubborn jar of peanut butter.
This robot is a lousy sandwich chef - CNET
Sat Aug 27 13:00, 2016 GMT
FBI's massive porn sting puts internet privacy in crossfire The Seattle Times The FBI snared scores of people after taking over a child-pornography bulletin board and conducting a sting and computer-hacking operation. But there is a growing social and legal controversy over the bureau's tactics and the impact on internet privacy .
FBI's massive porn sting puts internet privacy in crossfire - The Seattle Times
Fri Aug 26 20:59, 2016 GMT
Today we bring you the next episode of the Steal This Show podcast, discussing the latest file-sharing and copyright trends and news. In this episode we interview Tamas Kocsis, founder and developer of the potentially revolutionary P2P platform Zeronet. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Steal This Show S02E01: Zeronet
Fri Aug 26 16:58, 2016 GMT
In March 2013, a coalition of spammers and spam-friendly hosting firms pooled their resources to launch what would become the largest distributed denial-of-service (DDoS) attack the Internet had ever seen. The assault briefly knocked offline the world's largest anti-spam organization, and caused a great deal of collateral damage to innocent bystanders in the process. Here's a never-before-seen look at how that attack unfolded, and a rare glimpse into the shadowy cybercrime forces that orchestrated it.
Inside ‘The Attack That Almost Broke the Internet’
Fri Aug 26 16:19, 2016 GMT
Pakistani law could enable sweeping internet censorship CPJ Press Freedom Online Bangkok, August 26, 2016 - Pakistani President Mamnoon Hussain should veto a bill that could allow for sweeping censorship of the internet and the prosecution of journalists, the Committee to Protect Journalists said today. Pakistan's ... "Pakistan's ...
Pakistani law could enable sweeping internet censorship - CPJ Press Freedom Online
Fri Aug 26 09:11, 2016 GMT
Getting Internet Privacy Right Morning Consult According to data before the FCC, 94 percent of internet users believe “[a]ll companies collecting data online should follow the same consumer privacy rules” and 83 percent think privacy protections should be based on the sensitivity of their data ...
Getting Internet Privacy Right - Morning Consult
Fri Aug 26 10:22, 2016 GMT
Nabeel Rajab, just like you, thinks his country could be better. And he has made those views public. He speaks out against poor prison conditions, and argues for more freedom of speech in Bahrain. The post Who is Nabeel Rajab? appeared first on Index on Censorship .
Who is Nabeel Rajab?
Fri Aug 26 08:49, 2016 GMT
The conflict over Crimea between Ukraine and Russia is having a direct impact on journalists. Though the tactics have differed, each country has been narrowing the space for reporting information on events. The post Shrinking space for journalism in Russia and Ukraine appeared first on Index on Censorship .
Shrinking space for journalism in Russia and Ukraine
Fri Aug 26 08:16, 2016 GMT
VIENNA (Reuters) - A Chinese citizen has been arrested in Hong Kong in connection with a cyber attack that cost Austrian aerospace parts maker FACC 42 million euros ($47.39 million), Austrian police said on Friday.
Chinese man arrested in Hong Kong over FACC cyber attack in Austria
Fri Aug 26 05:23, 2016 GMT
The Department of Homeland Security says it's looking into a cyber-attack on Leslie Jones' website and iCloud account.
US authorities investigate cyber-attack against Ghostbusters actress Leslie Jones
Thu Aug 25 16:16, 2016 GMT
Now that WhatsApp is sharing phone numbers with Facebook, it's no longer the security oasis users relied on. The post WhatsApp's Privacy Cred Just Took a Big Hit appeared first on WIRED .
WhatsApp’s Privacy Cred Just Took a Big Hit
Thu Aug 25 05:13, 2016 GMT
Intimate images of Ghostbusters star Leslie Jones and racist photos appear on her website after it was targeted in a cyber-attack.
Ghostbusters star hit by cyber-attack
Wed Aug 24 22:59, 2016 GMT
Asian organisations are the worst prepared against cyber-attacks globally, according to US security company Mandiant.
Asian companies have world's worst cybersecurity says study
Wed Aug 24 20:32, 2016 GMT
WASHINGTON (Reuters) - U.S. banking regulators said in a letter released on Wednesday that they are continuing to focus on cybersecurity risks and controls for U.S. financial institutions after attacks earlier this year on the global financial network known as SWIFT.
U.S. banking regulators focused on cybersecurity after SWIFT attack
Wed Aug 24 18:28, 2016 GMT
Cloudflare has made it clear that the company isn't going to block piracy sites without a proper court order. In addition, it now opposes an injunction requested by the RIAA, under which it would have to disconnect alleged MP3Skull accounts based on a keyword and IP-address. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Cloudflare Fights RIAA’s Piracy Blocking Demands in Court
Wed Aug 24 10:18, 2016 GMT
AndroidGuys A lifetime of internet security with SaferVPN for just $49 AndroidGuys If you are the type who uses a public network, business purposes, libraries, coffee shops, etc. there are threats that can access your private information. A VPN can establish security and privacy no matter where you go ensuring your information stays ...
A lifetime of internet security with SaferVPN for just $49 - AndroidGuys
Wed Aug 24 01:38, 2016 GMT
The FBI is investigating whether Russian hackers have carried out a series of cyber attacks on the New York Times, officials tell US media.
Russian hackers 'targeted New York Times'
Wed Aug 24 09:11, 2016 GMT
The Drum EU states call for relaxation of internet privacy laws The Drum Both states have asked the European Union's executive body to instruct messaging services to decrypt communications between terror suspects to aid investigators as national security agencies struggle to intercept and decode a stream of messages between ... and more »
EU states call for relaxation of internet privacy laws - The Drum
Wed Aug 24 08:59, 2016 GMT
Index recently appointed a new youth advisory board cohort. The eight young students and professionals, from countries including Hungary, Germany, India and the US, will hold their seats on the board until December. The post Meet the new Index youth board appeared first on Index on Censorship .
Meet the new Index youth board
Wed Aug 24 03:14, 2016 GMT
SINGAPORE (Reuters) - Singapore is working on how to implement a policy to cut off web access for public servants as a defense against potential cyber attack - a move closely watched by critics who say it marks a retreat for a technologically advanced city-state that has trademarked the term "smart nation".
Mind the air-gap: Singapore's web cut-off balances security, inconvenience
Wed Aug 24 01:47, 2016 GMT
An investigation into the Ashley Madison hack has found that the site's owners "fell well short" of protecting customer privacy -- but 36 million members of the dating site probably already knew that.
You blew it ​Ashley Madison: Report slams dating site for security 'shortcomings' - CNET
Wed Aug 24 00:52, 2016 GMT
WASHINGTON (Reuters) - The New York Times said on Tuesday its Moscow bureau was targeted by a cyber attack this month but that there was no evidence the hackers, believed to be Russian, were successful.
New York Times says suspected Russian hackers targeted Moscow bureau
Tue Aug 23 18:48, 2016 GMT
OTTAWA (Reuters) - The parent company of infidelity dating website Ashley Madison was responsible for numerous violations of privacy laws at the time of a massive release of customer data in a cyber attack last year, privacy watchdogs in Canada and Australia said on Tuesday.
Ashley Madison parent broke Canada, Australia privacy laws
Tue Aug 23 12:45, 2016 GMT
Index on Censorship welcomes the delay in the royal charter recognition of Impress by the Press Regulation Panel and hopes it provides an opportunity for further consultation. The post Index fears recognition of Impress could stifle investigative journalism and threaten press freedom appeared first on Index on Censorship .
Index fears recognition of Impress could stifle investigative journalism and threaten press freedom
Tue Aug 23 08:15, 2016 GMT
Journalist and author Ece Temelkuran discusses the role of the Turkish ministry of culture in censoring theatre productions. The post Ece Temelkuran: Turkey’s drive to make theatre “suitable” appeared first on Index on Censorship .
Ece Temelkuran: Turkey’s drive to make theatre “suitable”
Mon Aug 22 21:09, 2016 GMT
High-profile videos involving the police and the black community have gripped the country in recent months. They've also put a spotlight on the confusing mess that is Facebook's censorship policies. We've put together the FAQ Facebook doesn't have to help you understand how, when and why you're being censored.
How Facebook censors your posts (FAQ) - CNET
Mon Aug 22 12:35, 2016 GMT
How To Escape The Challenges Of Internet Censorship ValueWalk Who might try to filter or block the internet ? It is important to identify the flocks that try to block the internet first. The next step should involve finding the probable ways to bypass internet block . In most cases ... Educational institutes ...
How To Escape The Challenges Of Internet Censorship - ValueWalk
Mon Aug 22 10:17, 2016 GMT
The Journalists Association of Turkey (TGC) on Thursday gave a 2016 Press Freedom Award to a coalition of international organisations, including Index on Censorship, that have worked in concert since last year to support journalists in the country and fight an ongoing deterioration in the state of press freedom. The post Turkish journalists honour international organisations appeared first on Index on Censorship .
Turkish journalists honour international organisations
Mon Aug 22 08:32, 2016 GMT
Blocking torrent portals and other pirate sites is nothing new in India, but a recently updated blocking message is causing panic among torrenters. According to a new blocking notification, torrent users face a prison sentence up to three years and a hefty fine if they continue downloading copyright infringing content. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Indian Piracy Blocks Scare Torrent Users With 3-Year Prison Sentence
Mon Aug 22 08:03, 2016 GMT
University professors, poets and artists signed an open letter in support of three media workers who were targeted with death threats and hate speech. The post Bosnia: Open letter expresses support for journalists targeted with threats appeared first on Index on Censorship .
Bosnia: Open letter expresses support for journalists targeted with threats
Mon Aug 22 02:25, 2016 GMT
India Plans to Enforce Internet Censorship With 3 Years Jail Time Bitcoinist.net While doubtful this is a move towards China-Style internet censorship in India, It highlights just how far reaching their current system is. While this censorship stems from a legal loophole that circumvents due process, interests align such that it ...
India Plans to Enforce Internet Censorship With 3 Years Jail Time - Bitcoinist.net
Sun Aug 21 09:08, 2016 GMT
In the early days of P2P, saving money on media was a key motivator for people to pirate online. But now, with the market beginning to mature, it is the timely availability of content in convenient formats that has the ability to tackle the piracy issue. For one iconic torrent site, availability of legitimate content was to prove fatal. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
How Legitimate Content Killed an “Ethical” Torrent Site
Sat Aug 20 16:01, 2016 GMT
MND slammed over Internet security Taipei Times Legislators yesterday criticized the National Defense University and the Ministry of National Defense (MND) over a lapse in Internet security , saying the ministry must bolster defenses against cyberattacks and develop counteroffensive measures. The ...
MND slammed over Internet security - Taipei Times
Fri Aug 19 10:57, 2016 GMT
The manner in which Gawker -- love it or loathe it -- has been shuttered is a significant blow to media freedom. The post The means of Gawker’s demise is a blow to media freedom appeared first on Index on Censorship .
The means of Gawker’s demise is a blow to media freedom
Thu Aug 18 20:07, 2016 GMT
Over the weekend, unknown assailants launched a massive cyber attack aimed at flooding .gov email inboxes with subscription requests to thousands of email lists. According to experts, the attack was successful largely thanks to the staggering number of email newsletters that don't take the basic step of validating new signup requests.
Massive Email Bombs Target .Gov Addresses
Thu Aug 18 11:00, 2016 GMT
Crowdsourcing security holes—aka bug bounties—has become an increasingly-popular tech firm tactic, bordering on Silicon Valley standard-operating-procedure. But as tempting as such an approach is, it's not without serious drawbacks. What we're talking about is encouraging and incentivizing anyone and everyone to dig into your app/OS and beat up on it to try and find any security problems. If they do, the bounty program offers them money, once they confirm the problem. The good part of this is that it's a very efficient and effective way to quickly identify and fix security holes. Depending on the bounty offered, it might even be cost-efficient as well. The bad side is that there is no control. Some of the people doing this probing may not have your best interests at heart. Once they put in the time and effort and find a serious hole, what if they choose to sell it to a cyberthief instead of you, ostensibly to make a lot more money? What if they choose to publish it on security web sites, instantly making you a target until you can fix the hole? What if they choose to complain about the hole's existence publicly, hurting your stock price and sales? A bounty program is lightyears different from retaining a small group of security consultants, people that you pay to privately try and find holes. That's a much safer route, but it's not necessarily going to expose as many holes as quickly as inviting anyone on the Internet to have a go. That said, there can be very attractive financial reasons to bountyize. A security consultant will charge for the time and effort to investigate your system, regardless of what they find. A declaration that your software is airtight comes with the same bill as a list of 50 flaws. Well, usually, unless it's a strict hourly charge, which the 50-flaw approach will take more time to document. Note: somewhere out there is probably a security consultant who found zero flaws in software, but I've yet to find them. A bounty program charges you nothing if nothing is found. And if something is found, you have a locked-in fee for that flaw's particulars. Generally, the fee is fixed regardless of the severity of the hole, which cuts both ways. It's also dangerous to choose to not pay for a minor hole as the publicity makes the savings rarely worth it. Part of the "should I do a bounty program or not?" calculation is based on how much of a target your company is. For Google, Walmart, Chase Manhattan and others, it's clear that bad guys are trying to break in at all times anyway, so the added risk of a bounty program is minimal. (Apple is the exception to this rule, but more on that in a moment.) But if your company has a very low profile, you need to seriously weigh your options. Do you really want to encourage that kind of attention and prodding/poking? Now, as promised, let's get to Apple. For good or for bad, Apple has tended to go its own way, regardless of industry trends. Apple would call it leadership and others would opt for different phrasing. Apple's approach to bug bounties is definitely different. It offers a bounty program, but the reward for finding something is a heartfelt "thanks" instead of money . Far from being renegade, Apple's position makes some sense. To the extent that a bug bounty program is all about using the gigantic power of crowdsourcing to find bugs your developers missed, then Apple's huge profile already delivers that. It knows that any Apple hole in published software will be discovered in days—if not hours—and will appear in the usual-suspect sites. Why pay for that which you're likely to get for free? Another part of this bounty ROI equation is whether a company is obligated to pay for that which it already knows. As experienced security professionals know, there are many large companies that know about security holes that they have chosen—for various cost related reasons—to not fix. Many have simply calculated that some holes are sufficiently obscure that the company's realistic fraud losses are less than what it would cost to fix. What should the company do when 200 bounty participants "discover" that hole and all seek money for the find? If you've chosen to not fix a security hole, you have presumably also decided to keep that fact a secret. Of course, for Apple, the real issue is finding the security holes before the software is widely distributed. One of Apple's most well-known disasters was its initial Apple Maps rollout. Apple’s senior vice president of Internet software and services Eddy Cue recently discussed that rollout and why Apple is rethinking its software development approach. "Most importantly, he realized that Apple’s notorious secrecy—something (former CEO Steve) Jobs had honed while chief executive—isn’t the best for software development. 'To all of us living in Cupertino, the maps for here were pretty darn good. Right? So [the problem] wasn’t obvious to us,' Cue said about early Apple Maps testing," according to Fortune story. "'We were never able to take it out to a large number of users to get that feedback. Now we do.' Apple is now able to try out its software on so many users by offering something it had never done until 2014: allowing the public to test beta versions of its mobile and desktop operating systems. At its Worldwide Developers Conference (WWDC) in June, Apple announced that it would make available both iOS 10 and macOS Sierra to the public for testing." This gets into some classic Silicon Valley parlance. A beta test is software shown to a small number of people willing to report back to the company on what it finds. These public tests are seen by many as launches. Consumers will grab the software and deploy it as though it's final code, fully prepared to blame Apple for anything that is wrong. Software developers can't win. Bottom line: bug bounties are a good idea, but not a great security strategy in themselves. You have to look at your company's security profile and set up specific limits on your bounties—so you don't pay for holes that you either already knew about or that another bounty-seeker already found. Done properly, it can certainly unearth things you need to know. The risk, though, is akin to a tiny fishing boat deep at sea. A school of dolphins is swimming nearby and is frightening off the cod that is the fish being sought. To scare the dolphins away, the fisherman splashes his paddle in the water furiously, hoping to attract sharks to scare off the dolphins. The moral of the story: When you encourage cyberthieves to explore your software, you may find that you've invited more headaches than you might have intended.
When Bug Bounties Are Counter-Productive
Thu Aug 18 06:07, 2016 GMT
Even the clothes of an opposition candidate was censored by the Belarusian Television (BT).
BT Turned T-Shirt “For Belarus Without Lukashenka” Into T-Shirt “For Belarus”
Thu Aug 18 01:30, 2016 GMT
Shanghai Daily (subscription) China Internet Security Conference aims to strengthening security CCTV Authorities are calling for open cooperation to crack down on cyber crimes globally. Chinese internet security company Qihoo 360 is offering its latest scanning system FREE to the world. Qihoo says the global real-time scanning system will share its ... Joint fight for Internet security Shanghai Daily (subscription) China faces serious threat of Internet vulnerabilities Global Times all 7 news articles »
China Internet Security Conference aims to strengthening security - CCTV
Wed Aug 17 18:01, 2016 GMT
RT Serious financing behind cyberattacks on RT – internet security experts RT “Attacks on RT are continuing for several days in a row, and that is an unusual situation for a protected [ internet ] resource, when the attacker cannot breach its security . This fact, alongside the absence of any demands from the hackers, indicates ... and more »
Serious financing behind cyberattacks on RT – internet security experts - RT
Wed Aug 17 12:41, 2016 GMT
Anjem Choudary is an extremist. His views are repugnant and to be countered at every opportunity, but he should be allowed to express them. The post Conviction of Anjem Choudary should not be used to further restrict free speech appeared first on Index on Censorship .
Conviction of Anjem Choudary should not be used to further restrict free speech
Wed Aug 17 12:15, 2016 GMT
One year has passed since Index magazine editor Rachael Jolley sent a copy of the publication to jailed Bahraini activist and writer Abduljalil Al-Singace The post The Bahrain 13: One year since Index magazine sent to jailed academic and blogger appeared first on Index on Censorship .
The Bahrain 13: One year since Index magazine sent to jailed academic and blogger
Mon Aug 15 15:18, 2016 GMT
Index on Censorship has joined the IFEX coalition to express deep concern by the cybercrime law adopted in Saint Vincent and the Grenadines. The post Cybercrime law adopted in Saint Vincent and Grenadines is fundamentally flawed appeared first on Index on Censorship .
Cybercrime law adopted in Saint Vincent and Grenadines is fundamentally flawed
Tue Aug 16 13:43, 2016 GMT
The silencing -- even temporarily -- of one of Turkey’s last independent papers underscores the severe erosion of freedom of expression in the country. The post Turkey’s continuing crackdown on the press must end appeared first on Index on Censorship .
Turkey’s continuing crackdown on the press must end
Tue Aug 16 11:00, 2016 GMT
We live in a software-driven world – it’s how organizations in every industry interact with customers, prospects and partners. But information security has not kept pace with this shift, and traditional defenses are proving inadequate in this environment. As users and applications become the risk focal point, there is no hard and fast perimeter security professionals can put a wall around. Consequently, application layers remain insufficiently secured. In fact, web application attacks are now the most frequent pattern in confirmed breaches (2016 Verizon Data Breach Investigations Report ), yet application security spending remains only a small fraction of overall security spending. A variety of misconceptions have led to the lag in AppSec adoption , but the reality is: application security should be a part of your overall security program. The following are the top four reasons why: Reason #1: You’re a software company, whether you know it or not. Applications are now tied to your business success. Every company uses applications to make business decisions, and to interact with business partners. Even GE now considers itself a software company . With this increased reliance on software, application quality now impacts your bottom line, and insecure software means an insecure business. Reason #2: Most apps are hackable. Veracode’s State of Software Security Report (vol 6) revealed that about 70 percent of all applications had at least one vulnerability classified as one of the top 10 web vulnerability types . Commercial software, financial services software, software written by government agencies … all are vulnerable. Reason #3: Apps are the top attack vector. According to Akamai’s Q3 2015 State of the Internet Security Repor t, attacks at the application layer are growing by more than 25 percent annually . Why are apps such a popular target? Because hackers know we’re sloppy about securing them. Ponemon Institute recently found that 79 percent of developers either have no process or an ineffective ad hoc process for building security into applications . Enterprises have spent billions securing the network, perimeter and hardware at their organizations, but have yet to invest sufficiently in securing their applications. At the same time, these enterprises are building, buying and downloading applications at a breakneck pace and in record numbers. Using third-party software or open source components to speed development cycles is now the norm – but it also introduces a whole new layer of risk. Our analysis of more than 5,300 enterprise applications uploaded to our platform over a two-month period found that components introduce an average of 24 known vulnerabilities into each application . In addition, our research found that 90 percent of third-party code does not comply with enterprise security standards such as the OWASP Top 10 .  Reason #4: If you get breached, you will pay. The Verizon 2015 Data Breach Investigations Report found that data breaches cost business around the world $400 million . Don’t underestimate the cost of a breach – you’ll feel it in: Lost revenue : This might result from stolen corporate data, lowered sales volumes (if consumers get scared) or falling stock prices. Money spent on investigation and cleanup : A recent joint Veracode/Centre for Economics and Business Research (Cebr) report found that cyberattacks cost UK firms £34 billion in revenue losses and subsequent increased IT spending . Cost of downtime : A recent Information Age article estimated that every hour of downtime costs businesses $100,000. Brand damage : The long-term reputation damage associated with security breaches can be substantial and lead to intangible costs or loss of business. Want more details on why application security should be a part of your overall security program? Check out this recent Veracode/SANS report: Why You Need an Application Security Program .
Top 4 Reasons Why Application Security Should Be Your Focus
Tue Aug 16 09:13, 2016 GMT
Azerbaijan’s record on press freedom has never been great. Since independence, the country's journalists have faced serious harassment. The post Azerbaijan’s long assault on media freedom appeared first on Index on Censorship .
Azerbaijan’s long assault on media freedom
Mon Aug 15 12:13, 2016 GMT
A security researcher says he managed to turn the tables on a cyber-scammer by sending him malware.
Blogger turns tables on cyber-scammer
Mon Aug 15 10:48, 2016 GMT
Index, Reporters Without Borders and the Bahrain Institute for Rights and Democracy have written to the UK government about Bahrain's record on press freedom. The post Letter: UK must question Bahrain’s record on press freedom appeared first on Index on Censorship .
Letter: UK must question Bahrain’s record on press freedom
Fri Aug 12 15:38, 2016 GMT
IFEX members call on the Government of Bahrain to stop the judicial harassment of Sheikh Maytham Al-Salman, and to allow human rights defenders to exercise their right to freedom of expression. The post Bahrain must end harassment of human rights defender Sheikh Maytham Al-Salman appeared first on Index on Censorship .
Bahrain must end harassment of human rights defender Sheikh Maytham Al-Salman
Sun Aug 14 12:00, 2016 GMT
The technology may lead to smoother transactions and less disputes, which could ultimately mean lower prices and faster delivery for consumers.
Bitcoin's technology has a surprising fan: IBM - CNET
Sat Aug 13 20:25, 2016 GMT
Credit card industry giant Visa on Friday issued a security alert warning companies using point-of-sale devices made by Oracle's MICROS retail unit to double-check the machines for malicious software or unusual network activity, and to change passwords on the devices. Visa also published a list of Internet addresses that may have been involved in the Oracle breach and are thought to be closely tied to an Eastern European organized cybercrime gang.
Visa Alert and Update on the Oracle Breach
Sat Aug 13 18:18, 2016 GMT
Behind the scenes, groups of individuals are trying to make BitTorrent better with steady, incremental updates. A new proposal tabled by P2P developer Luca Matteis envisions a tweak to the protocol that would allow greater resilience in the BitTorrent ecosystem. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
‘Mutable’ Torrents Proposal Makes BitTorrent More Resilient
Sat Aug 13 12:29, 2016 GMT
FCC chair: Your internet privacy shouldn't be a 'luxury item' - Chicago Daily Herald. Talking to reporters, the head of the Federal Communications Commission implied that the internet risks becoming divided into privacy haves and have-nots, if companies such as AT&T and Comcast can dangle discounts in front of consumers in exchange for ...
FCC chair: Your internet privacy shouldn't be a 'luxury item' - Chicago Daily Herald
Tue Aug 9 10:00, 2016 GMT
Los Angeles Times Want cheaper Internet access? Hand over your privacy Los Angeles Times It seems a simple enough proposition: Would you agree to receive marketing pitches in return for a discount on your high-speed Internet service? Telecom heavyweight Comcast made just such a case last week in a filing with the Federal Communications ... and more »
Want cheaper Internet access? Hand over your privacy - Los Angeles Times
Fri Aug 12 08:14, 2016 GMT
A seismic sensor firm has rejected claims that its geological monitoring systems are vulnerable to cyber attack.
Seismic sensor security claims denied
Fri Aug 12 09:03, 2016 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout Europe. The post Mapping Media Freedom: In review 30 July-10 August appeared first on Index on Censorship .
Mapping Media Freedom: In review 30 July-10 August
Fri Aug 12 08:17, 2016 GMT
ISLAMABAD (Reuters) - Pakistan has adopted a much-criticized cyber security law that grants sweeping powers to regulators to block private information they deem illegal.
Pakistan passes controversial cyber-crime law
Fri Aug 12 04:16, 2016 GMT
89.3 KPCC AirTalk | Should internet privacy be a luxury? | 89.3 KPCC 89.3 KPCC A student uses a laptop computer during a English lesson at the Ridings Federation Winterbourne International Academy. Matt Cardy/Getty Images. FCC Hasn't Closed Door on Regulating 'Pay for Privacy' Internet ... Government Technology all 2 news articles »
AirTalk | Should internet privacy be a luxury? | 89.3 KPCC - 89.3 KPCC
Thu Aug 11 17:42, 2016 GMT
Government Technology FCC Hasn't Closed Door on Regulating 'Pay for Privacy ' Internet Pricing Model Government Technology The FCC is considering sweeping rules governing internet privacy . Service providers would be blocked from sharing customers' personal information without prior consent, and would be required to disclose in plain English what information they collect ... and more »
FCC Hasn't Closed Door on Regulating 'Pay for Privacy' Internet Pricing Model - Government Technology
Thu Aug 11 17:58, 2016 GMT
NEW YORK (Reuters) - TradeZero, a Bahamas-based online broker-dealer, said on Thursday it had launched the world's first "dark pool" exchange for bitcoin to enable institutional investors to execute large trades.
Broker-dealer TradeZero launches first 'dark pool' exchange for bitcoin
Thu Aug 11 15:07, 2016 GMT
Pakistan’s National Assembly passed a controversial Prevention of Electronics Crimes Bill on Thursday 11 August. The bill will permit the Pakistan Telecommunication Authority to manage, remove or block content on the internet. The post Pakistan passes Prevention of Electronic Crimes Bill: “The youth of this country is losing hope” appeared first on Index on Censorship .
Pakistan passes Prevention of Electronic Crimes Bill: “The youth of this country is losing hope”
Thu Aug 11 11:00, 2016 GMT
You’ve dipped your toes into the AppSec waters, but now it’s time to wade in a little further. Many organizations understand application security is important, and maybe they’ve done some scanning or pen testing of a handful of apps. But many are also unsure what comes next, or even if anything needs to come next. The reality is that Web application attacks are now the most frequent pattern in confirmed breaches , and a one-time scan or pen test of a handful of business-critical apps will not protect you from these breaches. A program that continuously assesses the applications an organization builds, buys or assembles — from inception to production — will. But you don’t need to dive into the deep end right away –we’re just going from toe dipping to wading here. The following are some good next steps: Set policies and metrics: Do you know what good looks like for your application security program? Take some time to figure out what your application security initiative’s goals are, and make sure you can measure progress. Consider focusing on the OWASP Top 10 vulnerabilities, or reducing your flaw density by a set percentage . Run a discovery scan of your web perimeter: Most organizations don’t even know how many public-facing web applications they have, thanks to websites for new marketing campaigns, company acquisitions or web portals for customers and partners. You can’t protect what you aren’t aware of. With an automated discovery solution, you can quickly and accurately scan your web application perimeter , and find out what you have, and where vulnerabilities most likely lurk. Once you have a handle on your web perimeter, shut down any old, unused sites and scan and fix those most likely to contain exploitable vulnerabilities. Get a handle on components: Do your developers use components? They make life easier, but are also causing some serious headaches. Often, when major vulnerabilities in open source components are disclosed, companies struggle to respond because they don’t know which of their applications contain components, or even which components they are using. Consider technologies to keep track of which applications are using each component and what versions are being used . This gives your organization an easy way to update a component to the latest version if a vulnerability is discovered. When you’re ready to wade in a little further, consider: Runtime protection: The reality is that apps end up in production with vulnerabilities. Runtime protection technology enables applications to “self-protect” by reconfiguring automatically , without human intervention, in response to certain conditions. eLearning: Stop vulnerabilities at their source. Most developers are not trained in the practices of secure coding. Why would they be? The main goal of any developer is to produce high-quality code that meets the functional demands of the market. Application security solutions that integrate actionable eLearning with testing results allow developers to quickly get guidance on fixing the security issues in their application. And it works: Our research has found that development organizations that leverage eLearning see a 30 percent improvement in fix rate . Third-party security: Enterprises are increasingly getting breached through vulnerabilities in third-party applications . Consider an application security solution that will work directly with your software supply chain – on your behalf – to assess and remediate suppliers’ code and ensure it adheres to your security policies before you implement it. Take the plunge The bottom line is that you will only truly reduce the risk of cyberattacks through the application layer when you move forward from scanning a few apps to implementing a program that improves the security of the applications you build, buy and assemble, and across their lifecycles, from inception through production. It’s OK to wade in slowly, but at some point, you’ll need to take the plunge. Want help explaining your next AppSec steps to others in your organization? Check out our new eBook, Top 6 Tips for Explaining Why Your Application Security Journey Is Just Beginning .
You’ve Tested the AppSec Waters: Now It’s Time to Take the Plunge
Thu Aug 11 11:00, 2016 GMT
The country has proven time again that it's willing to block access to sites. The post It'd Be Crazy Easy for Brazil to Block the Web Right Now appeared first on WIRED .
It’d Be Crazy Easy for Brazil to Block the Web Right Now
Thu Aug 11 11:24, 2016 GMT
One of the most vital duties of a journalist -- in any democracy -- is to report on the day-to-day operations of a country's parliament. But 200 Turkish journalists have been barred. The post 200 Turkish journalists blacklisted from parliament appeared first on Index on Censorship .
200 Turkish journalists blacklisted from parliament
Wed Aug 10 15:41, 2016 GMT
Authorities in Russia are planning new legislation that could see a crackdown on users uploading pirated content to social networks. Also under consideration are measures to ban advertising from infringing sites and block subscription-based platforms from processing user payments. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Russia Plans Social Media Piracy Crackdown
Wed Aug 10 13:08, 2016 GMT
Despite repeated calls by international organisations for reform, Belarus' regime for press accreditation continues to help the government maintain its monopoly on information in one of the world's most restrictive environments for media freedom. The post Belarus: Government uses accreditation to silence independent press appeared first on Index on Censorship .
Belarus: Government uses accreditation to silence independent press
Wed Aug 10 12:33, 2016 GMT
The stream may be small right now, a trickle, but it is unmistakable. Turkey's academics and its secular elite are quietly and slowly making their way for the exits. The post Yavuz Baydar: As academic freedom recedes, intellectuals begin an exodus appeared first on Index on Censorship .
Yavuz Baydar: As academic freedom recedes, intellectuals begin an exodus
Wed Aug 10 10:40, 2016 GMT
International groups have written to Bangladesh's government about the ongoing detention of Shafik Rehman, an elderly journalist. The post Press freedom groups call on Bangladesh to release British journalist, 81 appeared first on Index on Censorship .
Press freedom groups call on Bangladesh to release British journalist, 81
Wed Aug 10 05:10, 2016 GMT
SYDNEY (Reuters) - Australia's first online national census was in chaos on Wednesday after the survey website crashed overnight due to a possible cyber attack, raising concerns over the country's cyber security and criticism of its slow internet services.
Australia's controversial census in chaos after possible cyber attack
Tue Aug 9 19:44, 2016 GMT
Hot Hardware FCC Chairman Tom Wheeler Says Internet Privacy Should Not Become A Luxury Hot Hardware Should privacy on the internet come at a premium? FCC Chairman Tom Wheeler does not think so. Wheeler has been battling ISP's in order to guarantee that all internet customers have an equal amount of privacy . He remarked, “I would hope that privacy  ... and more »
FCC Chairman Tom Wheeler Says Internet Privacy Should Not Become A Luxury - Hot Hardware
Tue Aug 9 16:05, 2016 GMT
The move comes months after company's controversial initiative for free but limited access was banned in India.
Facebook takes another crack at connecting India -- with cheap, not free Wi-Fi - CNET
Mon Aug 8 15:33, 2016 GMT
A Russian organized cybercrime group known for hacking into banks and retailers appears to have breached more than 700 computer systems at software giant Oracle Corp., KrebsOnSecurity has learned. More alarmingly, the attackers appear to have compromised a customer support portal for companies using Oracle's MICROS point-of-sale credit card payment systems.
Data Breach At Oracle’s MICROS Point-of-Sale Division
Mon Aug 8 13:06, 2016 GMT
People who stored bitcoins at a popular exchange are told they will lose 36% of their assets following a cyber-attack.
Bitfinex users to share 36% of bitcoin losses after hack
Mon Aug 8 12:47, 2016 GMT
For the past six months the Index on Censorship Youth Advisory Board has attended monthly online meetings to debate free speech issues and completed tasks The post Youth Advisory Board: Free speech issues around the world appeared first on Index on Censorship .
Youth Advisory Board: Free speech issues around the world
Mon Aug 8 10:30, 2016 GMT
Forbes Your Internet Privacy Should Be Up For Sale Forbes Internet companies collect abundant information about people's online activity. They use this information determine people's interests and shopping profiles, and then make money by selling personalized “behavioral” ads. The FCC is not too happy about ... and more »
Your Internet Privacy Should Be Up For Sale - Forbes
Mon Aug 8 09:52, 2016 GMT
Join Index on Censorship’s CEO Jodie Ginsberg as she presents an evening with award-winning journalist and novelist Ece Temelkuran to discuss her latest book Turkey: The Insane and the Melancholy. The post 20 Sep: Author Ece Temelkuran on the struggles that have shaped Turkey appeared first on Index on Censorship .
20 Sep: Author Ece Temelkuran on the struggles that have shaped Turkey
Mon Aug 8 09:48, 2016 GMT
Index on Censorship magazine contributing editor Kaya Genç discusses Turkey's evolution with Ece Temelkuran The post 15 Sep: The State of Turkey with Kaya Genç, Ece Temelkuran and Daniel Trilling appeared first on Index on Censorship .
15 Sep: The State of Turkey with Kaya Genç, Ece Temelkuran and Daniel Trilling
Sun Aug 7 01:48, 2016 GMT
Thousands of seismic sensors monitoring geological activity are vulnerable to cyber attack, suggests research.
Security of seismic sensor grid probed
Sat Aug 6 13:00, 2016 GMT
Your internet privacy shouldn't be a 'luxury item,' top regulator says - Chicago Tribune. Talking to reporters, the head of the Federal Communications Commission implied that the internet risks becoming divided into privacy haves and have-nots, if companies such as AT&T and Comcast can dangle discounts in front of consumers in exchange for ...
Your internet privacy shouldn't be a 'luxury item,' top regulator says - Chicago Tribune
Sat Aug 6 07:16, 2016 GMT
As I've been writing for months now, the job that runs the highest risk in Turkey is, without a shred of doubt, journalism. The post Yavuz Baydar: Turkey takes wife of journalist hostage appeared first on Index on Censorship .
Yavuz Baydar: Turkey takes wife of journalist hostage
Fri Aug 5 16:20, 2016 GMT
Huffington Post Sløtface Talks Feminism, Internet Censorship and "Take Me Dancing" Huffington Post Brace yourselves, America. Norway's Haley Shea, Lasse Lokøy, Halvard Skeie Wiencke and Tor-Arne Vikingstad are coming. The foursome go by the name Sløtface and just dropped a song that you will not be able to get out of your heads for the remainder of ...
Sløtface Talks Feminism, Internet Censorship and "Take Me Dancing" - Huffington Post
Fri Aug 5 13:46, 2016 GMT
What does socialized loss mean? Bitfinex isn't saying.
Bitcoin hack could cost exchange $72 million in 'socialized losses' - CNET
Fri Aug 5 15:09, 2016 GMT
Philadelphia Business Journal Your Internet privacy shouldn't be a 'luxury item,' this regulator says Washington Post Should your online privacy depend on whether you've paid your Internet provider a little extra this month? That's one of the key policy questions concerning the future of the Web. And on Thursday, the nation's top telecom and broadband regulator, Tom ... Comcast argues for pay-for- privacy internet pricing model to FCC Philadelphia Business Journal Comcast Thinks It's Totally Chill to Charge For Privacy Gizmodo Comcast supports higher prices for customers who want Web privacy Ars Technica all 66 news articles »
Your Internet privacy shouldn't be a 'luxury item,' this regulator says - Washington Post
Fri Aug 5 14:00, 2016 GMT
Adam Falkowski keeps jumping the gun on the biggest announcements in physics. And he's doing it for a reason. The post The Rogue Blogger Who Keeps Spoiling Physics' Biggest News appeared first on WIRED .
The Rogue Blogger Who Keeps Spoiling Physics’ Biggest News
Fri Aug 5 11:53, 2016 GMT
Kim Dotcom is teasing fresh information about his Megaupload 2.0 project set to launch in January 2017. Noting that every file transfer will be linked to a bitcoin transaction, Dotcom says the new platform will take decentralization, anonymity & encryption "to the next level". Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Megaupload 2.0 Will Link File Transfers to Bitcoin Transactions
Fri Aug 5 05:20, 2016 GMT
A program named Mayhem has provisionally won a competition to find software that does the best job of automatically defending against cyber attacks.
'Mayhem' program wins grand hacking challenge
Fri Aug 5 03:22, 2016 GMT
LAS VEGAS (Reuters) - A software program dubbed "Mayhem" was poised to win the final round of a three-year contest to teach computers to launch and defend against cyber attacks, earning a $2 million prize for the team that wrote the winning code.
Geeks win millions for teaching computers to battle each other
Fri Aug 5 01:04, 2016 GMT
AsiaOne Unofficial Pokemon Go downloads come with Internet security threat AsiaOne JAKARTA - A lot of Indonesians do not really pay attention on privacy when it comes to applications. Indonesian netizens have ridiculed government officials for claiming that the wildly popular augmented reality game Pokemon Go posed a serious national ...
Unofficial Pokemon Go downloads come with Internet security threat - AsiaOne
Thu Aug 4 17:12, 2016 GMT
Chris Foxx explains how a cyber-attack known as phishing works, and how you can protect yourself.
Technology explained: What is phishing?
Thu Aug 4 16:00, 2016 GMT
US health insurer Banner Health writes to 3.7 million customers and healthcare providers following a cyber-attack.
US health insurer hit by cyber-attack
Thu Aug 4 11:09, 2016 GMT
Turkey's third post-coup week has been full of uncertainties, suspicion and concern. As of Wednesday morning there were 1,297 individuals subject to an international travel ban, among them 35 journalists and 51 lawyers. The post Yavuz Baydar: Half-truths in the age of Turkey’s emergency rule appeared first on Index on Censorship .
Yavuz Baydar: Half-truths in the age of Turkey’s emergency rule
Thu Aug 4 04:31, 2016 GMT
The US government is concerned your choices this fall could be hijacked.
Hack the vote: Could cyberattackers disrupt the election? - CNET
Wed Aug 3 22:07, 2016 GMT
A hacker stole 119,756 bitcoins from cryptocurrency exchange Bitfinex, halting the firm's business operations.
Bitcoin value plummets after hackers steal millions from exchange - CNET
Wed Aug 3 18:24, 2016 GMT
Apple, Google and Microsoft, are in an ideal position to deter piracy, according to a new report published by Black Market Watch and the Global Initiative against Transnational Organized Crime. The controversial report opts for voluntary or mandatory blocking of pirated content on the operating system level. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Report: Operating Systems Should Actively Block Pirated Downloads
Wed Aug 3 15:38, 2016 GMT
In April 2016, security firm Trend Micro published a damning report about a Web hosting provider referred to only as a "cyber-attack facilitator in the Netherlands." If the Trend analysis lacked any real punch that might have been because -- shortly after the report was published -- names were redacted so that it was no longer immediately clear exactly who the bad hosting provider was. This post aims to shine a bit more light on the individuals apparently behind this mysterious rogue hosting firm -- a company called HostSailor[dot]com.
The Reincarnation of a Bulletproof Hoster
Wed Aug 3 15:36, 2016 GMT
Here's an uncomfortable truth for IT to internalize: enabling access for a friend facilitates access for an enemy. This is what was behind the anti-backdoor argument that Apple aggressively made, albeit for non-altruistic sell-more-hardware reasons. In effect, if you provide an easy way for government investigators to access data, there's no reason to believe that bad guys won't use a variation of that to steal data. I'm reminded of this while noting some new rules coming from Russia. Consider this report from Global Compliance News . As of July 20, companies may be required to "retain and store data on users, user activity and user communications on Russian territory for one year (previously six months), to retain and store the contents of user communications (including text, audio and video communications) on Russian territory for up to six months (as from July 2018); and to enable Russian security agencies to decrypt such correspondence" and "Failure to comply with the above requirements may result in administrative fines and access to a non-compliant service being blocked in Russia," according to that report. Although it's certainly true that Russia's environment is more open to such government mandates than some other parts of Europe and the U.S., the point is that there are going to be an increasing number of governmental as well as industry attempts to access a wide range of data types. From a security perspective, access is access. Does a thief differentiate between a weak remote access system for a network of franchisees and a security hole in your firewall? Want to make VPN access easier for lazier employees or those who are resistant to learning new authentication systems? CISOs get zero brownie points because the weak authentication deployed was done with good intentions of making life easier for contractors. Thieves are also remarkably fond of companies who think that the nature of their business generates little of thief interest. Trust me: Let them in and they'll find things you never thought of. I recently worked with a chain of car washes (no, this has nothing to do with Breaking Bad and money laundering, although it would be a lot more cool if it did) who in fact deployed consumer-level remote access because franchisees didn't think their data was going to be attractive to thieves. As they subsequently learned, their payment processors felt quite differently. There is no one way around this: Authentication needs to be strict and it needs to be strong. This is one of the reasons that passwords have got to go, replaced by different kinds of biometrics and pattern recognition. Strong and complex passwords are self-defeating as it simply increases passwords being written down or memorized by a program that itself has a password. As long as we have passwords, strong authentication means difficult and time-consuming authentication. That gets us back to ease of access. To make access easier for any friendlies—be they employees or law enforcement—you are necessarily making access easier for data thieves. Actions like government—or your parent company—insisting on backdoor access means easier bad guy access. If you don't want to resist such efforts on principle, resist it for data security.
To Weak Authentication, A Thief Looks Exactly Like A Cop
Wed Aug 3 08:53, 2016 GMT
Dutch journalists have been threatened in aftermath of Turkish coup attempt The post Turkey’s media crackdown has reached the Netherlands appeared first on Index on Censorship .
Turkey’s media crackdown has reached the Netherlands
Wed Aug 3 08:27, 2016 GMT
China Digital Times Internet Security Platform Closed; Founder Arrested China Digital Times As Chinese authorities frequently point out in response to foreign accusations that it sponsors international cyberattacks, China is also a victim of hacking. In recent years, its government departments, companies, and other organizations have had the ...
Internet Security Platform Closed; Founder Arrested - China Digital Times
Wed Aug 3 08:21, 2016 GMT
The price of bitcoin falls more than 10% after the Hong Kong-based digital currency exchange Bitfinex says it suffered a major hack.
Bitcoin drops more than 10% after security breach
Tue Aug 2 23:14, 2016 GMT
TheUSBport Internet of Things security – six issues for enterprises to reckon with Diginomica Unfortunately for the “greenfield opportunity” types, tackling IoT data privacy and security is a precondition for market growth. I tried to rectify that in my own coverage by taping a live podcast on the problem of IoT security with Volker ... Internet of Things needs to be faster and safer TheUSBport medical device makers need to step up security CIO Can the Internet of Things Be Defined? Bloomberg BNA Firstpost  - Computing  - ExecutiveGov all 68 news articles »
Internet of Things security – six issues for enterprises to reckon with - Diginomica
Wed Aug 3 03:03, 2016 GMT
WASHINGTON/SAN FRANCISCO (Reuters) - The FBI did not tell the Democratic National Committee that U.S officials suspected it was the target of a Russian government-backed cyber attack when agents first contacted the party last fall, three people with knowledge of the discussions told Reuters.
FBI took months to warn Democrats of suspected Russian role in hack: sources
Tue Aug 2 21:00, 2016 GMT
SAN FRANCISCO (Reuters) - A famed hacker who nearly 20 years ago told Congress he could take down the internet in 30 minutes is now going after the computer software industry, whose standard practices all but guarantee that most products will be vulnerable to cyber attacks.
Famed hacker creates new ratings system for software
Tue Aug 2 18:28, 2016 GMT
LONDON (Reuters) - A company that provides banks with anti-money-laundering controls has teamed up with a bitcoin security firm to try to curb nefarious uses of the digital currency, such as drug trafficking and terrorism financing.
Exclusive: LexisNexis and start-up join to curb bitcoin money-laundering
Tue Aug 2 16:55, 2016 GMT
Security experts detect shady software that can use your smartphone's unique battery signature to sniff out your online activity.
Your phone's battery now betrays your privacy - CNET
Tue Aug 2 15:13, 2016 GMT
Forcing ISPs to block entire websites to tackle Internet piracy is justifiable, a court in India has ruled. The decision by the Delhi High Court means that copyright holders will not have to target specific URLs when attempting to stop infringement on sites that are involved in widespread piracy. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Court Rules Whole Site Blocking Justifiable in Piracy Fight
Tue Aug 2 14:20, 2016 GMT
We're talking seriously awesome stuff here, from alternative comics to yachts.
25 things you didn't know you could buy with bitcoins - CNET
Tue Aug 2 13:54, 2016 GMT
The cancellation of three radio programmes on 4 July by Croatia's public broadcaster marks the latest in a line of sweeping changes the network has undergone since January 2016. The post Croatia: Over 70 journalists axed from public broadcaster since January appeared first on Index on Censorship .
Croatia: Over 70 journalists axed from public broadcaster since January
Tue Aug 2 12:22, 2016 GMT
Violence against journalists in Europe increased in the second quarter of 2016, reports submitted to Index on Censorship’s Mapping Media Freedom platform show. The post Journalists caught in the middle: Protests turn violent across Europe appeared first on Index on Censorship .
Journalists caught in the middle: Protests turn violent across Europe
Tue Aug 2 01:12, 2016 GMT
Artificial intelligence could soon be spotting and sealing security bugs in software before malicious hackers can slip through the holes.
Can machines keep us safe from cyber-attack?
Mon Aug 1 12:26, 2016 GMT
It was a long Saturday night for all of us, at home and abroad, monitoring the worrisome developments around media freedom in Turkey The post Yavuz Baydar: Six more journalists jailed in Turkey appeared first on Index on Censorship .
Yavuz Baydar: Six more journalists jailed in Turkey
Mon Aug 1 11:51, 2016 GMT
More than 30,000 people have signed a petition to have a book withdrawn from the Spanish market. The post Spain: 75 tips to shut a writer up appeared first on Index on Censorship .
Spain: 75 tips to shut a writer up
Mon Aug 1 11:34, 2016 GMT
Nabeel Rajab, the Bahraini human rights activist and Index award winner, is due to stand trial on 2 August over comments he made on Twitter criticising government institutions The post Why is Nabeel Rajab a repeated target of the Bahraini authorities? appeared first on Index on Censorship .
Why is Nabeel Rajab a repeated target of the Bahraini authorities?
Sat Jul 30 15:12, 2016 GMT
A "professional" cyber attack hits Russian government bodies, the country's intelligence service says.
Russia cyber attack: Large hack 'hits government'
Wed Jul 27 15:36, 2016 GMT
Censorship company drops bogus lawsuit against researchers who outed them Boing Boing Netsweeper sells " internet filtering technology" -- a tool that spies on users' internet traffic and censors some of what they see -- that is used by governments to control their populations, including the government of Yemen, which uses it to block ... and more »
Censorship company drops bogus lawsuit against researchers who outed them - Boing Boing
Sat Jul 30 11:40, 2016 GMT
Ministers are empowered to close TV, radio, websites and, even, book publishers. Prosecutors are required to follow those orders. This means a total end of media freedom in Turkey. The post Yavuz Baydar: Silence is the enemy of democracy appeared first on Index on Censorship .
Yavuz Baydar: Silence is the enemy of democracy
Fri Jul 29 20:51, 2016 GMT
WASHINGTON/SAN FRANCISCO (Reuters) - The computer network used by Democratic presidential candidate Hillary Clinton’s campaign was hacked as part of a broad cyber attack on Democratic political organizations, people familiar with the matter told Reuters.
Exclusive: Clinton campaign also hacked in attacks on Democrats - sources
Fri Jul 29 16:11, 2016 GMT
The arrests of dozens of journalists has added to the profound concerns for press freedom in Turkey, where emergency rule gives the authorities power to extend arrest periods up to 30 days. The post Yavuz Baydar: Tough times ahead for Turkey appeared first on Index on Censorship .
Yavuz Baydar: Tough times ahead for Turkey
Fri Jul 29 11:05, 2016 GMT
Security Researchers Sued For Exposing Internet Filtering Company's Sale Of Censorship Software To Blacklisted ... Techdirt Nothing says "Please stop keep talking about the bad stuff we do" quite like a bogus defamation lawsuit. Citizen Lab, which has reported on a great number of tech companies that are less than discriminating in their selection of customers (think ...
Security Researchers Sued For Exposing Internet Filtering Company's Sale Of Censorship Software To Blacklisted ... - Techdirt
Fri Jul 29 09:05, 2016 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout the European Union and neighbouring countries. Here are five recent reports that give us cause for concern. The post Mapping Media Freedom: In review 22-28 July appeared first on Index on Censorship .
Mapping Media Freedom: In review 22-28 July
Fri Jul 29 08:52, 2016 GMT
The spotlight has been on Turkey following the attempted coup against President Recep Erdogan and the government’s ensuing crackdown on journalists, teachers, judges and soldiers. How did it come to this? The post Turkey’s rising censorship: How did we get here? appeared first on Index on Censorship .
Turkey’s rising censorship: How did we get here?
Fri Jul 29 07:40, 2016 GMT
In 2014, Sony was subjected to a massive cyberattack which resulted in the leak of huge quantities of data. The trove contained several movies, all of which appeared online for anyone to download for free. Now the owner of one of the titles is suing Sony, claiming that company failed in its obligation to protect the movie from Internet pirates. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Sony Sued For Not Protecting Leaked Movie From Pirates
Fri Jul 29 01:02, 2016 GMT
SAN FRANCISCO/WASHINGTON (Reuters) - The FBI is investigating a cyber intrusion against a major Democratic Party congressional fundraising group, an attack that may be related to an earlier hack against the party apparatus, four people familiar with the matter told Reuters.
Exclusive: FBI investigates hacking of Democratic congressional group - sources
Thu Jul 28 20:19, 2016 GMT
(Reuters) - Amazon.com Inc reported a better-than-expected rise in quarterly revenue, powered by blockbuster growth in its cloud services unit and an increase in subscriptions for its Prime loyalty program.
Amazon revenue beats estimates as cloud sales surge
Thu Jul 28 19:31, 2016 GMT
One basic tenet of computer security is this: If you can't vouch for a networked thing's physical security, you also cannot vouch for its cybersecurity. That's because in most cases, networked things really aren't designed to foil a skilled and determined attacker who can freely connect his own devices. So you can imagine my shock and horror seeing a Cisco switch and wireless antenna sitting exposed atop of an ATM out in front of a bustling grocery store in my hometown of Northern Virginia.
Would You Use This ATM?
Thu Jul 28 17:02, 2016 GMT
We, the undersigned, express our deep concern with the Bahraini Public Prosecution’s decision to charge Nazeeha Saeed, correspondent for Radio Monte Carlo Doualiya and France24, with unlawfully working for international media. The post Bahrain: Rights of Nazeeha Saeed and all journalists to report must be respected appeared first on Index on Censorship .
Bahrain: Rights of Nazeeha Saeed and all journalists to report must be respected
Thu Jul 28 09:37, 2016 GMT
47 journalists subject to arrest under warrants issued on Wednesday. The list included the names of columnists, editors and reporters who formerly had been employed at Zaman daily. The post Yavuz Baydar: Turkey’s rounding up reporters, editors and columnists appeared first on Index on Censorship .
Yavuz Baydar: Turkey’s rounding up reporters, editors and columnists
Thu Jul 28 08:54, 2016 GMT
Media freedom must be treated for what it really is: a strong test of democracy. The post Dunja Mijatović : Turkey must treat media freedom for what it really is – a test of democracy appeared first on Index on Censorship .
Dunja Mijatović : Turkey must treat media freedom for what it really is – a test of democracy
Thu Jul 28 09:48, 2016 GMT
SEOUL (Reuters) - South Korea said on Thursday it suspected North Korea of hacking a South Korean online shopping site and stealing personal records of more than 10 million shoppers in what appeared to be the latest case of a cyber attack by the isolated state.
South Korea says North hacked online shopping site
Wed Jul 27 13:59, 2016 GMT
As journalists are detained, Yavuz Baydar writes about the changes being rolled out by Turkey's government The post Yavuz Baydar: Erdogan is ruling Turkey by decree appeared first on Index on Censorship .
Yavuz Baydar: Erdogan is ruling Turkey by decree
Tue Jul 26 14:51, 2016 GMT
Technical.ly DC Public Library's librarians are lowkey internet privacy activists Technical.ly Librarians are teaching patrons how to protect their privacy and also taking pains to make sure that personal information stays private on public computers, all in the shadow of the National Security Agency. One of its most popular event programs last ... and more »
DC Public Library's librarians are lowkey internet privacy activists - Technical.ly
Tue Jul 26 18:39, 2016 GMT
Motherboard An Internet Censorship Company Tried to Sue the Researchers Who Exposed Them Motherboard Netsweeper is a small Canadian company with a disarmingly boring name and an office nestled among the squat buildings of Waterloo, Ontario. But its services—namely, online censorship —are offered in countries as far-flung as Bahrain and Yemen. In 2015 ...
An Internet Censorship Company Tried to Sue the Researchers Who Exposed Them - Motherboard
Tue Jul 26 14:54, 2016 GMT
WASHINGTON/NEW YORK (Reuters) - The Obama administration on Tuesday released a new directive outlining how the U.S. government intends to respond to significant cyber attacks.
U.S. issues directive on government response to major hacks
Tue Jul 26 12:45, 2016 GMT
Bangkok Post EU watchdogs give US-EU internet privacy deal a chance to work Bangkok Post The 28 national EU data protection authorities meeting in Brussels on Monday found that the new Privacy Shield system has stronger safeguards on data transfer and better filters to prevent US intelligence agencies from conducting bulk collection of ... and more »
EU watchdogs give US-EU internet privacy deal a chance to work - Bangkok Post
Tue Jul 26 11:45, 2016 GMT
The death of Pavel Sheremet on Wednesday 20 July came as violent incidents against journalists in Ukraine have been on the rise since May. The post Ukraine: Journalist’s murder is the latest in a long line of violent attacks appeared first on Index on Censorship .
Ukraine: Journalist’s murder is the latest in a long line of violent attacks
Tue Jul 26 10:13, 2016 GMT
Blocking torrent and streaming sites is a regular occurrence in many countries but the practice is now extending to other areas. Following a complaint by Russian news site Gazeta, the Moscow City Court has ordered a news portal to be blocked by ISPs after it 'pirated' a tourism article. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Court Orders News Site Blocked Following Article Piracy
Tue Jul 26 10:29, 2016 GMT
Facebook says its anti-spam filters were to blame for its website briefly blocking access to internal emails from US Democratic Party committee members published by Wikileaks.
Facebook 'anti-spam systems' blocked Democrat emails dump
Mon Jul 25 22:25, 2016 GMT
Internet Privacy Doesn't Mean A Thing … Yet. Utne Reader Online Proponents argue the benefits of legally requiring Internet entities to delete, hide, or make anonymous content as requested by users. Critics say it's a technologically impossible attack on free speech and open access. But Ctrl+Z offers a simple ...
Internet Privacy Doesn't Mean A Thing … Yet. - Utne Reader Online
Mon Jul 25 14:20, 2016 GMT
Journalist Yavuz Baydar writes of the continuing crackdown in Turkey. The post Yavuz Baydar: The largest clampdown in modern Turkey’s history appeared first on Index on Censorship .
Yavuz Baydar: The largest clampdown in modern Turkey’s history
Mon Jul 25 13:28, 2016 GMT
LONDON (Reuters) - Europe's first regulated bitcoin product - an asset-backed exchange-traded instrument that will invest exclusively in the digital currency - begins trading this week on the Gibraltar Stock Exchange and Germany's Deutsche Boerse.
Europe's first regulated bitcoin product launches in Gibraltar
Mon Jul 25 11:39, 2016 GMT
An Index tweet from March is being used as evidence against Nabeel Rajab, a Bahraini human rights activist The post Jodie Ginsberg: Bahrain needs to know that #opinionsarenotcrimes appeared first on Index on Censorship .
Jodie Ginsberg: Bahrain needs to know that #opinionsarenotcrimes
Mon Jul 25 10:41, 2016 GMT
In the short three months since the Index on Censorship Awards, the 2016 fellows have been busy striking for stronger freedom of expression around the world The post #IndexAwards2016 Fellowship update: “We want change now” appeared first on Index on Censorship .
#IndexAwards2016 Fellowship update: “We want change now”
Sat Jul 23 07:00, 2016 GMT
It was at the early hours of Friday that a journalist sent a note to her colleagues. “We are told by the management that our publication is discontinued with immediate effect,” she said. “We are told to pack our belongings and leave the office. You can’t imagine how sad I am.” The weekly news magazine […] The post Yavuz Baydar: Escalation in the clampdown on Turkey’s media and academia appeared first on Index on Censorship .
Yavuz Baydar: Escalation in the clampdown on Turkey’s media and academia
Fri Jul 22 16:50, 2016 GMT
It seems like every summer there’s another horror story about shark sightings and attacks at local beaches. JAWS taught us all that sharks are scary and should be avoided in the open ocean. That’s pretty solid advice and I can’t argue with it. But you know what else is good advice for enjoying the perfect beach day? Knowing how to swim, wearing sunscreen, staying under an umbrella, drinking plenty of water, avoiding rip currents, and steering clear of slippery jetties. Sure, the possibility of being eaten by a shark is real, but a painful sunburn because you forgot to reapply is far more likely. The same logic follows for cyber-attack and prevention. Some types of exploits are far more common than others and usually much easier to prevent as well. The best way to protect applications from potential data breach is to code them securely from the start. Take for example injection flaws, which allow attackers to input code that can trick the app into executing a malicious call to the database. These types of flaws can dump passwords or allow a hacker to access and modify sensitive data among other fishy stuff. OWASP (the open web application security project) has been putting injection flaws on its Top 10 for nearly 15 years. In his SQL Injection Prevention Cheat Sheet author Dave Wichers says, “It’s somewhat shameful that there are so many successful SQL Injection attacks occurring, because it is EXTREMELY simple to avoid SQL Injection vulnerabilities in your code.” Preventing SQL injection flaws from showing up in your applications is like smearing on some SPF 50 and plopping yourself under a safely anchored umbrella. Doing the preventive work on the front end will save you a lot of trouble and it’s not all that hard to do either. Even the specific programming language chosen for an application can impact its overall security posture. Veracode’s recent supplement to the State of Software Security Vol. 6 found that applications written in web scripting languages, like PHP, have far higher rates of vulnerabilities like SQL Injection and cross-site scripting than applications written in say, C or C++. Veracode CTO, Chris Wysopal, notes, “When organizations are starting new development projects and selecting languages and methodologies, the security team has an opportunity to anticipate the types of vulnerabilities that are likely to arise and how best to test for them”. Picking the right language to maximize your app’s functionality and coding with security in mind is like knowing how to swim before diving in. There are a number of real world threats that any information security professional must be aware of and defend against. Some are easier to prevent than others and can dramatically lower your company’s overall risk. There’s sometimes a culture of fear around rare and complex exploits, like advanced persistent threats (shark attacks). But most bad actors follow the path of least resistance. Taking little preemptive steps, will make for a happy beach day and a safer application portfolio.
Why Focusing on “Shark Attack” Exploits is the Wrong Strategy
Fri Jul 22 14:58, 2016 GMT
Index on Censorship is appalled by the decision by the University of Cape Town (UCT) to rescind an invitation to Danish editor Flemming Rose to deliver the annual TB Davie lecture on academic freedom The post Index on Censorship condemns decision to axe Flemming Rose as speaker on academic freedom appeared first on Index on Censorship .
Index on Censorship condemns decision to axe Flemming Rose as speaker on academic freedom
Fri Jul 22 12:58, 2016 GMT
The University of Cape Town rescinded an invitation to journalist and editor Flemming Rose, who had been scheduled to deliver the annual TB Davie lecture on academic freedom in August. The post Flemming Rose responds to the University of Cape Town appeared first on Index on Censorship .
Flemming Rose responds to the University of Cape Town
Fri Jul 22 11:47, 2016 GMT
A Texan man has been sentenced to 18 months in jail for running a fraudulent Ponzi-style scheme based around the Bitcoin virtual currency.
US man jailed over bitcoin fraud scheme
Fri Jul 22 11:25, 2016 GMT
Turkey has seen an increase in violations against media workers, with journalists murdered, held hostage, arrested and physically attacked, as well as having equipment confiscated The post Mapping Media Freedom: A disastrous week for Turkish journalism appeared first on Index on Censorship .
Mapping Media Freedom: A disastrous week for Turkish journalism
Fri Jul 22 09:58, 2016 GMT
Although the US is considered to have relatively generous freedoms of speech and the press protected under the First Amendment to the US Constitution, these freedoms have their limits The post Chelsea Manning and the price US whistleblowers pay for revealing secrets appeared first on Index on Censorship .
Chelsea Manning and the price US whistleblowers pay for revealing secrets
Thu Jul 21 20:40, 2016 GMT
Global Voices Online Netizen Report: What do Zimbabwe, Kashmir, and Turkey Have in Common? Internet Censorship . Global Voices Online ... rights around the world. Reports of Web censorship — ranging from blocking specific websites and entire social media platforms as well as overall Internet blackouts — have been so widespread over the last two weeks that we've decided to dedicate ...
Netizen Report: What do Zimbabwe, Kashmir, and Turkey Have in Common? Internet Censorship. - Global Voices Online
Thu Jul 21 19:44, 2016 GMT
Here's a delightful bit of survey happiness out of Ireland: a vendor survey found that "almost half of Irish businesses wouldn’t disclose a data security breach to impacted third parties, including customers and suppliers." Even worse, these results likely underestimate how many execs agree with that thinking, but are shrewd enough to not share that with someone taking a survey. The survey result is surprising only in that so many executives admitted that desire to not disclose. But actually suppressing a data breach from customers—or investors, suppliers, resellers, franchisees or anyone else—is the quintessential self-destructive act. Why? Because sooner or later (trust me, it will be sooner), the news will get out and it will phrased in the least positive way possible. If you want to do damage control, announce it in the best way. Suppressing it does nothing other than making sure other people announce it for you. How will others learn of it? Let us count the ways. When the thieves start to use your data, it will be detected. Processors (yours and others) and card brands will look for a common point of purchase. That will be you. They will report it. Law enforcement will look for the trail, which will also lead to you. Your customer victims will discuss it on social media where consumers—and quite likely some reporters—will piece it together. The thieves might be arrested for an unrelated offense and admit to breaking into your operation. Etc.. If you will disclose, you will be able to color the first perceptions of the incident. Before you've even said word one, you're ahead of the game because your customers/shareholders/partners will hear about it first from you. That gets you serious points. You can say that your security mechanisms detected this breach and that it's a testimonial to your solid security systems, implying that your rival companies might have never detected it. Detection implies customer protection. Getting breached is never a good thing, but at least put the best face on it you can while you still—albeit briefly—control the story. Beyond PR, there are pragmatic reasons to do this. First, it alerts your customers (and partners) to watch for unauthorized transactions. That in turn will help law enforcement to catch the attackers, which is ultimately your goal. If they are caught and the damage is minimized, you're more likely to escape with your reputation mostly intact. There will be several post-breach investigations—and just about of them will look more favorably on you if you announce quickly. There will be a PCI-related probe from your processor and the relevant card brands. No mystery there. The "investigation" will quickly conclude that your assessor was wrong and that you were in fact not PCI compliant. (Whenever Visa or MasterCard is involved, consider yourself a character in George Orwell's 1984. The fact that you were breached of course proves that you weren't PCI compliant, right? PCI is perfect, no? Think I'm exaggerating? Wait until you're breached.) There will also be a law enforcement probe. You'll the victim in that probe, but you'll still have lots of questions to answer. Federal Trade Commission probes are also common. Then there will be the discovery from the inevitable class-action lawsuit on behalf of shareholders, assuming you're unlucky enough to be publicly-traded. About that disclosure, some pointers. Be absolutely and strictly truthful. That means not going even one tiny iota beyond what you know to be true. For example, never ever say "XYZ was tampered with, but ABC wasn't touched." In the early stages of your internal forensics probe, you have no idea what was or was not touched. You can say "At this point, we have seen no indications that ABC was touched," but that's as far as you dare go. The initial forensic reports—for very good reasons—are almost never accurate. Why? Because most cyberthieves are professionals. The first thing they do before leaving the scene of the crime is to erase almost all evidence of their existence. The second thing they do is leave misleading clues, to confuse the forensic investigators. Therefore, logically enough, when your team does its initial exhaustive sweep of log files and everything, the first things it finds are what the bad guys want them to find. It will take many more weeks and months of investigating—with lots of comparisons to archived files secured away before the breach—to find inconsistencies and to slowly figure out what most likely really happened. If your forensics team is good—and most are—the truth will eventually be learned. But like the crime scene photos shot by police in the very beginning of the probe, the story they will tell is almost always misleading—deliberately so. Sticking strictly to what you know to be true is the only viable approach. Beyond telling the stakeholders that a breach happened, you should also seriously consider spreading a more detailed version to others in the industry including your competitors. This is one of those rare times when you're all in this together. When your arch-rival gets hit, they'll likely return the favor. There have been some government-supported efforts to do this. Not all have been ideal—wrote last year about a well-intentioned but poorly-written federal effort —but better versions will hopefully emerge. Either way, the bad guys are hoping on using these techniques repeatedly, figuring that victims will be silent. We can't let that happen.
Keeping Your Breach a Secret and Other Self-Destructive Decisions
Thu Jul 21 11:39, 2016 GMT
Almost six million fraud and cyber crimes were committed last year in England and Wales, new figures from the Office for National Statistics suggest.
Nearly six million fraud and cyber crimes last year, ONS says
Thu Jul 21 11:21, 2016 GMT
The failed 15 July coup, bloody and despicable, delivered a lethal blow to the already crippled democratic order in Turkey. The cabal behind the putsch has become a The post Yavuz Baydar: As the purge deepens in Turkey, is a self-coup underway? appeared first on Index on Censorship .
Yavuz Baydar: As the purge deepens in Turkey, is a self-coup underway?
Thu Jul 21 04:54, 2016 GMT
The Republican National Convention is under constant attack. How cyberdefense firms keep thousands of connected devices safe around the clock.
Inside the RNC's secret cybersecurity battle - CNET
Wed Jul 20 20:57, 2016 GMT
The privacy-focused Tor Project backs a new initiative that lets you use Tor to keep your home's Internet-of-things devices hidden from hackers. The post Now You Can Hide Your Smart Home on the Darknet appeared first on WIRED .
Now You Can Hide Your Smart Home on the Darknet
Wed Jul 20 16:59, 2016 GMT
Blocking access to certain corners of the internet is a common response to political events in Turkey.
Turkey blocks WikiLeaks after it publishes 300,000 government emails - CNET
Wed Jul 20 16:45, 2016 GMT
PanAm Post Censorship in Venezuela: Over 370 Internet Addresses Blocked PanAm Post The study states Cantv and Digitel have similar blocks placed on them, in that they both block exactly the same web pages. However ... However, the study made clear it didn't observe “any other Internet censorship mechanisms (besides DNS blocking).
Censorship in Venezuela: Over 370 Internet Addresses Blocked - PanAm Post
Tue Jul 19 19:07, 2016 GMT
American Enterprise Institute Erdogan, the Internet , and Power American Enterprise Institute Under the leadership of Turkish President Recep Tayyip Erdogan, Turkey has become one of the most repressive states when it comes to internet freedom — ranked by Freedom House as the 20th most repressive country in the world, right between Egypt ... Turkey Throttled Social Media During Coup In 'Evolution' of Internet Censorship Motherboard Social media may have been blocked during Turkey coup attempt The Guardian Turkish coup plotters' cyber fail: Not turning off Internet Ars Technica Marketplace.org  - New York Times  - Quartz all 9,956 news articles »
Erdogan, the Internet, and Power - American Enterprise Institute
Wed Jul 20 08:45, 2016 GMT
Operators and Internet Service Providers will be required to detect IP-telephony traffic and block it in case of violation of the transmission procedure.
Full Control Of Viber And Skype Conversations to Be Introduced In Belarus
Wed Jul 20 11:10, 2016 GMT
On Tuesday 19 July, Turkey's independent and critical journalists, academics and law experts woke up to another day of concern and fear The post Yavuz Baydar: Critical Turkish media is cracking under pressure appeared first on Index on Censorship .
Yavuz Baydar: Critical Turkish media is cracking under pressure
Wed Jul 20 06:48, 2016 GMT
ISTANBUL (Reuters) - Turkey's Internet watchdog has blocked access to the WikiLeaks website in Turkey, it said, after the whistleblower organization released nearly 300,000 emails from the ruling AK Party.
Turkey blocks access to WikiLeaks after ruling party email dump
Wed Jul 20 01:13, 2016 GMT
Cici's Pizza, a Coppell, Texas-based fast-casual restaurant chain, today acknowledged a credit card breach at more than 135 locations. The disclosure comes more than a month after KrebsOnSecurity first broke the news of the intrusion, offering readers a sneak peak inside the sprawling cybercrime machine that thieves used siphon card data from Cici's customers in real-time.
Cici’s Pizza: Card Breach at 130+ Locations
Tue Jul 19 20:51, 2016 GMT
SAO PAULO (Reuters) - Brazil's Federal Supreme Court on Tuesday suspended a ruling by a low-tier judge ordering wireless phone carriers to block access to Facebook Inc's WhatsApp, the third such decision against the popular phone messaging app in eight months.
Brazil top court suspends ruling blocking WhatsApp message app
Tue Jul 19 17:36, 2016 GMT
Google and Bing are not required to automatically filter "torrent" related searches to prevent piracy, the High Court of Paris has decided. The filter, requested by the local music industry group SNEP, would be too broad, ineffective, and target legitimate content as well. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Court: Google and Bing Don’t Have to Censor “Torrent” Searches
Tue Jul 19 17:03, 2016 GMT
For the third time, a Brazilian judge blocks nationwide access to the messaging service WhatsApp amid an escalating row over criminal investigations.
Brazil judge blocks WhatsApp again as row escalates
Tue Jul 19 12:19, 2016 GMT
Mapping Media Freedom correspondent Christina Vasilaki looks at the treatment of journalists covering the refugee crisis in Greece The post Greece: The dangers of reporting on the refugee crisis appeared first on Index on Censorship .
Greece: The dangers of reporting on the refugee crisis
Tue Jul 19 03:49, 2016 GMT
Among the more plunderous cybercrime gangs is a group known as "Carbanak," Eastern European hackers blamed for stealing more than a billion dollars from banks. Today we'll examine some compelling clues that point to a connection between the Carbanak gang's staging grounds and a Russian security firm that claims to work with some of the world's largest brands in cybersecurity.
Carbanak Gang Tied to Russian Security Firm?
Mon Jul 18 19:05, 2016 GMT
Take Steps to Protect the Data before the Ransomware Attack Happens In a recent study conducted by Radware, C-level executives revealed that they had no interest in paying up if their network was hit by ransomware , but that response came before they were locked out from their data. Once they were actually attacked, nearly half of those executives admitted they have, indeed, paid the ransom. The FBI warns against paying any type of ransom , saying that not only are there no guarantees the data will be released – something a hospital in Kansas discovered after paying a ransom once, only to find that a second ransom was demanded – but that by paying, it ramps up the incentives for even more criminals to get involved in the ransomware act. Ransomware attacks are a fact of cyber-life in 2016, yet businesses, especially in the healthcare industry, seem to be caught unaware and unprepared, and some companies react because the either don’t have a choice (they may not have a readily accessible backup) or they panic. That raises the question: What should companies be doing to protect their data so that when ransomware strikes, paying the ransom is unnecessary? The main strategy to ensure ransomware is ineffective is to have a proper staged backup plan in place, according to Kevin Curran, IEEE Senior member and senior lecturer in Computer Science at the University of Ulster. Files that are backed up offline can simply be substituted for encrypted files and no ransom need ever be paid. “The backups should be serialized, with previous versions of files stored,” he explained. “Of course, these backups should not be stored on network attached drives as ransomware can infect shared and removable media.” Another strategy is to authenticate in-bound emails. “This helps as the majority of infections arise from opening ransomware attachments,” Curran said. “Implementing a Sender Policy Framework, Domain Keys Identified Mail and Domain Message Authentication Reporting and Conformance can help guard against spear phishing and other attacks coming through spoofed email. These work together to validate the domain of the originating email server but sadly, not enough organizations adopt these standards.” Awareness training is an absolute must, as well. When employees know what they are looking for – how to spy even the best-disguised phishing email or signs that a ransomware attack is beginning – they become the frontline of defense. If the ransomware isn’t downloaded, after all, there will be no need for a ransom to be paid. Vaclav Vincalek, President of Pacific Coast Information Systems Ltd., has personally witnessed how security-aware employees can make a difference in being a victim of a ransomware attack and preventing the attack from happening. The customers Vincalek works with recognized that malware started  to encrypt files, so they shut down the laptop and called IT department. “The IT guys turned off the switches to prevent the propagation of the virus,” he explained. “We did an assessment of the situation. We scanned the infected laptop, identified the signature of the virus and start scanning all the workstations in the office. Parallel to that we examined the file server where the files were encrypted. Once the assessment of the damage was done, the encrypted files were restored from backup, switches turned on and people continued working.” These precautions aren’t fool-proof, however. As Tyler Cohen Wood, Cyber Security Advisor for Inspired eLearning pointed out, while backing up data is vital, when you back up the data is also important. There is going to be a gap of data that is missed between the most previous backup and an attack; how small that gap is depends on how frequently backups occur. Also, Cohen Wood warned, depending on the ransomware, it is possible that backdoors in hardware and software could be left behind by an attack.” By reinstalling from backups, you can most likely thwart software backdoors,” she said, “but I highly recommend having a forensic team go over the systems to ensure no hardware malware or backdoor surprises have been left behind.” If you want to avoid being a statistic or you don’t want to resort to hoarding bitcoins , you’ll want to create a security culture in your company.  “Security used to be considered an IT problem, said Stu Bradley, VP of Cybersecurity at SAS.  “Given today’s threat landscape, security needs to be seen as every employee’s responsibility. This is particularly important in combatting ransomware.”
How Do You Avoid Paying a Ransom?
Mon Jul 18 14:05, 2016 GMT
Today is Nelson Mandela International Day, a day to remember Mandela’s achievements in democracy, human rights and peace. Holly Raiborn The post Nelson Mandela International Day: Index remembers apartheid-era South Africa appeared first on Index on Censorship .
Nelson Mandela International Day: Index remembers apartheid-era South Africa
Sun Jul 17 17:58, 2016 GMT
BBC News gained exclusive access to the secrets of the tech experts protecting Wimbledon from cyber attacks.
Wimbledon: Tennis tournament's secret cyber security
Fri Jul 15 21:49, 2016 GMT
Motherboard Turkey Throttled Social Media During Coup In 'Evolution' of Internet Censorship Motherboard Turkish security officers detain Turkish police officers (in black) on July 15, 2016 in Istanbul, during a security shutdown of the Bosphorus Bridge. ... A coup by “factions” of the Turkish military is underway, and social media sites including ...
Turkey Throttled Social Media During Coup In 'Evolution' of Internet Censorship - Motherboard
Fri Jul 15 21:21, 2016 GMT
HSBC Sites Downed Briefly After Cyber Attack Earlier this week, it was reported that HSBC had been the victim of a cyber attack and both it’s US and UK sites had been taken... read more The post Threat Recap: Week of July 11th appeared first on Webroot Threat Blog .
Threat Recap: Week of July 11th
Fri Jul 15 17:12, 2016 GMT
A new report published by the European Union Intellectual Property Office identifies a wide range of 'business models' that are used by pirate sites. The organization, which announced a new collaboration with Europol this week, signals Bitcoin and the Tor network as two key threats to ongoing anti-piracy efforts. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
‘Tor and Bitcoin Hinder Anti-Piracy Efforts’
Fri Jul 15 16:03, 2016 GMT
Index on Censorship is delighted to be one of the nine groups honoured by the Turkish Journalists Association (TGC) with this year's Press Freedom Prize. The post Turkey: Journalists’ association presents award to press freedom groups appeared first on Index on Censorship .
Turkey: Journalists’ association presents award to press freedom groups
Fri Jul 15 16:14, 2016 GMT
In a notable sign of the times, cybercrime has now surpassed all other forms of crime in the United Kingdom, the nation's National Crime Agency (NCA) warned in a new report. It remains unclear how closely the rest of the world tracks the U.K.'s experience, but the report reminds readers that the problem is likely far worse than the numbers suggest, noting that cybercrime is vastly under-reported by victims.
Cybercrime Overtakes Traditional Crime in UK
Fri Jul 15 12:09, 2016 GMT
Today we bring you the next episode of the Steal This Show podcast, discussing the latest file-sharing and copyright news. In this episode we discuss how proposed legislation threatens unrestricted VPN and BitTorrent use. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Steal This Show S01E13: Save P2P, Save The Internet!
Thu Jul 14 16:01, 2016 GMT
Charges of acquiring and divulging state secrets, membership of, and administration of a terrorist organisation brought against five journalists The post Turkey: Charges against five journalists must be dropped appeared first on Index on Censorship .
Turkey: Charges against five journalists must be dropped
Thu Jul 14 14:16, 2016 GMT
A Norwegian court has ordered ISPs to block subscriber access to eight pirate streaming sites, including WatchSeries, TUBE+, and CouchTuner. The new blockades are welcomed by Hollywood's major studios, but the local Pirate Party fears a slippery blocking-slope leading to overbroad censorship. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Expanding Pirate Site Blocks Spark Censorship Fears
Thu Jul 14 12:58, 2016 GMT
“Censorship is as much with us as it ever was,” said author, lawyer and early Index supporter Louis Blom-Cooper, in a speech to mark the 250th issue of Index on Censorship magazine, during its launch at London’s magCulture on Tuesday 12 July. The event saw special performances by actor Simon Callow, who read Maya Angelou’s poem […] The post The power of print: a celebration of 250 issues of Index on Censorship magazine appeared first on Index on Censorship .
The power of print: a celebration of 250 issues of Index on Censorship magazine
Thu Jul 14 11:39, 2016 GMT
Norwegian musician Moddi's upcoming Unsongs compiles songs from across the world that have been banned. Index has put together a playlist of the songs included in the album The post Moddi: Unsongs playlist of the banned, censored and silenced appeared first on Index on Censorship .
Moddi: Unsongs playlist of the banned, censored and silenced
Thu Jul 14 11:16, 2016 GMT
I wrote this letter during my time in prison. I don’t remember the exact date but it was in the middle of the Ukrainian crisis and the “trial” of Dilgam Askerov The post Khadija Ismayilova: Unsent letter from prison appeared first on Index on Censorship .
Khadija Ismayilova: Unsent letter from prison
Wed Jul 13 17:14, 2016 GMT
It was with considerable alarm that we watched the recent evidence session of counter-extremism minister, Karen Bradley, before Parliament’s Joint Committee on Human Rights The post Defend Free Speech: Minister for extremism comes up with ten different definitions in one hour appeared first on Index on Censorship .
Defend Free Speech: Minister for extremism comes up with ten different definitions in one hour
Wed Jul 13 15:17, 2016 GMT
Google released an updated overview of its anti-piracy efforts today. The company notes that many pirate sites have lost the vast majority of their search traffic due to its downranking efforts. However, Google stresses that it won't remove entire domain names from its search results, as this could lead to overbroad censorship. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Google: Punishing Pirate Sites in Search Results Works
Wed Jul 13 06:15, 2016 GMT
ETtech.com US & EU launch controversial Internet privacy deal ETtech.com The European Union on Tuesday launched a controversial deal with the United States aimed at curbing government spying on European citizens' personal Internet data. The new deal comes after the EU's top court last year struck down a previous ...
US & EU launch controversial Internet privacy deal - ETtech.com
Wed Jul 13 13:15, 2016 GMT
Index strongly protests the continued judicial harassment of Nabeel Rajab, a respected Bahraini human rights defender, and calls for his immediate and unconditional release. The post Index protests judicial harassment of Bahraini human rights defender appeared first on Index on Censorship .
Index protests judicial harassment of Bahraini human rights defender
Wed Jul 13 12:19, 2016 GMT
We joined editors, reporters, columnists, bloggers and civil society activists are, despite being a minority in the shackled media sector in Turkey The post In Turkey, a loud disagreement finds a common ground: Journalism is not a crime appeared first on Index on Censorship .
In Turkey, a loud disagreement finds a common ground: Journalism is not a crime
Wed Jul 13 11:25, 2016 GMT
A member of the What a Liberty! project to reimagine the Magna Carta for the 21st century writes about her experience at the public launch of the campaign to empower young people The post What a Liberty!: Raising our voice to call for change appeared first on Index on Censorship .
What a Liberty!: Raising our voice to call for change
Wed Jul 13 00:19, 2016 GMT
In a fun new HBO video, the actor has had it with these bleepin' dragons and these bleepin' White Walkers.
You'll swear by Samuel L. Jackson's uncensored 'Game of Thrones' summary - CNET
Tue Jul 12 21:07, 2016 GMT
The Daily Star EU, US launch controversial internet privacy deal The Daily Star EU, U.S. launch controversial internet privacy deal. US Commerce Secretary Penny Pritzker talks to the media after a meeting at the EU headquarters in Brussels, on July 12, 2016. AFP / THIERRY CHARLIER. RSS; Follow; Email; Print; Share. Agence France ...
EU, US launch controversial internet privacy deal - The Daily Star
Tue Jul 12 16:42, 2016 GMT
Developers are cranking out code faster than ever, and the threat landscape is growing and changing at an equally fast pace – all while the number of skilled security professionals is at an all-time low. If your application security strategy is to test code after it’s completed, then scramble to fix whatever’s broken, or worse, patch vulnerabilities in code as you hear about them, you won’t be able to keep up, and you’re giving the cyberattackers an edge. Need proof? CIO Magazine found that a typical $500 million-plus enterprise has developed more than 3,079 applications. At the same time, web application attacks are now the most frequent pattern in confirmed breaches ( 2016 Verizon Data Breach Investigations Report ), and the OWASP Top 10 list of security vulnerabilities is continually changing. Finally, CSO recently reported that there were 1 million cybersecurity job openings entering 2016 – with a projected shortfall of 1.5 million by 2019. The solution? Start by changing the way you think about application security. You won’t keep up with the bad guys if you think of it as an activity you add onto the end of the development process. Here are four good places to start. A Solution That Scales The lack of security resources, combined with the rapid pace of development, means that your application landscape is growing faster than you can secure it – unless you have a cloud-based solution that can easily scale along with your growing application landscape. And protecting the whole application perimeter, rather than just a portion, is key. While it’s important to test critical web applications early and often, all applications on the perimeter pose an opportunity for brand damage, and some may allow attackers to pivot to a more business-critical system once compromised. In fact, some of the most damaging recent breaches stemmed from applications deemed non business-critical. You need a solution that can scale easily to incorporate your entire application landscape, not just your most critical apps. Call-out: A recent Forrester Research study that examined the Total Economic Impact® (TEI) of switching from an on-premises to a cloud-based application security solution found that an enterprise would spend an additional $5 million (including the addition of 15 FTEs) over three years to expand an on-premises application security solution to match the scale of a cloud-based solution . Security in the SDLC Today’s environment demands that you produce secure code quickly. And when security is a gate at the end of the dev process, you’ll struggle to keep up with both your development deadlines, and with the multiplying threats. Rather than tacking security onto the end of the development process – when it’s cumbersome and expensive – work it into the early stages of development: Integrate security into the development process: Make the application security testing process as seamless for the development team as possible. This starts with selecting a solution that allows you to integrate security assessments into the same APIs that are used for development. By adding APIs to the development tools already being used by the programming teams (JIRA, Jenkins, Team Foundation Server), security can become so integrated into the development processes that it is seamless. Training dev: Over time, dev teams trained on secure coding will produce more secure code more quickly. Veracode research recently found that  development organizations that leverage eLearning see a 30 percent improvement in fix rate . Managing Components If a vulnerability is disclosed in an open source component, you have a limited window of time to hunt down and update every instance of that component in your applications. Take the case of a healthcare organization’s struggle when Heartbleed was disclosed . Although the organization was aware of the OpenSSL vulnerability, it was not able to find and update all versions of the component before hackers were able to breach it through the Heartbleed vulnerability. If your application security solution enables visibility into all of the components development teams are using, as well as the versions being used, security teams can quickly patch and/or update the component version when a new vulnerability is disclosed. Otherwise, you are left trying to work faster than the criminals, which most likely won’t end well. Runtime Protection Vulnerabilities will get through. You’re trying to do more with less, and the speed of development is only increasing. Maybe time-to-market pressures trumped security, or maybe an app gets updated, and that introduces a vulnerability. Adding runtime protection to your application security solution gives you some time. Runtime application protection adds detection and protection features to the application runtime environment, enabling applications to “self-protect” by reconfiguring automatically, without human intervention, in response to attacks. When your apps have shields, they protect themselves when you can’t – giving you some much-needed leeway to get vulnerabilities remediated before they are exploited. Conclusion With the rapid pace of technology innovation, and the slow pace of security skill development, tacking security onto the end of your processes means you’ll be in perpetual catch-up mode – and really, you’ll never catch up. To keep up in this environment, you have to think about security early and often, and find solutions that allow you to do so. Want more practical advice on starting and managing an application security program? Check out our new CISO Kit for Application Security .
You Can’t Keep Up With the Security Demand
Tue Jul 12 16:41, 2016 GMT
The "PokeGone" Chrome extension promises to filter out all Pokemon-related content from your internet experience.
Sick of Pokemon? There's a Chrome extension for that - CNET
Tue Jul 12 13:38, 2016 GMT
(Reuters) - Banco Santander SA, Spain's largest lender, named former JPMorgan executive Blythe Masters its senior blockchain adviser as banks race to find new uses for the technology behind virtual currency Bitcoin.
Spain's Santander names ex-JPMorgan executive Masters blockchain guru
Tue Jul 12 12:24, 2016 GMT
When you hear the words "hip hop", you may think about girls, guns and the other usual stereotypes that hunt the genre The post The power of hip hop: More than just guns and girls appeared first on Index on Censorship .
The power of hip hop: More than just guns and girls
Tue Jul 12 10:41, 2016 GMT
Phys.Org EU launches controversial internet privacy deal with US (Update) Phys.Org "The EU-US Privacy Shield is a robust new system to protect the personal data of Europeans and ensure legal certainty for businesses," said EU Justice Commissioner Vera Jourova, launching the deal with US Commerce Secretary Penny Pritzker in Brussels ... and more »
EU launches controversial internet privacy deal with US (Update) - Phys.Org
Tue Jul 12 09:36, 2016 GMT
NDTV EU Launches Controversial Internet Privacy Deal With US NDTV Brussels: The European Union today launched a controversial deal with the United States aimed at curbing government spying on the personal internet data of European citizens. EU Justice Commissioner Vera Jourova and US Commerce Secretary Penny ... and more »
EU Launches Controversial Internet Privacy Deal With US - NDTV
Tue Jul 12 00:32, 2016 GMT
Mir Islam, a 21-year-old Brooklyn man who pleaded guilty to an impressive array of cybercrimes including cyberstalking, "doxing" and "swatting" celebrities and public officials (as well as this author), was sentenced in federal court today to two years in prison. Unfortunately, thanks to time served in this and other cases, Islam will only see a year of jail time in connection with some fairly heinous assaults that are becoming all too common.
Serial Swatter, Stalker and Doxer Mir Islam Gets Just 1 Year in Jail
Mon Jul 11 18:30, 2016 GMT
Fortune Bernie Sanders and Other Senators Seek Stronger Internet Privacy Rules Fortune Internet users may be getting more privacy protection for their online activity as fallout from the decades-long battle over net neutrality. The Federal Communications Commission spent years trying to impose rules on broadband providers like Verizon ... Week ahead: Internet privacy rules under scrutiny The Hill Federal Trade Commission rejects FCC privacy regulation Washington Times all 7 news articles »
Bernie Sanders and Other Senators Seek Stronger Internet Privacy Rules - Fortune
Mon Jul 11 21:27, 2016 GMT
(Reuters) - A senior executive of Alphabet Inc's Google unit said on Monday that the company was notifying customers of 4,000 state-sponsored cyber attacks per month.
Google notifies users of 4,000 state-sponsored cyber attacks per month: executive
Mon Jul 11 18:21, 2016 GMT
How to protect technology such as drones from cyberattacks is one of the big issues at the Farnborough Airshow.
Farnborough Airshow: Keeping drones safe from harm
Mon Jul 11 17:37, 2016 GMT
Index on Censorship supports the "I am a journalist" campaign launched by journalists and media freedom advocates from Turkey. The post Standing in solidarity with Turkey’s journalists appeared first on Index on Censorship .
Standing in solidarity with Turkey’s journalists
Mon Jul 11 14:49, 2016 GMT
The family of murdered journalist and Sunday Times correspondent Marie Colvin has filed a lawsuit against the Syrian government The post War reporter Marie Colvin’s family sues Syria appeared first on Index on Censorship .
War reporter Marie Colvin’s family sues Syria
Mon Jul 11 08:54, 2016 GMT
Join two powerful journalists at Write on Kew to hear how and why reporters take risks to get close to the action, and discuss the vital role women can play in bringing truth to light. The post 24 Sept: Women on the front line at Write on Kew appeared first on Index on Censorship .
24 Sept: Women on the front line at Write on Kew
Mon Jul 11 13:10, 2016 GMT
The financial rewards for people who help to verify who does what with their bitcoins have been halved.
Bitcoin rewards halve for virtual cash money miners
Mon Jul 11 10:50, 2016 GMT
Facing charges related to comments on the social media website Twitter, Nabeel Rajab may be sentenced to more than ten years in prison. The post NGOs call for unconditional release of Bahraini human rights defender appeared first on Index on Censorship .
NGOs call for unconditional release of Bahraini human rights defender
Mon Jul 11 10:02, 2016 GMT
Washington Times Week ahead: Internet privacy rules under scrutiny The Hill "The FCC's proposed rules would needlessly increase costs and burdens for broadband providers, particularly smaller ones, with little to no consumer benefit, including because they fail to cover all actors in the Internet ecosystem," Matthew Polka, the ... Federal Trade Commission rejects FCC privacy regulation Washington Times all 4 news articles »
Week ahead: Internet privacy rules under scrutiny - The Hill
Mon Jul 11 03:25, 2016 GMT
Communities Digital News LGBT dating, guns, internet privacy and Macy's Ccops Communities Digital News She was accused of shoplifting and taken into an elevator and to a basement floor where two plainclothes security officers took her purse and her phone and patted her down under her shirt, legs and private areas. The woman repeatedly asked what was ...
LGBT dating, guns, internet privacy and Macy's Ccops - Communities Digital News
Sat Jul 9 18:19, 2016 GMT
Daniel Yankelevits, one of the top legal executives at Sony Pictures Entertainment, has asked Google to remove a leaked email published by Wikileaks after the 2014 hack. The top executive used a copyright takedown notice to bury an email which exposes his personal salary, claiming "it's not right." Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Sony Pictures Tries to Censor Wikileaks With Dubious DMCA Notice
Fri Jul 8 12:41, 2016 GMT
Robotics video-blogger Simone Giertz shows off a robot that places sunglasses on her face, so she can become a live-action meme.
​YouTuber says 'deal with it,' using a robot - CNET
Fri Jul 8 12:01, 2016 GMT
Vocativ Is Blocking Sex Selection Ads In India Internet Censorship ? Vocativ However, a lawyer for the companies, which were ordered by an Indian court last year to block such ads, argued at the time that it was “pre- censorship and information blocking.” Sex-selective abortions are rampant in India. For every 100 girls born ...
Is Blocking Sex Selection Ads In India Internet Censorship? - Vocativ
Fri Jul 8 12:11, 2016 GMT
Turkish journalist, author and filmmaker Can Dündar spoke at the House of Commons last week about the state of politics and media freedom in Turkey The post Can Dündar: Turkey is “the biggest prison for journalists in the world” appeared first on Index on Censorship .
Can Dündar: Turkey is “the biggest prison for journalists in the world”
Fri Jul 8 10:13, 2016 GMT
To mark the 250th issue of Index on Censorship magazine, we asked some of our contributors to nominate standout features from the publication's long history The post Marking the 250th issue: Contributors choose favourites from Index on Censorship archives appeared first on Index on Censorship .
Marking the 250th issue: Contributors choose favourites from Index on Censorship archives
Fri Jul 8 09:43, 2016 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout Europe The post Mapping Media Freedom: In review 30 June-7 July appeared first on Index on Censorship .
Mapping Media Freedom: In review 30 June-7 July
Fri Jul 8 07:29, 2016 GMT
Yesterday, the European Parliament adopted, with a large majority, a resolution condemning recent human rights abuses performed by Bahraini authorities The post European Parliament adopts resolution condemning Bahrain’s human rights abuses appeared first on Index on Censorship .
European Parliament adopts resolution condemning Bahrain’s human rights abuses
Thu Jul 7 19:09, 2016 GMT
A new phishing scam targeting online pirates is much broader than initially thought, with Internet providers all over the world being bombarded with fake copyright infringement notices and settlement demands. The scammers are pretending to represent various rightsholders, including HBO. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Phishing Scam Targets Game of Thrones Pirates
Thu Jul 7 15:20, 2016 GMT
The social network says it hasn't and won't censor live-streamed footage showing the aftermath of the fatal shooting of Philandro Castile.
Minnesota police shooting video brings graphic death to Facebook - CNET
Thu Jul 7 11:33, 2016 GMT
Bitcoins used to buy images of child sex abuse could soon be tracked and blocked as two companies share intelligence on how virtual cash is spent.
Bitcoins used in child sex abuse deals targeted
Thu Jul 7 10:59, 2016 GMT
In 2014, the High Court ordered Sky, TalkTalk, BT, Virgin Media and EE to block websites dealing in counterfeit luxury products. The ISPs appealed the case on a number of grounds, including that the court had no power to order the injunctions. That appeal has now failed. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
UK ISPs Fail to Overturn Site Blocking Order
Thu Jul 7 02:06, 2016 GMT
Businesses and law enforcement agencies are losing the "cyber arms race" with online criminals, the UK's National Crime Agency warns.
Criminals winning 'cyber arms race' - National Crime Agency
Wed Jul 6 12:00, 2016 GMT
Two types of cyberattacks may sound similar, but they're quite different in practice. The post Hacker Lexicon: What Are CNE and CNA? appeared first on WIRED .
Hacker Lexicon: What Are CNE and CNA?
Wed Jul 6 10:15, 2016 GMT
Journalists and citizens in Serbia’s northern city of Novi Sad are taking the streets after a wave of dismissals at the regional broadcaster Radio Television Vojvodina The post Serbia: Journalists protest “government control” of public broadcaster appeared first on Index on Censorship .
Serbia: Journalists protest “government control” of public broadcaster
Wed Jul 6 07:28, 2016 GMT
Well-known Brest blogger Siarhei Pyatrukhin deals with journalistic investigations devoted to corruption among officials and security forces.
Blogger's Gadgets Seized by the Police
Wed Jul 6 06:39, 2016 GMT
Belarusian blogger Anton Matolka received a letter from Eduard Palchys, who became known under the name of Jhon Silver.
Eduard Palchys: I’d Better Serve Term In Prison Camp, With Clear Conscience
Wed Jul 6 07:26, 2016 GMT
LONDON (Reuters) - London-based bitcoin start-up Elliptic and the Internet Watch Foundation, a charity that monitors online child sex abuse, will cooperate to clamp down on the use of bitcoin in online child pornography, Elliptic said on Wednesday.
New partnership aims to clamp down on use of bitcoin for child porn
Tue Jul 5 17:15, 2016 GMT
E-Commerce Times FCC's Internet Privacy Proposal Sparks Congressional Action E-Commerce Times Walden called upon the FCC to "engage in thoughtful discussions with industry to develop flexible and consistent rules" that mirror the Federal Trade Commission Internet privacy regulation framework "that has proven successful in today's digital ... and more »
FCC's Internet Privacy Proposal Sparks Congressional Action - E-Commerce Times
Tue Jul 5 17:52, 2016 GMT
The Daily Dot The reality of life under Turkey's internet censorship machine The Daily Dot Yet, Turkish citizens continuously adopt new methods of circumventing online censorship to read news, and they create novel ways to share their opinion without risking their freedom or job security . First of all, if a website does not load in Turkey ... and more »
The reality of life under Turkey's internet censorship machine - The Daily Dot
Tue Jul 5 16:45, 2016 GMT
Since February, eighteen British teenagers have worked together to re-imagine the Magna Carta and create their own Great Charter, the Magna Carta 2.0 The post 6 July: What a Liberty! launch the Magna Carta 2.0 appeared first on Index on Censorship .
6 July: What a Liberty! launch the Magna Carta 2.0
Tue Jul 5 16:45, 2016 GMT
How can we protect a free media and space for civil society? What are the growing restrictions facing journalists? How can investigative journalism fight corruption? The post 14 July: The role of investigative journalism and a free media in fighting corruption appeared first on Index on Censorship .
14 July: The role of investigative journalism and a free media in fighting corruption
Tue Jul 5 14:15, 2016 GMT
In almost four months covering protests against France's labour reform bill, a number of journalists in the country have faced intimidation, detention and injury The post Journalists attacked by police and protesters during French labour reform bill demonstrations appeared first on Index on Censorship .
Journalists attacked by police and protesters during French labour reform bill demonstrations
Tue Jul 5 14:28, 2016 GMT
Encryption and tokenization are great security tools—when executed properly—as they sidestep protecting data and instead attempt to make the data worthless to thieves. It's a great strategy. But when it's executed improperly, it can insidiously weaken security. This happens when IT gets cocky and overconfident that the data would indeed be worthless to attackers and starts to get lax implementing strong prevention tactics, such as firewalls. What brings this all to mind is Apple's new approach—unveiled June 13—called Differential Privacy. Apple is using mathematical encryption techniques to anonymize data. But Apple is being infuriatingly vague as to the precise mechanics of Differential Privacy. For security professionals, this is a concern. Many will be tempted to try and replicate Differential Privacy in an attempt to anonymize other kinds of data and make them theoretically less attractive to thieves. But if doesn't work, the almost inevitable security complacency from believing that it is working is frightening. This is how Apple's news release described Differential Privacy: "Starting with iOS 10, Apple is using technology called Differential Privacy to help discover the usage patterns of a large number of users without compromising individual privacy. In iOS 10, this technology will help improve QuickType and emoji suggestions, Spotlight deep link suggestions and Lookup Hints in Notes." In its developer release notes , Apple got microscopically more specific: "iOS 10 introduces a differentially private way to help improve the ranking of your app’s content in search results. iOS submits a subset of differentially private hashes to Apple servers as users use your app and as  NSUserActivity  objects that include a deep link URL and have their  eligibleForPublicIndexing  property set to YES are submitted to iOS. The differential privacy of the hashes allows Apple to count the frequency with which popular deep links are visited without ever associating a user with a link." Apple has also said: "To obscure an individual’s identity, Differential Privacy adds mathematical noise to a small sample of the individual’s usage pattern. As more people share the same pattern, general patterns begin to emerge, which can inform and enhance the user experience." Here's where things go off the proverbial rails. Differential Privacy has mathematical limitations, but it's hard to know when those limits have been reached. This was a terrific writeup on this in Cryptography Engineering, which addressed the programming realities—and limitations of this approach. "It goes without saying that the simple process of 'tallying up the results' and releasing them does not satisfy the DP definition, since computing a sum on the database that contains your information will potentially produce a different result from computing the sum on a database without it. Thus, even though these sums may not seem to leak  much  information, they reveal at least a little bit about you," the story said. "A key observation of the Differential Privacy research is that in many cases, DP  can  be achieved if the tallying party is willing to  add random noise  to the result. For example, rather than simply reporting the sum, the tallying party can inject noise from a Laplace or gaussian distribution, producing a result that's not quite  exact -- but that masks the contents of any given row." But, the story continued, it gets messy after that. Although "the amount of information leakage from a single query can be bounded by a small value, this value is not zero. Each time you query the database on some function, the total leakage increases and can never go down. Over time, as you make more queries, this leakage can start to add up. The more information you intend to ask of your database, the more noise has to be injected in order to minimize the privacy leakage," the story noted. "This means that in DP there is generally a fundamental tradeoff between accuracy and privacy, which can be a big problem when training complex ML models. Once data has been leaked, it's gone. Once you've leaked as much data as your calculations tell you is safe, you can't keep going -- at least not without risking your users' privacy. At this point, the best solution may be to just to destroy the database and start over. If such a thing is possible." Exactly. And that brings us back to the key point. These systems are a convenience and little more. Any of these data-obscuring tactics are, by their very nature, limited. Take payment data tokenization. It's pointless if it can't be reversed, such as to deal with a return. And if it can be reversed, it's foolish to think it's valueless to a thief. One of the early big data-breach victims in retail—TJX—famously told the SEC back in 2007 that its attackers had stolen the chain's decryption key, making encryption irrelevant. But not to worry, TJX told the feds , because the attacker stole the data before it was encrypted, so all is well. And nowhere is this fear more needed than when trying to protect apps. App data is where the bulk of data-fraud activity will happen over the next few years and it's the most tempting place to cut security corners. After all, proper security limits what apps can do and how it can do them. It will be irresistible for some to not want to believe that data can be obscured, thereby allowing security corners to be cut. Don't believe it. There is no replacement for redundant security levels and when anyone starts chattering away about "this makes the data worthless to thieves," ask them if your team can itself access it. And then allow logic and common sense to have their day.
Obscured Data Can Be A Psychological Security Trap
Tue Jul 5 14:50, 2016 GMT
STRASBOURG (Reuters) - The European Commission proposed on Tuesday stricter rules on the use of virtual currencies and prepaid cards in a bid to reduce anonymous payments and curb the financing of terrorism.
EU proposes stricter rules on Bitcoin, prepaid cards in terrorism fight
Tue Jul 5 10:06, 2016 GMT
Anti-censorship group GreatFire have launched a new service that will help internet users inside China live test how well different VPNs are working in the country The post Index award-winning GreatFire launches groundbreaking new site to test VPNs in China appeared first on Index on Censorship .
Index award-winning GreatFire launches groundbreaking new site to test VPNs in China
Tue Jul 5 07:05, 2016 GMT
China has raised concerns over internet censorship after warning news organisations not to fabricate false news or use social media as a source without careful verification.
China cracks down on news sites using social media sources - CNET
Mon Jul 4 05:20, 2016 GMT
South China Morning Post All news stories must be verified, China's internet censor decrees as it tightens grip on online media South China Morning Post China's powerful internet censorship body has further tightened its grip on online news reports by warning all news or social network websites against publishing news without proper verification, state media reports. China's powerful internet tsar ... China restricts online news sites from sourcing stories on social media Ars Technica China says it will crack down on fake news from social media VentureBeat Lu Wei to Give Up Post as China's Internet Czar, Deputy as Likely Successor YIBADA English Hindustan Times all 23 news articles »
All news stories must be verified, China's internet censor decrees as it tightens grip on online media - South China Morning Post
Mon Jul 4 11:01, 2016 GMT
Spiegel Online’s managing editor Matthias Streitz and Privacy International technologist Richard Tynan go head to head to debate the rise of ad-blockers The post Survey: Are ad-blockers killing the media? appeared first on Index on Censorship .
Survey: Are ad-blockers killing the media?
Mon Jul 4 09:22, 2016 GMT
Researchers at Western Sydney University and King's College London have published a paper comparing various 'pirate' blocking mechanisms around the world. While all have shortcomings, the regime in the UK is highlighted as being open to potential future abuse. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Pirate Blocking Injunctions Could Be Abused, Researchers Say
Mon Jul 4 05:19, 2016 GMT
South China Morning Post China's internet censorship body further tightens grip on online news reports South China Morning Post Officials say internet restrictions, including the blocking of popular foreign websites such as Google and Facebook, are needed to ensure security in the face of rising threats, such as terrorism, and also to stop the spread of damaging rumours ... Lu Wei to Give Up Post as China's Internet Czar, Deputy as Likely Successor YIBADA English China says to crackdown on fake news from social media Reuters all 6 news articles »
China's internet censorship body further tightens grip on online news reports - South China Morning Post
Sat Jul 2 22:38, 2016 GMT
The Inquisitr No Right To Privacy For Internet Users: Big Brother Gets Federal Court Approval The Inquisitr Senior U.S. District Judge Henry Coke Morgan Jr. has ruled that “people should have no expectation of privacy on their home PCs because no connected computer 'is immune from invasion,'” reports eWeek. The ruling ... “According to the court, the federal ... and more »
No Right To Privacy For Internet Users: Big Brother Gets Federal Court Approval - The Inquisitr
Sun Jul 3 10:46, 2016 GMT
The Scene is generally known as a network of 'pirate' release groups mostly interested in sharing content among each other. In these circles money is rarely discussed, but one relatively new group has broken this taboo with a call for Bitcoin donations. Thus far the result is rather disappointing. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Scene Group Asks For Bitcoin Donations, Gets $0
Fri Jul 1 17:39, 2016 GMT
Disrupting Internet Access Is A Human Rights Violation, UN Says ThinkProgress The United Nations Human Rights Council formally condemned countries that block or limit citizens' internet access in a new resolution passed Friday. According to the resolution, individuals' online and offline rights, such as “freedom of expression ...
Disrupting Internet Access Is A Human Rights Violation, UN Says - ThinkProgress
Sat Jul 2 11:26, 2016 GMT
Fifteen years ago a developer named Bram Cohen posted a short message online, announcing his new file-sharing tool BitTorrent. Three years later his protocol was responsible for a quarter of all Internet traffic, and now it helps people to share hundreds of petabytes of data per day. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
BitTorrent Protocol Turns 15 Years Old Today
Fri Jul 1 10:16, 2016 GMT
Apple is accused of blocking Spotify's streaming service by demanding the firm uses the iTunes billing service.
Spotify accuses Apple of blocking app and using store as 'weapon to harm competitors'
Fri Jul 1 13:56, 2016 GMT
A Brazilian judge has blocked access to a portion of Facebook's Brazilian bank accounts after it repeatedly ignored requests for WhatsApp user data in an ongoing drug case.
Brazil court freezes Facebook funds over WhatsApp non-compliance dispute - CNET
Fri Jul 1 11:07, 2016 GMT
Do taboos play an essential role in culture and society, or must we simply get rid of them? Index on Censorship magazine editor Rachael Jolley spoke on the topic at Fritt Ord headquarters The post Discussion: What are taboos and what role do they play in society? appeared first on Index on Censorship .
Discussion: What are taboos and what role do they play in society?
Fri Jul 1 09:53, 2016 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout the Europe The post Mapping Media Freedom: In review 24-29 June appeared first on Index on Censorship .
Mapping Media Freedom: In review 24-29 June
Wed Jun 29 03:28, 2016 GMT
eWeek Home Computers Connected to the Internet Aren't Private, Court Rules eWeek "[H]acking is much more prevalent now than it was even nine years ago, and the rise of computer hacking via the Internet has changed the public's reasonable expectations of privacy ," the judge wrote. "Now, it seems unreasonable to think that a computer ...
Home Computers Connected to the Internet Aren't Private, Court Rules - eWeek
Fri Jul 1 12:30, 2016 GMT
A court in Brazil has frozen 19.5 million reals (£4.5m, $6.07m) of Facebook's funds in a dispute with secure messaging service WhatsApp over a criminal case.
Brazil blocks Facebook funds in WhatsApp row
Thu Jun 30 19:16, 2016 GMT
Mashable Turkey's internet censorship after the Istanbul attack is nothing new Mashable However, soon after the news began to spread, the Turkish government's censorship machine revved into action. Facebook, Twitter and YouTube were blocked just a couple of hours after the attack according to Alp Toker, a tech analyst who regularly tracks ... and more »
Turkey's internet censorship after the Istanbul attack is nothing new - Mashable
Thu Jun 30 11:39, 2016 GMT
Yassin Juma is an extraordinary journalist, who has taken great personal risk to get the story of what is happening in the war that is being waged in Somalia against Al-Shabaab The post Podcast: Kenyan journalist forced into hiding after reporting the news appeared first on Index on Censorship .
Podcast: Kenyan journalist forced into hiding after reporting the news
Thu Jun 30 11:20, 2016 GMT
The Siyah Bant initiative, which carries out research on censorship of the arts in Turkey, has given much coverage to obstacles to freedom of expression in the cinematic field The post Turkey’s film festivals face a narrowing space for expression appeared first on Index on Censorship .
Turkey’s film festivals face a narrowing space for expression
Thu Jun 30 01:06, 2016 GMT
Yahoo News China's internet censorship chief steps down The Guardian Colleague Roger Cliff, Senior Fellow: “Lu Wei is not in any political or legal trouble, but Xi simply decided he wanted someone closer to him to be in charge of internet policy. I certainly would not interpret this move as a repudiation of Lu Wei's ... China Replaces Internet Censorship Chief Latin American Herald Tribune China appoints new internet regulator Yahoo News China's feared “ internet czar” Lu Wei is unexpectedly stepping down Quartz all 44 news articles »
China's internet censorship chief steps down - The Guardian
Wed Jun 29 12:04, 2016 GMT
The truth is in danger. Working with reporters and writers around the world, Index continually hears first-hand stories of the pressures of reporting, and of how journalists are too afraid to write or broadcast because of what might happen next. The post Risky business: Journalists around the world under direct attack appeared first on Index on Censorship .
Risky business: Journalists around the world under direct attack
Wed Jun 29 10:38, 2016 GMT
Their love of music brought them together but it was their spirituality and a feeling of seeking that prompted them to convert to Islam The post Poetic Pilgrimage: Hip hop has the capacity to “galvanise the masses” appeared first on Index on Censorship .
Poetic Pilgrimage: Hip hop has the capacity to “galvanise the masses”
Tue Jun 28 15:44, 2016 GMT
Index on Censorship is deeply concerned by news that Bahraini human rights activist Nabeel Rajab has been hospitalised while in prison The post Bahrain: Nabeel Rajab hospitalised after 15 days in solitary confinement appeared first on Index on Censorship .
Bahrain: Nabeel Rajab hospitalised after 15 days in solitary confinement
Tue Jun 28 13:48, 2016 GMT
Index on Censorship has dedicated its milestone 250th issue to exploring the increasing threats to reporters worldwide. Its special report, Truth in Danger, Danger in Truth: Journalists Under Fire The post Journalists under fire and under pressure: summer magazine 2016 appeared first on Index on Censorship .
Journalists under fire and under pressure: summer magazine 2016
Tue Jun 28 15:41, 2016 GMT
CBC.ca Public school board to tighten internet security for elementary schools CBC.ca A new certificate system – which is used to create secure connections and avoid malicious websites – will be released in August on shared elementary iPads. A new internet filtering policy is expected to be presented at a board meeting in September. and more »
Public school board to tighten internet security for elementary schools - CBC.ca
Tue Jun 28 13:32, 2016 GMT
Reuters Dismissal Of Class Action Lawsuit A Setback For Internet Privacy CloudTweaks News (blog) On Monday the Third U.S. Circuit Court of Appeals (a federal appeals court) unanimously dismissed a class action lawsuit by parents of children under the age of 13 who had used Nickelodeon's websites against Google and Viacom (which owns the ... Google beats children's web privacy appeal, Viacom to face one claim Reuters all 17 news articles »
Dismissal Of Class Action Lawsuit A Setback For Internet Privacy - CloudTweaks News (blog)
Tue Jun 28 05:12, 2016 GMT
TheTyee.ca How a File-sharing Lawsuit Could Erode Your Internet Privacy TheTyee.ca While the government has been slow to implement an easy fix for the problem in the form of regulations prohibiting the inclusion of settlement demands within the notices, another issue looms on the legal horizon that could eviscerate the privacy ... Voltage Pictures' 'Reverse Class Action' Threatens Canadians' Privacy : Michael Geist Huffington Post Canada all 3 news articles »
How a File-sharing Lawsuit Could Erode Your Internet Privacy - TheTyee.ca
Tue Jun 28 06:37, 2016 GMT
Consultancy.uk IPR laws and internet censorship harm US businesses in China Consultancy.uk A recent survey finds that 52% of US businesses cite China as a greater risk of IP leakage and data security threats than other regions in which they operate. Internet censorship too is inhibiting US businesses operating in China, among which ...
IPR laws and internet censorship harm US businesses in China - Consultancy.uk
Tue Jun 28 00:05, 2016 GMT
WASHINGTON (Reuters) - A Democratic senator on Monday prevented legislation from being quickly considered that would expand the FBI's power to use secretive surveillance orders to obtain some Internet records, arguing it would lead to a "dramatic erosion" of U.S. privacy rights.
U.S. senator, opposing FBI email data grabs, places hold on spy bill
Mon Jun 27 11:01, 2016 GMT
Toronto Star How a file-sharing lawsuit against Rogers threatens your Internet privacy : Geist Toronto Star While the government has been slow to implement an easy fix for the problem in the form of regulations prohibiting the inclusion of settlement demands within the notices, another issue looms on the legal horizon that could eviscerate the privacy ...
How a file-sharing lawsuit against Rogers threatens your Internet privacy: Geist - Toronto Star
Sat Jun 25 12:00, 2016 GMT
In this edition of Ask Maggie, CNET's Marguerite Reardon offers advice on how to make sure your vacation isn't ruined by becoming a victim of mobile cybercrime.
Seven tips on keeping your phone safe while traveling - CNET
Sat Jun 25 11:00, 2016 GMT
Each Saturday we round up the news stories that we didn’t break or cover in depth at WIRED, but which deserve your attention nonetheless. The post Security News This Week: Brexit Edition (Hey, at Least Bitcoin Is OK) appeared first on WIRED .
Security News This Week: Brexit Edition (Hey, at Least Bitcoin Is OK)
Fri Jun 24 15:37, 2016 GMT
On 14 June, Qasid, an Azerbaijan's state-owned media distributor warned that it will shut down the 2014 Index on Censorship Freedom of Expression Journalism Award-winning newspaper Azadliq The post Azadliq: “We are working under the dual threat of government harassment and financial insecurity” appeared first on Index on Censorship .
Azadliq: “We are working under the dual threat of government harassment and financial insecurity”
Fri Jun 24 16:36, 2016 GMT
An elaborate "piracy" phishing operation is targeting U.S. Internet providers and subscribers. Scammers are using the name of anti-piracy tracking company IP-Echelon and rightsholders such as Lionsgate, to send fake DMCA notices and settlement demands to ISPs. U.S. law enforcement has been notified and is currently investigating the matter. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Piracy Phishing Scam Targets U.S. ISPs and Subscribers
Fri Jun 24 12:18, 2016 GMT
This weekend marks 20 years since the murder of Irish award-winning crime reporter and investigative journalist Veronica Guerin The post How dangerous is it to be a journalist in Ireland 20 years after the murder of Veronica Guerin? appeared first on Index on Censorship .
How dangerous is it to be a journalist in Ireland 20 years after the murder of Veronica Guerin?
Fri Jun 24 11:36, 2016 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout the European Union and neighbouring countries. The post Mapping Media Freedom: In review 16-23 June appeared first on Index on Censorship .
Mapping Media Freedom: In review 16-23 June
Fri Jun 24 06:32, 2016 GMT
The Pirate Bay and other leading torrent sites will be eventually blocked in Australia but the mechanics are far from decided. This week rightsholders and ISPs have been in court fighting over the details. Predictably they're poles apart, and still arguing over who will pay. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Studios & ISPs Clash Over Aussie Pirate Bay Blockade
Thu Jun 23 16:43, 2016 GMT
MPAA Chairman and CEO Chris Dodd fears that Europe's plans to limit geo-blocking will "cause great harm" to the movie industry. In a keynote address at the CineEurope convention, Dodd warned that broad access to movies and TV-shows will result in fewer films and higher prices for consumers. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
MPAA Boss: Europe’s Geo Unblocking Plans Threaten Movie Industry
Thu Jun 23 13:44, 2016 GMT
Some say you can trace the origins of hip hop to a single room in New York City on 11 August 1973. At 1520 Sedgwick Avenue in the Bronx, the Jamaican-American DJ Kool Herc threw a party The post Jason Nichols: Debunking “old tropes” through hip hop appeared first on Index on Censorship .
Jason Nichols: Debunking “old tropes” through hip hop
Thu Jun 23 07:08, 2016 GMT
The Court of Appeal in Austria has lifted an order which forced local ISPs to block The Pirate Bay, isoHunt.to, 1337.to, and the long-defunct h33t.to. In response, rightsholders have made fresh calls for ISPs to block a range of popular movie and TV show streaming sites. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Pirate Bay Blockade Lifted By Austrian Court
Wed Jun 22 15:02, 2016 GMT
Honduran journalist Cesario Padilla is facing immediate detention and a possible five-year jail term after being present at student protests. The post Honduran journalist Cesario Padilla facing detention after student protests appeared first on Index on Censorship .
Honduran journalist Cesario Padilla facing detention after student protests
Wed Jun 22 12:54, 2016 GMT
Journalism has, without the slightest doubt, become the most risky, and endangered, profession in Turkey. The post Yavuz Baydar: A noble profession has turned into a curse appeared first on Index on Censorship .
Yavuz Baydar: A noble profession has turned into a curse
Wed Jun 22 09:20, 2016 GMT
The Head of the Investigatory Committee has said that “everything is clear” with Palchys’ case, and added that “the investigation will not take long”.
Blogger Eduard Palchys Officially Indicted
Wed Jun 22 08:42, 2016 GMT
Proposed legislative changes that will increase law enforcement’s ability to hack into computers are under attack by a broad coalition. Google, EFF, Demand Progress and FightForTheFuture are joined by TOR, Private Internet Access and other VPN services seeking to block changes to Rule 41. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
VPN Providers Protest Plans to Expand Government Hacking Powers
Tue Jun 21 11:54, 2016 GMT
Index on Censorship remains deeply concerned about the treatment of human rights activist Nabeel Rajab, whose detention was extended by another eight days. He has been held since 13 June. The post Bahrain must immediately release and drop all charges against Nabeel Rajab appeared first on Index on Censorship .
Bahrain must immediately release and drop all charges against Nabeel Rajab
Tue Jun 21 11:53, 2016 GMT
Belarus Free Theatre have been using their creative and subversive art to protest the dictatorial rule of Aleksandr Lukashenko for over a decade. The post Belarus Free Theatre: “Dictators are scared of a strong mutual position” appeared first on Index on Censorship .
Belarus Free Theatre: “Dictators are scared of a strong mutual position”
Tue Jun 21 11:14, 2016 GMT
Passwords for every GoToMyPC account are being reset following a "sophisticated" attack on the service.
GoToMyPC passwords reset after cyber-attack
Tue Jun 21 10:39, 2016 GMT
China's cyber-espionage groups have been laying off the US and 25 other countries that they have previously targeted, says security firm FireEye.
China's daily cyberattacks on the US are in decline, says report - CNET
Tue Jun 21 11:00, 2016 GMT
Firewalls have been protecting networks for decades, and many of us can’t remember life before them. But they aren’t your only friends, and these days just having a firewall isn’t enough to keep the bad guys from penetrating your network. While they are a good first step, you need to start thinking beyond firewalls to keep your infrastructure secure. What is really required is to move away from the notion of “we need to build a wall” to “we need to understand what is going on across our network.” It is a very different mindset, and requires an IT department to think differently about how to implement their network security and operations. The first step is in understanding what is going on across your application layers. To do this properly, you need to discover what applications are running across your enterprise . Some of the more modern firewalls are attempting to collect this information; they often rely on the IT department to understand their app portfolios up front to be effective. For example, they offer very granular app-level control, such as the ability to block a Facebook wall post but allow users to read their Facebook accounts. Many products (such as Palo Alto Networks) have extensive applications databases that they can draw on to model particular behaviors so that network administrators can craft very fine-grained access policies. But most firewalls are too steeped in the ports and protocols approach to be truly effective, and many require that IT operations keep up with network documentation and have a deep knowledge about the interaction of their firewall rule sets. Tools like Veracode that specialize in the app-layer defense don’t assume this knowledge, and also make it easier to set up app-specific security policies. Once you have this understanding, you can better design your app-layer network protection . Firewalls were designed to handle network-events, such as finding and blocking botnets and remote access exploits. Why can’t firewalls handle app-level situations? Well, some can, but only with some significant effort at configuring and monitoring them. Specialized app-layer tools are better at finding vulnerabilities and inspecting traffic that is moving across the application layers. You especially want app-layer protection if you have web-based or cloud-based applications. Next, you need to think differently about your endpoint protection too. We all know that the days of simple endpoint protection are over. Scanning and screening for malware has become a very complex process, and most traditional anti-malware tools only find a small fraction of the potential infections that are available to today’s cyber-criminals and attackers. Today there are numerous specialized endpoint detection and response (EDR) products that can dive deeper and understand the progress of any infection that happens. The best products are both hunting down particular exploits as well as gathering information about what is happening and tie into existing security news feeds as well. Many offer real-time analysis and other insights. When you start looking at your endpoints holistically in this fashion, you will find there are plenty of endpoints that aren’t traditional end-user devices. Most modern networks have plenty of embedded devices that are connected to their networks, such as network-based printers and cameras, environmental monitoring devices, and specialized industrial equipment. Remember the Target HVAC exploit? That was just the tip of numerous such attacks. Even if these systems aren’t connected to the network directly, they do have the means to be infected by a network-based computer, as the Iranian nuclear plant at Natanz found out years ago with the Stuxnet virus. Again, this is an area where traditional firewalls fall down: a potential threat from a print server could be buried in a firewall log. There are better ways to avoid this issue , such as by changing the default management ports and authentication credentials, keeping up with firmware updates, putting all embedded devices on their own VLAN and clearing their buffers and histories often. Part of the tools for these EDR products includes being able to block i nsider threats. These threats are becoming more common, and one of the reasons why traditional firewall and anti-virus protection has failed is because attackers can gain access to your internal network and do damage from a formerly trusted endpoint. Many firewall administrators are used to blocking incoming traffic and have focused their attention in the past to this arena. But traffic that originates from an insider who has been compromised is a problem too. To block this kind of behavior, today’s tools need to map the internal or lateral network movements so you can track down what PCs were compromised and neutralize them before your entire network falls into the wrong hands. As you can see, building up walls are a good first approach but not the only mechanism for defining your network, your applications, and your endpoints. You need a combination of several protective devices that can work together to secure your enterprise and gain visibility into all of your vulnerable places.
Why Firewalls Aren’t Your Only Friend
Tue Jun 21 07:04, 2016 GMT
JAKARTA (Reuters) - The central banks of Indonesia and South Korea have been hit by cyber attacks on their public websites since activist hacking group Anonymous pledged last month to target banks across the world, senior officials in the two countries told Reuters.
Indonesia, South Korea central bank websites hit by cyber attacks; no losses
Mon Jun 20 15:03, 2016 GMT
Index on Censorship calls for the immediate and unconditional release of journalists Şebnem Korur Fincancı, Erol Önderoğlu and Ahmet Nesin, who were arrested by Turkish authorities on 20 June. The post Turkey arrests journalists who showed support for press freedom appeared first on Index on Censorship .
Turkey arrests journalists who showed support for press freedom
Mon Jun 20 08:20, 2016 GMT
LONDON (Reuters) - The chief executive of TalkTalk received 2.8 million pounds ($4.1 million) in pay and share bonuses for the last 12 months, despite the telecoms company suffering a cyber attack in October that put the data of thousands of customers at risk.
TalkTalk pays CEO $4.1 million in year firm hit by cyber attack
Sun Jun 19 21:26, 2016 GMT
Algeria temporarily blocks access to social media in an attempt to combat cheating in the main secondary school exam, the baccalaureat.
Algeria blocks social media over exams
Sat Jun 18 02:27, 2016 GMT
Inverse EFF Calls for a Day of Action In Defense Of Internet Privacy Inverse “EFF, the Tor Project, and dozens of other organizations concerned about the future of our digital security are taking a stand for users everywhere,” the post explained. It all kicked off on June 21st, when website owners and citizens are being urged ...
EFF Calls for a Day of Action In Defense Of Internet Privacy - Inverse
Fri Jun 17 17:28, 2016 GMT
The Index on Censorship Big Debate took place at the 5th annual Leeds Big Bookend Festival this week, where journalists and authors were invited to discuss which has the biggest impact: journalism or fiction. The post Index on Censorship Big Debate: Journalism or fiction? appeared first on Index on Censorship .
Index on Censorship Big Debate: Journalism or fiction?
Fri Jun 17 16:56, 2016 GMT
Index on Censorship joined English Pen at the Saudi Arabian embassy in London to call for the immediate release of Saudi blogger Raif Badawi The post Fourth anniversary of Raif Badawi’s arrest: Saudi Arabia must release him now appeared first on Index on Censorship .
Fourth anniversary of Raif Badawi’s arrest: Saudi Arabia must release him now
Fri Jun 17 16:42, 2016 GMT
Marketing and sales company Smart Circle is using the DMCA to uncover the identity of a critical blogger. The company obtained a subpoena directed at WordPress, stating that the blogger in question violates their copyrights by publishing modified images of its key employees. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Company Uses DMCA to Censor and Expose Critical Blogger
Fri Jun 17 15:04, 2016 GMT
Kaboom! Video bloggers team up to film an aluminum can exploding at 11,000 frames per second.
Watch an electromagnet rip apart a soda can in slow motion - CNET
Fri Jun 17 14:37, 2016 GMT
Each week, Index on Censorship’s Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout the European Union The post Mapping Media Freedom: In review 2-16 June appeared first on Index on Censorship .
Mapping Media Freedom: In review 2-16 June
Thu Jun 16 12:02, 2016 GMT
Newsmax Internet Security Firm: 'Cyber Jihad' Is Coming Newsmax Researchers at Kaspersky Lab, a global computer security firm based in Moscow, said the online forum appears to be run by a Russian speaking group. It offers access to hacked computers owned by governments, companies and universities in 173 countries ... $6- that's all you need to buy a server from the eBay of cybercrime Firstpost all 78 news articles »
Internet Security Firm: 'Cyber Jihad' Is Coming - Newsmax
Fri Jun 17 11:51, 2016 GMT
Demonstrations are being held in Brussels, Luanda, Pretoria and Paris to mark one year since the arrest of an Angolan book club's members. The post Protests mark a year since #Angola17 arrests appeared first on Index on Censorship .
Protests mark a year since #Angola17 arrests
Thu Jun 16 22:19, 2016 GMT
Bitcoin may still bring to mind images of drug markets and hackers. But big corporations are also embracing the technology behind the cryptocurrency. The post Here's How IBM Is Planning to Use Its Own Blockchain Software appeared first on WIRED .
Here’s How IBM Is Planning to Use Its Own Blockchain Software
Thu Jun 16 19:03, 2016 GMT
TORONTO/OTTAWA (Reuters) - The Bank of Canada is experimenting with a payments system based on the technology behind the bitcoin virtual currency, the central bank said on Thursday.
Bank of Canada studies payments system using tech behind bitcoin
Thu Jun 16 17:50, 2016 GMT
As has become almost a weekly tradition, another major security hole was reported last week (June 8). This report , from Talos, is about a hole that allows malicious files to be launched when anyone clicks on a PDF from within the Google Chrome browser. The attack leverages "an exploitable heap buffer overflow vulnerability in the Pdfium PDF reader. By simply viewing a PDF document that includes an embedded jpeg2000 image, the attacker can achieve arbitrary code execution on the victim’s system. The most effective attack vector is for the threat actor to place a malicious PDF file on a website and and then redirect victims to the website using either phishing emails or even malvertising," said the Talos alert. "A heap buffer overflow vulnerability is present in the jpeg2000 image parser library as used by the Chrome's PDF renderer, PDFium. The vulnerability is located in the underlying jpeg2000 parsing library, OpenJPEG, but is made exploitable in case of Chrome due to special build process." It's a slight—but important—variation on the click-on-an-email-attachment method of infecting a machine and potentially taking it over. What many people outside the security profession don't quite grasp is that clicking on a link on a Web site absolutely is downloading a file. How do they think those images and words appear? It's an interesting twist because consumers have been taught to avoid opening unknown attachments—and to not visit unknown sites (which, admittedly, is a more challenging demand)—but opening a PDF that appears to be inside a trusted site doesn't seem to violate the rules. And yet it does. This all comes down to a simple rule that security folk have been preaching for 20 years: Only click/open something that you anticipate, that you expected to come. This gets us into the latest cyberthief trickery, which is to impersonate someone the targeted victim knows. That might be via stealing the contacts list and then sending messages, seemingly from the first victim, to hundreds of other victims found on the first victim's contacts list. The messages would seem to be coming from a friend. But it's still not expected and the phrasing may be off. The second sneaky method is what I call the LinkedIn Research (LR) attack. The contacts list attack is designed to send out to a huge number of potential victims, hoping to entrap however many people fall for it. The LinkedIn Research attack is much more time-consuming—and therefore expensive, for the cyberthief—but it's quite effective. The LR attack targets a high-value potential victim, such as a key bank employee who handles money-transfers. Then they fake a message from a company executive who orders a wire transfer and says that it must happen right away. I ran into one bank that was almost victimized by the fraud, until someone noticed that the message was phrased far more politely than this executive ever speaks in e-mails. The "please" gave it away. See? Sometimes being rude does pay dividends. What impressed the bank is that the executive being faked was a temp and that his name appeared nowhere on the site. But the temp happened to have just added this gig to his LinkedIn account. The fact that few outsiders would have known of this person's existence is what gave the attack initial credibility. It's not just clicking on attachments that is an age-old problem that isn't going away. Why are SQL injection and cross-site scripting attacks still so common? Here's the problem. IT has historically attacked such security diseases with training—which employees attend in body but rarely pay attention—and guidelines, which are also ignored because there is rarely any visible enforced consequences to ignoring them. It may be time to take a hit on functionality/productivity and program rules that block such actions. I'd really rather not need a supervisor's signoff to click on an attachment, but if employees endanger network security because they won't learn, what is the viable alternative?
How Can Enterprises Still Be Victimized By Attacks That We've Known About For Decades?
Thu Jun 16 12:14, 2016 GMT
One of the great difficulties with satire is that often those who actually get it are those who are already on board with the message. The post Zambezi News: Satire leaves “a lot of ruffled feathers in its wake” appeared first on Index on Censorship .
Zambezi News: Satire leaves “a lot of ruffled feathers in its wake”
Thu Jun 16 05:33, 2016 GMT
Free Word in partnership with Index on Censorship brought together three major cultural figures from Hungary, Poland and Turkey to compare their stories and ask: is Europe just a place, or a set of values that are rapidly unravelling? The post Illiberal democracy: Europe’s worrying trend on freedom and liberty appeared first on Index on Censorship .
Illiberal democracy: Europe’s worrying trend on freedom and liberty
Thu Jun 16 10:22, 2016 GMT
As Formula One fans prepare for the Baku Grand Prix on Sunday, Index on Censorship looks at the country’s dismal human rights record The post Azerbaijan: Why Formula One fans are paying attention for all the wrong reasons appeared first on Index on Censorship .
Azerbaijan: Why Formula One fans are paying attention for all the wrong reasons
Thu Jun 16 08:42, 2016 GMT
In a new and concerning escalation of its crackdown against civil society, Bahraini authorities are targeting human rights defenders The post Bahrain: NGOs call for an end to reprisals against human rights defenders appeared first on Index on Censorship .
Bahrain: NGOs call for an end to reprisals against human rights defenders
Thu Jun 16 03:13, 2016 GMT
(Reuters) - A "lone hacker" has taken responsibility for a cyber attack on the U.S. Democratic National Committee, which the DNC and a cyber-security firm have blamed on the Russian government.
'Lone hacker' claims responsibility for cyber attack on Democrats
Mon Jun 13 21:34, 2016 GMT
Daily News Biotech Wired Symantec buying internet security firm Blue Coat for $4.65B Daily News Biotech Wired The investors are hoping to capitalise on the increased complexity of internet security created by cloud computing, mobile devices and the internet of things, as hacking breaches continue to make regular headlines. It will prevent cyber attacks on the ... and more »
Symantec buying internet security firm Blue Coat for $4.65B - Daily News Biotech Wired
Wed Jun 15 11:29, 2016 GMT
FRANKFURT (Reuters) - A major underground marketplace acting like an eBay for criminals is selling access to more than 70,000 compromised servers allowing buyers to carry out widespread cyber-attacks around the world, security experts said on Wednesday.
Cybercrime market sells servers for as little as 6 dollars to launch attacks
Tue Jun 14 20:22, 2016 GMT
NEW YORK (Reuters) - Bank of Tokyo-Mitsubishi UFJ confirmed on Tuesday it is conducting experiments on a digital currency utilizing the technology behind the virtual currency bitcoin.
Bank of Tokyo-Mitsubishi says testing its own digital currency
Tue Jun 14 12:14, 2016 GMT
The professor of European Studies at Oxford University talks to Index on Censorship about his new book Free Speech: Ten Principles for a Connected World The post In conversation with Timothy Garton Ash: A blueprint for freer speech appeared first on Index on Censorship .
In conversation with Timothy Garton Ash: A blueprint for freer speech
Tue Jun 14 03:45, 2016 GMT
India.com Internet censorship ! 240 escort service websites to be blocked India.com New Delhi, June 14: In order to clean internet from obscene contents, the communications and IT ministry on Monday ordered the Internet Service Providers (ISP) to block 240 websites allegedly offering escort services. The government has asked the ISP ... and more »
Internet censorship! 240 escort service websites to be blocked - India.com
Mon Jun 13 10:55, 2016 GMT
Previously Uladzimir Rabavolau was a deputy head of Belarus’s Operative and Analytical Centre (OAC), one of the most closed institutions in Belarus.
Number One Blocker Of Independent Websites Appointed Ananich’s Assistant
Mon Jun 13 18:02, 2016 GMT
Dutch film producer Klaas de Jong has filed a police report against four local ISPs, holding them accountable for tens of millions of euros in piracy related losses. The producer says that the ISPs are responsible for the actions of pirating subscribers, since they fail to block torrent sites and other download portals. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
Film Producer Wants ISPs Prosecuted Over Widespread Piracy
Mon Jun 13 13:07, 2016 GMT
Around 51 million user records of a file-sharing service that was first sued and then approved by the RIAA has been leaked online. The iMesh service was part of a shady group of former P2P services operating under the Bearshare, Lphant and Shareaza brands, despite the latter being obtained in the most questionable of circumstances. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
RIAA-Approved File-Sharing Service Hacked, 51m User Details Leaked
Mon Jun 13 13:48, 2016 GMT
BUDAPEST (Reuters) - Hungary passed legislation on Monday which could curb the activities of Uber after months of protests by taxi drivers, following in the footsteps of other countries that have banned some of its ride-hailing services.
Hungarian parliament passes law that could block Uber sites
Mon Jun 13 13:39, 2016 GMT
Join Fritt Ord, Free Word and Index on Censorship for an evening of discussion about taboos. The post 21 June: What are taboos? appeared first on Index on Censorship .
21 June: What are taboos?
Mon Jun 13 09:49, 2016 GMT
Monday's arrest of Nabeel Rajab marks the latest attempt to silence one of the Middle East's most prominent human rights defenders. The post Bahraini authorities once again target human rights activist Nabeel Rajab appeared first on Index on Censorship .
Bahraini authorities once again target human rights activist Nabeel Rajab
Mon Jun 13 08:57, 2016 GMT
Bahraini authorities have arrested Nabeel Rajab, a prominent human rights activist. The post Index condemns arrest of Nabeel Rajab appeared first on Index on Censorship .
Index condemns arrest of Nabeel Rajab
Fri Jun 10 23:32, 2016 GMT
Tech2 Lee: Internet block is necessary The Star Online SINGAPORE: Singapore's Prime Minister Lee Hsien Loong has defended the country's controversial decision to cut off civil servants' work computers from the Internet , calling the move “absolutely necessary” to keep information systems secure. “Are we ... Cyber security vital in Smart Nation push The Straits Times “Sophisticated” cyber attacks prompt internet shutdown on govt computers: Singapore PM Tech2 all 14 news articles »
Lee: Internet block is necessary - The Star Online
Thu Jun 9 22:12, 2016 GMT
Examiner.com Axl Rose demands Internet censorship of "fat" photos Examiner.com Former rock icon William "Axl" Rose from the once relevant band Guns N' Roses has demanded worldwide Internet censorship of unflattering pictures of himself, taken from some of his ever inspiring live performances. The photos in question have become ... and more »
Axl Rose demands Internet censorship of "fat" photos - Examiner.com
Fri Jun 10 13:27, 2016 GMT
STOCKHOLM (Reuters) - Wikipedia co-founder Jimmy Wales has said an attempt by France to give an online privacy ruling global force is opening up a "disastrous can of worms" and could spur global censorship.
Wikipedia warns against French attempt to extend EU privacy law globally
Fri Jun 10 10:35, 2016 GMT
Each week, Mapping Media Freedom project verifies threats, violations and limitations faced by the media throughout Europe The post Mapping Media Freedom: Week in review appeared first on Index on Censorship .
Mapping Media Freedom: Week in review
Thu Jun 9 23:42, 2016 GMT
Delimiter Digital Rights Watch calls for fair use, end of Internet censorship Delimiter news Advocacy group Digital Rights Watch has called for the introduction of fair use legislation and the cessation of Internet censorship as the Productivity Commission prepares to undertake a 12-month public inquiry into Australia's intellectual ...
Digital Rights Watch calls for fair use, end of Internet censorship - Delimiter
Thu Jun 9 21:48, 2016 GMT
NEW YORK (Reuters) - Two Israeli citizens pleaded not guilty on Thursday to orchestrating a massive computer hacking and fraud scheme that included an attack against JPMorgan Chase & Co and generated hundreds of millions of dollars of illegal profit.
Two charged in cyberfraud against JPMorgan, others plead not guilty
Thu Jun 9 21:55, 2016 GMT
(Reuters) - U.S. burger chain operator Wendy's Co said it had discovered additional instances of unusual credit card activity at some of its franchise-operated restaurants, widening the scope of an earlier cyber attack on the company.
Wendy's says it finds more unusual card activity at restaurants
Thu Jun 9 13:03, 2016 GMT
After a man calls a female match a "gold-digger" and "entitled", dating app Bumble post a public letter and block him from their service.
Bumble dating app blocks and shames 'small-minded misogynist'
Thu Jun 9 16:52, 2016 GMT
The security researcher's lot is not an easy one. This player is an essential part of the security ecosystem, an experienced security person who tries and finds security holes in systems so that they can be flagged and fixed. The problem is that the good guy security researcher—at a glance—looks and acts an awful lot like a bad guy cyberthief. From the CISO's desk, how is one to tell the difference? As a practical matter, though, this column is not really about confusing the two. That is because if the CISO detects the security researcher's efforts, then that CISO is on top of their defenses enough that it's not a problem. No, this column is about how the rules for security researchers and cyberthieves must be polar opposites—and they're not. If it's not fixed soon, today's security problems will be heaven compared to what things will be like in two years. Consider a recent case. According to a fascinating report in The Daily Dot , "Once again, a security researcher has found himself facing possible prosecution under a federal statute known as the Computer Fraud and Abuse Act (CFAA). His crime, according to a dental-industry software company, was accessing what had been left publicly available on the open Internet." Specifically, the researcher (Justin Shafer) "was researching an issue with hard-coded database credentials when a search for a password led him to an anonymous FTP server that allowed anyone access. When Shafer looked at the files on the publicly available server and saw a directory with patient data, he took steps to alert Patterson to secure the protected health information. Only after Shafer determined that the patient data had been secured did he and DataBreaches.net disclose the incident publicly." The owner of the servers contacted the FBI, accusing Shafer of having "exceeded authorized access." Check out the Daily Dot piece to read the full details, but that's the essence of the case. A key element of U.S. criminal prosecution is a legal concept known as mens rea, which is essentially criminal intent. But here's where common sense falls apart. Criminal intent, as it was originally intended, is an intent to steal from or to harm someone. Today, though, many laws merely require a literal violation of a statute's phrasing with no intent to do anything wrong. Let's consider an example of a helpful neighbor. She notices that your front-door is wide open, which is very unusual. She walks closer and peers in. She walks right up to the door and shouts "Is everything OK?" When no one responds, she slowly steps into the doorway and looks to see if anything looks wrong. When she sees nothing concrete, she exits the house and calls the homeowner's mobile phone and reports what she found. Legally, that woman is guilty of burglary. She knew that she didn't own that house and she entered anyway. How is that burglary? Burglary is entering with the intent to do something illegal. What was the illegal thing she intended to do? Trespass, of course. The state of the door is important. Was it locked and did she smash in with a battering ram? Did she pick the lock? Was the door closed and unlocked? Was it slightly ajar? Or was it wide open? Now let's go back to Shafer's situation. He saw this server and its protections amounted to it being wide-open. Now let's make this analogy even closer. Shafer wasn't merely a neighbor who happened to stumble upon this open door. He's a security professional who knows what to look for. Getting back to that house with the open door and the concerned neighbor, the closer analogy would be a local police officer or perhaps the head of the neighborhood watchgroup. That police officer or watchgroup leader are supposed to make rounds through the neighborhood, looking for any indications of something unusual, something that might signal criminal activity. Would you rather have your unlocked door discovered by a watchgroup or police officer, or a burglar or murderer? That brings us back to criminal intent. When Shafer walked into the open door to check on the safety of those ultra-sensitive medical records, was his intent to steal those records or to help keep them safe? That's the more meaningful mens rea at issue here. Without reading someone's mind—or having to take someone at their word—how do you establish what their intent had been? It's reasonable to make inferences from their actions. Had that neighbor taken valuables out of the house and sold them,  that is pretty indicative of criminal intent. Instead, she took nothing and immediately phoned the homeowner. What did Shafer do? In effect, the same thing. He immediately contacted the owner of the servers and reported the problems he found. He waited until the records were secured and then reported the security problems publicly, to get others to protect their own files. As for exceeding authorized access, that's the weakest part of this case. The intent of that phrasing is to punish people who have the authority to use one part of a system, but uses someone else's password—or cracks passwords—to get into an unauthorized area. In Shafer's case, there were no passwords. That's the whole point. Indeed, permissions were set in such a way that a random visitor had full authority to look at those files. He didn't exceed authorized access. He used his authorized access. The problem is that the server had its permissions set improperly. That's certainly not Shafer's fault. This case criminalizes security behavior that every responsible security professional needs to be legal and encouraged. If you have a security hole, wouldn't you rather be told about it by a good guy before you're attacked by a bad guy? Admittedly, bad guys and good guys look an awful lot alike. A report last week spoke of CiCi's Pizza—more than 500 stories in 35 states—where thieves "obtained access to card data at affected restaurants by posing as technical support specialists for the company's point-of-sale provider," according to a report in KrebsOnSecurity . But it doesn't take a Sherlock Holmes to recognize the difference between someone acting like Shafer and a thief. The only one who couldn't see the difference is an embarrassed security chief at a medical company that wanted to strike out vindictively at the guy who revealed that the emperor is wearing no clothes. That is the kind of conduct that the industry must crack down on.
The Peril Of Confusing A Security Researcher With A Cyberthief
Thu Jun 9 15:50, 2016 GMT
FedScoop FTC Should Have Priority Over Internet Privacy Somewhat Reasonable - Heartland Institute (blog) Recently, the Federal Communications Commission has proposed to construct a new, additional regulatory apparatus, asserting, without any factual support, that creating untested and discriminatory rules for internet service providers (ISPs) will be the ... FCC internet privacy plan will be complicated, confusing for consumers FedScoop Overnight Tech: US, India to boost cyber threat sharing | House panel reviewing internet privacy rules | Another Dem ... The Hill Wolverton: FCC should bar 'pay for privacy ' schemes SiliconBeat all 28 news articles »
FTC Should Have Priority Over Internet Privacy - Somewhat Reasonable - Heartland Institute (blog)
Thu Jun 9 18:08, 2016 GMT
Last week hundreds of thousands of people downloaded a copy of the blockbuster "London Has Fallen," and some of these pirates are in for a nasty surprise. To recoup some of the losses, the makers are sending automated $300 'fines' to those who get caught. In addition, over a thousand U.S. citizens have been sued. Source: TF , for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services .
“London Has Fallen” Pirates Targeted With Lawsuits and Automated $300 ‘Fines’
Thu Jun 9 15:43, 2016 GMT
SINGAPORE (Reuters) - Singapore is to cut off internet access for government employees' work computers to protect government data after some "very sophisticated" cyber attacks, Prime Minister Lee Hsien Loong was quoted as saying on Thursday.
Singapore PM says "sophisticated" cyber attacks prompt internet shutdown on government computers

Archive of 'Internet censorship, security and privacy news tracking'



Google