Blog Posts Tagged with "Internet Service Provider"
November 30, 2012 Added by:Jeffrey Carr
When the New York Times released its story that some of the Syrian government's websites were hosted outside of Syria, I wasn't surprised to see SoftLayer as one of the hosts. They are the company that hosted StopGeorgia.ru, the Russian forum which coordinated many of the cyber attacks...
July 12, 2012 Added by:Electronic Frontier Foundation
A controversial, anti-privacy data retention mandate is notably absent from the child protection bill recently introduced by Rep. Lamar Smith. Smith had previously introduced H.R. 1981, which would have mandated that ISPs collect and maintain data on Internet users not suspected of any crime...
May 09, 2012 Added by:Headlines
Please act now. The clean servers maintained by the private sector in coordination with the FBI will expire on July 9, 2012. Internet users who have the DNSChanger malware and whose IS) has moved them to one of the clean servers, may not have access to the Internet after this date...
April 10, 2012 Added by:Electronic Frontier Foundation
Law enforcement would have access to IP addresses, email addresses, when you send an email, and corresponding data for phone calls and text messages. The government has claimed this is needed to fight terrorism, but it would be available to law enforcement for all purposes...
April 02, 2012 Added by:Electronic Frontier Foundation
Using cryptography to protect communications could be taken as a way to defeat an operational control. Measuring the performance of one's ISP or analyzing whether packets are being modified maliciously could all be seen as security threats under this definition...
March 23, 2012 Added by:Headlines
“Today is an example of the importance of self-regulatory efforts to help improve the safety and performance of the internet. Sustainable solutions to contain bots must include all stakeholders in efforts to detect, prevent, and remediate these threats..."
February 24, 2012 Added by:Headlines
"If we fail to tackle these challenges, we will pay the price in the form of diminished safety, lost privacy, lost jobs, and financial vulnerability – billions of dollars potentially lost to digital criminals," FCC Chairman Julius Genachowski said...
February 13, 2012 Added by:Pierluigi Paganini
The login credentials were stored in plain text in the repository that had been exposed, and that is absurd. This is a failure of the basic security procedures that should be recognized internationally, and is an offense for which there should be heavy penalties...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013