Blog Posts Tagged with "internet"

7ddc1f3000a13e4dfec28074e9e7b658

Vague Cybersecurity Legislation Threatens Civil Liberties

April 02, 2012 Added by:Electronic Frontier Foundation

Using cryptography to protect communications could be taken as a way to defeat an operational control. Measuring the performance of one's ISP or analyzing whether packets are being modified maliciously could all be seen as security threats under this definition...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Experts Warn of Online Voting Security Issues

March 30, 2012 Added by:Headlines

“Election officials who run and pursue online voting programs must understand that they are putting voters’ ballots at risk of being altered or deleted without anyone realizing it,” said Susannah Goodman of the Election Verification Network...

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

Can DNS Attacks Threaten the Internet on a Large Scale?

March 27, 2012 Added by:Alan Woodward

This attack is theoretically possible because the DNS is a hierarchy. At the top level are 13 servers. Disrupt them and you could disrupt the entire DNS network. Authorities know this and they put a lot of effort into ensuring that the DNS network can cope with a DOS attack...

Comments  (3)

B64e021126c832bb29ec9fa988155eaf

IP Address Leads Police to Shootout with French Terrorist

March 24, 2012 Added by:Dan Dieterle

Elite French special operation RAID Police took down the radical Muslim terrorist Mohamed Merah on Thursday. Merah had contacted one of his victims, a French soldier, on the pretext of buying his scooter. Investigators were able to match Merah to his IP address...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Anti-Botnet Code of Conduct for ISPs Unveiled

March 23, 2012 Added by:Headlines

“Today is an example of the importance of self-regulatory efforts to help improve the safety and performance of the internet. Sustainable solutions to contain bots must include all stakeholders in efforts to detect, prevent, and remediate these threats..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Hackers Target Social Media for Social Engineering Attacks

March 22, 2012 Added by:Dan Dieterle

Hackers are getting much better at their craft, and people are making it very easy for them. A Social Engineer will use information gathered about a person, place or business in specially crafted attacks that play on people’s thoughts, beliefs or emotions...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US - UK Progress Towards a More Secure Cyberspace

March 15, 2012 Added by:Headlines

"We share an abiding commitment to keeping cyber-criminals from victimizing our citizens and weakening our trust in networked technology. Owing in part to our close partnership, it is harder than ever before for criminals to operate in cyberspace with impunity..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

NIST Steering Group to Support Trusted Identities in Cyberspace

March 15, 2012 Added by:Infosec Island Admin

"The committee will guide creation of an ‘Identity Ecosystem’ in which businesses and individuals can have more confidence in the security and privacy of their online transactions. The committee will also be responsible for identifying resources that will support the effort..."

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

NTIA Requests Comments on New Privacy Framework

March 14, 2012 Added by:David Navetta

The NTIA seeks comments to begin development of the consumer data collection code of conduct among a broad spectrum of stakeholders in which companies will voluntarily participate, but which will also be legally enforceable and subject to the jurisdiction of the FTC...

Comments  (7)

69dafe8b58066478aea48f3d0f384820

The Need for Advancements in Browser Based Security

March 08, 2012 Added by:Headlines

"Data protection is fast becoming a product and service differentiator. It is incumbent on business leaders to take a holistic view of these issues and understand how they are undermining consumer trust. Now is the time for businesses to make data protection a priority..."

Comments  (0)

Ebbcdce0dfc85abf519d8b44a017f687

On President Obama’s Consumer Privacy Bill of Rights

February 29, 2012 Added by:Brian Dean

If new legislation is passed, those who have already embraced the CPBR concepts will be well positioned to comply with it. Also, meeting these objectives will meet your clients’ expectations, including those detailed by the CPBR, creating a competitive advantage...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

US CERT Advisory on DNSChanger Malware

February 27, 2012 Added by:Infosec Island Admin

US-CERT encourages users and administrators to utilize the FBI's rogue DNS detection tool to ensure their systems are not infected with the DNSChanger. Computers testing positive for infection of the malware will need to be cleaned to ensure continued Internet connectivity...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Google Circumvents Browser Privacy - Why We Need Do Not Track

February 26, 2012 Added by:Electronic Frontier Foundation

One way that Google can prove itself as a good actor is by providing meaningful ways for users to limit what data is collected. It’s time Google's third-party web servers start respecting Do Not Track requests, and time for Google to offer a built-in Do Not Track option...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FCC Prompts ISPs to Adopt Code of Conduct Standards

February 24, 2012 Added by:Headlines

"If we fail to tackle these challenges, we will pay the price in the form of diminished safety, lost privacy, lost jobs, and financial vulnerability – billions of dollars potentially lost to digital criminals," FCC Chairman Julius Genachowski said...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Obama Unveils Blueprint for Online Privacy Bill of Rights

February 23, 2012 Added by:Headlines

The Obama Administration today unveiled a “Consumer Privacy Bill of Rights” as part of a comprehensive blueprint to improve consumers’ privacy protections and ensure that the Internet remains an engine for innovation and economic growth...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

IPv6 Protocol Implementation is Not a Security Panacea

February 22, 2012 Added by:Headlines

"The same thing that made the IPv6-enabled Internet valuable has also made it an increasingly valuable venue for attacks. While the frequency of attacks is relatively modest on IPv6 today, we expect that accelerated adoption will be followed in-kind by an accelerated pace of attacks..."

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »