50 Topics
![]() | |
Legal and regulatory challenges for blockchain projects include navigating uncertain laws, particularly regarding data privacy and smart contracts. Compliance with anti-money laundering and know-your-customer regulations is tricky due to blockchain's pseudonymous nature. Token regulation complexity and cross-border transaction issues add further hurdles. Moreover, protecting intellectual property in open-source settings poses … | |
The rise in data usage and exponential growth of remote work in recent years has increased the need for reliable data centers all around the world. Since data centers are critical for wide-scale networking, data storage, and information sharing, they require exceptional security measures to safeguard them from rapidly evolving … | |
I was just roaming the internet for some interesting reads and I came across [this very interesting paper](http://www.priv.gc.ca/information/research-recherche/2011/forcese_201107_e.asp) about how to define a legal framework for the "reasonable expectation of privacy" when it comes to our new cyber-existence. I thought I'd share it with you guys, and see what you … | |
I don't trust my code. I really don't. I always have a feeling that something is wrong with it. Every variable looks like an enemy. Every loop, unfinished condition. Every input, possible injection. I'm kinda paranoid so to say. There's many white hat hackers out there which could make buck … | |
In his essay '[A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html)' Matthew Green, a cryptographer and research professor at Johns Hopkins University, asks "how the hell is NSA breaking SSL?" If this is news to you, following the Edward Snowden revelations in The Guardian, then you obviously haven't read the New York … | |
American technology companies are by implication evil, and aiding terrorist groups such as Islamic State/ISIS according to a number of highly influential but terribly ill-informed Western players. Apple and Google have become the command and control networks of choice for terrorists and implementing full-device encryption by default will help Islamic … ![]() | |
A friend of mine has asked me to invest in a proxy server to protect myself because I have no idea about security. But be4 i even think about doing this I need to know what a "proxy server" is, how they work, are they safe and is it legal? | |
That's the surprising consensus reached at a meeting of 30 CSOs representing some of the UK's leading enterprises held in London during the past week. This despite a poll at the bi-annual [URL="http://www.csointerchange.org"]CSO Interchange[/URL] event revealing that those same CSOs view social networking as the most over-hyped threat. When it … | |
Gartner defines the '[Nexus of Forces](http://www.gartner.com/it-glossary/nexus-of-forces)' as being "the convergence and mutual reinforcement of social, mobility, cloud and information patterns that drive new business scenarios". The global IT analyst outfit has also just released details of research which suggests that the perceived level of maturity when it comes to the … ![]() | |
Continuing our round up of 2013 IT security vendor predictions, we've got the thoughts of three of the big Infosecurity Europe exhibitors: Palo Alto Networks, SafeNet and Kaspersky Lab.  Brian Tokuyoshi from Palo Alto Networks predicts that social media, data decryption and virtualised network security will be high … ![]() | |
Gary McKinnon, an unassuming 46 year old Londoner who suffers from Asperger's syndrome and depression, is an unlikely man to be making headlines the world over once again. Indeed, across the last decade McKinnon has almost seemed to be a permanent fixture in news media feeds online and off, a … | |
If you use, or operate, a password-free wireless network then legal action being taken in the US by the adult movie industry might just be about to rain on your parade warns one European IT threat mitigation expert. [ATTACH=RIGHT]23826[/ATTACH]The lawsuit was filed by Liberty Media Holdings, a producer of adult … | |
An Internet Service Provider (ISP) has finally been given permission to reveal that he was the recipient of an National Security Letter (NSL) from the Federal Bureau of Investigation (FBI) six years ago, demanding information about his clients. Nicholas Merrill, president of the New York ISP Calyx, still can’t say … | |
For some reason I was looking for hackers to do some legal ethical hacking jobs.Someone recommended me this site <SNIP> they are hardcore hackers and I have heard good things about them,but the question is; how safe is to hire hackers?They will know everything about the network and it could … | |
[ATTACH=right]16930[/ATTACH]Just weeks after Research in Motion [URL="http://www.daniweb.com/news/story303272.html"]installed servers in Saudi Arabia[/URL] to allow authorities there to monitor Blackberry messaging traffic and avoid being shut down in the Kingdom, an encore of the drama is playing out in India. The Indian government has [URL="http://www.informationweek.com/news/software/operatingsystems/showArticle.jhtml?articleID=226700187"]pledged to shut down RIM's encrypted services[/URL] in … | |
Blogetery.com, a free WordPress blog provider, was shut down earlier this month when their [URL="http://www.daniweb.com/news/story297729.html"]entire server was mysteriously yanked [/URL]without warning or explanation. When the site went dark, over 73,000 user generated blogs disappeared and since then there has been little to no information as who was responsible for pulling … | |
Perhaps it was [URL="http://www.nytimes.com/2010/04/26/technology/26craigslist.html"]reading [/URL]that Craigslist expected to earn $36 million this year from sex ads that set him off. Connecticut Attorney General Richard Blumenthal has issued a subpoena to Craigslist Inc., seeking information on whether it is fulfilling its promise to crack down on ads for prostitution in its … | |
It's not exactly news that the relationship between Google and China has soured over the last month or two and it looks as though [URL="http://www.macworld.com/article/147096/2010/03/china_google.html?lsrc=rss_main"]Google may quit China soon[/URL] leaving the vastly lucrative Chinese market to Microsoft and others. What's not clear is what the implications will be for the … | |
Google has signalled, in the strongest possible manner, that it will be pulling out of China unless something is done to address censorship of searches. It has also accused China of launching a "highly sophisticated and targeted attack" on the Google corporate infrastructure, along with another twenty large companies from … | |
Just when it looked like every avenue to prevent the extradition of self-confessed NASA Hacker Gary McKinnon had been exhausted, especially when just last week a couple of High Court judges denied him leave to appeal his case to the highest court in the UK, it looks like the [URL="http://www.daniweb.com/blogs/entry3877.html"]hacking … | |
[url]http://mashable.com/2009/10/10/facebook-poke-arrest/[/url] In a society that has become as litigious as ours, this was inevitable. If you read the link above you will find out that a woman has been charged with violating an order of protection for poking someone on Facebook. If found guilty, the woman could get a month … | |
Gary McKinnon is either a UFO-obsessed nerd who happens to suffer from a form of autism, or a fugitive from justice who was responsible for the biggest military hack of all time. The description varies depending upon whether you are a balanced individual with no axe to grind or the … | |
There has been a lot of comment in the past on Gary McKinnon and his hacking into US military computers. Readers might understand that some of the comment in the UK has been about how he should have been tried over here, there's no need to extradite him and if … | |
A group of University of Washington students and professors has developed an application called Vanish that automatically makes data used with it disappear after eight to nine hours. The open-source software is [URL="http://vanish.cs.washington.edu/download.html"]downloadable[/URL] now, as well as information about how to use it and a research paper about its development, … | |
Security stories abound on the Internet, and as we enter a new month an old one has resurfaced. There are legal questions over the Sarah Palin hacking event last year. Graham Cluley has [URL="http://www.sophos.com/blogs/gc/g/2009/07/01/legal-arguments-sarah-palin-email-hack/"]blogged[/URL] about it. For me he's buried the main point right at the end of the story. … | |
The continuing saga of Craigslist vs. the state attorneys general took another turn, with South Carolina Attorney General Henry McMaster [URL="http://www.scattorneygeneral.org/"]contending[/URL] that the continued presence of ads for "erotic services" on the site constituted a criminal violation for which Craigslist management was personally responsible, and with Craigslist management firing back … | |
It might seem like something of an odd question, unless your idea of a good night in is a box of popcorn and a copy of some dodgy DVD featuring a Captain Jack lookalike doing unmentionable things to his crew. Yet the answer is that these two things, the illegal … | |
Botnets are, without any doubt, a huge and growing problem. The technology news feeds are bursting to the seams with stories about them: how [URL="http://www.daniweb.com/blogs/entry2838.html"]botnets boost click-fraud rates[/URL], how [URL="http://www.daniweb.com/blogs/entry2838.html"]botnets control sex spam zombies[/URL], how the cyber-criminals are [URL="http://www.itwire.com/content/view/23383/1231/"]building the first mobile botnet[/URL] and even how some botnet builders are … | |
The Maryland Court of Appeals has reversed a lower-court ruling that a website must reveal the names of anonymous posters during a defamation hearing, and has issued guidelines for how such requests should be made in the future. The court ruling laid out the following steps in its [URL="http://mdcourts.gov/opinions/coa/2009/63a08.pdf"]decision[/URL]: [LIST=1] … | |
Security experts [URL="http://www.mcafee.com"]McAfee[/URL] confirm what we already know: when the [URL="http://www.daniweb.com/blogs/entry3023.html"]economy starts to hurt[/URL], the purveyors of malware jump in to increase the pain. With the revelation of it's 2009 threat predictions, McAfee looks ahead to a dismal year of continuing cyberthreats. Like I say, with no hint of surprise … | |
Under new a new law adopted in the UK, the British police are now permitted to access data stored on home computers without benefit of a search warrant. Worse yet, officers are allowed to hack into computers remotely without notifying its owner. Even though officials say these methods would only … | |
The IBM Internet Security Systems division, better known simply as ISS, has today warned of the 'perfect storm' of security threats which has been created by the global economic slowdown, an unprecedented level of cybercrime activity and both the cost and complexity of legal security infrastructures. ISS announced a set … | |
Sex on the Internet is nothing new, in fact it has been one of the great unspoken drivers of ecommerce and ecommerce technology over the years. Selling stuff on the Internet is nothing new, it too has been pivotal in driving online development. In particular, when you think of eBay … | |
Sometimes I am left almost loss for words, and today is one of them. Judge Louis Stanton gave a ruling in the federal court for the Southern District of New York which has, quite frankly, dismissed the right to privacy of anyone who has ever watched a video clip on … | |
Amazingly, according to [URL="http://www.theinquirer.net/gb/inquirer/news/2008/06/20/teen-faces-years-hacking"]The Inquirer[/URL], an Orange County hacker is facing an incredible 38 years in prison if found guilty of several counts relating to hacking into his school computer. It seems that Omar Khan, 18, of Coto de Caza, California hacked into computer in order to change his grades. … | |
Research by security as a service specialists [URL="http://www.scansafe.com"]ScanSafe[/URL] has proven something that pretty much everyone knew already: namely that people working at home are more likely to view online pornography than those stuck in an office somewhere. I mean, it hardly needed a survey to dig up that little gem, … | |
According to [URL="http://www.news.com/8301-13578_3-9899151-38.html"]recent reports[/URL] the FBI has been using honey-trap hyperlinks which claim to lead to child pornography in order to entice offenders into clicking them. Last year, it seems, armed raids were carried out on homes in Nevada, New York and Pennsylvania as a direct result of such link … | |
In today's heightened threat environment, it is a constant battle for IT security departments to stay on top of all possible attacks and vulnerabilities they could encounter. With insider threats on the rise and the continuous danger posed by external hackers, coupled with the alarmingly quick development of stronger and … | |
It doesn’t really matter where you live in the world, the chances are that your country has been hit by some high profile data loss scandal during the course of the last year or so. Everything from retail operations such as TJ Maxx losing the odd 40 million or so … | |
A survey by secure data specialists [URL="http://www.cyber-ark.com/news-events/pr_20070530.asp"]Cyber-Ark Software[/URL] has revealed that the least trustworthy members of staff include temps, cleaners, security guards and the board of directors. PR, marketing and sales staff were also low on the list. At the other end of the trust scale, the personnel and legal … | |
Controversial media company and alleged spreader of adware Zango, formerly 180solutions, has been forced to back down from its legal attempts to get both Kaspersky Lab and PC Tools to reclassify its applications as non-threatening and prevent security software from blocking them. Kaspersky Lab [URL="http://www.kaspersky.com/news?id=207575556"]reports[/URL] that the US District Court … | |
According to a posting by someone calling themselves Gabriel, published on the Full Disclosure list (warning – [URL="http://seclists.org/fulldisclosure/2007/Jun/0380.html"]this link[/URL] contains the so-called plot spoiler), the ending of the yet to be published Harry Potter and the Deathly Hallows book has been revealed. Not by magic or wizardry, but by good … | |
To most people who do not actually play it, World of Warcraft is just a game. Anyone who has devoted any time at all within an immersive online world such as this will gladly put you straight on that. World of Warcraft is not just a game, it is a … | |
Web security company [URL="http://www.scansafe.com"]ScanSafe[/URL] has published its latest monthly Global Threat Report that looks at corporate usage of the web. The results should not be shocking as we all know that if you give someone free access to the Internet at work then they will abuse that access if at … | |
During the course of this week there have been numerous reports floating around, mainly online and mainly pretty devoid of any real substance, claiming that the popular anonymous browsing solution [URL="http://tor.eff.org/"]Tor[/URL] has been cracked. In fact, what these reports should have been reporting is the fact that researchers from the … | |
The [URL="http://www.acte.org"]Association of Corporate Travel Executives[/URL] (ACTE) has warned, during a conference in Barcelona this week, that the visitors to the United States risk having their laptops seized and searched on arrival and departure. The law applies equally to US and non-US passport holders, and following an appeal judgment in … | |
According to a survey by the [URL="http://www.ponemon.org"]Ponemon Institute[/URL], sponsored by [URL="http://www.pgp.com"]PGP Corporation[/URL] and [URL="http://www.vontu.com"]Vontu Inc[/URL], the true cost of data breaches in 2006 was $182 per compromised record on average, that is a 31% increase over the 2005 figures. Furthermore, the results of the report, published today, reveal that the … | |
BT is an unlikely sounding pioneer in the global battle against spam, but that is exactly the role the UK telecoms giant is adopting as it claims to be implementing the world’s first fully-automated spam buster system to track down and tackle professional spammers but also botnet-infected customers on the … | |
Here is my perfect world Mac --> should be used by the regular home user. Macs are easy to use, have all the software a user will ever need incorportated in it. Although not cheap, Macs are built to last. The average user will never have a problem with a … | |
A couple years ago, RedHat Linux was a completely open-source, freely-available linux solution that brought linux to the masses. Then, RedHat changed the paradigm: they wanted to transform RHL to a corporate supported linux, and enjoined with the Fedora Project for community support. But now a choice had to be … |