The Open Rights Group has launched a campaign for the adoption of a new HTTP 400 range status code: Error 451, designed to indicate that access to a page or website is unavailable by court order.
IBM to Acquire Financial Malware Defense Firm Trusteer
IBM has announced a definitive agreement to buy the Israeli firm Trusteer, which specializes in anti-financial malware and fraud software. Although terms have not been revealed, market estimates put the price at around $800-$900 million.
Users Have No Expectation of Privacy in Gmail Says Google
In filing a motion to dismiss a class action that it illegally intercepts and reads emails, Google lawyers have invoked a ruling from a 1979 court case (Smith vs Maryland) that originally referred to telephony.
DNS Posioning and Spoofing Made Simpler with BIND Vulnerability
Web page spoofing just got easier: One of the defenses against Domain Name System (DNS) cache poisoning and web address spoofing lies in the randomization of the IP address of the queried name server. But a newly found vulnerability in BIND, the most w…
Hacking the Lightbulb: Malware Can Produce a Sustained Blackout
Considering the hyper-connected world that we live in, a good security mantra should be: if it can be connected to the web, it can be hacked. Even light bulbs. Yes, even light bulbs.
Cyber Spies in London Recycle Bins Told to Move On
News emerged last week that a London firm had been installing wifi snooping equipment in London recycle bins, spying on the mobile phones of passers-by. But the City of London authorities have moved quickly with a cease and desist instruction.
Dalai Lama’s Website Compromised and Serving Malware
The Dalai Lama and his supporters have been under almost continuous cyber attack for years. In a new ‘don’t go there’ announcement, a security researcher warned Monday that the Chinese language version of his website has been compromised in a new water…
Joomla Exploit Cashes Out Accounts with Zbot Variant
Websites using the popular content management system Joomla are at risk of being hijacked for use in malware payload and phishing attacks, thanks to the discovery of a fresh vulnerability and accompanying zero-day attack.
Department of Defense Approves BlackBerry for MDM
Remember when President Obama had to get a special, encrypted version of his BlackBerry in order to continue using a smartphone post-election? It’s taken the US Department of Defense (DoD) about five years since then to support anything but restricted …
Bitcoin Besieged by Hackers and Regulators
Just as Bitcoin warns its users that Android-based bitcoin wallets are vulnerable to theft, so the New York Department of Financial Services subpoenas 22 digital currency companies and investors, and investigates the regulatory guidelines that should b…