A French court yesterday ruled that Twitter must reveal the identities of users who post racist and anti-Semitic comments following demands from the Union of Jewish Students of France (UEJF).
Senate Democrats introduce 2013 Cybersecurity Act
After a US presidential election season that saw cybersecurity policy come front and center in debates and as planks in political platforms, the US Senate Committee on Commerce said this week that it is reviving the debate surrounding the passage of a …
Eastern European CERTs stage massive Virut botnet takedown
A large Eastern European botnet has been thwarted in Poland and Russia – for now. Local Computer Emergency Response Teams (CERTs) and partners have shut down the Virut threat, which in Poland alone commanded more than 890,000 unique IP addresses.
ICO fines Sony £250,000 for loss of personal data in 2011
In a monetary penalty notice dated 14 January but announced today, the Information Commissioner’s Office has fined Sony Computer Entertainment Europe Ltd £250,000 for a serious breach of the UK’s Data Protection Act.
SCADA password-cracker targets Siemens gear
SCADA vulnerabilities are once again making their frightening selves known with the revelation that a new password-cracker is specifically targeting industrial control systems.
Cybersecurity faces mostly ‘post-PC’ threats
Even as the existing cybersecurity threat landscape becomes more complex, IT departments should be looking to the next wrinkle: cybercriminals have moved beyond the PC, targeting Android, social media and the Mac OS X with new attacks.
New features available for GoAnywhere file transfer services
Linoma Software, the managed file transfer and data encryption specialist, has announced new clustering and load balancing capabilities for its GoAnywhere Services version 3.1 offering.
Why did WikiLeaks dox Swartz?
In a brief series of tweets, WikiLeaks seems to have named Aaron Swartz as a WikiLeaks contributor; but the motivation for the move remains unclear.
Mega’s security put under the microscope; and Mega responds
Following the razzmatazz at the launch of Dotcom’s new secure Mega file storage service over the weekend comes the expected analysis and criticism of its security. There are two primary areas of focus – the RSA key generation and an apparent deduplicat…
Mega’s security put under the microscope; and Mega responds
Following the razzmatazz at the launch of Dotcom’s new secure Mega file storage service over the weekend comes the expected analysis and criticism of its security. There are two primary areas of focus – the RSA key generation and an apparent deduplicat…