Source: Fast Company
Amnesty International USA and the Standby Task Force have launched an ambitious campaign to crowdsource analysis of Syrian satellite imagery for military movements, demonstrations, and checkpoints.
Security researchers suspect that Japanese defense contractor Mitsubishi Heavy Industries was hit by a spear-phishing attack and that the operation bears the marks of the recent Operation Aurora cyber-spying campaign.
Source: The Register
If you use Skype on an iPhone or iPod touch, Phil Purviance can steal your device’s address book simply by sending you a chat message.
In partnership with colleagues at the Center for Democracy & Technology, the Berkman Center is pleased to release a report on “Account Deactivation and Content Removal: Guiding Principles and Practices for Companies and Users.”
Source: RIPE NCC
The front page story of the September 13 2011 issue of the International Herald Tribune said it all: “Iranian activists feel the chill as hacker taps into e-mails.” The news story relates how a hacker has “sneaked into the computer systems of a security firm on the outskirts of Amsterdam” and then “created credentials that could allow someone to spy on Internet connections that appeared to be secure.”
Source: Internet Governance Project
Last week, China, the Russian Federation, Tajikistan and Uzbekistan released a Resolution for the UN General Assembly entitled “International code of conduct for information security.”
Tim Berners-Lee, a British scientist, invented the World Wide Web in 1990 and changed the entire playing field. The Web represents the mainstreaming and democratisation of the Internet. As of March 2011, there were over 2 billion Internet users internationally. The Internet is a global communications medium of staggering proportions. It has become an international publishing platform, a marketplace, and a battleground.
Source: slight paranoia
As consumers around the world have embraced cloud computing, large Internet firms like Google, Facebook, Twitter, Yahoo, all of them based in the United States, increasingly hold users’ most private documents and other data. This has been a boon for law enforcement agencies, which can often obtain these files without a court issued search warrant, or have to provide the investigated individual with the kind of prompt notice that would otherwise occur had their home been searched.
Source: China Daily
The United Nations permanent representatives of China, Russia, Tajikistan and Uzbekistan jointly sent a letter to UN Secretary-General Ban Ki-moon on Monday, requesting him to circulate the International Code of Conduct for Information Security. Drafted by the four countries, it is a formal UN document of the 66th session of the General Assembly.
Source: The Express Tribune
In this opinion piece, editor Jahanzaib Haque writes about the growing trend of state-condoned Internet monitoring and the how the practice is hurting the citizens it seeks to protect.