House of Lords committee condemns regulations being drawn up by European commission and recent ECJ ruling.
A "right to be forgotten" – enforcing the removal of online material – is wrong in principle and unworkable in practice, a parliamentary committee has said. The House of Lords home affairs, health and education EU sub-committee has condemned regulations being drawn up by the European commission and a recent landmark judgment by the European court of justice (ECJ) in Luxembourg. The study supports the coalition government's opposition to the EU proposals on the grounds that search engines should not be made responsible for the content of the internet.
Read moreCanada accused China on Tuesday of hacking into the computers of its research and development arm, which Beijing strongly denied.
China partners each year with thousands of Canadians firms to roll out new technologies, and took advantage of this arrangement to engage in a cyber attack, Ottawa said. "Recently, the government of Canada, through the work of the Communications Security Establishment, detected and confirmed a cyber intrusion on the IT infrastructure of the National Research Council of Canada by a highly sophisticated Chinese state-sponsored actor," said a government statement.
Read moreAccording to Security Affairs, vulnerabilities that reveal information about the user and execute code remotely were discovered in the operating system, called Tails.
The American information security company, called Exodus Intelligence has found some critical zero day vulnerabilities that allow attackers to disclose personal information. Note that the operating system Tails, which was based on Linux and provided anonymity through Tor, was recommended by Edward Snowden. Loc Nguyen, the information security expert from Exodus Intelligence said that the found problems allow both hackers and security services to gain access to personal user‘s data, in addition they help execute code remotely with the help of it attackers can have complete control over victim.
Read moreIt’s been a persistent question ever since Edward Snowden revealed the National Security Agency’s expansive spying operations just over a year ago: Have the disclosures damaged U.S. interests?
A new report by the nonpartisan New America Foundation surveyed the revelations’ impact on U.S. businesses. The authors found that the resulting erosion of trust is having serious consequences for U.S. technology firms and for U.S. credibility around the world. Summarizing the research to date, the report notes a widely cited 2013 paper by the Information Technology & Innovation Foundation, a business-friendly think tank, which found that the revelations could cost the U.S. cloud computing industry between $22 and $180 billion by 2016.
Read moreInformation security is the process of protecting the availability and privacy, but you should be aware that not all your applications are safe. Most of all anti-virus programs were forged by hackers. Experts from Trend Micro conducted research and made the conclusion that applications attack Android users more and more.
The company examined the most popular apps in Google Play and found that more than 77% of these applications are fake. Unlicensed programs are almost identical to the original, but at the same time they are very dangerous. According to the research of the Japanese company, called Trend Micro a huge number of fake software were found.
Read moreBoffins get your mobe to spill the beans using Google text-to-speech kit. Researchers from the Chinese University of Hong Kong have developed bizarre malware that dictates contacts, emails and other sensitive text data in order to steal it.
In the novel attack a seemingly innocuous app that required no permissions called a bad guy's phone number and blabbered the stolen data out of the speakers and down the microphone using Google Voice Services (GVS). It affected 'nearly all' Android devices and could not be detected by VoicEmployer malware or victims, provided savvy hackers conducted the attack in the wee hours with the volume turned down.
Read moreAttackers are exploiting a vulnerability in distributed search engine software Elasticsearch to install DDoS malware on Amazon and possibly other cloud servers.
Elasticsearch is an increasingly popular open-source search engine server developed in Java that allows applications to perform full-text search for various types of documents through a REST API (representational state transfer application programming interface). Because it has a distributed architecture that allows for multiple nodes, Elasticsearch is commonly used in cloud environments. It can be deployed on Amazon Elastic Compute Cloud (EC2), Microsoft Azure, Google Compute Engine and other cloud platforms.
Read moreEdward Snowden wants to develop new methods of improving information security. The former employee of the NSA wants to create programs which will be able to stop surveillance. So, he asked for help information security experts.
On July 19, in New York the Hackers On Planet Earth (HOPE) took place where Snowden asked for help a via video link and requested to create anti-surveillance technology. He also declared that he plans to spend a lot of time to develop programs against government surveillance. According to the former employee of National Security Agency of the USA, he is going to spend enough time to advance new technologies, especially those which give people the chance to talk anonymously and to encrypt messages.
Read moreGoogle’s handling of “right to be forgotten” requests from European citizens will come under fire from the continent’s privacy watchdogs on Thursday, after the search engine restricted the removal of Internet links to European sites only.
European data protection authorities are meeting representatives of Google, Microsoft, which operates the Bing search engine, and Yahoo to discuss the implementation of the landmark ruling from Europe’s top court upholding people’s right to request that outdated links be removed from Internet search results. European Union privacy watchdogs have several concerns on the way the ruling, which has pitted privacy advocates against free speech defenders, is being implemented, particularly by Google, according to a person familiar with the matter.
Read moreAccording to the Chinese mass media charges, information security could suffer. At the same time Apple representatives claim that user‘s location data are only on his device and can't be saved on iTunes or iCloud.
Apple denies Chinese statement, broadcasted on China Central Television (CCTV) about surveillance over users. The "Frequent Locations" function caused many questions. According to the Chinese mass media, the information gathered by Apple can reveal the entire country's economic situation and even state secrets. In turn, Apple‘s technical support declares that the "Frequent Locations" function doesn't track your smartphone.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland