Feeds

'People expect privacy on Facebook and Twitter'

'Too posh to push? You haven't got the Right Stuff'

The Power of One Brief: Top reasons to choose HP BladeSystem

QuotW This was the week when the competition over the new nano-SIM standard was heating up as Apple reportedly said it would waive its patent fees as long as its design was chosen.

But Nokia, who has a competing design for the teeny SIMs, is arguing that its proposals are far better. It will be up to ETSI, the European Telecommunications Standards Institute, to decide between the two.

This was also the week when US legislators were concerned over employers asking prospective and current workers for access to their Facebook account.

Two Senators asked the Department of Justice and the Equal Employment Opportunity Commission to launch a federal investigation into the practice.

Senator Charles Schumer said:

Employers have no right to ask job applicants for their house keys or to read their diaries – why should they be able to ask them for their Facebook passwords and gain unwarranted access to a trove of private information about what we like, what messages we send to people, or who we are friends with?

And a Democratic lawmaker, Congressman Ed Perlmutter, attempted to sort the issue out by introducing an amendment to the Federal Communications Commission Reform Act in the House of Representatives that would have allowed the FCC to put a stop to it.

He said:

People have an expectation of privacy when using social media like Facebook and Twitter. They have an expectation that their right to free speech and religion will be respected when they use social media outlets. No American should have to provide their confidential personal passwords as a condition of employment.

Employers essentially can act as impostors and assume the identity of an employee and continually access, monitor and even manipulate an employee's personal social activities and opinions. That's simply a step too far.

But House Republicans disagreed with tacking the issue onto the FCC Reform Act, and shot down the amendment by 236 votes to 184.

Apple's the-new-iPad launch didn't go very smoothly Down Under as Aussie fanbois discovered that the fondleslab's so-called 4G connectivity didn't work on Australian 4G networks.

The Australian Competition and Consumer Commission (ACCC) thought this was a bit much since the fruity firm was advertising the iDevice as 4G and took Cupertino to court stating:

[Apple's advertising is misleading] because it represents to Australian consumers that the device can connect to a 4G mobile data network in Australia, when this is not the case.

Apple quickly said it would offer refunds to disappointed followers and issue corrective adverts, but the firm may still need to settle with the ACCC.

Fighting against cybercrime, Microsoft took down some key servers associated with the ZeuS and SpyEye banking Trojan botnets after months of investigation. Redmond said:

Cybercriminals have built hundreds of botnets using variants of ZeuS malware. For this action – codenamed Operation b71 – we focused on botnets using ZeuS, SpyEye and Ice-IX variants of the ZeuS family of malware, known to cause the most public harm and which experts believe are responsible for nearly half a billion dollars in damages.

Due to the unique complexity of these particular targets, unlike our prior botnet takedown operations, the goal here was not the permanent shutdown of all impacted targets. Rather, our goal was a strategic disruption of operations to mitigate the threat in order to cause long-term damage to the cybercriminal organization that relies on these botnets for illicit gain.

While the European Commission proposed a crack cyber-intelligence nerve centre in the shape of a European Cybercrime Centre, whose employees may or may not have costumes.

The commission said in a statement:

The centre would pool European cybercrime expertise and training efforts. It would warn EU countries of major cybercrime threats, of new ways to commit online crimes and identify organised cybercrime networks and prominent offenders in cyberspace.

It would provide operational support in concrete investigations and help set up cybercrime joint investigation teams.

In science news, China has issued some more news on their first female astronauts - they'll be fragrant, good-looking and married.

The woman taikonauts have to be married and have given birth naturally, as this reportedly ensures they have the mental and physical fortitude to survive in space. They also need flawless skin, scars could open and bleed in space and they shouldn't be smelly because the cramped conditions of the spacecraft would make the stench unbearable.

Pang Zhihao, deputy editor-in-chief of Space International magazine, is quoted as saying:

They even must not have decayed teeth because any small flaw might cause great trouble or a disaster in space.

Also, boffins have reassured the planet that there are a myriad of new homes to replace this one just as soon as we need to evacuate the most intelligent and valuable among us as chosen by the governments in the event of a world-destroying disaster event.

Around a hundred Earth-like planets are merrily orbiting in the habitable regions of stars just 30 light years away that will make wonderful homes for fleeing humans. After they have been examined for signs of life, intelligent or otherwise, and said life has been exterminated/enslaved/judged yummy enough to become a McAlien™ sandwich.

Researcher Xavier Delfosse said:

Some of these planets are expected to pass in front of their parent star as they orbit — this will open up the exciting possibility of studying the planet's atmosphere and searching for signs of life.

But don't get too excited yet, as we'd still have to get there somehow...

And finally, Abyss director James Cameron's deep sea dive into the Mariana Trench was deemed somewhat less than successful by Reg readers, who were not impressed when his submersible's robot-arm-failure resulted in a failure to collect any samples.

One commentard said:

Shooting in 3D of absolutely nothing and collecting no samples. Is this still a success story? How low can you go...

Although it has since emerged that this was the only footage publicised probably because Cameron is saving all the best stuff for his next waterlogged blockbuster - a 3D documentary of his dive. (Follow the conversation on the new forums here). ®

Seven Steps to Software Security

More from The Register

next story
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Russia sends SEX-CRAZED GECKOS to SPAAAAACE!
In space... no one can hear you're green...
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.