Articles about Information

US Senators hope to crack down on the trade of private information

Four US senators are introducing legislation aimed at turning the screws on businesses that gather up and sell citizens' personal information. Senators Edward Markey (D-MA), Richard Blumenthal (D-CT), Sheldon Whitehouse (D-RI) and Al Franken (D-MN) have teamed up to introduce the Data-broker Accountability and Transparency Act ( …
Shaun Nichols, 06 Mar 2015

Confidential information exposed over 300 times in ICANN security snafu

Two months after claiming there was "no indication" that confidential information was exposed in a security cock-up, domain name overseer ICANN has admitted it happened on at least 330 occasions. Following an audit of its main customer portal, the organization confirmed what we reported at the start of March: that misconfigured …
Kieren McCarthy, 30 Apr 2015
Parliament House Canberra by Flickr user OzMark17 used under CC Share and Share alike licence

Information Technology Supplier Advocate job abolished

Australia has abolished its Information Technology Supplier Advocate, a Canberra-based role designed to help small biz jump through the hoops of government contracting. The incumbent, Don Easter, finishes work next Monday. The position of Information Technology Supplier Advocate was created in 2010 when, as Labor Senator Kate …
Simon Sharwood, 23 Jun 2014
The Rugby Tuning Coil

The Information Age: A day out for grown-up children?

Exhibition Review The Science Museum's new Information Age gallery opened in October to great fanfare. Most of that fanfare, however, was concerned with an elderly lady having sent a tweet, rather than the substance of the exhibition itself. Youtube Video So, with the Christmas holidays upon us, and a pressing need to find things to fill up the …
Nigel Whitfield, 06 Dec 2014

French firms: You want us to compile DATABASES... of our SECRET information?

Businesses in France are being asked to compile a database of commercially sensitive information that will potentially attract increased interest from cyber criminals. Changes to employment laws in the country will require businesses with more than 50 employees to create a database for worker representatives to be able to access …
OUT-LAW.COM, 04 Apr 2014
Homer Simpson confronts rigged voting machine

Interview: Michael Cordover, voteware freedom-of-information crusader

A barrister has offered pro bono assistance to Michael Cordover, the Hobart Solicitor seeking the source code to the EasyCount software used by the Australian Electoral Commission (AEC) to count votes in the nation's senate elections. Cordover first sought the source code last year because, as he told The Register, “I have …
Simon Sharwood, 15 Jul 2014

NSA SOURCE CODE LEAK: Information slurp tools to appear online

The NSA has decided to let the public have a peek at what it's been up to, for a change, by promising to release some of its data analysis tools under an open-source license. On Tuesday, intelligence-gobbling agency said it hopes to make the code to NiFi – a project previously known internally as Niagarafiles – available as an …
Neil McAllister, 25 Nov 2014

Leaked Syrian log files reveal attempts to starve rebels of information

Syria's Bashar al Assad-led regime blocked scores of legitimate services and entire network regions in its bid to scrub out access to sites such as Reddit, Google and Skype, the first analysis of the nation's web filtering reveals. Research by three Sydney researchers from National ICT Australia (NICTA), together with three …
Darren Pauli, 28 Nov 2014
US cashpoint. Pic: Tax Credits

Are you an infosec bod? You must be STINKING RICH, says study

Jobs in the lucrative cyber-security sector can command salaries of $200,000 or more, according to a new salary survey. Lead software security engineer pull in an average of $233,333 while Chief Security Officer ($225,000) and Global Information Security Director ($200,000) also receive serious salaries. A new study of 2015 …
John Leyden, 12 May 2015

NSW Information Commissioner sends email to wrong list

The Information Commissioner in the Australian state of New South Wales, an officer whose job it is to offer and enforce best information management practice for the State, has apologised after sending an email to the wrong list. The email in question advised of a conference at which the Commissioner, Deirdre O’Donnell, is due …
Simon Sharwood, 20 Nov 2012
The Register breaking news

Obama cybersecurity order mandates better information sharing

RSA 2013 President Obama's executive order on cybersecurity means security officers at critical infrastructure companies will get greater clearances from the government to access its information, says a Department of Homeland Security honcho. The "unprecedented" executive order, which Obama revealed during his State of the Union address …
Jack Clark, 25 Feb 2013

Anonymous unleashes online petition against US info-sharing bills

Activist and hacktivist collective Anonymous has launched an online awareness-raising operation opposing pending controversial US information-sharing bills. Critics from across the political spectrum, including libertarian-minded technologist Robert Graham, argue that the Cybersecurity Information Sharing Act sacrifices privacy …
John Leyden, 20 Apr 2015
The Register breaking news

Caldicott: NHS workers should 'have the confidence to share information'

Dame Fiona Caldicott, who is scrutinising the government's plan to hand NHS patient records to private companies, today gave the proposals the thumbs-up - with a few caveats, naturally. The noted psychiatrist's review [PDF] of the data-sharing scheme was published just minutes ago. Her report, drafted in March, follows Health …
Kelly Fiveash, 26 Apr 2013
DNA Helix

Would you trust your DNA with APPLE? HealthKit lined up as genome data trafficker

Apple is set to enable DNA handling in iOS apps, allowing the applications to feed data from DNA labs to genetic researchers via iPhones or iPads. A report from the MIT Technology Review claims two US hospitals are running trial programs to collect DNA from people, and then transmit details of their genetic blueprints to their …
Shaun Nichols, 06 May 2015
Congress

America's cyber-security proto-laws branded 'surveillance in disguise'

The US House of Representatives has passed not one but two computer security bills that allow companies and Uncle Sam to share information about citizens, cyber-attacks and software vulnerabilities – and removes any legal liabilities for firms doing so. The Protecting Cyber Networks Act [PDF] (PCNA), which passed by 307 votes to …
Iain Thomson, 23 Apr 2015
Royal coat of arms on a court building. Pic: Elliott Brown

Ex-Logica beancounter pleads guilty to insider trading

A financial planning manager at the outsourcer formerly known as Logica has today pleaded guilty to three instances of insider dealing. Ryan Willmott made £30,000 by obtaining information relating to the £1.7bn takeover of Logica by Canadian outsourcer CGI, which was announced on 31 May 2012. The case against Willmott was …
Kat Hall, 26 Feb 2015
The Register breaking news

Information teleportation goes large-scale

Quantum teleportation of information between quantum objects, like photons, is so well-understood that it’s almost routine. Now, an international physicists is claiming to have carried out the same trick in the macro universe. If the experiment can be replicated, it will be an impressive trick. The scientists, led by Jian-Wei …

Governments beg Twitter for more data; network offers birdcage droppings

Governments' demands for data on Twitter users surged 40 per cent in the last six months of 2014, according to a new report by the avian network. America, Turkey, and Russia were behind the lion's share of that increase, with the former increasing its information requests by 29 percent. Turkey upped its demands by 150 per cent, …
Darren Pauli, 10 Feb 2015

TalkTalk 'fesses up to MEGA data breach

TalkTalk has admitted to a major breach of sensitive user information, which may have led to some customers handing over bank data to hackers. In an email to subscribers, the company said it first saw a big increase in malicious scammers claiming to be from TalkTalk at the end of last year. The budget telco said that – …
Kat Hall, 27 Feb 2015

What are cellphone networks blabbing about you to the Feds? A US senator wants to know

US Senator Edward Markey (D-MA) wants America's mobile networks to reveal the types of customer information they share with Uncle Sam. The carriers publish "transparency" reports detailing how many demands for sensitive information they receive from the governments, and how many they comply with – but this is not enough for …
Shaun Nichols, 22 May 2015

Governments lodge just 10 subpoenas for GitHub user info

Law enforcement agencies find Github geeks so boring they submitted a paltry ten subpoenas last year to gain information on 40 of the site's eight million active accounts. GithHub's transparency report for requests received during 2014 reveals information was provided to legal requesters in seven of these cases and about half of …
Darren Pauli, 17 Apr 2015
Elephant

'Right to be forgotten' festers as ICO and Google come to blows

Google is receiving a telling off from the UK's Information Commissioner's Office and may face legal action after failing to adequately respond to several so-called "right to be forgotten" requests. The ICO told The Register that "since the details of the ruling were first announced, we have handled over 183 complaints from …
Cow skull

FTC to scavengers: Radio Shack corpse doesn't include customer data

The US Federal Trade Commission (FTC) has issued an official warning to the companies taking over the assets of North American electronics retailer Radio Shack — namely, don't touch customer data. "We understand that RadioShack’s customer information constitutes a potentially valuable asset," FTC Consumer Protection boss Jessica …
Shaun Nichols, 18 May 2015
Sad cloud

IBM’s 700TB security threat database enters the cloud. Look to the heavens, hackers

IBM is putting its massive threat database up into the cloud for researchers, IT administrators, and anyone else to access in the hope of fundamentally changing how security companies defend against attackers. "Information sharing is something that has been discussed in legislation, within the industry, and between companies but …
Iain Thomson, 16 Apr 2015
spy_eye_648

Mobile spyware firm mSpy hacked, clients doxxed on dark web

Mobile spyware firm mSpy's database has appeared on the dark web, following an apparent hack on its systems last week. Emails, text messages, payment details, Apple IDs, passwords, photos and location data for mSpy users have all been exposed, according to investigative reporter Brian Krebs, who broke the story about the …
John Leyden, 15 May 2015
Abbott and Costello dressed as policemen

Welsh police force fined £160,000 after losing sensitive video interview

South Wales Police has been hit with a £160,000 fine for losing a video recording which formed part of the evidence in a sex abuse case. The lost DVDs contained film of an interview with a victim, who had been sexually abused as a child. Despite the DVDs containing a graphic and disturbing account of events, the discs were …
John Leyden, 18 May 2015
The Register breaking news

Understanding the make-up of information management

On demand On January 25th, Regcast presenter Jon Collins was joined by Freeform Dynamics’ Martha Bennett, Jason Frost from Blueprint, and Will Thompson from Microsoft for our very first live event of 2012. The thing that brought our panel together was the necessary evil that is - information management in business. Our latest Reg research …
Miatta Momoh, 03 Feb 2012

Frayed British Airways plays down mega hack attack on frequent flyer accounts

Wrongdoers have hacked into tens of thousands of British Airways' frequent flyer accounts, however the travel giant claimed on Sunday that no personal information had been swiped. Some customers, who are members of BA's Executive Club, have complained on message forums that their accounts had been breached and claimed that their …
Kelly Fiveash, 29 Mar 2015
Crop of doctor with pen and clipboard

WHOOPSIE! Vast US health insurer CareFirst plundered of 1.1 MEELLION records

More than 1.1 million user records have been compromised following a hack against US health insurer CareFirst BlueCross BlueShield. Data including members’ names, birth dates, email addresses and subscriber identification numbers may have been stolen by hackers as a result of a security breach last July. The hack was only …
John Leyden, 21 May 2015
Morgan Stanley

Morgan Stanley fires rookie for stealing thousands of fat cats' financial files

Morgan Stanley has confirmed it sacked one of its financial advisers after he allegedly stole confidential data on up to 350,000 clients – information which then appeared online. According to the New York Times, in mid-December Morgan Stanley found on Pastebin sensitive information regarding 1,200 accounts belonging to 900 …
Iain Thomson, 06 Jan 2015
Two upended shopping trolleys in an alleyway. Photo by Cyron, licensecd under CC 2.0

Bank-card-sniffing shop menace Punkey pinned down in US Secret Service investigation

Security researchers have identified a new strain of point-of-sale (POS) malware during an investigation led by the US Secret Service. Stolen payment card information and the IP addresses of more than 75 infected sales tills were found by security researchers at Trustwave during the probe. It's unclear how many victims the so- …
John Leyden, 16 Apr 2015
eyeofSauron

UK says comms metadata can kill personal privacy

The UK's inquiry into whether it conducts mass surveillance and the legality of such an effort has recommended tighter controls on access to communications metadata. The inquiry, which as we've reported finds that mass surveillance capabilities exist in the UK, but are used appropriately. The inquiry also rejects use of the …
Simon Sharwood, 12 Mar 2015

Google forced to – wah! – OBEY the LAW with privacy policy tweaks

Google has agreed to change its privacy policy to comply with the Data Protection Act following an investigation by Blighty's watchdog into the company's harvesting of personal information. The giant ad broker was slapped by the Information Commissioner's Office back in July 2013 for being "too vague" when describing how it uses …
Kat Hall, 30 Jan 2015
Crop of doctor with pen and clipboard

Turn your head and cough (up your details), HealthCare.Gov has sprung a leak!

Researchers have spotted a security lapse on the healthcare.gov site that leaves users vulnerable to data harvesting. The Associated Press and the EFF report that the site is providing some personal information about visitors to third-party advertisors. According to the researchers, the healthcare.gov site provides advertising …
Shaun Nichols, 22 Jan 2015
Lock security

Google tells world where Apps users live after WHOIS SNAFU

Names, home and email addresses, and phone numbers for a whopping 282,867 Google Apps domains have been exposed through previously borked private WHOIS records, Cisco boffins say. The research is the work of Nick Biasini, Alex Chiu, Jaeson Schultz, Craig Williams and William McVey of Cisco's Talos team who today published an …
Darren Pauli, 13 Mar 2015
The Register breaking news

Creating information management Initiatives that deliver

Live broadcast On March 13th at 11:00GMT El Reg front-man Jon Collins is packing our studio with some information management experts that we hope will give you a leg-up on your BI initiatives. Tony Lock from Freeform Dynamics is coming along with a stash-bag of findings from the latest research that many of you took part in. We’ve also got …
Phil Mitchell, 07 Mar 2012
Samsung Smart TV

EPIC asks FTC to stick a probe up Samsung over 'snooping' smart TVs

The Electronic Privacy Information Center (EPIC) has lobbied the US Federal Trade Commission (FTC) to investigate Samsung's collection of user information in its Smart PCs. The group filed a formal complaint with the FTC alleging that Samsung is misleading its customers and running afoul of the US Electronic Communications …
Shaun Nichols, 27 Feb 2015
All UK police forces use Tetra

Police ICT company finally lurches off the ground

After a four-year gestation period, the body intended to help UK coppers better splash their £1bn a year in tech spend – the Police ICT Company – has finally got off the ground. The Association for Police and Crime Commissioners (APCC) has approved the proposal first made by Home Secretary Theresa May in 2011 to establish the …
Kat Hall, 30 Mar 2015

Canada passes controversial spook-powers law

The Canadian government has passed a controversial anti-terrorism Bill, designed to extend the powers of the country's spy agencies. The Bill was passed 183 votes to 93 yesterday and was introduced following the first terror attack on Canadian soil last October, in which a gunman attacked the country's parliament, shot a soldier …
Kat Hall, 07 May 2015

Miscreants rummage in lawyers' silky drawers at will, despite warnings

UK data privacy watchdogs at the ICO investigated 173 UK law firms for reported breaches of the Data Protection Act (DPA) last year. A total of 187 incidents were recorded last year, with 173 firms investigated for a variety of DPA-related incidents, of which 29 per cent related to "security" and a similar 26 per cent related to …
John Leyden, 16 Apr 2015

VMware's tool to harden virtual networks: a spreadsheet

VMware has released a guide to hardening its NSX virtual networking and product. The guide published online by VMware information security professional Pravin Goyal, covers management, control and data planes. It recommends including audit logs and system events in backups, enabling and securing remote logging for the NSX …
Darren Pauli, 14 Oct 2014

Ukraine suddenly 40% more interested in UK tax info – HMRC

Cooperation between HM Revenue and Customs (HMRC) and foreign tax authorities will only increase as more countries sign up to automatic tax information exchange agreements. This is according to Pinsent Masons, the law firm behind Out-Law.com, which obtained figures showing a 45 per cent increase in the number of requests for …
OUT-LAW.COM, 19 Feb 2015

Costa Coffee Club members wake up and smell the data breach

Costa Coffee is warning customers it may have suffered a security breach and, alongside resetting the passwords for all of its Coffee Club accounts, is going to implement a "new format" for users' passwords. The Costa Coffee Club is Costa's "little way of saying thanks", and it certainly is little, offering five pence for every …

104 Australian orgs report breaches to privacy commissioner

Australian organisations have voluntarily submitted 104 data breach notifications over the last year, the Privacy Office says. News of the breach disclosures arrived today, the first anniversary of the country's tougher privacy policies, among reports of 4,016 privacy complaints, a 43 percent increase over the prior year. …
Darren Pauli, 12 Mar 2015
Facebook's Mark Zuckerberg, speaking at the 2015 F8 conference

Facebook is VIOLATING your SEXUAL privacy, warn Belgian data cops

Belgium’s privacy watchdog has pilloried Facebook for its tracking of users and non-users, saying it is in breach of EU law. The Commission de Protection de la Vie Privée (CPVP) said it was staggered by the fashion in which Facebook tramples users’ rights and tracks them across the web whether they want it or not. The Belgian …
Jennifer Baker, 15 May 2015
australia

Tech policy battle: Australian Industry Group vs. Information Industries Association

Two big lobby groups have just released their visions for Australia's future economy, and agree on the need for reform that will help Australia's technology sector to improve its performance. Let's start with business lobby group The Australian Industry Group (AIG), which this morning published its 10 point plan for a strong and …

Revenge porn forbidden: Twitter bans hobby of bitter ex-boyfriends

Twitter has formally banned its users from posting intimate photos of people without their permission. It's a move that will hopefully rid the site of "revenge porn," which are typically sexy snaps leaked online by bitter ex-partners, usually spiteful former boyfriends. The 140-character chatterbox site has updated its rules of …
Shaun Nichols, 12 Mar 2015
Twitter for Mac New

Oi, Twitter! Sign this or we won't talk to you, growls EU

Twitter could soon find itself cold-shouldered by top European law-makers. The deadline for all companies and organisations wanting to lobby the EU to update their information on the so-called Transparency Register passed this week. The annual update was more important than usual this year since the Commission, under president …
Jennifer Baker, 01 May 2015
france

France wants to make les citoyens' health data available to world+dog

Plans to centralise the storage of health data in France are being considered by the French parliament. Draft legislation, which would see a new single national health database created, was backed by the National Assembly earlier this month and is now being considered by the Senate. Under the proposals, five sets of data would …
OUT-LAW.COM, 30 Apr 2015
Samuel L Jackson locates late passengers with RFID

Euro ministers trade data for data protection – yes, your passenger records

After weeks of mounting pressure from national governments for increased access to personal data following the Charlie Hebdo attack, the European Parliament has pulled a switch that aims to simultaneously increase citizens’ privacy rights while also giving law enforcement agencies more ability to track travellers. As they twist …
Jennifer Baker, 13 Feb 2015