Articles about Information

Twitter for Mac New

The Man demands yet more account information from Twitter

Twitter's transparency report reveals it has received 52 per cent more requests for account information than ever before, affecting 78 per cent more account holders, during the last six months. The transparency report, which covers the period between January and June 2015, now includes information regarding alleged copyright …

US Senators hope to crack down on the trade of private information

Four US senators are introducing legislation aimed at turning the screws on businesses that gather up and sell citizens' personal information. Senators Edward Markey (D-MA), Richard Blumenthal (D-CT), Sheldon Whitehouse (D-RI) and Al Franken (D-MN) have teamed up to introduce the Data-broker Accountability and Transparency Act ( …
Shaun Nichols, 06 Mar 2015
Fiorina

Apple, Google should give FBI every last drop of user information, says ex-HP CEO and wannabe US prez Carly Fiorina

Former HP CEO and current presidential hopeful Carly Fiorina says Apple and Google should just hand user information over to government investigators. Speaking Thursday at the Republican party's presidential debates, Fiorina said companies should be more willing to cooperate with requests from federal investigators to produce …
Shaun Nichols, 07 Aug 2015

Confidential information exposed over 300 times in ICANN security snafu

Two months after claiming there was "no indication" that confidential information was exposed in a security cock-up, domain name overseer ICANN has admitted it happened on at least 330 occasions. Following an audit of its main customer portal, the organization confirmed what we reported at the start of March: that misconfigured …
Kieren McCarthy, 30 Apr 2015
Gravity image

DataGravity puts a little weight behind protecting your information

Paula Long-led startup DataGravity has updated its Discovery array with a second generation Discovery Series V2 software. DataGravity said its arrays integrate the separate functions of data security, search and discovery, and protection into one platform and provide visibility into data as it's created. The added software …
Chris Mellor, 14 Aug 2015
Parliament House Canberra by Flickr user OzMark17 used under CC Share and Share alike licence

Information Technology Supplier Advocate job abolished

Australia has abolished its Information Technology Supplier Advocate, a Canberra-based role designed to help small biz jump through the hoops of government contracting. The incumbent, Don Easter, finishes work next Monday. The position of Information Technology Supplier Advocate was created in 2010 when, as Labor Senator Kate …
Simon Sharwood, 23 Jun 2014
Walther PPK pistol. Pic: Art Bromage

How British spies really spy: Information that didn't come from Snowden

Feature David Anderson QC’s review of Britain’s anti-terrorism laws, published earlier this month, has mostly been examined for its potential impact on the government’s plans for a new act of Parliament on surveillance, known as the Snooper’s Charter to opponents. He made extensive recommendations as to what should be in the …
SA Mathieson, 23 Jul 2015

French firms: You want us to compile DATABASES... of our SECRET information?

Businesses in France are being asked to compile a database of commercially sensitive information that will potentially attract increased interest from cyber criminals. Changes to employment laws in the country will require businesses with more than 50 employees to create a database for worker representatives to be able to access …
OUT-LAW.COM, 04 Apr 2014
The Rugby Tuning Coil

The Information Age: A day out for grown-up children?

Exhibition Review The Science Museum's new Information Age gallery opened in October to great fanfare. Most of that fanfare, however, was concerned with an elderly lady having sent a tweet, rather than the substance of the exhibition itself. Youtube Video So, with the Christmas holidays upon us, and a pressing need to find things to fill up the …
Nigel Whitfield, 06 Dec 2014
Homer Simpson confronts rigged voting machine

Interview: Michael Cordover, voteware freedom-of-information crusader

A barrister has offered pro bono assistance to Michael Cordover, the Hobart Solicitor seeking the source code to the EasyCount software used by the Australian Electoral Commission (AEC) to count votes in the nation's senate elections. Cordover first sought the source code last year because, as he told The Register, “I have …
Simon Sharwood, 15 Jul 2014

Prof Hawking cracks riddle of black holes – which may be portals to other universes

Professor Stephen Hawking thinks he has solved the 40-year-old information paradox – a conundrum of what happens to matter in black holes. Matter that gets sucked into a black hole was thought to be destroyed by the immense forces involved, as per the theory of general relativity. However, that's a problem from a quantum …
Iain Thomson, 25 Aug 2015

NSA SOURCE CODE LEAK: Information slurp tools to appear online

The NSA has decided to let the public have a peek at what it's been up to, for a change, by promising to release some of its data analysis tools under an open-source license. On Tuesday, intelligence-gobbling agency said it hopes to make the code to NiFi – a project previously known internally as Niagarafiles – available as an …
Neil McAllister, 25 Nov 2014

Insider trading ring hired 'Ukrainian hackers to scoop stock market'

The FBI says it has cracked open an insider-trading ring which employed Ukrainian hackers to pinch corporate announcements from news wires and then traded stocks based on the unreleased information. Nine men have been named in a pair of indictments filed in New York and New Jersey. Five of the nine were arrested in a series of …

NSW Information Commissioner sends email to wrong list

The Information Commissioner in the Australian state of New South Wales, an officer whose job it is to offer and enforce best information management practice for the State, has apologised after sending an email to the wrong list. The email in question advised of a conference at which the Commissioner, Deirdre O’Donnell, is due …
Simon Sharwood, 20 Nov 2012

Leaked Syrian log files reveal attempts to starve rebels of information

Syria's Bashar al Assad-led regime blocked scores of legitimate services and entire network regions in its bid to scrub out access to sites such as Reddit, Google and Skype, the first analysis of the nation's web filtering reveals. Research by three Sydney researchers from National ICT Australia (NICTA), together with three …
Darren Pauli, 28 Nov 2014
Twitter for Mac New

Painfully insecure GDS spaffs £21,000 on online narcissism tool

The Government Digital Service is spending £21,000 per year on a brand monitoring tool designed to track what is being said about it online. Brandwatch monitors conversations happening online "in order to provide brands with information and the means to track specific segments to analyse their online presence". The Brighton …
Kat Hall, 04 Aug 2015
Uber launch party by https://www.flickr.com/photos/5chw4r7z/ CC2.0 sharelalike attribution https://creativecommons.org/licenses/by-sa/2.0/

Uber slapped with $7.3m fine for keeping quiet about driver accidents

A Californian judge has ruled that Uber, by refusing to disclose particular business practices to state regulators, is in breach of the conditions under which it is allowed to operate in the state. The international controversy-courting ride-hailing service received a hard spanking on its home turf when an administrative law …

Oh no Wikiwon't: Russians plan own version of 'distorted' Wikiland

Following the country's short-lived ban on Wikipedia, Russian politicians have come up with another wheeze to divert traffic from the encyclopedia site. Moscow’s head of communication and culture, Yevgeny Gerasimov, set out plans (selfishly in Russian) on Tuesday (25 August) for a Russian version of the site. He told Russia's …
Jennifer Baker, 26 Aug 2015
Hillary Clinton

Hillary Clinton kept top-secret SIGINT emails on her home email server

Hillary Clinton's personal email server and one of her thumb drives held emails containing classified and top-secret information. That's according to a note by the US Intelligence Community Inspector General. While US Secretary of State, Clinton had access to American intelligence. It appears some of Uncle Sam's sensitive …
Iain Thomson, 12 Aug 2015
Crop of doctor with pen and clipboard

NHS England backs down over another data extraction scheme

NHS England has backed down from yet another data extraction scheme, after details emerged of backdoor plans to gather patient appointment information. The episode has echoes of the on-going Care.data debacle, a scheme that has been heavily criticised for its lack of public consultation in sharing patient information with …
Kat Hall, 22 Jul 2015
Cash in brown paper envelope CC 2.0 attribution StockMonkeys.com

A third of workers admit they'd leak sensitive biz data for peanuts

A third of employees would sell information on company patents, financial records and customer credit card details if the price was right. A poll of 4,000 employees in the UK, Germany, USA and Australia found that for £5,000, a quarter would flog off sensitive data, potentially risking both their job and criminal convictions …
John Leyden, 29 Jul 2015

Catch 'em while you can! Presenting Druva's virtual open door detector

Think checking doors and windows every night so as to stop burglars scrambling through to rob you. Well, now your personal data can be handled in the same way, with Druva's end-point protection services identifying risky exposure to sensitive information loss by scanning backed-up data and alerting compliance teams. Its inSync …
Chris Mellor, 22 Jul 2015

Spotify now officially even worse than the NSA

New terms and conditions popping up on Spotify users screens give the music-streaming company sweeping new rights. The “What we collect” section of the new terms seems scary enough: By using or interacting with the Service, you are consenting to: the collection, use, sharing, and processing of information about your location …
Simon Rockman, 21 Aug 2015
The Register breaking news

Obama cybersecurity order mandates better information sharing

RSA 2013 President Obama's executive order on cybersecurity means security officers at critical infrastructure companies will get greater clearances from the government to access its information, says a Department of Homeland Security honcho. The "unprecedented" executive order, which Obama revealed during his State of the Union address …
Jack Clark, 25 Feb 2013
shutterstock_273641723

Spotify climbs down on new terms and conditions

Spotify will clarify its position on its wide-reaching terms and conditions. In a post entitled “SORRY”, company founder Daniel Ek said: “We have heard your concerns loud and clear. We are also going to update the new Privacy Policy in the coming weeks.” In the post, Ek paints it as a misunderstanding of what Spotify was …
Simon Rockman, 21 Aug 2015
still_life_with_skull_cropped_648

Cisco ISE carries HTML authentication bug

Cisco's identified a bug in its Identity Services Engine: its admin portal doesn't properly authorise HTML requests, and that can let an attacker see custom pages an admin has created. The reason it matters is that sys admins' custom pages can contain sensitive security information about the network that ISE is managing. “The …
F-16 falcon fighter jet

US Air Force: 'Loose tweets destroy fleets'

Pic The US Air Force has warned its personnel to keep quiet of their activities on Twitter – or as they put it: "Loose tweets destroy fleets." The notice reminds everyone that terrorist organizations and sympathizers will exploit any military information posted on social networks and other websites. The warning extends not only …
Shaun Nichols, 17 Aug 2015
US cashpoint. Pic: Tax Credits

Are you an infosec bod? You must be STINKING RICH, says study

Jobs in the lucrative cyber-security sector can command salaries of $200,000 or more, according to a new salary survey. Lead software security engineer pull in an average of $233,333 while Chief Security Officer ($225,000) and Global Information Security Director ($200,000) also receive serious salaries. A new study of 2015 …
John Leyden, 12 May 2015
Doctor Nick Riviera

Hackers invade systems holding medical files on 4.5 million Cali patients

UCLA Health hospitals say hackers may have accessed personal information and medical records on 4.5 million patients. The California medical group admitted today that miscreants infiltrated its computer systems as long ago as September. It is possible the intruders accessed databases holding patient names, addresses, dates of …
Shaun Nichols, 17 Jul 2015
Australian attorney general George Brandis by https://www.flickr.com/photos/cebitaus/ cc 2.0 attribution https://creativecommons.org/licenses/by/2.0/

Australian government mulls secret terror court proposals

The Australian government is taste-testing new anti-terrorism proposals to give police access to information gathered by its spook agencies. Dropped to the Murdoch press over the weekend, the idea is to create secret courts to look at information from the Australian Security Intelligence Organisation (ASIO) and other security …
Deflated balloon elephant by https://www.flickr.com/photos/zimpenfish/ CC 2.0 attribution https://creativecommons.org/licenses/by/2.0/

Forget Big Data hype, says Gartner as it cans its hype cycle

Analyst outfit Gartner has decided that Big Data hype is so last year and canned its hype cycle for Big Data. In new research titled “The Demise of Big Data, Its Lessons and the State of Things to Come” the firm says “we did it to move the big data discussion past hype and into practice” and also because “Hype Cycles consider …
Simon Sharwood, 21 Aug 2015
US Pentagon. Pic: DoD photo by MSgt Ken Hammond, USAF

You're hosting Uncle Sam's files in the cloud. You get hacked. This is what happens next

The US government has posted a new set of rules outlining how cloud providers should report IT security cockups that involve Uncle Sam's data. The new Department of Defense (DoD) rules [PDF] include requirements on how contractors who handle government information should deal with computer network breaches and attacks, and how …
Shaun Nichols, 26 Aug 2015

Still using ColdFusion? Really? Well, you'll want to install this patch

Adobe is advising users and administrators running ColdFusion to patch their software following the release of a security fix for an information disclosure vulnerability. The ColdFusion HotFix addresses a vulnerability in the handling of XML data for ColdFusion 10 and 11. Both patches address a single CVE-listed security …
Shaun Nichols, 27 Aug 2015

ICO fines anti nuisance call company for making nuisance calls

The Information Commissioner’s Office (ICO) has fined a company that blocks nuisance calls for making nuisance calls. The ICO announced yesterday that Point One Marketing Ltd (previously Conservo Digital Ltd) from Bournemouth would have to fork out £50,000 for harassing people. The company, which trades as "Stop the Calls", …
Jennifer Baker, 11 Aug 2015

China makes internet shut-downs official with new security law

China is able to shut off internet access during major 'social security incidents' and has granted its Cyberspace Administration agency wider decision making powers under a draft law published this month. The draft also appears to require critical infrastructure organisations including foreign entities to store "important" …
Darren Pauli, 13 Jul 2015

Three exposed Brit's privates with sloppy survey code

Hacker Joseph Redfern has reported a privacy flaw at UK telco Three, which exposed names and email addresses in online surveys. The telco shuttered the offending survey site and the exposed API which returned the private information in JSON forms when a user entered data. Refern says the flaw meant any phone number could be …
Darren Pauli, 17 Jun 2015

Joomla Helpdesk Pro remote code exec vulns lead to server pwnage

Outpost24 researcher Kasper Bertelsen has warned of several vulnerabilities in Joomla's Helpdesk Pro which can lead to remote code execution on servers. The Helpdesk Pro Joomla extension allows users to categorise and log support tickets with managers who receive notifications. eBay, Heathrow Airport and the High Court of …
Darren Pauli, 22 Jul 2015
1984

Jail incompetent council folk who leak our data, thunders furious BBW

A report published today by British privacy rights group Big Brother Watch (BBW) says the scale of private data being leaked is so great that those responsible should be jailed. Between April 2011 and April 2014, local councils experienced around four data breaches a day – a total of 4,236 instances – according to figures …
Jennifer Baker, 11 Aug 2015
firing range - target in cross hairs

SEC joins hunt for FIN4 attackers

America's Securities and Exchange Commission (SEC) has joined the hunt for the FIN4 hacking group. The bunch, revealed by FireEye in December 2014, used a phishing attack to get access to listed companies' computer systems. Their payoff was to get insider information to trade their targets' stocks. According to Reuters, the SEC …
theresa_may_648

Email apparently from Home Office warns of emails apparently from Home Office

The Home Office has sent unsolicited emails to the public, warning that the Home Office will never send unsolicited emails to the public, and will not ask for personal information or passwords in an email. The lay-off happy government department warned the public to be wary of emails that appear to come from the Ministry of …
Screenshot of Chrome's "Aw, snap!" error message

Google burnishes Chrome to patch over 43 bugs

Google has pushed out a new cross-platform version of Chrome that fixes no less than 43 security bugs. Chrome version 44.0.2403.89 for Windows, Mac and Linux addresses 12 potentially “high-impact flaws”, several of which revolve around buffer overflow bugs. A pair of universal cross-site scripting bugs also rate towards the …
John Leyden, 24 Jul 2015

Dossiers on US spies, military snatched in 'SECOND govt data leak'

A second data breach at the US Office of Personnel Management has compromised even more sensitive information about government employees than the first breach that was revealed earlier this week, sources claim. It's possible at least 14 million Americans have chapter and verse on their lives leaked, we're told. The Associated …
Neil McAllister, 12 Jun 2015
hacker

Bloke thrown in the clink for hacking SIXTY PER CENT of Americans

A Vietnamese crook has started a 13-year stretch behind bars for hacking into corporate America, and offering to sell personal information on 200 million US citizens. Hieu Minh Ngo, 25, pleaded guilty to wire fraud, identity fraud, and access device fraud charges, and four counts of computer fraud and abuse. Judge Paul J. …
Shaun Nichols, 16 Jul 2015
container_ship_hamburg_shutterstock_648

Net config too SLOW for clouds, says Fujitsu

When tens of seconds is too slow: Fujitsu is getting ready to launch a technology it says can create virtual networks for Linux containers in a second. Being readied for the Asia-Pacific Network Operations and Management Symposium in South Korea later this month, the technology is designed to address the mis-match between how …

Victims of US gov't mega-breach still haven't been notified

Nearly three months after the US Office of Personnel Management (OPM) discovered its databases had been compromised by Chinese hackers, the government still hasn't notified the employees and contractors affected by the breach. On Tuesday, the OPM said it planned to start the process of informing victims "later this month," and …
Neil McAllister, 02 Sep 2015
facebook_shock_648

Wanna harvest a stranger's Facebook data? Get a mobile number and off you go

Hackers and other miscreants are able to access names, telephone numbers, images and location data in bulk from Facebook, using only a cellphone number. The loophole was revealed by software engineer Reza Moaiandin. Moaiandin, technical director at UK-based tech firm Salt.agency, exploited a little-known privacy setting in a …
John Leyden, 12 Aug 2015
The Register breaking news

Caldicott: NHS workers should 'have the confidence to share information'

Dame Fiona Caldicott, who is scrutinising the government's plan to hand NHS patient records to private companies, today gave the proposals the thumbs-up - with a few caveats, naturally. The noted psychiatrist's review [PDF] of the data-sharing scheme was published just minutes ago. Her report, drafted in March, follows Health …
Kelly Fiveash, 26 Apr 2013

Epic Games, Epic Fail: Forumers' info blown into dust by hack

Epic Games, known for its Unreal Engine and the Games of War series, sent a grovelling letter to its forum users this morning explaining that a hack "may have resulted in unauthorised access to your username, email address, password, and the date of birth you provided at registration." Emails announced that the company has …

Do svidaniya to public record as Russia passes NEED to be forgotten bill

The lower house of the Russian‬ Parliament has given its approval to a new law which will resemble the European Union's controversial "Right to be Forgotten" legislation, but which critics have warned is stricter, arbitrary, and open to abuse. The bill, which was advanced earlier this month, requires search engines to remove " …

New US cyber laws will hit privacy and security, says Homeland Security

The US Department of Homeland Security is hardly what you'd think of as a bunch of whining lefties, but even this agency has come out against the proposed Cybersecurity Information Sharing Act. In a letter [PDF] to Senator Al Franken (D-MN), Alejandro Mayorkas, the deputy secretary of the DHS, said that the proposed American …
Iain Thomson, 04 Aug 2015