Articles about Information

Parliament House Canberra by Flickr user OzMark17 used under CC Share and Share alike licence

Information Technology Supplier Advocate job abolished

Australia has abolished its Information Technology Supplier Advocate, a Canberra-based role designed to help small biz jump through the hoops of government contracting. The incumbent, Don Easter, finishes work next Monday. The position of Information Technology Supplier Advocate was created in 2010 when, as Labor Senator Kate …
Simon Sharwood, 23 Jun 2014
The Rugby Tuning Coil

The Information Age: A day out for grown-up children?

Exhibition Review The Science Museum's new Information Age gallery opened in October to great fanfare. Most of that fanfare, however, was concerned with an elderly lady having sent a tweet, rather than the substance of the exhibition itself. Youtube Video So, with the Christmas holidays upon us, and a pressing need to find things to fill up the …
Nigel Whitfield, 06 Dec 2014

French firms: You want us to compile DATABASES... of our SECRET information?

Businesses in France are being asked to compile a database of commercially sensitive information that will potentially attract increased interest from cyber criminals. Changes to employment laws in the country will require businesses with more than 50 employees to create a database for worker representatives to be able to access …
OUT-LAW.COM, 04 Apr 2014
Homer Simpson confronts rigged voting machine

Interview: Michael Cordover, voteware freedom-of-information crusader

A barrister has offered pro bono assistance to Michael Cordover, the Hobart Solicitor seeking the source code to the EasyCount software used by the Australian Electoral Commission (AEC) to count votes in the nation's senate elections. Cordover first sought the source code last year because, as he told The Register, “I have …
Simon Sharwood, 15 Jul 2014

NSA SOURCE CODE LEAK: Information slurp tools to appear online

The NSA has decided to let the public have a peek at what it's been up to, for a change, by promising to release some of its data analysis tools under an open-source license. On Tuesday, intelligence-gobbling agency said it hopes to make the code to NiFi – a project previously known internally as Niagarafiles – available as an …
Neil McAllister, 25 Nov 2014

Leaked Syrian log files reveal attempts to starve rebels of information

Syria's Bashar al Assad-led regime blocked scores of legitimate services and entire network regions in its bid to scrub out access to sites such as Reddit, Google and Skype, the first analysis of the nation's web filtering reveals. Research by three Sydney researchers from National ICT Australia (NICTA), together with three …
Darren Pauli, 28 Nov 2014

NSW Information Commissioner sends email to wrong list

The Information Commissioner in the Australian state of New South Wales, an officer whose job it is to offer and enforce best information management practice for the State, has apologised after sending an email to the wrong list. The email in question advised of a conference at which the Commissioner, Deirdre O’Donnell, is due …
Simon Sharwood, 20 Nov 2012
The Register breaking news

Obama cybersecurity order mandates better information sharing

RSA 2013 President Obama's executive order on cybersecurity means security officers at critical infrastructure companies will get greater clearances from the government to access its information, says a Department of Homeland Security honcho. The "unprecedented" executive order, which Obama revealed during his State of the Union address …
Jack Clark, 25 Feb 2013
The Register breaking news

Caldicott: NHS workers should 'have the confidence to share information'

Dame Fiona Caldicott, who is scrutinising the government's plan to hand NHS patient records to private companies, today gave the proposals the thumbs-up - with a few caveats, naturally. The noted psychiatrist's review [PDF] of the data-sharing scheme was published just minutes ago. Her report, drafted in March, follows Health …
Kelly Fiveash, 26 Apr 2013
The Register breaking news

Information teleportation goes large-scale

Quantum teleportation of information between quantum objects, like photons, is so well-understood that it’s almost routine. Now, an international physicists is claiming to have carried out the same trick in the macro universe. If the experiment can be replicated, it will be an impressive trick. The scientists, led by Jian-Wei …

VMware's tool to harden virtual networks: a spreadsheet

VMware has released a guide to hardening its NSX virtual networking and product. The guide published online by VMware information security professional Pravin Goyal, covers management, control and data planes. It recommends including audit logs and system events in backups, enabling and securing remote logging for the NSX …
Darren Pauli, 14 Oct 2014
The Register breaking news

Understanding the make-up of information management

On demand On January 25th, Regcast presenter Jon Collins was joined by Freeform Dynamics’ Martha Bennett, Jason Frost from Blueprint, and Will Thompson from Microsoft for our very first live event of 2012. The thing that brought our panel together was the necessary evil that is - information management in business. Our latest Reg research …
Miatta Momoh, 03 Feb 2012
Double Facepalm; when one facepalm is not enough.

Oz fed police in PDF redaction SNAFU

You can't make this stuff up: one of the lead agencies involved in agitating for Australia to implement a data retention regime has fallen prey to not knowing how to properly redact information in PDFs. The Guardian Australia which broke the story, saying documents the AFP provided to parliament contained the sensitive …

Northern Ireland website leaves front door open, spills users' data

The creators of this Irish website may be fluent in the language of the Emerald Isle, but they are distinctly unversed in computer security. The Líofa (Fluent) website – a UK government project [PDF] – suffered not so much a data breach as a data giveaway. Users' personal information such as names, addresses, emails and phone …
Jennifer Baker, 18 Nov 2014
australia

Tech policy battle: Australian Industry Group vs. Information Industries Association

Two big lobby groups have just released their visions for Australia's future economy, and agree on the need for reform that will help Australia's technology sector to improve its performance. Let's start with business lobby group The Australian Industry Group (AIG), which this morning published its 10 point plan for a strong and …
The Register breaking news

Creating information management Initiatives that deliver

Live broadcast On March 13th at 11:00GMT El Reg front-man Jon Collins is packing our studio with some information management experts that we hope will give you a leg-up on your BI initiatives. Tony Lock from Freeform Dynamics is coming along with a stash-bag of findings from the latest research that many of you took part in. We’ve also got …
Phil Mitchell, 07 Mar 2012
Tesla Model S family e-car

Telstra scores deal to drive data to Teslas

Australian buyers of the Tesla model S will become customers of the nation's dominant telco, Telstra, after the two companies announced a deal. The Tesla S famously includes a 17-inch touch screen into which all sorts of data pours to power services like mapping and real-time traffic updates. Telstra's mobile networks will be …
Simon Sharwood, 17 Dec 2014
Photo of Kim Jong-un using an archaic computer

Brits to teach Norks hacks about 'multimedia websites'. 5% of DPRK is in for a TREAT

A group of North Korean journalists will visit the UK next year to "observe how multimedia websites work at British media companies". The Foreign and Commonwealth Office-funded project Inside Out: Working in North Korea to connect its journalists to the internet world aims to give North Korean journalists a greater understanding …
Kat Hall, 01 Dec 2014
Hidden Bing developer ad

Yahoo, Bing beg 'right to be forgotten' wipers: Don't FORGET about US

Amid the growing number of demands by netizens for Google to remove their out-of-date information under the controversial "right to be forgotten" ruling, it seems other search engines are keen to remind us not to forget them, too. Earlier this year the EU's Court of Justice ruled that individuals have a "right to be forgotten" …
Kat Hall, 01 Dec 2014

Australia to 'relieve' telcos of need to disclose intercepts

Updated The federal government's “red tape repeal” policy looks set to reduce the amount of information Australians receive about telecommunications interception requests. Deep in the bills designed to reduce telecommunications service providers' regulatory compliance costs is a proposal to repeal the record-keeping requirement that …

PRE-SPLINTERED Symantec's Q2 revenue slips, net profit rises

Symantec has reported mixed second quarter results, with revenue down one per cent on the year, but net profit rising by the same amount. The company saw revenue of $1.62bn for its second fiscal 2015 quarter, compared with revenue of $1.64bn a year ago (a fall of one per cent), and $1.74bn in the previous quarter. Net profit of …
Chris Mellor, 06 Nov 2014
Angry woman on mobile

Cheapo telcos fined for their cheapo security: Financial records on 305,000 people spilled

American watchdog the FCC is fining a pair of US mobile operators for an astonishing lack of security in handling customer information. The commission said that TerraCom Wireless and YourTel Wireless improperly stored information on 305,000 customers and will have to pay a joint fine of $10m split between the two firms as a …
Shaun Nichols, 25 Oct 2014

US, China, ink tariff-free technology trade pact

The United States of America and the People's Republic of China have agreed to abolish tariffs on each other's technology products. Announced at the Asia-Pacific Economic Co-operation (APEC) summit in Beijing on Monday, the deal won't immediately mean unfettered access for US and Chinese companies, because the agreement was …
Simon Sharwood, 12 Nov 2014
eyeofSauron

Oz metadata retention won't include URLs: report

Updated The Australian government has reportedly circulated a private brief outlining how it intends to define “metadata”, according to The Australian. There are some snippets of new information in the copy of the document seen by The Oz: while the government is apparently excluding “content” from the data retention scheme, it now seems …
Laurel and Hardy on the phone

Stupid humans and their EXPENSIVE DATA BREACHES

UK data breaches are increasingly being traced back to human error, despite the growing emphasis on data protection. A Freedom of Information (FOI) request to data privacy watchdogs at the Information Commissioner’s Office (ICO) revealed that a quarter of reported data breaches during the first three months of 2014 were caused …
John Leyden, 05 Dec 2014

India to develop an API for entire government

India has released a “Policy on Open APIs for Government of India” (PDF) that calls on the nation's government to develop APIs to let departments share information with each other and with the public. Many of India's government agencies are infamously moribund and Indians bemoan the short working hours, can't-do attitude and …
Sydney harbour bridge poking out of the clouds

Australia mandates* cloud use by government agencies

Australia's Department of Finance has updated its Cloud Policy to say “... agencies now must adopt cloud”. Those italics are the Department's, and it also has some qualifications for the edict, namely that cloud should only be adopted “where it is fit for purpose, provides adequate protection of data and delivers value for money …
Simon Sharwood, 08 Oct 2014

Taiwan: Top tech giants must stop playing fast and loose with privacy

A Taiwanese watchdog claims 12 of the world's largest makers of cellphones have broken laws safeguarding privacy. The state's National Communications Commission, which has probed several tech giants, wouldn't name all of the accused – but officials at the regulator mentioned Apple, Xiaomi, Samsung, Sony and HTC, according to the …
Shaun Nichols, 05 Dec 2014

Exercise-tracking app not QUITE fit for purpose

Popular fitness app MyFitnessPal, used by 65 million people, has fixed a vulnerability that exposed personal information including date of birth records. The profiles allowed users to fill out their private location data including country, state, and city but not street-level addresses for the purposes of linking neighbours. …
Darren Pauli, 22 Sep 2014

UK.gov SLASHES ICT frameworks by more than HALF

The government is cutting the number of its ICT frameworks from 26 down to just 10 - a move that has been criticised for leaving SMEs in the dark. The strategy will initially reduce the number of frameworks down to 16, but as more agreements expire that number will decrease to 10. The new frameworks will typically last for …
Kat Hall, 16 Dec 2014
High risk

Data retention means telcos risk Privacy Act breach, Pilgrim warns

Australia's privacy watchdog Timothy Pilgrim has warned that indiscriminate metadata collection would place personal information at risk of privacy breaches. Under the presently broad and opaque proposal, telcos could be required to at least hold data on Australians that would link them to their internet protocol addresses in a …
Darren Pauli, 11 Aug 2014
Renault 4 from Belgium in Weststraat, Aardenburg gtl 1100 1980

Égalité, Fraternité - Oui, peut-etre. Liberté? NON, French speedcam Facebookers told

A judge in France has slapped a month-long driving ban on 15 people for posting info about speed cameras on Facebook. The court in Rodez, a small town north-east of Toulouse in the south of France, took a very literal interpretation of article R413-5V of the French rules of the road, which makes it illegal to alert drivers to …
Jennifer Baker, 08 Dec 2014

SPLITTERS! Symantec cleft in twain

The reports have been confirmed: Symantec CEO Michael Brown will split the unwieldy business into separate security and information management concerns, thus undoing the 2004 Veritas acquisition. Brown has moved quickly after his confirmation in the role to lift the cleaver. The San Andreas-style fault running through the heart …
Chris Mellor, 10 Oct 2014

Knives out for new EU rules forcing govts to reveal hacker attacks

Talks began on a new computer security law for Europe on Tuesday night. National ministers, the European Commission and MEPs got together for the first time in an attempt to nail down the wording in the proposed Network and Information Security (NIS) Directive. When it was proposed by the commission early last year, the draft …
Jennifer Baker, 14 Oct 2014

Silver-tongued phish bait lures execs, hooks M&A deals

A hacking group has been stealing identity information and reading emails to get the inside edge on stock markets to buy and sell to make quick profits. Vendor FireEye reckons the group sent articulate phishing emails with malicious attachments demonstrating "deep" knowledge of financial markets and corporate communications. In …
Darren Pauli, 02 Dec 2014
The Internet from the IT Crowd

The IT Crowd's internet in a box gets $240k of crowdcash for a cause

Back in February we reported on a crew called Outernet and its plan to float a network of tiny satellites to deliver internet access around the world and in the process “bypass censorship, ensure privacy, and offer a universally-accessible information service at no cost to global citizens.” Outernet's made some progress towards …
Simon Sharwood, 21 Nov 2014
The Register breaking news

Still got too much Information

Part 2 Welcome back to Reg Ltd, where Graham finally has his trousers on. But there's crisis in the air: ahead of the annual meeting, Ronald's slashing budgets and threatening to take the company bowling. How can Microsoft cloud technologies smooth the process of planning the budgets? How can Emily hang on to her share? We can't do …
Phil Mitchell, 25 Oct 2011

Britain's MPs ask Twitter, Facebook to keep Ts&Cs simple

UK politicos have called upon social media firms to simplify their privacy policies and come clean about how they use customers' personal data. The Science and Technology Committee has concluded an inquiry into the terms and conditions users agree to when they sign up for accounts with sites like Twitter or Facebook. It has …
Jasper Hamill, 28 Nov 2014
cookies_eyes_privacy evercookies flash cookies

Device fingerprinting tech: It's not a cookie, but 'cookie' rules apply

Website operators that turn to new "device fingerprinting" technologies to track internet users' behaviour in place of "cookies" have to obtain users' consent in accordance with the same EU legal standards that apply to the use of cookies, an EU privacy watchdog has said. In a new opinion it has issued, the Article 29 Working …
OUT-LAW.COM, 02 Dec 2014
Files

Twitter: Hey. Remember us? Hello, yes. Govts want to spy on us too!

Twitter has seen government requests for user information climb nearly 50 per cent over the last six months. The company said in its semi-annual transparency report that over the first half of 2014, governments from 54 countries made requests for account information. Eight of those countries were requesting data for the first …
Shaun Nichols, 01 Aug 2014

Craigslist pushes punters to YouTube, hacker site

Craigslist is asking users to flush their DNS after one or more pranksters twice changed the DNS records of the popular flesh and furniture classifieds site so it redirects users to a website and video. The attack, launched on 23 November, saw some users to some pages redirected to a site previously used in 2008 to sell stolen …
Darren Pauli, 25 Nov 2014
Tim Cook Apple CEO with glowing green eyes, dark glasses a la Demon Headmaster

Chinese hackers slurp iCloud passwords, Apple's CEO jumps into his jet for China

Apple boss Tim Cook has met top Chinese officials following a major attack on the security of the iCloud website – an assault that some security analysts have blamed on Beijing. Cook was snapped in full demon headmaster mode heading into a pow-wow with Vice Premier Ma Kai. According to the Xinhua news agency, the issues of " …
Jasper Hamill, 22 Oct 2014
Breach

Australian E-Health records breached twice in the last year

Australia's Office of the Information Commissioner (OAIC) has released its Annual report of the Information Commissioner’s activities in relation to eHealth 2013–14, complete with a report on two data breaches in the systems used to store personally controlled electronic health records (PCEHRs). The first was notified in …
Simon Sharwood, 29 Oct 2014
The Blue Mosque in Istanbul

HSBC Turkey WON'T reissue cards despite 2.7 MILLION account details going AWOL

HSBC Turkey has confessed to a security breach exposing the details of 2.7m credit card accounts but the bank has made a decision not to reissue cards after deciding that the data exposed is not enough to make fraudulent transactions. The compromise – limited to the international bank's business in Turkey – exposed credit card …
John Leyden, 14 Nov 2014

Adobe spies on readers: EVERY DRM page turn leaked to base over SSL

Adobe has tweaked its Digital Editions 4 desktop ebook reader to now encrypt the data it secretly sends back to headquarters – data that details a user's reading habits. Previously, information on every single tome accessed by Digital Editions 4 was phoned home unencrypted, allowing anyone eavesdropping on a network to intercept …
Iain Thomson, 23 Oct 2014
hands waving dollar bills in the air

Hewlett Foundation lays out MEELLIONS on security

The Hewlett Foundation has found US$45m in its other jacket, and has anointed three lucky US universities to spend on security research. MIT, Stanford and UC Berkeley will share the simoleons, in a program MIT says is designed to generate a “robust marketplace of ideas”, whatever that is. On a more pragmatic basis, the …
Pingdom Europe Google Data Center Map

Google's 'Right to be forgotten' roadshow is just a 'distraction' – EU digital rights group

European digital rights group EDRi will boycott the last day of Google’s right to be forgotten roadshow on Tuesday because it believes the search giant has “misrepresented the whole issue”. As an example, the group pointed to the search giant's Transparency Report, in which it refers to "URL removal requests" rather than the …
Jennifer Baker, 04 Nov 2014

Loss of unencrypted back-up disk costs UK prisons ministry £180K

The UK's Ministry of Justice has been fined £180,000 following the latest in a series of failures involving how prisons handle private information. The penalty (PDF) follows the loss of a back-up hard drive at HMP Erlestoke prison in Wiltshire back in May 2013. The *unencrypted* hard drive contained sensitive and confidential …
John Leyden, 26 Aug 2014

Yorkshire man NICKS 1,000 Orange customer records. Court issues TINY FINE

A man who attempted to illegally access the passwords and login details of more than 1,000 Orange customers has been fined just £500 for his actions. The Information Commissioner's Office said that the 25-year-old company director Matthew Devlin was handed the financial penalty after he appeared before Calderdale Magistrates' …
Kelly Fiveash, 12 Nov 2014

Google ordered to tear down search results from its global dotcom by French court

In one of the first rulings of its kind, a French court last month ordered Google to remove links to defamatory information from its search results globally. Up to now, most rulings have limited themselves to the local top level domain – such as Google.fr. However, the decision of the High Court in Paris was that this would be …
Jennifer Baker, 03 Oct 2014