Feeds

Articles about Information

Parliament House Canberra by Flickr user OzMark17 used under CC Share and Share alike licence

Information Technology Supplier Advocate job abolished

Australia has abolished its Information Technology Supplier Advocate, a Canberra-based role designed to help small biz jump through the hoops of government contracting. The incumbent, Don Easter, finishes work next Monday. The position of Information Technology Supplier Advocate was created in 2010 when, as Labor Senator Kate …
Simon Sharwood, 23 Jun 2014

French firms: You want us to compile DATABASES... of our SECRET information?

Businesses in France are being asked to compile a database of commercially sensitive information that will potentially attract increased interest from cyber criminals. Changes to employment laws in the country will require businesses with more than 50 employees to create a database for worker representatives to be able to access …
OUT-LAW.COM, 04 Apr 2014
Homer Simpson confronts rigged voting machine

Interview: Michael Cordover, voteware freedom-of-information crusader

A barrister has offered pro bono assistance to Michael Cordover, the Hobart Solicitor seeking the source code to the EasyCount software used by the Australian Electoral Commission (AEC) to count votes in the nation's senate elections. Cordover first sought the source code last year because, as he told The Register, “I have …
Simon Sharwood, 15 Jul 2014

NSW Information Commissioner sends email to wrong list

The Information Commissioner in the Australian state of New South Wales, an officer whose job it is to offer and enforce best information management practice for the State, has apologised after sending an email to the wrong list. The email in question advised of a conference at which the Commissioner, Deirdre O’Donnell, is due …
Simon Sharwood, 20 Nov 2012
The Register breaking news

Obama cybersecurity order mandates better information sharing

President Obama's executive order on cybersecurity means security officers at critical infrastructure companies will get greater clearances from the government to access its information, says a Department of Homeland Security honcho. The "unprecedented" executive order, which Obama revealed during his State of the Union address …
Jack Clark, 25 Feb 2013
The Register breaking news

Caldicott: NHS workers should 'have the confidence to share information'

Dame Fiona Caldicott, who is scrutinising the government's plan to hand NHS patient records to private companies, today gave the proposals the thumbs-up - with a few caveats, naturally. The noted psychiatrist's review [PDF] of the data-sharing scheme was published just minutes ago. Her report, drafted in March, follows Health …
Kelly Fiveash, 26 Apr 2013
The Register breaking news

Information teleportation goes large-scale

Quantum teleportation of information between quantum objects, like photons, is so well-understood that it’s almost routine. Now, an international physicists is claiming to have carried out the same trick in the macro universe. If the experiment can be replicated, it will be an impressive trick. The scientists, led by Jian-Wei …
Double Facepalm; when one facepalm is not enough.

Oz fed police in PDF redaction SNAFU

You can't make this stuff up: one of the lead agencies involved in agitating for Australia to implement a data retention regime has fallen prey to not knowing how to properly redact information in PDFs. The Guardian Australia which broke the story, saying documents the AFP provided to parliament contained the sensitive …
australia

Tech policy battle: Australian Industry Group vs. Information Industries Association

Two big lobby groups have just released their visions for Australia's future economy, and agree on the need for reform that will help Australia's technology sector to improve its performance. Let's start with business lobby group The Australian Industry Group (AIG), which this morning published its 10 point plan for a strong and …
The Register breaking news

Understanding the make-up of information management

On January 25th, Regcast presenter Jon Collins was joined by Freeform Dynamics’ Martha Bennett, Jason Frost from Blueprint, and Will Thompson from Microsoft for our very first live event of 2012. The thing that brought our panel together was the necessary evil that is - information management in business. Our latest Reg research …
Miatta Momoh, 03 Feb 2012
The Register breaking news

Creating information management Initiatives that deliver

On March 13th at 11:00GMT El Reg front-man Jon Collins is packing our studio with some information management experts that we hope will give you a leg-up on your BI initiatives. Tony Lock from Freeform Dynamics is coming along with a stash-bag of findings from the latest research that many of you took part in. We’ve also got …
Phil Mitchell, 07 Mar 2012
eyeofSauron

Oz metadata retention won't include URLs: report

The Australian government has reportedly circulated a private brief outlining how it intends to define “metadata”, according to The Australian. There are some snippets of new information in the copy of the document seen by The Oz: while the government is apparently excluding “content” from the data retention scheme, it now seems …
High risk

Data retention means telcos risk Privacy Act breach, Pilgrim warns

Australia's privacy watchdog Timothy Pilgrim has warned that indiscriminate metadata collection would place personal information at risk of privacy breaches. Under the presently broad and opaque proposal, telcos could be required to at least hold data on Australians that would link them to their internet protocol addresses in a …
Darren Pauli, 11 Aug 2014
Files

Twitter: Hey. Remember us? Hello, yes. Govts want to spy on us too!

Twitter has seen government requests for user information climb nearly 50 per cent over the last six months. The company said in its semi-annual transparency report that over the first half of 2014, governments from 54 countries made requests for account information. Eight of those countries were requesting data for the first …
Shaun Nichols, 01 Aug 2014

Loss of unencrypted back-up disk costs UK prisons ministry £180K

The UK's Ministry of Justice has been fined £180,000 following the latest in a series of failures involving how prisons handle private information. The penalty (PDF) follows the loss of a back-up hard drive at HMP Erlestoke prison in Wiltshire back in May 2013. The *unencrypted* hard drive contained sensitive and confidential …
John Leyden, 26 Aug 2014
Angry woman on mobile

This flashlight app requires: Your contacts list, identity, access to your camera...

A global survey of more than 1,200 mobile apps has discovered that the vast majority (85 per cent) fail to provide basic privacy information. The global survey faulted apps for accessing large amounts of personal information without adequately explaining how they were collecting, using and disclosing personal information. Almost …
John Leyden, 11 Sep 2014

Racing Post escapes ICO fine after leaking info of 677K punters

UK sports-betting newspaper the Racing Post has received a stern warning – but not a fine – after it emerged that it had aired the private details of more than 677,000 customers as the result of a security breach last year. The October 2013 snafu resulted in the exposure of the names, addresses, passwords, dates of birth and …
John Leyden, 28 Aug 2014

FTC: We didn't robocall you and thousands of others asking for bank details. IT'S A TRAP!

The FTC says it has shut down a massive robocall operation that gathered personal information and bank account details on thousands of people. The US watchdog claims a company operating under the name The Cuban Exchange used a combination of calls and fake websites to pose as an "FTC refund" site in order to harvest account …
Shaun Nichols, 10 Sep 2014
The Register breaking news

Still got too much Information

Welcome back to Reg Ltd, where Graham finally has his trousers on. But there's crisis in the air: ahead of the annual meeting, Ronald's slashing budgets and threatening to take the company bowling. How can Microsoft cloud technologies smooth the process of planning the budgets? How can Emily hang on to her share? We can't do …
Phil Mitchell, 25 Oct 2011

Watch this! The changing face of malware

Youtube Video The anti-malware software industry seems to be fighting a losing battle, with Symantec even declaring antivirus "dead". In this online tutorial Darryl MacGregor, principal technologist for information security at IT training biz QA, discusses the best strategies for protecting your information assets in the near …
David Gordon, 21 May 2014

Verizon hit with $7.4 MEEELLION fine for slurping users' privates

Verizon has agreed to pay the US Treasury $7.4m to settle an investigation by the Federal Communications Commission into its failure to tell customers that it was using their personal information for marketing purposes. "In today's increasingly connected world, it is critical that every phone company honor its duty to inform …
Iain Thomson, 03 Sep 2014

Cisco okayed for UK government comms

Cisco has had a bunch of products certified as secure by the GCHQ's information security arm, the Communications & Electronics Security Group (CESG). The certification only covers the products to handle information up to the UK government's “Official” classification – that is, most government information. However, as the …
kidspot

Spammer pops Kidspot tots 'n' cots chatterhub

Users of tots-and-cots website Kidspot are getting weight-loss spam after the site was breached, and only belatedly let customers know what was going on. Hackers in early May made off with a database containing personal information on mums and dads including names, email and postal addresses, and date of birth details for family …
Darren Pauli, 02 Jun 2014
Whale Oil

NZ Justice Minister scalped as hacker leaks emails

A hacker has claimed the scalp of New Zealand Justice Minister Judith Collins by releasing information showing a purported campaign to undermine government officials. The revelations, revealed last month, came from a hacker known as RawShark (@whaledump), who broke into the email account of conservative blogger Cameron Slater. …
Darren Pauli, 01 Sep 2014
usb nuclear button hub

Nuke regulator hacked three times in three years

The US Nuclear Regulator Commission (NRC) has been hacked three times in as many years, according to documents obtained under freedom of information requests. Unnamed foreign hackers sent hundreds of phishing emails - targeting 215 staff in one incident alone - in what was dubbed a 'credential harvesting campaign', according to …
Darren Pauli, 19 Aug 2014
Spin

Firm issues soft denial against Iron Dome hack

An Israeli defence firm linked to Israel's Iron Dome missile defence platform has denied reports it was hacked by Chinese attackers who made off with information on the military technology. Israel Aerospace Industries (IAI) spokeswoman Eliana Fishler said in statement emailed to outlets including The Register that reports it had …
Darren Pauli, 30 Jul 2014
The US Cyber Command official seal

What is ex-NSA spyboss selling for $1m a month, asks US congressman

Representative Alan Grayson (D-FL) is pushing for a formal investigation into the activities of General Keith Alexander now that the former head of the NSA has started his own very expensive security consultancy. There is no evidence of any wrongdoing by Gen Alexander. Last week it was reported that Alexander, who retired from …
Iain Thomson, 26 Jun 2014
GCHQ as seen on Google Earth

Show us your Five-Eyes SECRETS says Privacy International

Privacy International has taken the “Five-Eyes” spying issue to court, filing a demand that the agreements between participant countries – the US, the (currently) UK, Canada, Australia and New Zealand – be made public. As its filing states, the court action follows a freedom of information (FOI) request for information about the …

Google: Glass goggles are a 'fairly lousy surveillance device'

Google's creepy Glass wearable could breach Britain's Data Protection law, the Information Commissioner's office has warned. The ad giant began flogging the device in Blighty this week for £1,000 a pop. That move prompted the country's data watchdog to outline the "privacy implications of wearable technology" in a blog post …
Kelly Fiveash, 27 Jun 2014
wheat

Seedy hacker steals 1300 Monsanto client and staff records

Monsanto has admitted credit card data along with names, addresses and US taxation information for 1300 customers and employees was compromised in after hackers broke into its servers. The March breach affected Monsanto's Precision Planting division which manufactured specialist farming equipment. It came as the agriculture …
Darren Pauli, 02 Jun 2014

China cracks down on instant messengers: Users must hand over REAL NAMES

China has tightened rules regulating the use of instant messengers, forcing users to reveal their real names when registering so their identities can be linked to their content. In much the same way as with social networks – although clearly for different reasons – the State Internet Information Office (SIIO) is requiring users …

Grabby baddie scours Paddy Power's towers: 650k punters leaked and it took 4 years to admit it

Irish bookmakers Paddy Power has admitted miscreants copied from its systems more than 649,000 customer records containing personal information. The snaffled dataset contained names, usernames, addresses, email addresses, phone contact numbers, date of birth, and security question and answer pairs. The leaked data comes from …
John Leyden, 31 Jul 2014
The Register breaking news

Secunia bets on open information for security growth

Danish vulnerability specialist developer Secunia has released the latest beta of its Personal Software Inspector (PSI), and says it is betting on an open approach to security information to grow the company. Founder Niels Henrik Rasmussen told The Register that his company will continue to work on open information sharing with …
Iain Thomson, 02 Mar 2012

Troll or thief? User claims Bitcoin founder Satoshi Nakamoto dox sabotage

An internet user has claimed to have hacked the email account of the entity thought to be behind the Bitcoin - Satoshi Nakamoto -and has offered to release personal details for $12,000. Nothing is known about the identity of the claimed hacker and there is little evidence that they had details of Nakamoto to hand. Evidence for …
Darren Pauli, 10 Sep 2014
GCHQ road sign

GCHQ names the Hogwarts for Hackers

The UK's Government Communications Headquarters (GCHQ) has certified six Masters of Cyber Security degrees. The certifications were issued under the UK's Cyber Security Strategy that, among other things, calls for the nation to “Strengthen postgraduate education to expand the pool of experts with in-depth knowledge of cyber.” …
Simon Sharwood, 04 Aug 2014
The Register breaking news

Driving customer focus with information

Given today's economic background, organisations of all shapes and sizes are recognising they can no longer just spend money on new technology. While prevalent in the past, this approach has led to information and process silos that can be a long way from optimal. With quantities of information continuing to increase, but with …
Phil Mitchell, 29 Nov 2011
steve jobs

Does this float your boat? Dead Steve Jobs to hijack yachts from BEYOND THE GRAVE

Apple cofounder Steve Jobs shuffled off this mortal coil in 2011, but his name is living on in patent filings. The patient and endearing CEO is listed as a co-inventor in a US patent application that describes a handheld gadget remotely controlling a large boat. The filing sets out a system in which a tablet or smartphone can …
Shaun Nichols, 18 Sep 2014
Parliament House Canberra by Flickr user OzMark17 used under CC Share and Share alike licence

Voteware source code requester labelled 'vexatious'

Australia's Electoral Commission (AEC) has again denied a request to reveal the source code of the software used to count votes in Senate elections, and pointed out the the man seeking it that he may be a vexatious applicant abusing the freedom of information process. Hobart Lawyer Michael Cordover first tried to view the source …
Simon Sharwood, 04 Jul 2014

Microsoft, eBay apps open to man-in-the-middle diddle

At least 350 Android apps are open to man-in-the-middle MITM attacks, thanks to code that fails to validate certificates over secure sockets layer (SSL), says US Computer Emergency Response (CERT) security pro Will Dormann. The apps can be found in the Google Play and Amazon stores and have been included in a continually updated …
Darren Pauli, 05 Sep 2014
management regulation2

Royal Commission probes Cbus over CFMEU privacy leaks

Australia's Royal Commission into union corruption will today examine if superannuation firm Cbus breached the Privacy Act by supplying customer account details to the Construction, Forestry Mining and Energy Union (CFMEU) as part of an alleged union campaign. It has been alleged that Cbus supplied private information on 300 …
Darren Pauli, 07 Jul 2014
south korea

Three quarters of South Korea popped in online gaming raids

Three quarters of South Korea's population have been compromised in a massive data breach affecting 27 million people. The nearly incomprehensible breach was revealed when 16 individual were arrested after selling the records relating to victims aged between 15 and 65 years-old. The records included names account logins …
Darren Pauli, 26 Aug 2014
management regulation2

Redmond resists order to hand over overseas email

Microsoft is holding out against a US court order asking it to provide investigators with customers' personal information held offshore. In late July, Redmond was ordered to hand over emails relating to a US narcotics investigation. Microsoft had argued that since the messages were stored in Ireland, they were beyond the reach …
Cyber friends - Kiwicon 7

Australia and USA strike closer cyber defence alliance

Australia and the United States will forge tighter bonds in information security defence and incident response on the back of a White House meeting between the nation's leaders. The announcement contained scant detail on the arrangement and came as Prime Minister Tony Abbott and President Barack Obama agreed to new defence deals …
Darren Pauli, 13 Jun 2014
Still from Iron Man. Pic: Paramount

T-Mobile US lobs sueball at Huawei: Claims Chinese giant stole robot tech

T-Mobile US has filed a suit accusing Huawei of stealing the tech behind its mobile phone testing robot, nicknamed “Tappy”. The carrier claims that Huawei employees, who were authorised to to use the robot for testing, allegedly stole the software and specs for the ‘bot, including illicit photos of the machine at work, to help …
cable

Hackers' delight: Hotel cyber-cafe, er, business centers, apparently – US Secret Service

The US Secret Service has quietly warned hotels that malware slingers are increasingly targeting PCs in hotel business centers to harvest sensitive information. In a non-public advisory, obtained by investigative journalist Brian Krebs, law enforcement officials have arrested members of a criminal gang that is accused of …
Iain Thomson, 14 Jul 2014

Evidence during FOI disputes can be provided in SECRET

Public bodies defending a decision to withhold information requested under freedom of information (FOI) laws can submit evidence to an information rights tribunal in secret, the Court of Appeal has ruled. The Court said that tribunal rules allow for closed evidence sessions to be conducted, meaning that neither the FOI requester …
OUT-LAW.COM, 05 Aug 2014
Sharing image

ENISA, Europol, strike info-sharing deal

Europe's peak information security body will join forces with the continent's criminal intelligence sharing outift in order to beat down on carders and crackers plaguing Europe. Heads of the European Union Agency for Network and Information Security (ENISA) signed a deal with Europol at the Hague last Thursday to give a …
Darren Pauli, 30 Jun 2014
Data breach image

Who has your credit card data? 1 million HOLIDAY-MAKERS' RECORDS exposed

A UK-based online travel firm has been fined £150,000 over a breach of breach of the Data Protection Act after their "insecure" coding reportedly exposed more than a million customer records to cybercrooks. Think W3 Limited was hacked in December 2012 in an attack that relied on what the ICO described as "insecure" coding on the …
John Leyden, 24 Jul 2014

'ALL information leaks', Samsung exec told us – Nokia splutters in filing

This was the week when a judge ordered a probe into allegations of a confidentiality breach after Samsung execs were said to have viewed secret Apple docs they should never have clapped eyes on. As part of its IP spat with Samsung, Apple had to disclose a number of its patent agreements – with Nokia, Sharp, Philips, Ericsson and …
Jasper Hamill, 04 Oct 2013

Transparency by Telstra: a good start but not enough

Telstra probably thought it was doing the right thing by joining other big names and publishing a transparency report. Instead, it's become a focus of criticism for, in the eyes of 'net freedom advocates, handing over too much customer information on too little pretext. The carrier's report has led to a headline number: more …