Articles about Information

Parliament House Canberra by Flickr user OzMark17 used under CC Share and Share alike licence

Information Technology Supplier Advocate job abolished

Australia has abolished its Information Technology Supplier Advocate, a Canberra-based role designed to help small biz jump through the hoops of government contracting. The incumbent, Don Easter, finishes work next Monday. The position of Information Technology Supplier Advocate was created in 2010 when, as Labor Senator Kate …
Simon Sharwood, 23 Jun 2014
The Rugby Tuning Coil

The Information Age: A day out for grown-up children?

Exhibition Review The Science Museum's new Information Age gallery opened in October to great fanfare. Most of that fanfare, however, was concerned with an elderly lady having sent a tweet, rather than the substance of the exhibition itself. Youtube Video So, with the Christmas holidays upon us, and a pressing need to find things to fill up the …
Nigel Whitfield, 06 Dec 2014

French firms: You want us to compile DATABASES... of our SECRET information?

Businesses in France are being asked to compile a database of commercially sensitive information that will potentially attract increased interest from cyber criminals. Changes to employment laws in the country will require businesses with more than 50 employees to create a database for worker representatives to be able to access …
OUT-LAW.COM, 04 Apr 2014
Homer Simpson confronts rigged voting machine

Interview: Michael Cordover, voteware freedom-of-information crusader

A barrister has offered pro bono assistance to Michael Cordover, the Hobart Solicitor seeking the source code to the EasyCount software used by the Australian Electoral Commission (AEC) to count votes in the nation's senate elections. Cordover first sought the source code last year because, as he told The Register, “I have …
Simon Sharwood, 15 Jul 2014

NSA SOURCE CODE LEAK: Information slurp tools to appear online

The NSA has decided to let the public have a peek at what it's been up to, for a change, by promising to release some of its data analysis tools under an open-source license. On Tuesday, intelligence-gobbling agency said it hopes to make the code to NiFi – a project previously known internally as Niagarafiles – available as an …
Neil McAllister, 25 Nov 2014

Leaked Syrian log files reveal attempts to starve rebels of information

Syria's Bashar al Assad-led regime blocked scores of legitimate services and entire network regions in its bid to scrub out access to sites such as Reddit, Google and Skype, the first analysis of the nation's web filtering reveals. Research by three Sydney researchers from National ICT Australia (NICTA), together with three …
Darren Pauli, 28 Nov 2014

NSW Information Commissioner sends email to wrong list

The Information Commissioner in the Australian state of New South Wales, an officer whose job it is to offer and enforce best information management practice for the State, has apologised after sending an email to the wrong list. The email in question advised of a conference at which the Commissioner, Deirdre O’Donnell, is due …
Simon Sharwood, 20 Nov 2012
The Register breaking news

Obama cybersecurity order mandates better information sharing

RSA 2013 President Obama's executive order on cybersecurity means security officers at critical infrastructure companies will get greater clearances from the government to access its information, says a Department of Homeland Security honcho. The "unprecedented" executive order, which Obama revealed during his State of the Union address …
Jack Clark, 25 Feb 2013
The Register breaking news

Caldicott: NHS workers should 'have the confidence to share information'

Dame Fiona Caldicott, who is scrutinising the government's plan to hand NHS patient records to private companies, today gave the proposals the thumbs-up - with a few caveats, naturally. The noted psychiatrist's review [PDF] of the data-sharing scheme was published just minutes ago. Her report, drafted in March, follows Health …
Kelly Fiveash, 26 Apr 2013
The Register breaking news

Information teleportation goes large-scale

Quantum teleportation of information between quantum objects, like photons, is so well-understood that it’s almost routine. Now, an international physicists is claiming to have carried out the same trick in the macro universe. If the experiment can be replicated, it will be an impressive trick. The scientists, led by Jian-Wei …
Morgan Stanley

Morgan Stanley fires rookie for stealing thousands of fat cats' financial files

Morgan Stanley has confirmed it sacked one of its financial advisers after he allegedly stole confidential data on up to 350,000 clients – information which then appeared online. According to the New York Times, in mid-December Morgan Stanley found on Pastebin sensitive information regarding 1,200 accounts belonging to 900 …
Iain Thomson, 06 Jan 2015
medical_doctor_health_channel

Turn your head and cough (up your details), HealthCare.Gov has sprung a leak!

Researchers have spotted a security lapse on the healthcare.gov site that leaves users vulnerable to data harvesting. The Associated Press and the EFF report that the site is providing some personal information about visitors to third-party advertisors. According to the researchers, the healthcare.gov site provides advertising …
Shaun Nichols, 22 Jan 2015
The Register breaking news

Understanding the make-up of information management

On demand On January 25th, Regcast presenter Jon Collins was joined by Freeform Dynamics’ Martha Bennett, Jason Frost from Blueprint, and Will Thompson from Microsoft for our very first live event of 2012. The thing that brought our panel together was the necessary evil that is - information management in business. Our latest Reg research …
Miatta Momoh, 03 Feb 2012

VMware's tool to harden virtual networks: a spreadsheet

VMware has released a guide to hardening its NSX virtual networking and product. The guide published online by VMware information security professional Pravin Goyal, covers management, control and data planes. It recommends including audit logs and system events in backups, enabling and securing remote logging for the NSX …
Darren Pauli, 14 Oct 2014
Double Facepalm; when one facepalm is not enough.

Oz fed police in PDF redaction SNAFU

You can't make this stuff up: one of the lead agencies involved in agitating for Australia to implement a data retention regime has fallen prey to not knowing how to properly redact information in PDFs. The Guardian Australia which broke the story, saying documents the AFP provided to parliament contained the sensitive …
australia

Tech policy battle: Australian Industry Group vs. Information Industries Association

Two big lobby groups have just released their visions for Australia's future economy, and agree on the need for reform that will help Australia's technology sector to improve its performance. Let's start with business lobby group The Australian Industry Group (AIG), which this morning published its 10 point plan for a strong and …

Northern Ireland website leaves front door open, spills users' data

The creators of this Irish website may be fluent in the language of the Emerald Isle, but they are distinctly unversed in computer security. The Líofa (Fluent) website – a UK government project [PDF] – suffered not so much a data breach as a data giveaway. Users' personal information such as names, addresses, emails and phone …
Jennifer Baker, 18 Nov 2014
The Register breaking news

Creating information management Initiatives that deliver

Live broadcast On March 13th at 11:00GMT El Reg front-man Jon Collins is packing our studio with some information management experts that we hope will give you a leg-up on your BI initiatives. Tony Lock from Freeform Dynamics is coming along with a stash-bag of findings from the latest research that many of you took part in. We’ve also got …
Phil Mitchell, 07 Mar 2012

Definitions matter. For crying out loud, securobods, BE SPECIFIC – ENISA

Definitions matter when your infrastructure is under threat says European Union Agency for Network and Information Security (ENISA). ENISA’s latest report, published on Thursday, concludes that there is an increase in the occurrence of routing threats, DNS threats and DDoS attacks to internet infrastructure. Its advice? Get your …
Jennifer Baker, 15 Jan 2015
FBI badge and gun

FBI has its fingers deep in NSA surveillance pie, declassified report shows

The FBI had, and most likely still has, a much closer involvement with the NSA’s mass surveillance programs than previously thought – with access to raw foreign intelligence and data on Americans gleaned from the PRISM program. The 231-page report, from the Department of Justice’s Inspector General, was obtained – albeit in a …
Iain Thomson, 13 Jan 2015
The Child Catcher

Edu-apps may be STALKING YOUR KIDS, feds warn

The US Federal Trade Commission (FTC) is warning parents after the discovery of possible user-tracking activity by educational software for children. The commission said that some children's education software, such as that marketed by China-based BabyBus, appears to be collecting locational data from users and possibly tracking …
Shaun Nichols, 22 Dec 2014
Angry old man

Hackney council leaked thousands of locals' data in FoI blunder

Thousands of Hackney residents are fuming after their personal information was leaked by the council online in a bungled Freedom of Information request. Details including addresses, rental accounts and sexuality of 15,000 Hackney Homes tenants and leaseholders were available in full from the website What Do They Know for nearly …
Tesla Model S family e-car

Telstra scores deal to drive data to Teslas

Australian buyers of the Tesla model S will become customers of the nation's dominant telco, Telstra, after the two companies announced a deal. The Tesla S famously includes a 17-inch touch screen into which all sorts of data pours to power services like mapping and real-time traffic updates. Telstra's mobile networks will be …
Simon Sharwood, 17 Dec 2014
Photo of Kim Jong-un using an archaic computer

Brits to teach Norks hacks about 'multimedia websites'. 5% of DPRK is in for a TREAT

A group of North Korean journalists will visit the UK next year to "observe how multimedia websites work at British media companies". The Foreign and Commonwealth Office-funded project Inside Out: Working in North Korea to connect its journalists to the internet world aims to give North Korean journalists a greater understanding …
Kat Hall, 01 Dec 2014

Australia to 'relieve' telcos of need to disclose intercepts

Updated The federal government's “red tape repeal” policy looks set to reduce the amount of information Australians receive about telecommunications interception requests. Deep in the bills designed to reduce telecommunications service providers' regulatory compliance costs is a proposal to repeal the record-keeping requirement that …
Hidden Bing developer ad

Yahoo, Bing beg 'right to be forgotten' wipers: Don't FORGET about US

Amid the growing number of demands by netizens for Google to remove their out-of-date information under the controversial "right to be forgotten" ruling, it seems other search engines are keen to remind us not to forget them, too. Earlier this year the EU's Court of Justice ruled that individuals have a "right to be forgotten" …
Kat Hall, 01 Dec 2014
medical_doctor_health_channel

NHS refused to pull 'unfit for purpose' Care.data leaflet

The mishandling of the controversial Care.data scheme – intended to extract data from GP records and effectively share it with world+dog – was in part due to the refusal of NHS England to recall an ill-informed public leaflet from the printers, an independent oversight body has revealed. Care.data was supposed to begin in spring …
Kat Hall, 07 Jan 2015

Wikileaks: We DO NOT approve of OUR secret stuff being LEAKED

WikiLeaks is demanding answers from Google after learning that the company handed user information to the FBI and didn't acknowledge the incident for more than two years. The whisteblowing site on Monday issued an open letter to Eric Schmidt asking the former Google CEO and current chairman to explain when and where it gave law …
Shaun Nichols, 27 Jan 2015

PRE-SPLINTERED Symantec's Q2 revenue slips, net profit rises

Symantec has reported mixed second quarter results, with revenue down one per cent on the year, but net profit rising by the same amount. The company saw revenue of $1.62bn for its second fiscal 2015 quarter, compared with revenue of $1.64bn a year ago (a fall of one per cent), and $1.74bn in the previous quarter. Net profit of …
Chris Mellor, 06 Nov 2014
Angry woman on mobile

Cheapo telcos fined for their cheapo security: Financial records on 305,000 people spilled

American watchdog the FCC is fining a pair of US mobile operators for an astonishing lack of security in handling customer information. The commission said that TerraCom Wireless and YourTel Wireless improperly stored information on 305,000 customers and will have to pay a joint fine of $10m split between the two firms as a …
Shaun Nichols, 25 Oct 2014

US, China, ink tariff-free technology trade pact

The United States of America and the People's Republic of China have agreed to abolish tariffs on each other's technology products. Announced at the Asia-Pacific Economic Co-operation (APEC) summit in Beijing on Monday, the deal won't immediately mean unfettered access for US and Chinese companies, because the agreement was …
Simon Sharwood, 12 Nov 2014
eyeofSauron

Oz metadata retention won't include URLs: report

Updated The Australian government has reportedly circulated a private brief outlining how it intends to define “metadata”, according to The Australian. There are some snippets of new information in the copy of the document seen by The Oz: while the government is apparently excluding “content” from the data retention scheme, it now seems …
Laurel and Hardy on the phone

Stupid humans and their EXPENSIVE DATA BREACHES

UK data breaches are increasingly being traced back to human error, despite the growing emphasis on data protection. A Freedom of Information (FOI) request to data privacy watchdogs at the Information Commissioner’s Office (ICO) revealed that a quarter of reported data breaches during the first three months of 2014 were caused …
John Leyden, 05 Dec 2014

India to develop an API for entire government

India has released a “Policy on Open APIs for Government of India” (PDF) that calls on the nation's government to develop APIs to let departments share information with each other and with the public. Many of India's government agencies are infamously moribund and Indians bemoan the short working hours, can't-do attitude and …
Sydney harbour bridge poking out of the clouds

Australia mandates* cloud use by government agencies

Australia's Department of Finance has updated its Cloud Policy to say “... agencies now must adopt cloud”. Those italics are the Department's, and it also has some qualifications for the edict, namely that cloud should only be adopted “where it is fit for purpose, provides adequate protection of data and delivers value for money …
Simon Sharwood, 08 Oct 2014
The Register breaking news

Still got too much Information

Part 2 Welcome back to Reg Ltd, where Graham finally has his trousers on. But there's crisis in the air: ahead of the annual meeting, Ronald's slashing budgets and threatening to take the company bowling. How can Microsoft cloud technologies smooth the process of planning the budgets? How can Emily hang on to her share? We can't do …
Phil Mitchell, 25 Oct 2011

Exercise-tracking app not QUITE fit for purpose

Popular fitness app MyFitnessPal, used by 65 million people, has fixed a vulnerability that exposed personal information including date of birth records. The profiles allowed users to fill out their private location data including country, state, and city but not street-level addresses for the purposes of linking neighbours. …
Darren Pauli, 22 Sep 2014

Taiwan: Top tech giants must stop playing fast and loose with privacy

A Taiwanese watchdog claims 12 of the world's largest makers of cellphones have broken laws safeguarding privacy. The state's National Communications Commission, which has probed several tech giants, wouldn't name all of the accused – but officials at the regulator mentioned Apple, Xiaomi, Samsung, Sony and HTC, according to the …
Shaun Nichols, 05 Dec 2014
High risk

Data retention means telcos risk Privacy Act breach, Pilgrim warns

Australia's privacy watchdog Timothy Pilgrim has warned that indiscriminate metadata collection would place personal information at risk of privacy breaches. Under the presently broad and opaque proposal, telcos could be required to at least hold data on Australians that would link them to their internet protocol addresses in a …
Darren Pauli, 11 Aug 2014
Ryanair

Top EU court: Ryanair data barrel must be left unscraped

Irish low-cost airline Ryanair can stop whomever it wishes from scraping content, according to the European Court of Justice (ECJ). PR Aviation – which runs price comparison websites WeGoLo.com and flylowcost.com – had sought to use the EU’s Database Directive to prove that Ryanair was wrong to impose contractual terms …
Jennifer Baker, 15 Jan 2015

UK.gov SLASHES ICT frameworks by more than HALF

The government is cutting the number of its ICT frameworks from 26 down to just 10 - a move that has been criticised for leaving SMEs in the dark. The strategy will initially reduce the number of frameworks down to 16, but as more agreements expire that number will decrease to 10. The new frameworks will typically last for …
Kat Hall, 16 Dec 2014
Renault 4 from Belgium in Weststraat, Aardenburg gtl 1100 1980

Égalité, Fraternité - Oui, peut-etre. Liberté? NON, French speedcam Facebookers told

A judge in France has slapped a month-long driving ban on 15 people for posting info about speed cameras on Facebook. The court in Rodez, a small town north-east of Toulouse in the south of France, took a very literal interpretation of article R413-5V of the French rules of the road, which makes it illegal to alert drivers to …
Jennifer Baker, 08 Dec 2014
Planet of the Apes

Veritas is home. Symantec’s storage split-off adopts old name

Bisecting Symantec has decided after much deliberation that the Veritas brand - the one it torched years ago - will be the monicker for the Information Management business when it splits from the mothership. Security biz Symantec paid $13.5bn for Veritas at the end of 2004, thinking that storage plus security would make a …
Chris Mellor, 28 Jan 2015

SPLITTERS! Symantec cleft in twain

The reports have been confirmed: Symantec CEO Michael Brown will split the unwieldy business into separate security and information management concerns, thus undoing the 2004 Veritas acquisition. Brown has moved quickly after his confirmation in the role to lift the cleaver. The San Andreas-style fault running through the heart …
Chris Mellor, 10 Oct 2014

Knives out for new EU rules forcing govts to reveal hacker attacks

Talks began on a new computer security law for Europe on Tuesday night. National ministers, the European Commission and MEPs got together for the first time in an attempt to nail down the wording in the proposed Network and Information Security (NIS) Directive. When it was proposed by the commission early last year, the draft …
Jennifer Baker, 14 Oct 2014
The Internet from the IT Crowd

The IT Crowd's internet in a box gets $240k of crowdcash for a cause

Back in February we reported on a crew called Outernet and its plan to float a network of tiny satellites to deliver internet access around the world and in the process “bypass censorship, ensure privacy, and offer a universally-accessible information service at no cost to global citizens.” Outernet's made some progress towards …
Simon Sharwood, 21 Nov 2014

Silver-tongued phish bait lures execs, hooks M&A deals

A hacking group has been stealing identity information and reading emails to get the inside edge on stock markets to buy and sell to make quick profits. Vendor FireEye reckons the group sent articulate phishing emails with malicious attachments demonstrating "deep" knowledge of financial markets and corporate communications. In …
Darren Pauli, 02 Dec 2014
New Horizons spacecraft approaching Pluto

FROSTY MISTRESS of the Outer System: Pluto yields to probe snapper

NASA's New Horizons spaceship, which has been on its mission to Pluto for nine years now, is expected to start snapping photos of the icy planet today. The probe has travelled roughly 3 billion miles away from Earth for its closest approach with the dwarf planet expected to take place on 14 July this year. Boffins at the U.S. …
Team Register, 25 Jan 2015

Britain's MPs ask Twitter, Facebook to keep Ts&Cs simple

UK politicos have called upon social media firms to simplify their privacy policies and come clean about how they use customers' personal data. The Science and Technology Committee has concluded an inquiry into the terms and conditions users agree to when they sign up for accounts with sites like Twitter or Facebook. It has …
Jasper Hamill, 28 Nov 2014

Google reveals bug Microsoft says is mere gnat

Google has reported a local file flaw affecting Windows 7 and 8.1 32 and 64 -bit systems in the third vulnerability dropped since a spat with Microsoft erupted last week. The vulnerability that allowed a malicious Server Message Block version 2 server to force a client to open arbitrary local files was marked high severity by …
Darren Pauli, 20 Jan 2015