Sales Of Public Data To Marketers Can Mean Big $$ For Governments

"Spokesperson Andrew Cole confirms the Secretary of State sells business information for monetary amounts ranging from $200 to $12,000, depending on frequency and amount of information requested. The Secretary of State also sold voter registration information — including names, addresses and political party affiliation of voters — for $58,000, last year. The Denver Clerk and Recorder made $32,000 last year selling home sale data. It happens in college, too. The University of Colorado Boulder buys names from the SAT for 33 cents each and names from the ACT for 34 cents each. CU sells student information to private meal plans and storage companies for $15,000 a year." Continue reading

Continue ReadingSales Of Public Data To Marketers Can Mean Big $$ For Governments

Sure, You Can Steal Bitcoins. But Good Luck Laundering Them

"Bitcoin is a bit of a paradox. It can be used nearly anonymously: any two people can easily set up brand new Bitcoin wallets, meet in a park, and exchange cash for Bitcoin. But at the same time, Bitcoin trades are public: all transactions are shared in a publicly available file called the Blockchain that’s posted to the Bitcoin peer-to-peer network. That public ledger makes it pretty tough for big-time criminals to launder money through the network. At least that’s what researchers at the University of California and George Mason University found when they studied the Bitcoin network by developing sophisticated tools to track how money was moving around it." Continue reading

Continue ReadingSure, You Can Steal Bitcoins. But Good Luck Laundering Them

U.S. and China announce cybersecurity collaboration amid hacking dispute

"China and the US, which are embroiled in a bitter dispute over hacking, have agreed to set up a cybersecurity working group, US Secretary of State John Kerry said on Saturday. 'All of us, every nation, has an interest in protecting its people, protecting its rights, protecting its infrastructure,' he told reporters on a visit to Beijing. 'Cybersecurity affects everybody,' he said. 'It affects airplanes in the sky, trains on their tracks, it affects the flow of water through dams, it affects transportation networks, power plants, it affects the financial sector, banks, financial transactions. So we are going to work immediately on an accelerated basis on cyber.'" Continue reading

Continue ReadingU.S. and China announce cybersecurity collaboration amid hacking dispute

The Pentagon: Angry Birds Hold the Key to Our Security

"'The digital battlefield has to be as easy to navigate as an iPhone,' writes Wired magazine’s Noah Shachtman. 'The attacks have to be as easy to launch as an Angry Bird.' Mr. Shachtman points out that U.S. cyberoffensives have taken months of planning and have required small specialized units. Instead, the Pentagon wants 'munitions made of 1s and 0s to be as simple to launch as ones made of metal and explosives.' The Pentagon has brought in 'designers behind some of Apple’s most famous computers — with assistance from the illustrators who helped bring Transformers to the silver screen.' The DoD will shell out $16.1 billion in contract money to conduct their cyber makeover." Continue reading

Continue ReadingThe Pentagon: Angry Birds Hold the Key to Our Security

New York Times says outage ‘most likely result of malicious external attack’

"The New York Times said its website went down Tuesday after what appeared to be a 'malicious external attack.' A security researcher said there were indications that the Syrian Electronic Army, which has attacked several media organizations, was the culprit. Matt Johansen of WhiteHat Security said in a tweet that the technical aspects of the website during the outage were 'pointing to Syrian Electronic Army.' The Washington Post website was hacked this month in an attack blamed on the Syrian Electronic Army, a group that backs embattled strongman Bashar al-Assad." Continue reading

Continue ReadingNew York Times says outage ‘most likely result of malicious external attack’

Meet the men who spy on women through their webcams

"RAT operators have nearly complete control over the computers they infect; they can (and do) browse people's private pictures in search of erotic images to share with each other online. They even have strategies for watching where women store the photos most likely to be compromising. Women who have this done to them, especially when the spying escalates into blackmail, report feeling paranoia. One woman targeted by the California "sextortionist" Luis Mijangos wouldn't leave her dorm room for a week after Mijangos turned her laptop into a sophisticated bugging device. Mijangos began taunting her with information gleaned from offline conversations." Continue reading

Continue ReadingMeet the men who spy on women through their webcams

U.S. tech sector feels pain from NSA PRISM revelations

"An industry group, the Cloud Security Alliance said last month that 10 percent of its non-US members have cancelled a contract with a US-based cloud provider, and 56 percent said they were less likely to use an American company. A separate report this month by the Information Technology & Innovation Foundation, or ITIF, a Washington think tank, said US cloud providers stand to lose $22 billion to $35 billion over the next three years due to revelations about the so-called PRISM program. Daniel Castro, author of the report, says a loss of trust in US tech firms could lead to 'protectionist' measures that hurt the fast-growing cloud sector." Continue reading

Continue ReadingU.S. tech sector feels pain from NSA PRISM revelations

Passing Over Eisenhower

"Almost all of the major Internet industry giants are based in the United States. The tradition of strong entrepreneurship practiced in the US since their inception, mixed with their purchasing power and history of acquiring any sufficiently profitable venture or fascinating technology from abroad, has put the US into a prime position to be the global leader in provision of Internet services. That may just have ended. While US dominance over the roughly $11 trillion/year global Internet services market is still unchallenged, the damage that the revelations made about NSA’s vast global surveillance scheme may stymie their growth and perhaps even turn them into a localized recession." Continue reading

Continue ReadingPassing Over Eisenhower

Is Windows 8 a Trojan Horse for the NSA? The German Government Thinks So

"The German Government is now deeply suspicious that the Trusted Platform Module (TPM) technology built into a growing number of Windows 8 PCs and tablets is creating a gigantic back door for NSA surveillance, leaked documents have suggested. During TCG meetings, German officials appear to have expressed concern about the potential for abuse but were 'rebuffed,' Zeit claims. The documents also refer to the NSA having representation at the meetings and the statement 'the NSA agrees' in the context of leaving the technology in its current (presumably unreformed) state." Continue reading

Continue ReadingIs Windows 8 a Trojan Horse for the NSA? The German Government Thinks So

‘Data is the new oil’: Tech giants may be huge, but nothing matches big data

"'Data is the new oil,' declared Clive Humby, a Sheffield mathematician who with his wife, Edwina Dunn, made £90m helping Tesco with its Clubcard system. Though he said it in 2006, the realisation that there is a lot of money to be made – and lost – through the careful or careless marshalling of 'big data' has only begun to dawn on many business people. About 90% of all the data in the world has been generated in the past two years (a statistic that is holding roughly true even as time passes). There are about 2.7 zettabytes of data in the digital universe, where 1ZB of data is a billion terabytes (a typical computer hard drive these days can hold about 0.5TB, or 500 gigabytes)." Continue reading

Continue Reading‘Data is the new oil’: Tech giants may be huge, but nothing matches big data