Oct
20

The state of internet policy making in Ethiopia

From: CyberEthiopia

Kinfe Michael Yilma, a scholar at Brunel University London UK, discusses Ethiopia’s internet policies and participation in internet governance forums.

Ethiopia is among those countries with the lowest level of internet penetration and use. A 2014 World Internet Stats report, for instance, claims that Ethiopia has had only 1.9% internet penetration. Similarly, the World Economic Forum also rated the number of internet users in Ethiopia at 1.1%, ranking the country 142 out of 144 countries surveyed in 2012/13. As of December 31, 2013, that number had only risen to 5.5%, according to a report released by the Ethiopian government. Indeed, it was only in 1997 that Ethiopia introduced the internet, and not until 2005 that the first four thousand kilometers of fiber optic backbone were laid in Addis Ababa. This delay in the proliferation of the internet has played a role in delaying the development of internet policies including legislative measures surrounding the internet.

Oct
17

U.S. Delegation to the International Telecommunication Union Plenipotentiary Conference in Busan, Republic of Korea

From: US Department of State

Ambassador Daniel Sepulveda, U.S. Coordinator for International Communications and Information Policy, is leading the U.S. delegation to the International Telecommunication Union (ITU) 2014 Plenipotentiary Conference, which takes place from October 20-November 7 in Busan, Republic of Korea.

Other members of the U.S. delegation include Federal Communications Commission Chairman Tom Wheeler, FCC Commissioner Michael O’Reilly, Permanent Representative of the United States of America to the United Nations and other International Organizations in Geneva Pamela Hamamoto, State Department Coordinator for Cyber Issues Christopher Painter, Assistant Secretary of Commerce for Communications and Information and Administrator of the National Telecommunications and Information Administration Lawrence E. Strickling, Dr. Andy Ozment Ozment, Assistant Secretary, Office of Cybersecurity and Communications, Department of Homeland Security, and officials of the National Aeronautics and Space Administration and the Department of Defense.

Oct
15

Why the government needs access to your data

From: betaNews

By Paul Cooper

We are in Brussels at the 27th annual Information Security Solutions Europe Conference (ISSE), one of Europe’s largest gatherings of cyber security experts.

Troels Oerting of the Danish police gave a fascinating opening keynote defending the right of the police to use surveillance over the Internet. It certainly ruffled some feathers in Brussels, but here are some of the highlights so you can make up your own mind.

At the moment I’m taking a lot of flak from privacy people on the Internet, because I want police and law enforcement to have access to people’s data on the Internet.

Oct
14

J.P. Morgan CEO: Cybersecurity Spending to Double

From: The Wall Street Journal

James Dimon Appears on Panel in First Public Remarks Since Throat Cancer Treatment

By Emily Glazer

J.P. Morgan Chase JPM -0.93% & Co. Chairman and Chief Executive James Dimon said the bank would double spending on cybersecurity over the next five years, his first public remarks following the data breach that hit the nation’s largest bank this summer.

Mr. Dimon was speaking in his first public appearance since July, when he disclosed that he had been diagnosed with throat cancer.

Oct
13

Obama Said to Warn of Crippling Cyber Attack Potential

From: Fox Business

By

President Barack Obama believes cyber terrorism is one of the biggest threats to national security and says the White House is bracing for a possible doomsday scenario if hackers can successfully penetrate government and business computer systems, the FOX Business Network has learned.

The president shared his thoughts on cyber terrorism last week, during a fundraising tour in New York City and a stop in Greenwich Conn., according to people who attended the events. At the same series of events, the president also downplayed the threat of a large Ebola outbreak in the United States, citing the nation’s medical infrastructure as the main reason the deadly virus hasn’t spread as it has in West Africa, these people say.

Oct
10

Cyberattacks trigger talk of ‘hacking back’

From: The Washington Post

By Craig Timberg, Ellen Nakashima and Danielle Douglas-Gabriel

The recent rash of cyberattacks on major U.S. companies has highlighted the scant options available to the victims, who often can do little more than hunker down, endure the bad publicity and harden their defenses in hopes of thwarting the next assault.

But behind the scenes, talk among company officials increasingly turns to an idea once considered so reckless that few would admit to even considering it: Going on the offensive. Or, in the parlance of cybersecurity consultants, “hacking back.”

Read Complete Article

Oct
08

Xi calls on PLA to step up information security to counter growing cyber threat

From: South China Morning Post

Central Military Commission, chaired by the president, says military information security is a key part of building a strong army

Laura Zhou

President Xi Jinping has called for the country’s military to promote home-grown security systems to boost military information security.

The directive, issued by the supreme Central Military Commission which is chaired by Xi, is designed to act as a guideline for the People’s Liberation Army (PLA) and People’s Armed Police.

It stipulates military information security is a key part of building a strong army.

Read Complete Article

Oct
03

Cigarette Smuggling and Cyber Security: Low-Tech Crimes Fund High-Tech Threats

From: CircleID

By Bruce Levinson

You may not connect the cheap cigarettes sold under the counter (or out of a trunk, bodega or by a street vendor) with the mysterious charges on your credit card that you don’t remember making or the cash that has, somehow, just disappeared from your bank account. You also may not connect that website selling cheap cigarettes made in second and third world countries with Shellshock or whatever the fashionably scary cyber-threat of the day is when you’re reading this. But the Russian mafia and other Transnational Criminal Organizations and Foreign Terrorist Organizations understand the connections quite well. Criminals around the world know that tobacco trafficking is a lucrative, low risk way of raising cash that can be used to fund narcotics deals, arms smuggling, human trafficking and, more recently, the theft of credit card and banking data.

Oct
02

US security firm reports ‘malicious, fake’ smartphone apps spy on Hong Kong protesters

From: Associated Press via StarTribune

HONG KONG — The Chinese government might be using smartphone apps to spy on pro-democracy protesters in Hong Kong, a U.S. security firm said.

The applications are disguised as tools created by activists, said the firm, Lacoon Mobile Security. It said that once downloaded, they give an outsider access to the phone’s address book, call logs and other information.

The identities of victims and details of the servers used “lead us to believe that the Chinese government are behind the attack,” said a Lacoon statement.

Sep
30

China clears iPhone 6 for sale only after security tweaks

From: GoodGearGuide

A Chinese regulator has claimed it found security flaws in Apple’s iOS software that could steal user’s data

Michael Kan (IDG News Service)

China has effectively cleared the iPhone 6 for sale in the country, granting the product a license, but not before a government regulator demanded Apple make some security changes in the iOS operating system to fix suspected flaws in the software.

China’s Ministry of Industry and Information Technology (MIIT) recently granted the iPhone 6 a network access license, the government regulator said in an online posting on Tuesday, following weeks of speculation about the delay in the approval.

Older posts «