Symantec, a computer security, antivirus, backup and SSL provider, wrote an article about the effect that new generic top-level domains (gTLDs) will have on SSL certificates. There are already many new gTLDs that have been released by ICANN and there will be potentially over a thousand new gTLDs available in the next couple of …
According to a south African’ internet blog, The Draft Online Regulation Policy proposed by the Film and Publication Board (FPB) is far-reaching and absolute in its censorship, with little clarity on practical implementation. This is according to commentators on a recent Carte Blanche insert about the Internet censorship which will accompany the bill. The FPB published …
[Editors note: Please welcome Farzaneh Badii, from Hamburg University’s Graduate School in Law and Economics, who joins Syracuse University’s iSchool and the IGP as a Visiting Doctoral Student for the next six months.] “Lord, deliver us from all evil and from French state justice.”[1] This was the French farmers’ prayer once their parliament and state got …
Foreign intelligence agencies are targeting IT workers at big businesses to gain access to sensitive information, MI5 warns British corporations Security service warns of the threat posed to firms by members of staff Fears junior IT workers could infiltrate systems and sell vital information Could also upload malicious software to cause a business serious harm …
In view of its growing cyber security concerns, India has decided to challenge the U.S. government’s control over the Internet and ensure that the trio of the U.S., Russia and China does not ignore India’s concerns while developing an international regime for Internet governance. India will also push for storing all Internet data within the …
In 2008, two security researchers at the DefCon hacker conference demonstrated a massive security vulnerability in the worldwide internet traffic-routing system — a vulnerability so severe that it could allow intelligence agencies, corporate spies or criminals to intercept massive amounts of data, or even tamper with it on the fly. The traffic hijack, they showed, …
Summary: From Facebook to Adobe, 2013 has been a tough year for companies looking to defend against cybercrime. Media Outlets: The New York Times, The Wall Street Journal In January this year, The New York Times, having been the victim of persistent attacks, experienced a breach which lasted four months. A sophisticated Chinese hacking team …
NEW DELHI: With an aim to protect information and build capabilities to prevent cyberattacks, the government released the National Cyber Security Policy 2013 to safeguard both physical and business assets of the country. “…policy is a framework document and it gives you a broad outline of what our vision is…the real task or the challenge …
Barack Obama will confront Chinese president Xi Jinping next week over a spate of cyber-attacks on the US, including the latest allegation that Chinese hackers gained access to more than two dozen of America’s most advanced weapons systems. The alleged cyber-attacks are the most serious of a series of issues creating friction between the US …
WASHINGTON, D.C.— Senators John D. (Jay) Rockefeller IV, Chairman of the Senate Commerce, Science, and Transportation Committee, Tom Carper, incoming Chairman of the Senate Homeland Security and Governmental Affairs Committee, and Dianne Feinstein, Chairman of the Senate Select Committee on Intelligence, today released the following statement on the introduction of S. 21, the Cybersecurity and American …