Security Alerts & News
by Tymoteusz A. Góral

History
#195 ISPs want “flexible” privacy rules that let them “innovate” with customer data
Broadband industry lobby groups urged the Federal Communications Commission on Thursday not to impose privacy rules that dictate "specific methods" of protecting customer data, since that would prevent "rapid innovation."
#194 Tribunal rules computer hacking by GCHQ is not illegal
GCHQ (UK Government Communications Headquarters) is operating within the law when it hacks into computers and smart phones, a security tribunal has ruled.
#193 Big data privacy must be fixed before the revolution can begin
Big data is an asset which can create tens of thousands of jobs and generate hundreds of billions for the economy, but the opportunity can't be taken until concerns about privacy and security have been overcome.
#192 Women may write better code, study finds
The US researchers analysed nearly 1.4 million users of the open source program-sharing service Github. They found that pull requests - or suggested code changes - made on the service by women were more likely to be accepted than those by men.
#191 Your smart, IoT toaster really will be spying on you for the government
The boom in Internet of Things (IoT) devices -- especially those ones with poor security -- is going to be good news for spies, according the director of US intelligence.
#190 KillDisk and BlackEnergy Are Not Just Energy Sector Threats
New intelligence on BlackEnergy expands previous findings on the first wide-scale coordinated attack against industrial networks. Based on our research that we will further outline below, attackers behind the outages in two power facilities in Ukraine in December likely attempted similar attacks against a mining company and a large railway operator in Ukraine.
#189 A Worldwide Survey of Encryption Products Report (PDF)
In 1999, a group of researchers from George Washington University attempted to survey the worldwide market for encryption products [HB+99]. The impetus for their survey was the ongoing debate about US encryption export controls. By collecting information about 805 hardware and software encryption products from 35 countries outside the US, the researchers showed that restricting the export of encryption products did nothing to reduce their availability around the world, while at the same time put
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12