Skip to main content

Home/ ARIN6902 Internet Cultures and Governance/ Group items tagged cyber

Rss Feed Group items tagged

Sarah Manson

Google Attacks Highlight Growing Problem of Cyber Security Threats | Science and Techno... - 0 views

  •  
    This article is dealing with the recent disclosure by Google that it had fallen victim to a cyber attack. It renews the growing sentiment that a global response to the issue of cybersecurity is needed with particular emphasis on the cooperation between the government and business sectors.
  •  
    Interesting comparison was made in this article regarding President Obama's priorities. It stated that "Obama has made cyber security a top priority for his administration, and has listed the threat from cyber weapons along with other weapons of mass destruction - such as nuclear, chemical and biological weapons." Is it fair to make a comparison between the threat of nuclear weapons and threats which exist within the world of computers?
Stephen Murphy

BBC NEWS | Americas | US launches cyber security plan - 0 views

  •  
    A short and sweet introduction in to the developing cyber security threat and the vision behind Barack Obamas Cyber security plan launched in May 2009.
Elizabeth Gan

Check the Hype - There's No Such Thing As 'Cyber' - 0 views

  •  
    This article discusses the terminology "cyber" versus "online" as a method to frighten people. The manner in which we speak on the Internet has changed greatly, and as a result, this article ponders the legitimacy of the use of this word, for example, "cyberbully," "cyberwar," are terms or tactics to instill some sense of fear into the masses regarding the security on the Internet. "When that kind of fear-mongering is needed to loosen the purse strings for computer security, only one word will do...Cyber."
Stephen Murphy

Cyber Espionage 2.0 - 0 views

  •  
    Highly detailed white paper on the underworld of cyber-espionage. Multinational corporation and state sponsored - all explore this backbone of the internet to get an advantage. Note: This gets quite technical at times. Very eye opening considering the recent events with the Australian/China cyber attacks on government and corporate targets.
Gina Spithakis

Cyber virus targets online banking log-ins - 0 views

  •  
    Banks were the target of the clampi cyber virus which basically stole the online banking details of those using infected computers
Elizabeth Gan

Hackers: not just geeks, but activists - 0 views

  •  
    It's quite interesting that the term "hackers" was often deemed negative. However, in this following article, the discussion of "White hat" hackers vs. "Black hat" introduces the idea that cyber security/cyber espionage in the online world can also be saved by the same breed that seek to do criminal activies. These white hat hackers were able to uncover a Chinese-based espionage ring that had been gleaning sensitive information: visa applications. People no longer simply hold posters chanting and marching against the "man," rather, they stick it to them, by strengthening the masses in the online world.
anonymous

China-Based Hackers may Have used Twitter, Google to Attack Dalai Lama - 0 views

  •  
    This article (posted yesterday) is about the announcement of a huge China-based cyber espionage which stole thousands of documents - including classified information, visa applications, and personal identities - from "politically sensitive targets" around the world using platforms such as Twitter, Google Groups, Blogspot, Baidu Blogs, blog.com and Yahoo Mail to maintain persistent control of infected computers. Among the targets: the offices of the Dalai Lama, the United Nations as well as Indian and Pakistani government officials. Also available in this article, a report document of 58 pages about "Investigating Cyber Espionnage" (scribd application)
Bec Crew

Man Avoids Jail in First Cyber Bullying Case - 0 views

  •  
    Another case of cyber bullying that led to the suicide of a teenager, Allem Halkic, who was sent threatening texts and Internet communication by former friend, Shane Phillip Gerada. Gerada received an 18-month community-based order after pleading guilty to stalking Allem. Another move towards the governance of threatening behaviour via the Internet.
Search and More

Network security( Penetration testing) : cyber-crime is costing the UK's small businesses - 0 views

  •  
    It's a well-known fact that small businesses are more susceptible to cyber-crime than many of their larger counterparts. A lack of funding and resources means that few small to medium-sized businesses can afford to pay for vulnerability assessments or penetration testing of their network security.
Allison Jones

Cyber terrorism - 1 views

  •  
    Most hacking activities are not reported by the websites that are victim to it, most probably so as not to scare the public. In this article, filmmaker Phillip Mora looks at the activities of hackers and cyber terrorists, likening the potentialities to the Holocaust and 9/11.
Bujuanes Livermore

Iran arrests 30 over U.S.-linked cyber ring: report - 1 views

  •  
    Iran has arrested 30 people suspected of belonging to a U.S.-linked cyber network gathering information on Iranian nuclear scientists and sending people abroad for training, a news agency reported on Saturday.
Elizabeth Gan

Telling the difference - 0 views

  •  
    This webpage discusses the differences between cyber-bullying and harassment and cyberstalking. The main difference between a cybebully and cyber-harassment is age. Though this depends on jurisdiction, and the definition by law in that region. The article continues to discuss the types, sources, and nature of threats through cyberbullying. If the perpatrator is traceable, the best advice given is to report to the service provider about violation of terms of service, and contacting local authorities.
Javier Velandia

Cyber bullying cases put heat on Google, Facebook - 0 views

  •  
    This article show how companies like Google, Facebook, are facing judgments from the public that blame them for the latest cases of Cyber-bulling. They defend themselves arguing that the number of users has grow fast and is impossible to control all the contents. However social networks are using auto regulating mechanism like reporting abuse. The preoccupation raises in how the main idea of free expression that internet provides could be destroyed by the "freedom abuse".
Elizabeth Gan

War game reveals U.S. lacks cyber-crisis skills - 0 views

  •  
    This article discusses how a simulated war game called "Cyber ShockWave" can turn any electronic item, for example, cell phone or computer can be "weapons" used to shut down the Internet during terrorist attack. The notion of privacy and civil liberties, should expect to be ceased for Americans during a crisis of that level. During this mock scenario, it was revealed that "[The United States] don't have the authority in this nation as a government to quarantine people's cellphones." Which during a state of emergency brings to question if Internet carriers should allow their networks to be monitored. How secure is online security, and who is the enemy, becomes difficult to discern, as any threat to national security arises.
Nikki Bradley

Law falling behind cyber bullying trend - ABC News (Australian Broadcasting Corporation) - 0 views

  •  
    There is a call for specific cyber bullying laws to be introduced on Australia.  A recent case that led to the suicide of a 17 year old boy led to the sentencing of a man to a community service order. The Government has agreed that more needs to be done to empower and protect victims.
Elizabeth Gan

Cyber bully whose victim suicided avoids jail - 0 views

  •  
    This article discusses the repercussions and impacts of threatening text messages that resulted in a teen suicide. Although the bully expressed remorse, the tragedy clearly marks how words are simply devastating, even if they seem trivial to others. Prosecution and Cyber bullying laws should examine the severity of the crime, and provide adequate justice.
Sarah Manson

Cyber mafia out to steal your identity - dnaindia.com - 1 views

  •  
    The cybersecurity threat in India is demonstrated in Symantec's Internet Security Threat Report that outlined the latest threat for computers which involves the Trojan viruses sending confidential data to a host server. This information is then used by cyber mafia to carry out financial transactions in various countries resulting in identity theft.
Tamsin Lloyd

New laws to target cyber bullies - 0 views

  •  
    The Federal Government introduces anti-harassment laws for online harrasment. It points out, interestingly, that whilst a 16 year old has protection under current laws 15 year olds don't. It will be interesting to see how this works in practice.
Bec Crew

New Laws to Target Cyber Bullies - 1 views

  •  
    In an attempt by the government to modernise the 25-year-old Sex Descrimination Act, new laws have been made to protect teenagers from cyber-bullying acts such as sexting and online harrassment. It also protects breastfeeding women and gives men the same protection as women in the workplace when it comes to family responsibilities.
Allison Jones

http://www.guardian.co.uk/world/2010/may/23/us-appoints-cyber-warfare-general - 1 views

  •  
    Increasing "probes" on US military networks has led to the appointment of a senior general to Cyber Command operations and approximately 30,000 troops have been re-assigned from IT support to "the frontlines of cyberwarfare". The US is increasingly anxious about the vulnerability of its networks to attack. Chinese, Russian and Korean hackers have been targeted as alleged attackers so far. There is concern that cyberwarfare techniques being used by the US are outpacing the ability to develop policy surrounding their use.
1 - 20 of 54 Next › Last »
Showing 20 items per page