Skip to main content

Home/ ARIN6902 Internet Cultures and Governance/ Group items tagged threats

Rss Feed Group items tagged

Sarah Manson

Cyber mafia out to steal your identity - dnaindia.com - 1 views

  •  
    The cybersecurity threat in India is demonstrated in Symantec's Internet Security Threat Report that outlined the latest threat for computers which involves the Trojan viruses sending confidential data to a host server. This information is then used by cyber mafia to carry out financial transactions in various countries resulting in identity theft.
Sarah Manson

Fact Check: Cyberattack threat - CNN.com - 0 views

  •  
    This article is actually looking at the question of whether there is even a cybersecurity threat. It demonstrates that even within government bodies in the US there is no consensus about the level of current threat.
Sarah Manson

Google Attacks Highlight Growing Problem of Cyber Security Threats | Science and Techno... - 0 views

  •  
    This article is dealing with the recent disclosure by Google that it had fallen victim to a cyber attack. It renews the growing sentiment that a global response to the issue of cybersecurity is needed with particular emphasis on the cooperation between the government and business sectors.
  •  
    Interesting comparison was made in this article regarding President Obama's priorities. It stated that "Obama has made cyber security a top priority for his administration, and has listed the threat from cyber weapons along with other weapons of mass destruction - such as nuclear, chemical and biological weapons." Is it fair to make a comparison between the threat of nuclear weapons and threats which exist within the world of computers?
Sarah Manson

AFP: Governments, businesses to discuss cybersecurity threats - 1 views

  •  
    The Worldwide Cybersecurity Summit is taking place in Dallas and will discuss ways to protect the world's digital infrastructure and electronic threats. This summit recognizes the important of creating a coordinated front in order to counter the growing concern of cybersecurity. It will remain to be seen if cooperation between governments is actually possible...not likely.
marinecf

Computers, Children and the Digital Divide | Special English | Learning English - 1 views

  •  
    The author puts forward that giving access to computer to children from developing countries is a remarkable opportunity for them but could alsobe a threat as they are not being familiarised with the dangers of the Internet.
Andra Keay

Google stops censoring in China | The Australian - 1 views

  •  
    tactical withdrawal while maintaining a high threat level? or total showdown?
renae englert

Internet censorship in Australia angers group, causing violent threats. - 2 views

  •  
    Media hyperbole or a serious threat? Threatening posts on the '4chan' boards has the government ad the SMH worried...
  •  
    Although in some respects, the public response to Australia's push to impose mandatory internet filtering, there has been a violent and disturbing response from a select group calling for the assassination of Stephen Conroy and advising on how to make bombs.
anonymous

Australia on internet watchlist with Iran, North Korea - 0 views

  • Paris-based media rights group Reporters Without Borders on Thursday put Australia and South Korea on its list of countries "under surveillance" in its "Internet Enemies"
  • Australia was listed for the government's plan to block access to websites featuring material such as rape, drug use, bestiality and child sex abuse.
  • "This regrettably puts Australia on notice that, despite the Rudd government’s best intentions, any mandatory filtering policy is likely to be perceived internationally in ways that will not benefit our reputation as a free and open society," he said.
  • ...1 more annotation...
  • He cited Australia's plans as an example, saying that there "the wide scope of content prohibited could include socially and politically controversial material".
  •  
    A media rights watchdog has listed Australia in a report on countries that pose a threat of internet censorship.
  • ...1 more comment...
  •  
    A top media rights watchdog has listed Australia along with Iran and North Korea in a report on countries that pose a threat of internet censorship.
  •  
    Why does everyone get so worked up with the word "censorship"? In some cases, like with child porn, if a medium is used to violate a human right or indeed foments a crime, then there should be some sort of control. Why look at it from a b&w perspective when there are so many grey areas?
  •  
    Is this really where Australia's future in censorships is heading?
Stephen Murphy

BBC NEWS | Americas | US launches cyber security plan - 0 views

  •  
    A short and sweet introduction in to the developing cyber security threat and the vision behind Barack Obamas Cyber security plan launched in May 2009.
Tom Berzins

There's more to security risk management than just patching - 0 views

  •  
    With an increasing number of critical systems being placed within virtual environments, security is now understandably a prime concern. Systems can be attacked, and valuable information and assets can be compromised. maybe looking at a Vulnerability management system?
Elizabeth Gan

Telling the difference - 0 views

  •  
    This webpage discusses the differences between cyber-bullying and harassment and cyberstalking. The main difference between a cybebully and cyber-harassment is age. Though this depends on jurisdiction, and the definition by law in that region. The article continues to discuss the types, sources, and nature of threats through cyberbullying. If the perpatrator is traceable, the best advice given is to report to the service provider about violation of terms of service, and contacting local authorities.
Amit Kelkar

European Parliament Rips Global IP Accord | Threat Level | Wired.com - 0 views

  •  
    The European Parliament overwhelmingly voted to explicitly oppose any law or global agreement which would entail ISPs to punish customers for breaches of copyright. They have also demanded that documents surrounding the secret worldwide negotiations, which Australia is also involved in, be released publicly. 
Djordje Veselinovic

When using open source makes you an enemy of the state - 0 views

  •  
    This is a blog posting discussing the International Intellectual Property Alliance (IIPA) which recently added Indonesia, Brazil and India to its 'Special 301 Watchlist' which marks nations as a threat to intellectual property for encouraging their government departments and companies to use open source software
Elizabeth Gan

War game reveals U.S. lacks cyber-crisis skills - 0 views

  •  
    This article discusses how a simulated war game called "Cyber ShockWave" can turn any electronic item, for example, cell phone or computer can be "weapons" used to shut down the Internet during terrorist attack. The notion of privacy and civil liberties, should expect to be ceased for Americans during a crisis of that level. During this mock scenario, it was revealed that "[The United States] don't have the authority in this nation as a government to quarantine people's cellphones." Which during a state of emergency brings to question if Internet carriers should allow their networks to be monitored. How secure is online security, and who is the enemy, becomes difficult to discern, as any threat to national security arises.
César Albarrán Torres

Pennsylvania Attorney General Tries to Unmask Twitter Critics | Threat Level | Wired.com - 0 views

  • An anonymous blogger critical of Pennsylvania Attorney General Tom Corbett plans to challenge a grand jury subpoena ordering Twitter to reveal the blogger’s identity.
  • The bloggers received an e-mail from Twitter on Tuesday evening saying the micro-blogging service would respond to the subpoena (.pdf) in a week “unless we receive notice from you that a motion to quash the subpoena has been filed or that this matter has been otherwise resolved.”
  • In August, however, Google unmasked the operator of the “Skanks in NYC” blog after being subpoenaed by an Australian model who claimed the site defamed her. And on Monday, a federal judge prevented Yahoo from revealing the identity of a message-board poster critical of USA Technologies.
  •  
    Twitter users have been issued subpoenas from Pennsylvania Attorney General Tom Corbett due to the critical comments they've made about the politician. It's interesting how much anonymous comments can make an impact on a public figure's reputation that it forces him to take legal action.  
  •  
    Twitter receives a grand jury subpoena forcing the company to reveal a user's identity. Interesting how this can be done when the stakes are high, when there is a a political subtext under it. Could this set a precedent for defamation cases?
César Albarrán Torres

Hugo Chavez Has a New Title: Blogger - 0 views

  • That’s right, in addition to (surprisingly) getting hip to Twitter, Chavez now has his very own blog.
  • the site basically contains news about meetings with Chinese officials, columns by Fidel Castro (who Chavez has already urged to join Twitter), as well as speeches, photos and videos. In short, this is a pretty standard political website — there’s even a comments section (although all comments are suspiciously positive).
  • This sentiment falls in line with statements he made two months ago when he called for greater regulation of the Internet after a website posted a story falsely suggesting that Diosdado Cabello, a senior minister and close aide of Chavez, had been assassinated.
  •  
    Venezuelan president Hugo Chavez is really into his digital persona. Now he has a blog. Interesting how he has taken social media communications seriously. 
Javier Velandia

Head of judiciary threatens senders of text messages - 0 views

  •  
    The text Messages other threat for the Iranian Government. With that decision some leaders from the opposition argue that this decision is the anxiety of public opinion.
john sega

Online Threats and Dangers - 1 views

I downloaded an audio file from an unpopular website, when I opened it my computer crashed and since then, I have troubles turning it on because it would no longer display the correct desktop setti...

Desktop Computer Support

started by john sega on 11 May 11 no follow-up yet
1 - 18 of 18
Showing 20 items per page