Are Social Networks Inherently Democratizing? “Libya is not Egypt, it is not Tunisia.” It’s an observation recently made by many – no less in this quote than by Saif al-Islam, son of Libyan autocrat Moammar Gadhafi. Unlike Tunisia, there’s less national and more tribal identity in Libya. Unlike Egypt, there are no strong Libyan institutions […]
Poisoning the Internet
William Ide – Washington A group of computer hackers hijacked websites run by the Voice of America this week, sending its online traffic to an Internet website claimed to be run by the “Iranian Cyber Army”. The attack comes as the U.S. government is renewing its push to promote freedom in cyber space and as […]
Future War
Jennifer Glasse | London A new OECD cyber-security study by British professors says cyber weaponry will be used routinely in future wars. The study says computer attacks on their own will not necessarily constitute a threat, but a coordinated attack – or in combination with more computer attacks – could have serious consequences. Read more […]
Chasing Secrets
Once a Secret is Out of the Bag, Can It Ever Go Back In? Kate Woodsome | Washington, D.C The U.S. Justice Department is reportedly considering whether to file espionage charges against the WikiLeaks Web site and its founder Julian Assange. The case has raised broad legal questions about how the government will protect the […]
Reach Out and Touch Someone…From Prison
How Mobile Phones are Increasingly Becoming a Threat in Jails Andrew McIntyre is no school boy. As the BBC reports, he had been convicted on numerous firearms and drug-related charges and was serving an eight-month sentence behind bars. But that wasn’t enough to slow McIntyre’s burgeoning drug business. From his jail cell he was able […]
The Keys To The Kingdom
…And Why HTML5 May Be A Hacker’s Dream Andy Greenberg over at Forbes’ “Firewall” has this curtain-lifter from next week’s Black Hat conference on Internet security. Greenberg reports that one of next week’s presenters, security researcher (a.k.a. “reformed hacker”) Lavakumar Kuppan will demonstrate HTML5’s enhancements will also give malicious hackers to access other users browsers […]
The First Strike in Cyber-War
The Stuxnet worm has been neutralized, but not before it may have done its damage. But what’s to come? More attacks, and more sophisticated cyber-weapons, are safe bets. Read Martin Secrest’s full report by clicking here.
The Tweet That Shook The World
Armed with little more than a flammable message, pastor Terry Jones set the Internet on fire recently when he announced he planned to burn copies of the Quran at his Florida church. He now says he doesn’t intend to follow through on his threat, but damage has already been done. With few followers and fewer […]
What Is Wikileaks?
How One Website is Changing Journalism Wikileaks first came online in 2007, promising any individual a forum to anonymously publish previously classified, hidden or sensitive documents and make them publicly available. The idea was relatively simple: given the viral nature of the Internet – and the ease of duplicating digital documents – once secret information […]