Source: Graham Webster, Al Jazeera
Last week, after the Washington Post reported that numerous Washington institutions in and outside government have experienced hacking attributed to China, the Post’s excellent political writer Ezra Klein had an unfortunate foray into commentary on Chinese elite politics.
@citizenlab Twitter to WordPress posts.
Source: BBC News
Italy’s former Prime Minister Silvio Berlusconi has been convicted and sentenced to a year in jail over an illegal wiretap.
Source :Security Week
Ryan Naraine talks to Vupen CEO Chaouki Bekrar about the controversies surrounding the sale of zero-day vulnerabilities and exploits, his company’s business dealings and the work that goes into winning the CanSecWest Pwn2Own hacker contest.
The Indian Space Research Organization (ISRO) is planning its next remote sensing satellite.
ICANN has released a “living” graphic aimed to provide a high-level view of how the internet is run attuned for those less familiar with the inner workings of the internet infrastructure ecosystem.
Source: Chris Bronk, The New York Times
“There’s no cyberwar without a real war,” argues cryptographer Bruce Schneier. Yet some sort of cyberconflict with China is afoot.
Source: Josh Halliday, The Guardian
Cyber criminals have targeted government officials in more than 20 countries, including Ireland and Romania, in a complex online assault seen rarely since the turn of the millennium.
Source: The Verge
Two decades after computer security began generating billions by selling expertise and software designed to protect unwanted network intrusions, experts say those networks are more vulnerable than ever.
Source: The Globe and Mail
The political leader of exiled Tibetans is calling on Canada’s ambassador for religious freedom to investigate religious repression and suicide in his homeland, squeezing the week-old post into a tricky diplomatic position.
Cell phone searches are a common law enforcement tool, but up until now, the public has largely been in the dark regarding how much sensitive information the government can get with this invasive surveillance technique.