DHS Cybersecurity Leader Defends Agency Amid Criticism

The man in charge of running the Department of Homeland Security's cybersecurity efforts has defended its efforts in the face of congressional criticism. Homeland Security undersecretary defends Robert Jamison, the man in charge of coordinated US government cybersecurity efforts on a day to day basis, told El Reg that criticism that the agency was poorly led and failing to deliver results came from lawmakers who were unfamiliar with the agency's operations or future plans.

  • Read the article: The Register

  • Online Comments Criticized in Detah of Chinese Actress

    Though the reasons behind the suicide of one of South Korea's most beloved actresses remain unclear, her death has fueled a debate over how to tackle what are considered the two biggest social problems in South Korea: suicide and so-called cyber-terrorism. Since Choi Jin-sil's death, many high-profile figures have expressed sympathy for her emotional suffering from comments made by online posters.

  • Read the article: Los Angeles Times

  • Google Seeks to Settle Book-Scanning Case for $125 Million

    In another step toward changing the future of books, Google Inc. has reached an agreement with publishers and authors to scan millions of copyrighted titles and post them on the Internet for users to read and print for a fee. Under the agreement, Google will pay $125 million to settle a long-standing class-action lawsuit with the Association of American Publishers and with the Authors Guild, which represents more than 8,000 authors.

  • Read the article: Austin American-Statesman

  • Net Companies Plan "Code" for Free Speech Online

    Google, Microsoft and Yahoo and a group of human rights and public interest organizations plan to introduce a global code of conduct that they say will better protect online free speech and privacy against government intrusion. The principles are the starting point for a new effort, called the Global Network Initiative, which commits the companies to "avoid or minimize the impact of government restrictions on freedom of expression," according to a final draft of documents.

  • Read the article: The New York Times

  • Google Seeks Information from Copyright-Policing Service

    In a motion filed in federal court in Viacom's copyright case against Google, the search engine demands internal records from closely held BayTSP Inc., one of a number of firms that offer copyright-policing services. Since launching its legal attack on Google in 2007, Viacom has leaned heavily on evidence compiled by Los Gatos, Calif.-based BayTSP.

  • Read the article: MarketWatch

  • Companies Partner to Educate on Phishing Scams

    Microsoft, Yahoo, Western Union, and The African Development Bank are partnering to educate Internet users about the dangers of falling prey to the fake lottery winner e-mails. In such scams, victims are told that they have won a lottery, often in a foreign country, and are then asked to provide their personal and financial information to claim the winnings. In the current economic downturn, the fear is that desperate people will be more likely to take the bait.

  • Read the article: CNET News.com

  • Chinese Official Criticizes Microsoft on Anti-Piracy

    A top Chinese copyright official chided Microsoft for launching an anti-piracy tool that nags users of counterfeit software with a black computer screen and said the company's prices were too high. The U.S. software giant launched Windows Genuine Advantage in China last week, a program that turns the background of the Windows operating system's desktop black if the software fails a validation test.

  • Read the article: internetnews.com

  • Officials Probe Computer Searches for "Joe the Plumber"

    Ohio and local officials are investigating if state and law-enforcement computer systems were illegally accessed when they were tapped for personal information about "Joe the Plumber." Samuel Joseph Wurzelbacher became part of the national political lexicon Oct. 15 when Republican presidential candidate John McCain mentioned him frequently during his final debate with Democrat Barack Obama.

  • Read the article: The Columbus Dispatch

  • Indicted TJX Hackers Shed Light on Cybercrooks

    Two men who played key roles in the massive cyberheist at TJX, parent of retailers T.J. Maxx and Marshalls, were involved in different scams tied to TJX, according to their respective indictments. The men's divergent sagas represent bookends of the vast digital crime. According to psychiatrists, hackers and computer-security experts, they represent the vanguard of cybercrooks: young, misguided males who rationalize that they've done nothing wrong.

  • Read the article: USA Today

  • Bryan Adams Pursuing Operators of Unofficial Sites

    Canadian soft rocker Bryan Adams is the latest star to grumble at fans for plastering his name and face on unofficial websites. The crinkly Eighties star and sometime number one slot hogger has enlisted the help of Web Sheriff to convince the likes of bryanadamsfanclub.nl, bryanadams.nu and badfan.com to play nice and agree to a set of guidelines that will allow them to "happily coexist" with Adams.

  • Read the article: The Register

  • Tech Industry Looking Forward to New President

    No matter who wins the White House, Silicon Valley is looking forward to a president who understands the value of technology and innovation -- far better, some would say, than at any time in recent years. Though the campaign has been dominated by other matters, from personal attacks to the overall economy, both John McCain and Barack Obama have vowed to address numerous issues of concern to the tech industry.

  • Read the article: SiliconValley.com

  • Security Flaw Found in Android Phone Software

    Just days after the T-Mobile G1 smartphone went on the market, a group of security researchers have found what they call a serious flaw in the Android software from Google that runs it. One of the researchers, Charles A. Miller, notified Google of the flaw and said he was publicizing it now because he believed that cellphone users were not generally aware that increasingly sophisticated smartphones faced the same threats that plague Internet-connected personal computers.

  • Read the article: The New York Times