Judge Lets Sony Subpoena Hacker's PayPal Account

A federal magistrate said Sony may subpoena the PayPal account of PlayStation 3 hacker George Hotz, as the gamemaker ratchets up its civil lawsuit against the man who released the first full-fledged PS3 jailbreak in the console’s four-year history. The order came two weeks after Magistrate Joseph Spero in San Francisco granted Sony the right to acquire the internet IP addresses of anybody who had visited Hotz’s website from January of 2009 onward.

  • Read the article: Wired

Internet Advertising Company Settles with FTC

The Federal Trade Commission announced that it has barred Chitika, an online advertiser, from misleading consumers about its privacy policy. The company allows Internet users to opt out of being monitored online when they clicked on ads that Chitika places on websites. But the FTC found that from May 2008 to February 2010, the promised opt-outs lasted only ten days, instead of the promised 10 years.

Lure of Facebook IPO Creates Financial Scams

The wild popularity of Facebook and other social media sites has spawned a cottage industry of con artists promising average investors a chance to cash in on the frenzy through shares in the companies ahead of their initial public offerings. While the pre-IPO offerings may be real, investors must be aware that the people touting them may be frauds, the U.S. Financial Industry Regulatory Authority (FINRA) said.

White House to Push for "Privacy Bill of Rights"

The Obama administration plans to ask Congress to pass a "privacy bill of rights" to protect Americans, amid growing concern about the tracking of Internet users. Lawrence E. Strickling, an assistant secretary of commerce, plans to call for the legislation at a hearing of the Senate Commerce Committee, according to a person familiar with the matter.

Blind Group Wants Justice Department to Probe Google

The National Federation for the Blind requested that the Department of Justice investigate Google for what it considers to be the discriminatory nature of its Google Apps product. The NFB contends that Google Apps "contains significant accessibility barriers for blind people utilizing screen access technology, which converts what is on the computer screen into synthesized speech or Braille."

WIPO to Consider Trademark Protection Online

WIPO is set to consider the protection of trademarks online, including recommendations for a harmonised dispute resolution procedure between mark owners and Internet service providers. The topic sits on the agenda for the upcoming meeting of WIPO’s Standing Committee on the Laws of Trademarks, Industrial Designs and Geographical Indications (STC) on March 28 to April 1.

Iran Preparing "To Fight Our Enemies in Cyberspace"

Iran is gearing up for a cyberwar campaign after being hit with coordinated, sophisticated cyberattacks last year that reportedly crippled its Natanz nuclear enrichment facility. The Islamic Republic plans “to fight our enemies with abundant power in cyberspace and Internet warfare,” according to Brigadier Gen. Gholamreza Jalali, who leads the country’s Passive Defense Organization.

Mozilla CEO Predicts Law for Do-Not-Track Feature

A do-not-track tool that lets consumers keep their online habits from being monitored “probably will be” backed up by regulation, according to the CEO of Mozilla Corp., the company that makes the Firefox Web browser. Moves by Microsoft and Firefox indicate that browser makers are responding to a call by the Federal Trade Commission to develop such a system -- and that they are starting to compete on privacy protections.

LinkedIn Calls Chinese Censorship a Risk in IPO

Following a recent blocking of LinkedIn in China, the social Internet network for professionals warned potential investors in its initial public offering that similar incidents in the future could hurt its value. In its latest filing with U.S. financial regulators, LinkedIn confirmed that the Chinese government had briefly blocked access to its site and said that such censorship by China or other governments or organizations could lead to the loss or slowing of growth in its member base or member activity.

India's BlackBerry Demands Called "Astonishing"

A top executive of BlackBerry-maker Research in Motion Ltd. said Indian security agencies are making "rather astonishing" demands for increased powers to monitor email and other data traffic, raising serious privacy issues that threaten to harm the country's reputation with foreign investors. Robert Crow, vice president of industry and government relations for RIM, said India's Home Ministry, which oversees domestic security, wants the ability to intercept in real time any communication on any Indian network—including BlackBerry's highly secure corporate-email service -- and get it in readable, plain-text format.

Amid Disasters, Internet Stays Alive in Japan

Unlike Egypt or Libya, where dictatorships found it all too easy to turn off the Internet, Japan's Internet has largely stayed up in the face of disaster. This is a credit to Japan's robust Internet that has managed to keep running despite a 8.9 Richter scale earthquake and numerous powerful aftershocks, tidal waves, and all the havoc that such natural disaster play on a modern society's infrastructure.

  • Read the article: ZDNet

Twitter Settles Privacy Charges with FTC

The Federal Trade Commission accepted a settlement with Internet messaging service Twitter Inc. to resolve charges that Twitter deceived consumers and put their privacy at risk by not safeguarding personal information. The settlement bars Twitter from misleading consumers about the extent to which it protects the security, privacy and confidentiality of non-public consumer information for 20 years, according to a statement posted on the FTC website.

Internet Explorer Subject to "Drive-By" Browser Attack

A vulnerability in the way Internet Explorer parses MHTML content -- a method for combining multiple file types and HTML content into a single file -- is now targeting users as part of a "drive-by" browser attack. It's called that due to the process by which attackers exploit the loophole: They'll create a malicious website, lure a user in, and then force the user's browser to run Javascript code.