Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×
Canada

Submission + - Cdn IP Lobbyists Caught Faking Counterfeit Data (michaelgeist.ca)

An anonymous reader writes: The Canadian IP Council, the Canadian Chamber of Commerce's IP lobby arm, has been caught floating false claims about the scope of counterfeiting in Canada. Recent claims include citing a figure based on numbers the FBI rejects ($22.5 billion), a figure the Canadian police won't support ($30 billion), and when pressed on the issue, it now points to yet another source that upon review indicates it fabricated its claims.
Government

Submission + - The Role of Governments in Respect to Netizens (securityweek.com)

wiredmikey writes: Lately we have seen governments around the globe adopt different approaches to how citizens engage online, often proving to be a double-edged sword.

Two years ago, the presidential election in Iran sparked a wave of protest and government crackdowns that ultimately left scores of people dead. Facebook, and Twitter emerged as a major news outlet to report the rioting as well as the government’s forceful reaction. It was a cyber-battle for control over the flow of information, one where a multitude of self-made reporters and frustrated citizens could vent their sentiments to the world. But the Iranian government was not without weapons of its own, and it countered the growth of citizen journalism with one simple maneuver – blocking all of the country’s access to Twitter and Facebook.

We’ve seen Syria launch a “Nation-in-the-Middle” attack, as it sought to intercept Facebook communications from its citizens. In response to the use of social media to spread information and rally protestors, the government of Tunisia tightened its grip on the Internet and hacked its own citizens.

All this leads us to wonder – whether countries that are not led by dictators can perform similar acts of Internet censorship. The shutting down of the Internet would probably be harder in these countries than in Egypt, for example, due to the multitude of independent Internet service providers (ISPs).

As the governments of the world work to establish the right balance between control and freedom, is has been the job of private businesses to protect and serve their customers – whether or not they are security-aware. But what about governments? Should they have any impact on the security of individuals’ online behavior?

Censorship

Submission + - Facebook Deletes Political Groups On Royal Wedding (wordpress.com)

juicegg writes: In an unprecedented move, in the last 12 hours, Facebook has deleted around 50 groups in United Kingdom. Majority of the deleted groups are a part of anti-cuts movement protesting UK's harsh austerity measures. Besides online censorship, UK police has also conducted many raids against political squats and social centers.
Education

Submission + - IT Security Risks Colleges & Universities Face (securityweek.com)

wiredmikey writes: An interesting article on the increased risks that higher education institutions are faced with when it comes to IT and network security.

Student Internet use is nothing short of the Wild West. Malicious software (malware), phishing, infrastructure attacks, social network targeting, and peer-to-peer (P2P) information leakage are not potential threats; they’re actual, daily issues. And here’s the scary part: when a student’s computer on a college network is compromised, it’s not just the student who pays the price—legally, so does the institution.

The dangers for a university or college network can lurk everywhere from e-mail to the Internet infrastructure itself. In this column, the author discusses such risks, including:

1. How the Internet’s infrastructure poses a security risk for college networks

2. Why a university’s partners could be putting the institution at risk of a security breach

3. The unique ways students, professors and administrators use the Internet that jeopardize college networks

4. The potential costs of security breaches

5. Specific information technology (IT) security regulations that directly impact institutions in higher education

6. How institutions can comply with regulations and keep their networks safe

Long gone are the days where a “boxed” solution is going to protect a university from the cyber bad guys....[More]

Submission + - Wikileaks Shows Massive US Lobby on Canadian DMCA (michaelgeist.ca)

An anonymous reader writes: Wikileaks has released dozens of new U.S. cables that demonstrate years of behind the scenes lobbying by U.S. government officials to pressure Canada into implementing a Canadian DMCA. The cables include confirmation that Prime Minister Harper personally promised U.S. President George Bush at the SPP summit in Montebello, Quebec in 2008 that Canada would pass copyright legislation, U.S. government lines on copyright reform that include explicit support for DMCA-style digital lock rules, and the repeated use of the Special 301 process to "embarrass" Canada into action. In fact, cables even reveal Canadian officials encouraging the U.S. to maintain the pressure and disclosing confidential information.
Businesses

Submission + - Big Content is strangling American innovation (hbr.org)

hype7 writes: "Harvard Business Review is running an article close to many slashdotter's hearts: the problems with "Big Content". They make the argument that all the measures that the movie and music industry are putting in place to protect their business models actually threatens to undermine the innovation engine that the US has built up in the tech space. Very interesting reading."

Slashdot Top Deals

It is impossible to enjoy idling thoroughly unless one has plenty of work to do. -- Jerome Klapka Jerome

Working...