Archive for the ‘Focused REWIND’ Category
- A survey of IT practitioners conducted by the Ponemon Institute and Juniper Networks suggests that cyber attacks have recently become more harsh and recurrent. At least 90% of the IT practitioners surveyed claimed that they had experienced one or more cyber breaches within the last year, and 89% of these respondents could not identify the source of these breaches. Interestingly, employee mobile devices and laptop computers have been recognized as the top devices used in the unleashing of cyber attacks against a company. This survey suggests that ordinary network security methods are inadequate and companies need to make enhancements in order to prevent such cyber crimes.
- According to nextgov.com, Tuesday’s Senate Banking Committee hearing on cybersecurity in the financial sector, showed the senate’s critical attitude toward institution’s negligence in informing its customers of security breaches they experience in a timely manner. Although waiting to release sensitive information regarding security breaches may prove to be beneficial to the federal agents involved in these investigations, customers should be notified as soon as possible so they can take action to safeguard themselves from future attacks. In response to the increased number of attacks, the White House has presented legislative language that would require national notification of a security breach to the government and affected customers within 60 days of discovering a cyber attack. The seriousness of these cyber threats has forced government officials to set forth a new legislative race on cybersecurity related laws.
- The government itself is also not immune from these cyber attacks, as suggested by the recent attacks on the IMF, Senate, and CIA. The group responsible for many of these attacks, Lulz Security, has teamed up with Anonymous, another team of computer hackers, to begin a cyber war against governments and companies around the world, which they call “Operation Anti-Security.” According to a New York Times article, both groups have been interacting frequently via Twitter. Also via Twitter, Lulzsec has offered to help Sega in tracking down the hackers responsible for its recent cyber security breach. Although the group was deemed responsible for cyber attacks against Sony and Nintendo, its Twitter post showcased their loyalty to Sega’s Dreamcast system. The Sega breach compromised personal information of 1.3 million customers, including email addresses, passwords and birth dates. While financial information was safe, Sega Pass has been shutdown since the breach for security and investigation purposes and customers were promptly notified. The use of social networks, like Twitter, as a means of communication between hackers raises many questions surrounding the role of social media in security breaches. The unexpected shutdown of Netflix this Father’s Day left many believing that it was another cyber attack (see article on ibtimes.com). However, Netflix has not officially indicated the cause of the temporary outage. The frequency and severity of recent cyber crimes has left the world in a frenzy and upon the occurrence of any technological failure, people are not hesitant to suspect yet another cyber attack.
- Lulz Security also successfully attacked an Arizona police website, releasing about a half a gigabyte of data, including dozens of internal documents it alleges are related to border control and other law enforcement activities, over the Internet. The computer hackers oppose a tough anti-immigration law in Arizona. Its headline was “Chinga La Migra,” Spanish for a more profane way of saying “Screw the Immigration Service.”
Priya S. Amin contributed to this post.
For sources, read:
- The Los Angeles Times in its coverage of Wal-mart Stores, Inc. v. Dukes, Betty, et al., 10-277, ”Supreme Court hears arguments in Wal-Mart sex discrimination case,” calls the Supreme Court “skeptical.”
- Meanwhile, The New York Times in its story, “Justices Take Up Class-Action Issue in Wal-Mart Bias Suit,” says the Supreme Court “appeared closely divided on Tuesday during arguments over the theory put forth by the plaintiffs.”
- Bloomberg sees an emerging gender gap on the Supreme Court bench, “Wal-Mart Discrimination Case Reveals Gender Gap at High Court.”
- Commissioner of China’s State Intellectual Property Office Tian Lipu says “China Is Serious About Intellectual Property,” despite negative stories in the media to the contrary. Intellectual property (IP) laws are a relatively new concept to the Chinese. Pre-1980, little to no knowledge of intellectual property rights even existed. Since then, formal IP laws and protective measures have been gradually introduced. As a result, IP infringement in China continues to effect western countries and multinational corporations more each year. Within the last decade, the Chinese government has begun to curtail the problem and acknowledge U.S. concerns. The problem which originated between the two superpowers has now undeniably become a global issue seeking reform.
- This month, the Chinese Minister for Commerce Chem Deming invited foreign executives from companies such as Microsoft, Motorola and Nokia to attend an intellectual property forum to address and discuss the contentious IP issues. Slight improvements have been acknowledged by foreign experts stimulated by China’s acceptance of its continued IP abuse and the damaging effects this abuse has caused to its reputation abroad. Moreover, Chinese companies have begun lobbying the government to increase IP protection following the backlash to their own businesses.
- Over the last three months, 4,000 people have been arrested in violation of intellectual property rights in China, as part of a six-month campaign implemented by the Chinese government to crackdown on copyright infringement, piracy and counterfeit goods. Notably, the number and financial cost of IP infringement cases has tripled in the last year. The International Intellectual Property Alliance (IIPA) estimated U.S. trade losses to be up to $3.5 billion a year. China accounts for 80% of counterfeit merchandise collected at U.S. borders.
- Even Chinese government agencies have been criticized for downloading illegal software updates for programs they purchased illegally. The discrepancy between Chinese hardware and software sales is indicative of the ongoing illegality. Protectionist barriers created by the government have also prompted tension with the West. Beijing has gone as far as to implement a trade barrier formally known as “indigenous innovation” which effectively insists that products sold in China must be conceived and designed there.
- Recent trade discussions held in Washington D.C. between U.S. lawmakers and the Chinese President Hu Jintao included discussion of U.S. concerns for China to restrain North Korea’s aggressive policies, which are mounting pressure on economic trade. Future development between the U.S. and China is largely dependant on the two collaborating and adhering to IP laws. Furthermore, the European Union (particularly Germany) and Japan have voiced concern about IP infringement and trade, urging China to strengthen enforcement and boost protective measures.
Compiled and summarized by Muireann O’Keeffe.