Source: National Cyber Security – Produced By Gregory Evans In a veiled attack on the US, Chinese President Xi Jinping today said no nation should pursue “Internet hegemony” and asserted that countries have the right to independently choose their own path of cyber development and regulations. Addressing the opening ceremony…
China calls for Internet front to fight hacking, cyber “arms race”
Source: National Cyber Security – Produced By Gregory Evans China’s President Xi Jinping laid out his vision for the Internet on Wednesday, calling for a new status quo where Internet sovereignty rests in the hands of nations controlling the flow of information. “Each country should join hands and together curb…
Parents grow wary with kids’ internet habits
Source: National Cyber Security – Produced By Gregory Evans HYDERABAD: A recent survey by Intel Security pinpoints an alarming trend among children in Indian cities having met and wanting to meet complete strangers, with whom they have first interacted on social networking sites. The survey also finds that children admit…
Free Microsoft Windows for the Internet of Things and Mobile Devices
Source: National Cyber Security – Produced By Gregory Evans Tomorrow, 8th April could be a sad day for all those who are still using Windows XP, as it is an official assassination day of it, but there is also a good news that Microsoft is going to stop charging for…
The NSA and EFF Agree on One Thing: How the NSA’s Internet Spying Works
Source: National Cyber Security – Produced By Gregory Evans Much has changed in the nearly ten years since we launched our first lawsuit challenging the NSA’s illegal surveillance of millions of Americans’ Internet communications. Over time, the defendants in the cases have changed; the legal “authority” the government has invoked…
Web visits of “every visible user on Internet” were tracked by GCHQ
GCHQ’s Karma Police program followed “suspicious” Web searches around the globe and profiled each and every Internet user According to the documents published by The Intercept, it disclosed that the United Kingdom’s Government Communications Headquarters (GCHQ) has been tracking World Wide Web users since 2007, with an operation called “Karma…
2 Billion Lines Of Code For Google’s Internet Services And Its All In One Place
Google’s Internet Services Has 2 Billion Lines Of Code, Which Is 40 Times Size Of The The Windows According to Google Engineering Manager, Rachel Potvin at an engineering conference in Silicon Valley on Monday estimated that the software required to run all of Google’s Internet services from Gmail to Google…
Safer Internet: Let’s kick off the conversation
Source: National Cyber Security – Produced By Gregory Evans When we talk about technology and crime, or technological crime, we probably refer to crimes using new technologies, that is information and communication technologies (ICTs). It is very difficult to define, as new technologies continue to emerge and the examples become…
Catch Phil talking the Internet of Things on Portland’s KOIN 6
Android Central’s own Phil Nickinson recently made an appearance on Portland’s KOIN 6 to talk about using your smartphone to keep your home safe with the Internet of Things. View full post on MobileNations
Ken Westin is a cyber stalker trying to make the internet a safer place
Source: National Cyber Security – Produced By Gregory Evans THE internet is sometimes described as the Wild West. And in this metaphor, Ken Westin is the biggest sheriff in town. He’s a professional cyber stalker who tracks down criminals using the trail left by their digital fingerprints. “I’m a hunter,”…