Date: 20/06/12 Special chapter, consisting of five articles, included in the Criminal Code of the Republic of Azerbaijan
Certain changes are expected to be made to the list of items excluded from civil circulation in Azerbaijan. According to information provided by ICTnews, the changes to the law on the "List of items excluded from civil circulation" were proposed at the Milli Machlis of the Republic of Azerbaijan.
Date: 19/06/12 Baku to host international conference on hyper-crime in November
An international conference on fight against hyper-crime is expected to be held in Baku in November. This information was provided to ICTnews by the head of the Law and Personnel Department of the Ministry of Communications and Information Technologies of the Republic of Azerbaijan Bakhtiyar Mammadov.
Date: 11/06/12 Think Tank: LinkedIn gets hacked and nobody cares
The British technology press was awoken from Jubilee madness with news that 6.5m passwords had been stolen from LinkedIn’s database this week. It emerged that hackers were working to “crack” a list of 6.5 million out of 150 million LinkedIn profiles.
Date: 07/06/12 LinkedIn passwords leaked by hackers
Social networking website LinkedIn has said some of its members' passwords have been "compromised" after reports that over six million' passwords had been leaked onto the internet.Hackers posted a file containing encrypted passwords onto a Russian web forum. They have invited the hacking community to help with decryption.
Date: 05/06/12 Banking club created to develop IT security in Azerbaijani banks
A banking club has been created to develop information technologies and information security in Azerbaijani banks, Supervisory Board of Azerbaijani Unibank reported. "At present, the competitiveness of any bank depends on how well the banks can apply modern information technologies, as the bank needs all
Date: 04/06/12 Cyber Threat Projection and the Insider Threat: Stuxnet Edition
Experts who theorize about cyber conflict talk about the ability to “project” power in and through cyberspace. They also warn of the danger from the “insider threat,” a trusted individual with access to sensitive systems or information who either deliberately or accidentally compromises them.
Date: 04/06/12 Hackers claim breach of China Telecom, Warner Bros. networks
SwaggSec says it lifted more than 900 login credentials from the Chinese ISP and that the company did little to defend itself after it discovered the breach. An Internet hacking group claimed today to have broken into the networks of Warner Bros. and China Telecom, publishing documents and login credentials purportedly stolen in the breaches.
Date: 30/05/12 Flame virus: son of Stuxnet uncovered in Middle East
New malware designed to spy on people, steal classified information and cause mass deletion of data has been uncovered by a number of anti-virus software vendors and security researchers. Code-named "Flame" or "Flamer", the malware is currently undetectable by standard anti-virus and anti-malware programs and can be updated by its operators to expand its range of attack.
Date: 30/05/12 Security monitoring of employee behaviour on the rise – Gartner
Staff can increasingly expect to be monitored by their employers – and not just what they do online during working hours,
Date: 30/05/12 ICO sets up online survey as cookie complaints rise
The Information Commisioner's Office (ICO) has received 84 customer complaints relating to the controversial EU cookie law since it came into force on Friday, via a survey tool to establish the key problem areas. The new rules were brought in amid controversy over
Date: 22/05/12 Connection line encoded to prevent outside interference to e-services
The Ministry of Labor and Social Protection of the Republic of Azerbaijan encoded the connection line, which is used to exchanges information between the Ministries of Communications and Information Technologies and Labor and Social Protection, in order to eliminate outside interference to e-services.
Date: 19/05/12 Anonymous attacks Indian government websites
The hacker group Anonymous has carried out a series of attacks against websites in India. Websites for government departments, India's Supreme Court and two political parties all came under attack. Anonymous said the attacks were carried out in retaliation against
Date: 11/05/12 Government prioritises new laws on data monitoring and retention
The government is forging ahead with much-criticised plans to allow police and intelligence agencies to access personal communication information. The draft Communications Bill, announced in the Queen's speech today, will make it easier for government agencies to monitor details of people's emails,
Date: 11/05/12 Supplier security audits on rise, but questions over cloud ignored
More organisations than ever are conducting IT audits of suppliers and potential business partners to ensure they comply with minimum security standards, particularly ISO 27001 – the international computer security standard.Even companies such as Hewlett-Packard have to respond to security audits
Date: 11/05/12 Nine out of 10 custom-built web applications vulnerable to attack
Almost nine out of 10 custom-built web-facing applications contain severe vulnerabilities that could expose organisations to a serious attack, according to an expert at HP. "Some 86 per cent of the web applications that we analysed as part of HP Fortify had an SQL injection
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65