December 2012

The Federal Trade Commission is really on a roll these days. In the last few weeks alone it has: reached settlements with two companies, Compete, Inc. and Epic Marketplace, Inc., over the FTC’s charges that the two companies deceived consumers by misrepresenting their online data collection practices; released a blistering report criticizing the developers

The National Security Division of the Justice Department may be getting on the cyberspace attribution/retribution bandwagon — and in the process, reshaping US strategy for deterring cyberespionage.

First, they are creating a new liaison position in US Attorney offices across the country — the National Security Cybersecurity Specialist, or NSCS (rhymes with “discus meniscus” for

It’s been a contentious meeting in Dubai at the World Conference on International Telecommunications (WCIT), where the United States and its allies have been trying to fend off efforts by Russia, China, and others to expand the writ of the International Telecommunications Union to cover the Internet. Besides that fundamental dispute, there have been some

For those who have wondered why the feds cared about what former CIA Director David Petraeus was doing on his private email account, recent reports on hacks into the personal computers of former Chairman of the Joint Chiefs of Staff Mike Mullen provide at least a clue. Mullen’s personal computers, which he used while working

Previously, I told the story of how Trend Micro identified “Luckycat,” a Chinese hacker who had attacked the Dalai Lama, aerospace firms, and other targets. Based on what we know so far, the likely hacker is Gu Kaiyuan, formerly a student at Si Chuan University’s Information Security Institute and currently employed by the large Chinese