Angela Merkel demands tighter EU-wide data security rules

The German Chancellor, Angela Merkel, has called for difficult information security guidelines within the Western Partnership, as well as a far greater level of visibility from the bigger online organizations like Facebook  and Search engines.

During an meeting broadcasted last night, Merkel said that Malaysia desired “the online organizations here in European countries, such as Facebook and Search engines, to tell us who they are providing the [personal] information to” and included that the nation would take a “very company position on the issue.”

Merkel’s meeting with In german broadcaster ARD follows latest details about the US online monitoring program, known commonly as PRISM. Merkel, who has obtained much household critique over her lack of major action to secure In german individuals from international monitoring, also requested for In german law to be observed: “I anticipate a clear dedication by the US Govt for the future – that you will notice In german law on In german area.

We are an associated associate. We are in a protecting partnership and must be able to depend upon each other.” Merkel said that despite Malaysia having great comfort regulations, such as the Govt Data Protection Act, it still could not assurance that its citizens’ information could be secured.

This, she said, was due to different regulations implementing to different organizations based on where they were authorized. For example, if a company was authorized in Ireland in europe then they would be topic to Irish law. She added: “Therefore, we do need a specific Western solution.” With the In german individuals on both the eastern and western of the nation aware of their nation’s monitoring history, this is a topic I’m sure they’ll be following with interest.

Sex and the City writer compromised, set up of new book is released online

Candace Bushnell, the writer popular for “Sex and the City”, has dropped sufferer to a cyberpunk who not only split into her Twitter posts consideration, but also published ingredients of her as-yet-unfinished next guide on the internet.

Although the designer of June Bradshaw seems to have removed the cyberpunk from her Twitter posts consideration, and removed the harmful tweets, an beginning set up edition of what seem to be the first 50 webpages of Bushnell’s guide – currently eligible “Killing Monica” – are available on the internet for anyone to obtain and study to their heart’s material.


In inclusion, the cyberpunk has also published screenshots of personal emails from Bushnell’s Earthlink consideration between her, her marketers and her fictional providers.Interestingly, the cyberpunk who is getting credit score for the bargain of Bushnell’s records and the flow of her guide set up is “Guccifer”.

Regular visitors of Undressed Protection will keep in mind that Guccifer is the hoopy frood who believed it was a wise decision to crack into records that belong to Colin Powell and former US Presidents Henry H and Henry W Shrub.

From the looks of factors, Candace Bushnell has been poor with her pc security – perhaps selecting an easy-to-guess security password, using the same security password in several locations or enabling her security password to be phished by a cyberpunk.But furthermore, the occurrence underlines the value of encrypting delicate records (such as the first 50 set up webpages of an future book) so even if your e-mail consideration *is* affected, a cyberpunk won’t be able to study any accessories which could be personal or from the commercial perspective delicate.

Nobody prefers to be compromised, of course. And it is a legal act which should be examined by the regulators. And Bushnell and her marketers have the right to select how and when ingredients from her guide are distributed to a broader viewers.

But you can’t help but wonder if Candace Bushnell’s marketers might be able to convert a prospective catastrophe into a PR opportunity, and convert around this regrettable occurrence and use it as a opportunity to improve attention in the popular writer’s next guide.

Uncool cyberpunk held responsible for unrevealing swimwear images of musician Victoria Justice

United states musician Victoria Rights is not satisfied that someone (she places blame on a hacker) has released swimwear pictures of her onto the world wide web.

I’ve never observed of Victoria Rights, which may mean that the 20-year-old musician isn’t focusing on my particular market, but she is clearly popular enough to create statements when she statements that the pictures released of her were thieved by a cyberpunk.

Media who protected the tale described the released pictures as “semi-racy… but nothing of the R-rated wide range, displaying Victoria completely dressed but in a showering suit”.


Clearly, however, Rights – who has her own display on Nickelodeon known as “Victorious” – was not entertained and is looking for, err, justice.

    Coughing & taking is NOT COOL. #RespectPeoplesPersonalProperty #Karma

And she is right, of course, hacking into somebody’s personal records and taking pictures is *not* cool. And it’s even less cool for sites to take the thieved pictures and to post them on the net.

And yet it seems to keep on occurring, and the sites appear to get away with it scot-free.

For example, we’ve seen “news” sites posting romantic pictures of  celebrity spam news like  Scarlett Johansson, Mila Kunis, Christina Aguilera, and many other superstars in the last without any obvious repercussions.

Although online hackers can get severe charges for obtaining superstar records and taking pictures, we don’t listen to anything about the rumors sites that voluntarily went community with the thieved content.

Facebook experiments with profiting from celebrity stalkers and spammers

Facebook  programs to cost UK customers as much as £10.68 to deliver information to top-tier superstars (think Olympic silver medallist scuba diver Tom Daley or former kid’s laureate Eileen Rosen) in an attempt to seal out junk.

According to The Weekend Periods, Facebook  has already silently slid the expenses into position for English customers who want to deliver a concept to superstars and other individuals outside their group of buddies.

The public networking Megatron is examining a moving range of expenses depending on how well-known it makes a given individual.

One phase below the expensive Most Popular kinds are demi-gods such as Salman Rushdie, the Booker prize-winning writer, as well as United states artist Sneak Dogg, either of whom will price customers £10.08 to concept.

And then there are those considered, more or less, schlubs, such as regular people or minimal celebrity news, who go for a simple 71p (which, in US cents, is God knows what, given that on the internet forex converters can’t be worried to record one and probably wouldn’t fold over to choose one up).

Bargain-basement people who can be messaged for 71p consist of comedienne Miranda Hart and TV documented manufacturer Louis Theroux, according to ITV Information.

Facebook must have liked the outcomes of its research with asking for this kind of fee when it provided it a try in the US in Dec.

In that restricted test, Facebook or myspace let choose customers concept unknown individuals for $1.

Facebook described the cost as a junk deterrent:

  “Several experts and scientists have mentioned that magnificent a economical price on the email emailer may be the most beneficial way to avoid undesirable information and accomplish distribution of information that are appropriate and useful.”

At enough time, TechCrunch’s Josh Constine recommended that it likely wouldn’t change into a significant resource of income for Facebook or myspace, given that customers were given a regularity cap – at least in the first test – of one compensated concept weekly.

Fair enough. But that was then, and this is now, and that $1 to concept any unfamiliar individual at all has in this metamorphose expanded into £10 a pop, or $15.

That’s some serious cash. This could be a proper and balanced income flow were Facebook or myspace to raise the regularity restrict.

Bandaged thumbI wish Facebook or myspace doesn’t raise the regularity restrict. The only individuals who could probably deliver boxes of junk to high-priced superstars are, likely, a bit excessive. Hopefully, a obstruction such as heavy price might control their actions.

More essential, of course, is that with the regularity restrict in position, this could be a powerful obstruction for junk.

Given the low transformation rate for junk promotion, pushing spammers to pay expenses to concept unknown individuals could power the small profits to light in evaluation to the expenses of texting.

I can’t think of a disadvantage for daily Facebook customers.

Unless you have, say, a large number of long-lost friends to concept who are outside of your group of buddies, the fee appears to be like a affordable compromise for reducing off a 100 % free, simple way for spammers to get to us – whether “us” comprises silver medalists, popular performers and performers, silver medalists, or just regular schlubs like us.

But absolutely I can restrict those who can get in touch with me to “Friends Only”?

In situation you believed it was possible to avoid someone you didn’t know delivering you a concept on Facebook or myspace because of your comfort configurations – think again.

Lil’ Kim Recent name to be included to the Hacked Celebrity line-up

Kanye West is experiencing with his affected Googlemail, Tweets and MySpace records than I listen to that his other artist Lil’ Kim is having Web 2.0 protection issues of her own.

The Grammy award-winning musician is declaring that her Facebook or myspace web page was lately compromised, after a writing showed up there explainin Celebrity Spam Naturi Naughton as “tasteless and talentless”.

Here is what was revealed to have been published on Lil’ Kim’s formal Facebook or myspace page:

I wasn’t even able to select who I desired to represent me in this film. I would have never selected Naturi, she doesn’t have a Lil’ Kim element at all! She looks nothing like I seemed returning then. We have NO resemblances. Viewing her on-screen was so ‘dreadful’ as Simon Cowell would say. She is unpalatable and talentless. Never once did she get in touch with me for feedback or to get a experience of me for the personality. A TRUE celebrity would get in touch with the resource to be the best they can be in representing someone. That informed me right there, she wasn’t right for the aspect and in addition to, Naturi has got to be one of THE most severe stars I’ve ever seen and I can’t believe they select her.

It’s easy to understand that Lil’ Kim’s attorneys (who have certainly been active looking after their customer in the past) would be eager to highlight that they were not her own views, but that of a cyberpunk.

Ashton Kutcher’s Twitter hacked with pro-SSL graffiti

Celebrity Ashton kutcher, perhaps best known to many people as Mr Demi Moore, seems to have had his Tweets consideration affected while he joined the brainbox TED Meeting in Lengthy Seaside, Florida. And the doubt has to be that a deficiency of SSL protection was responsible.

Messages published to Ashley Kutcher’s ‘aplusk’ consideration, which were distributed to his more than 6.4


Ashton, you’ve been Punk’d. This consideration is not protected. Guy, where’s my SSL?

and

P.S. This is for those younger demonstrators all over the globe who are entitled to not to have their Facebook or myspace & Tweets records affected like this. #SSL

Tools such as Firesheep make it kid’s perform for anybody seated near to you to leap onto your Facebook or myspace or Tweets period if you’re using unencrypted WiFi without an SSL relationship, for example at a free WiFi hot spot.

Wouldn’t it be great if Tweets pressured the use of HTTPS at all times? Clearly whoever affected into Ashley Kutcher’s Tweets consideration seems the same.

The vulnerable Tweets and Facebook or myspace records of some superstars provide a very attractive focus on for cybercriminals who may wish to propagate their risky or spam news hyperlinks to an incredible number of supporters. We should just be thankful that on this event the crack seems to have taken place to advertise better attention of the need for better protection, rather than with more harmful purpose.

Other star sound system at the TED conference consist of Windows Invoice Gateways, artist Bobby McFerrin, film maker Morgan Spurlock, artist Jerr Mraz and bigwigs from the Honda Engine Organization and Coke. Let’s wish they’re more cautious if they choose to accessibility their public networking records from the conference.

Bill Gates’s ssn, address, credit file and more… released by hackers

Bill Gates is the latest superstar to have had his individual details released on a web page that has revealed the social security numbers, details and individual financial details of lots of people in the community eye. Malware practice are carried out by any sites and people should be aware of  spammers.These type of spammers details can be seen in various spam alert sites.

As with the flow earlier this week of individual details that belong to – amongst others – companies Kim Kardashian, Mrs. Obama, and Beyoncé, it appears that the individual details has been procured from a group of 3 of credit score rating companies – Experian, Equifax and TransUnion.

Although the FBI are said to be analyzing who is behind the “Secret Files” web page, it is currently still accessible.

And whoever is behind the secret web page has been busy continuing to upgrade it – with individual details of more politicians such as Glove Mitt romney, Competition Timber, and R Kelly felix as well as the creator of Ms.

Once again, we repeat that we do not suggest that users visit this web page – as you could be putting your computer at risk of viruses disease, as well as motivating the unlawful details disclosure.

Meanwhile, what still isn’t clear is just how unexpected parties handled to fraudulently accessibility the records of well-known numbers without authorisation.

One concept is that those behind the web page were able to collect details on the internet about the superstars, and then use that information to efficiently impersonate their objectives and accessibility the money score ratings.

Rihanna sex video occasion fraud propagates on Facebook

Be on your secure if you see any of your Facebook or myspace buddies publish a concept about an claimed Beyonce sex video.

A variety of Undressed Security visitors expected me off to the information that were showing across the online community by means of occasion invites.

If you are a fan of Rihanna’s hip-grinding Bajan music then you might well be influenced to discover further, and simply simply select the weblink which would take you to a Facebook or myspace web page like the following:

 

[VIDEO] RIHANNA SEX TAPE
I missing all regard for her after viewing this >> [LINK]

If you’re thinking what in the world y.ahoo.it is, it’s not the French edition of the “Ahoo” online look for motor, but rather a URL shortener in the design of bit.ly or Twitter’s t.co.

Facebook’s security group is preventing the hyperlinks as they have been revealed as harmful, but it’s always possible that whoever is behind this fraud could use another cover to try to walk previous that protection.

In the last, frauds like this have been used to generate associates cash by getting visitors or visitors to reviews or have set up Mac viruses onto the computer systems of viewing Facebook or myspace customers.

Scams like this only propagate because of person’s organic curiousity and wish to look at a sleazy superstar sex movie.

If you were misled into doing this fraud create sure that any remains of it have been eliminated from your newsfeed, and remove any information or activities you may have unintentionally distributed to your friends

Spam has its own notorious menace since decades when online had gained popularity among people. The scammers make people victim not only for money but also for playing brutal with human emotions. In recent years, this kind of Nigerian spam targets popular personalities as it goes viral on the internet. One such famous personality who got victim for this online spam is Rihanna who is a well known singer, actress and fashion designer. Fake Rihanna sex tape and her relationship as lesbian were circulated in 2011 which went viral creating a big issue on online security.

It got spread as a kind of Facebook scam directing users to click on the invitation welcoming to watch a Rihanna sex tape. The users access to the site was made to infect with malware directing them to the fake tape. The Facebook’s security team responded by blocking the malicious links that contain the postings. The people who were invited to watch the video were also prompted to click certain suspicious links. This may tend to steal the user credentials too.

It is better to strength and protect your passwords in order to defend yourself being fall as victim for this Nigerian spam. It is also advised not to click on any suspicious links that trick people to fall as a victim.

Jeremy Clarkson drops nasty of bodyfat spammers on Twitter, vows to kill hackers

Jeremy Clarkson, the questionable speaker of BBC’s “Top Gear” program, has had his Tweets consideration affected by spammers… and he wants his vengeance.

It seems to be that the frank TV speaker and journalist, who memorably had a custard pie tossed in his experience by natural campaigners when he went to choose up an honorary level at Oxford, was just the newest in a lengthy range of Tweets customers to have their consideration hi-jacked by diet strategy spammers.

  The Quickest Way To Reduce BodyFat in (2)Weeks [LINK]

If any of Clarkson’s 1.3 thousand Tweets supporters frequented on the weblink, they would have frequented a bogus information web page, advertising an Acai berry Berries diet strategy solution:

Of course, we have seen bogus information sites advertising Acai berry Berries diet plans many many periods before, and we have even revealed lately on how the providers of bogus information sites like these have been penalized huge amount of money for ripping off the community.


Chances are that Jeremy Clarkson either had his protection password phished, thought or damaged, or that he provided a bogus third celebration program privileges to publish from his consideration.

If he has any feeling, Jeremy Clarkson should modify his protection password (making sure that he selects a hard-to-crack new protection password, and that he’s not using the same protection password anywhere else on the net – if he is, those other sites also need a product new password) and revoke the privileges of any program linked with his Tweets consideration that he doesn’t acknowledge.

What creates this Tweets break somewhat different from that which hit Physician Who celebrity Nancy Gillan or technological innovation pundit David C Dvorak in the last, is Clarkson’s response:

Somehow I don’t think Clarkson is likely to mete out his penalties. In all possibilities, Clarkson was not actually focused by the online hackers but was just one of the many Tweets customers each day who have their records affected by Acai berry Berries spammers.


In brief, the Acai berry Berries diet strategy spammers just got fortunate reaching such a well-known Tweets customer.

Rather than strategy his vengeance, Clarkson might be smarter to smarten up about pc protection and wish that Tweets presents two aspect verification soon.

Update: Some of Undressed Security’s Facebook or myspace lovers have outlined that Clarkson seems to be estimating Liam Neeson’s personality in the film “Taken”:

Was Alicia Keys hacked, or is she cheating on BlackBerry with iPhone this Valentine’s Day?

BlackBerry recently surprised the tech industry when they announced at their major launch event on January 30 the appointment of musician, Alicia Keys, as the Global Creative Director.

And since then Keys has been pimping BlackBerry’s new smartphone model, Z10, tweeting from it since launch. But is there a secret that Keys has been keeping? An extra-cellular affair with the iPhone?

At the BlackBerry launch, Keys told the audience about her on-again/off-again love affair with BlackBerry.

She said she had been lured away from BlackBerry by “hotter, sexier phones, something with more bling” in the past, but now declaring that she and Blackberry were “exclusively dating”.

So it was a bit of a surprise when a tweet from her account went out to her 11 million followers on February 11 – just days after the BlackBerry launch – sent not from her exclusive BlackBerry, but from her ex, the iPhone.

Started from the bottom now were here!

Later the same day, Keys sent out a tweet stating that the previous tweet quoting lyrics from recording artist, Drake, had not come from her, but likely a hacker. (But don’t be offended – she still likes Drake.)

What the h*ll?!!!! Looks like I’ve been hacked… I like @Drake but that wasn’t my tweet 🙁

But that doesn’t explain this tweet pic posted a day before from her account showing the musician looking radiant in her dressing room at the Grammys with not just one, but two, of her exes in reach – iPhones.

Now, we at Naked Security have seen our fair share of hacked Twitter accounts of celebrities such as Justin Bieber and Britney Spears – and this doesn’t quite smell the same.

Would a hacker that has gone through the trouble of hacking an account of such a well-known figure with access to *11 million followers* really only send one tweet with just a song lyric?

This story reminds us of a previous incident when Kim Kardashian claimed her Twitter account was hacked after having trouble logging in to Twitter from her home computer.