There are around 450 criminal gangs around the world making money from images of child sex abuse, the UK’s Internet Watch Foundation has said. The watchdog’s annual report says that the 10 most prolific of these account for more than … Read more
Minesh
Security chip that does encryption in PCs hacked
Deep inside millions of computers is a digital Fort Knox, a special chip with the locks to highly guarded secrets, including classified government reports and confidential business plans. Now a former U.S. Army computer-security specialist has devised a way to … Read more
Secure Hash Competition Kicks Off
Dozens of amateur and professional cryptographers signed up last week for the United States’ first open competition to create a secure algorithm for generating hashes – the digital fingerprints widely used in a variety of security functions. The contest, run … Read more
‘Extreme Porn’ Law Could Criminalise Millions in UK
Almost unreported, the UK Criminal Justice Bill is slowly wending its way toward becoming law. It includes a section (Clause 63) on “extreme pornographic images” that may, or may not, affect a very large proportion of the adult population in … Read more
IWF Annual Report highlights persistent core of child sexual abuse websites
The Internet Watch Foundation (IWF) Annual Report 2007, published 17 April 2008 reveals new intelligence regarding the scale of publicly available child sexual abuse websites known to the IWF. Whilst it is very rare to trace these websites to the … Read more
‘I was falsely branded a paedophile’
With ID fraud on the rise, the assumption is you’ll lose money which can be claimed back. But Simon Bunce lost his job, and his father cut off contact, when he was arrested after an ID fraudster used his credit … Read more
German Police Creating LE Trojan
German cops are pushing ahead with controversial plans, yet to be legally approved, to develop “remote forensic software” – in other words, a law enforcement Trojan. Leaked documents outline proposals by German firm Digitask to develop software to intercept Skype … Read more