Tag Archive for: 12th

This Week In Techdirt History: Augusts 12th – 18th

Five Years Ago

This week in 2013, the White House incredibly put James Clapper in charge of independent NSA review, then tried to change its tune a bit when people rightly pointed out that this was insane. Meanwhile, Rep. Justin Amash discovered that the House Intelligence Committee had withheld important NSA documents from the rest of Congress, and that the White House knew it. Then, the latest leak revealed that the NSA abused the rules to spy on Americans thousands of times every year — since there was no real oversight, the FISC court just relied on the NSA’s own statements to determine what was legal, and agents were told to withhold information from those in charge of oversight. Senators Wyden and Udall hinted that this was just the tip of the iceberg, while NSA defenders claimed the abuses were evidence of the system working well and that the numbers were impressive compared to the amount of spying the NSA does.

Ten Years Ago

This week in 2008, Italy tried and failed to block all access to The Pirate Bay, with the predictable result of a spike in Italian traffic to the site. Universities were realizing that the RIAA was taking advantage of them in its crusade against file-sharing students, while one teenager targeted in a lawsuit managed to get damages reduced with an “innocent infringement” defense. Nintendo was freaking out about memory cards for the Nintendo DS, while Tiffany was continuing its futile efforts to hold eBay accountable for counterfeit products by appealing a court ruling that said they weren’t (and this same week, a Belgian court was ruling the same thing).

Fifteen Years Ago

This week in 2003, eBay was only just starting to become the ecommerce platform of choice with folks setting up entire businesses on the site. ISPs were the ones fighting back against the RIAA, along with one accused file-sharer who was hitting the agency with a countersuit arguing that sharing does not equal distribution. There were early rumblings of “personalization” as the future of search engines, and the fairly new technology of MMS picture messages was being put to use for networked security cameras and medical emergencies. And nearly seven years before the iPad, there were lots of tablet computers hitting the market, but nobody wanted them.

Permalink | Comments | Email This Story

Techdirt.

Join SC Media for their 12th annual cybersecurity conference, RiskSec, in New York!

Join SC Media for their 12th annual cybersecurity conference, RiskSec, in New York!

Graham Cluley Security News is sponsored this week by the folks at SC Media. Thanks to the great team there for their support!

SC Media’s 12th annual security conference, RiskSec (previously branded as SC Congress) will be held May 31 in New York City. This event will provide insights from thought leaders across various industries, focusing on the most significant issues that CISOs and other security professionals face every day.

Features include:

  • Interactive learning sessions
  • Demos from 25 prominent tech companies
  • 30+ industry-leading speakers
  • Ability to earn up to 9 CPE credits
  • Breakfast and lunch from executive chef
  • Cocktail reception

In 2017, there was a record number of massive data breaches that compromised millions of users’ data and cost senior-level executives their jobs. This event is a great opportunity to collaborate and continue to improve defense techniques.

Use discount code CLULEY for $ 100 off admission.

RiskSec is a selective event for senior security professionals. Space is limited and the event will sell out.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Graham Cluley

Votiro’s Zero Day Exploit Technology Honored as Silver Winner in the 12th Annual 2016 Info Security PG’s Global … – PR Newswire (press release)

Votiro's Zero Day Exploit Technology Honored as Silver Winner in the 12th Annual 2016 Info Security PG's Global
PR Newswire (press release)
Votiro's Zero Day Exploit Technology neutralizes cyber threats without having to identify them in advance. Threat neutralization is achieved by making micro changes to the structure and metadata of a file. Invisible to users, these changes do not

and more »

“zero day” – read more