The Times to Charge for Frequent Access to Its Web Site

Taking a step that has tempted and terrified much of the newspaper industry, The New York Times announced on Wednesday that it would charge some frequent readers for access to its Web site — news that drew ample reaction from media analysts and consumers, ranging from enthusiastic to withering. Starting in January 2011, a visitor to NYTimes.com will be allowed to view a certain number of articles free each month; to read more, the reader must pay a flat fee for unlimited access. Subscribers to the print newspaper, even those who subscribe only to the Sunday paper, will receive full access to the site without any additional charge

Gmail of Foreign Journalists in China Hijacked

The Gmail accounts of foreign reporters in at least two news bureaus in Beijing have been hijacked, a journalists’ group in China said Monday. The news comes just one week after Google said it had been targeted by recent cyberattacks aimed at accessing the Gmail accounts of Chinese human rights activists. The US search giant cited the attacks as one reason it has decided to stop censoring its Chinese search engine and may ultimately close its China offices, a threat China has dismissed. The hijacked Gmail accounts used by the journalists in Beijing had been set to forward all e-mails to a stranger’s address, the Foreign Correspondents’ Club of China said in an e-mail to members. The group did not name the news organizations hit by the attack or say when the hijacking occurred

Law Firm Suing China Hit By Cyber Attack

Last week, CYBERsitter sued the People’s Republic of China, the two Chinese software makers, and seven computer manufacturers for distributing Web filtering software known as Green Dam with allegedly stolen code. This week, the law firm representing the company said that it had been targeted in a cyber attack from China. In a phone interview, Elliot B Gipson of Gipson Hoffman & Pancione described what amounts to a spear-phishing attack — the same technique used against Google in China. They were e-mails targeted at individuals in our law firm that were made to appears as if they were coming from other individuals at our law firm, he said. They attempted to get the target to click on a link or attachment

IE Zero-Day Used in Chinese Cyber Assault on 34 Firms

Updated Hackers who breached the defences of Google, Adobe Systems and at least 32 other companies used a potent vulnerability in all versions of Internet Explorer to carry out at least some of the attacks, researchers from McAfee said Thursday. The previously unknown flaw in the IE browser was probably just one of the vectors used in the attacks, McAfee CTO George Kurtz wrote in a blog post. Using a sophisticated spear-phishing campaign, the perpetrators included malicious links exploiting the bug in emails and instant messages sent to employees from at least three of the targeted companies. Contrary to previous speculation, there was no evidence vulnerabilities in Adobe’s Reader or Acrobat applications were used in any of the attacks, Kurtz said. In its own statement, Adobe concurred, saying researchers have not been able to obtain any evidence to indicate that Adobe Reader or other Adobe technologies were used as the attack vector in this incident. Kurtz said his findings were based on malware samples taken from three to five of the targeted companies and he stressed that other zero days or exploits could have been used against other victims

Channel 4 Seeks Terminally-Ill Volunteer to be Mummified in TV Documentary

Channel 4 looks set to become embroiled in another taste row after backing a project which seeks to mummify a terminally-ill volunteer for a TV documentary. The body of the candidate selected to be embalmed could then end up being displayed in a museum. If the project goes ahead it will follow a trail of programmes which seek to challenge views on death

Vodafone Warranty Slap Good News For All Mobile Phone Owners

Most consumers are aware that they’re entitled to have goods replaced if they prove faulty early in their life after purchase, but just how long does that period last? In the case of Vodafone and mobile phones, the answer now turns out to be more than two weeks thanks to an ACCC court ruling that should help everyone who owns a mobile phone. The ACCC has sought and received court enforceable undertakings from Vodafone that it will not automatically tell consumers that they are entitled only to a repair on faulty phones any time two weeks after purchase, a policy apparently adopted by some 3 stores prior to its merger with Vodafone and one which violates the Trade Practices Act. The decision is interesting even if you’re not a Vodafone customer, as it essentially defines reasonable periods for demanding a replacement phone (as opposed to a repair) when things go wrong

China’s Green Dam Named $US2.2bn Lawsuit

A $US2.2 billion ($US2.39bn) lawsuit that targets the Chinese government and several international computer makers is the latest twist in the saga of China’s controversial Green Dam software, which last year was introduced to filter internet content on individual computers. The lawsuit, filed Tuesday by Cybersitter, a California maker of parental-control software, alleges that Green Dam uses copied code from its filtering software. The complaint also alleges that China-based sources attempted to gain access to the private servers that held its proprietary material

Anti-Stephen Conroy Web Site Back Online

A web site that was taken offline by the domain name regulator .au Domain Administration, is now back online and continuing its protest against the Government’s internet filtering policy. The site stephenconroy.com.au, which takes aim at the Communications Minister Stephen Conroy for his policy on what it deems as internet censorship, was taken down by auDA at the end of last month less than two days after it went live

Just What Did President Obama’s Executive Order Regarding INTERPOL Do?

Obama administration officials say this new executive order doesn’t allow INTERPOL to do any more than they were allowed to do once Reagan recognised them as a public international organisation. Though clearly the Executive Order does prohibit US law enforcement from searching and seizing INTERPOL records, officials say, those provisions can be waived by the president if need be

Killer Superbug Solution Discovered in Norway

Aker University Hospital is a dingy place to heal. The floors are streaked and scratched. A light layer of dust coats the blood pressure monitors. A faint stench of urine and bleach wafts from a pile of soiled bedsheets dropped in a corner. Look closer, however, at a microscopic level, and this place is pristine. There is no sign of a dangerous and contagious staph infection that killed tens of thousands of patients in the most sophisticated hospitals of Europe, North America and Asia this year, soaring virtually unchecked. The reason: Norwegians stopped taking so many drugs

Google and India Test the Limits of Liberty

The rules of political speech on the Internet are usually pretty simple. In America, almost anything goes. In places like China, the censors call the shots. But in India — a boisterous democracy that’s riven by religious and ethnic tension — the game is far trickier, as Google is discovering. In September, lawyers at Google’s New Delhi office got a tip from an internet user about alarming content on the company’s social networking site, Orkut. People had posted offensive comments about the chief minister of India’s southern state of Andhra Pradesh, who had died just a few days earlier in a helicopter crash. Google’s response: It removed not just the material but also the entire user group that contained it, a person familiar with the matter says. The Internet giant feared the comments could heighten tensions at a time when thousands of mourners of the popular politician were emptying into the street

New Zealand’s Cyber Spies Win New Powers

New cyber-monitoring measures have been quietly introduced giving police and Security Intelligence Service officers the power to monitor all aspects of someone’s online life. The measures are the largest expansion of police and SIS surveillance capabilities for decades, and mean that all mobile calls and texts, email, internet surfing and online shopping, chatting and social networking can be monitored anywhere in New Zealand. In preparation, technicians have been installing specialist spying devices and software inside all telephone exchanges, internet companies and even fibre-optic data networks between cities and towns, providing police and spy agencies with the capability to monitor almost all communications. Police and SIS must still obtain an interception warrant naming a person or place they want to monitor but, compared to the phone taps of the past, a single warrant now covers phone, email and all internet activity. It can even monitor a person’s location by detecting their mobile phone; all of this occurring almost instantaneously