Choose Privacy Week begins on May 1, 2012!

/
Choose Privacy Week begins next week (May 1 – 7, 2012), and the ALA is offering numerous resources to help libraries take part, including online programming, a series of blog posts and a brand-new new video documentary. From April 25 through April 27, the ALA will release three brief online presentations that explore the growing impact of surveillance on our civil liberties. Each presentation is designed to help librarians better understand how government agencies and corporations are collecting, storing and using data about individuals' daily lives. These presentations will be posted on privacyrevolution.org, and can be used to guide library program planning or can be shared with the community during Choose Privacy Week:

Welcome to Choose Privacy Week!

/
Welcome to Choose Privacy Week! Choose Privacy Week will take place May 1-7, 2012 and is an ongoing program of the American Library Association. Choose Privacy Week is an initiative that invites library users into a national conversation about privacy rights in a digital age. The campaign gives libraries the tools they need to educate and engage users, and gives citizens the resources to think critically and make more informed choices about their privacy.

Privacy Awareness Week 2012

/
Privacy Awareness Week 2012 Download and print this poster to promote the APPA youth-resources! Do you ever wonder how you can you protect your privacy rights as an individual? Or consider your privacy responsibilities when you handle the personal information of others? Privacy Awareness Week 2012 runs from 29 April to 5 May and is all about promoting awareness about privacy rights and responsibilities in the community. Privacy Awareness Week is a jointly promoted annual event of the members of the Asia Pacific Privacy Authorities forum.

ISSA-LA Donates $20,000 for Nonprofits to Attend the Fourth Annual Information Security Summit on Cybercrime

/
The Los Angeles Chapter of the Information Systems Security Association’s (ISSA-LA) has created a donation fund of up to $20,000 to IT employees and executives of nonprofits to attend, at no charge to the attendees, the fourth annual Information Security Summit on Wednesday, May 16, 2012 at Hilton Universal City Hotel in Los Angeles. The theme of the one-day Summit is The Growing Cyber Threat: Protect Your Business, which includes the business of operating nonprofits.

Defcon17 – Jailbreaking and the Law of Reversing

/
Developers who rely on reverse engineering face a thicket of potential legal obstacles, including license agreements, copyright, the Digital Millennium Copyright Act (DMCA), and the Computer Fraud and Abuse Act (CFAA). Taking iPhone jailbreaking as real-world example, we will review the legal theories Apple has asserted, shedding light on the major legal pitfalls that developers face, and what they can do to avoid them and minimize risks. We will also examine the additional legal issues raised by reverse engineering networked code, such as online video games.

DNSChanger Malware: Produced by US-CERT

/
US-CERT encourages users and administrators to ensure their systems are not infected with the DNSChanger malware by utilizing tools and resources available at the DNS Changer Working Group (DCWG) website.

Splunk Live! 2012 in Washington, DC

/
Why do over 3,700 companies, including more than half of the Fortune 100, use Splunk to gain new levels of visibility and insight from their machine data? It's because Splunk is the fastest, easiest way to put your machine data to work.

CES on the Hill: Online Infringement & Privacy and Electronic Data Collection

/
CES on the Hill comes to the nation's capital this spring, bringing together Members of Congress, their staff and the Washington press to mingle with executives from the CE Industry and get a chance to interact with companies producing innovative technologies that are changing the way we live and work. The next evening CEA hosts its annual Digital Patriots Dinner honoring government officials and technology leaders for their positive influence on both technology and the industry.

New Mac Trojan: Sabpab

/
A new Trojan known as "Sabpab" could hurt Mac users who run…

Sabpab, Another Mac OS X backdoor Trojan horse as been discovered

/
More malware for the Mac OS X platform has been discovered, hot on the heels of the revelation that some 600,000 Macs had been infected in the Flashback attack. And just like Flashback, the new Trojan doesn't require any user interaction to infect your Apple Mac. The Sabpab Trojan horse exploits the same drive-by Java vulnerability used to create the Flashback botnet.