Space Industry and Business News  
CYBER WARS
UAE ban on BlackBerry data a security badge of honor

China hosts meeting on cyberspace security
Beijing (AFP) Aug 4, 2010 - Hundreds of hackers, computer programmers and online security experts met in Beijing Wednesday to discuss ways to defend against an increasing number of cyberattacks. Internet titan Microsoft has sponsored the two-day summit in the nation's capital, which has attracted about 300 participants from China and around the world to exchange ideas on improving cyberspace security, the China Daily said. Among those attending the event are veteran hackers from the United States who have said they are on a quest to foster alliances with peers and dispel notions that all of their kindred spirits in China are cyberspies.

"We want to create understanding between the two hacker cultures," Colin Ames told AFP earlier this week at a gathering of hackers in Las Vegas. "It's nonsense that all Chinese hackers are evil and hack for the government," said Ames, who is attending the XCon information security conference in Beijing. China, which has been accused of waging cyberattacks on US Internet giant Google and the Indian government, has the world's largest online population of 420 million users, according to official data. Canadian researchers claimed in April that a China-based online spying network leveraged popular web services such as Twitter, Google Groups and Yahoo! Mail to steal information from the New Delhi government and other Indian networks. China denied the accusations, which were made weeks after Google effectively shut its search engine, in part over cyberattacks it claimed originated from China.
by Staff Writers
San Francisco (AFP) Aug 3, 2010
Security experts said Tuesday that banning BlackBerry data service in the United Arab Emirates smacks of political backlash and could be a testament to how hard it is to snoop on that network.

"The BlackBerry security model is very different from other phones," said Kevin Mahaffey of Lookout mobile security firm.

"It is end-to-end and the encryption is so strong nobody knows how to monitor it."

Canada-based Research In Motion built its own platform for business customers that encrypts BlackBerry email messages and routes them in a way that keeps the data off limits from even telecom firms that carry the transmissions.

"They have such good security that I think some countries are uncomfortable with the fact that they can't intercept it," said Lookout chief executive John Hering.

While iPhones have been all the rage with smartphones users thrilled by games, social networking, video watching and other casual uses, BlackBerry has remained a favorite for business people craving secure wireless communications.

BlackBerry smartphones can be hard targets for countries that do electronic snooping in the name of national security.

RIM on Tuesday denied allegations it had offered some governments access to customers' data and not others, as it faced a ban in two Gulf States and India.

The UAE has said that BlackBerry services including messenger, web browsing and email will be suspended because they "allow individuals to commit violations" that the country cannot monitor.

People who use BlackBerry handsets as personal smartphones don't enjoy the same protections as companies that contract with RIM to deploy the devices to employees.

BlackBerry security is designed to let business users "transmit information wirelessly while also providing them with the necessary confidence that no one, including RIM, could access their data," according to RIM.

RIM uses a special layer of coding to shield email as it is routed to the company's servers and then on to intended recipients, according to Mahaffey.

BlackBerry also uses encrypted validation to identify handsets connecting to the network, according to Peter Beardmore of Russia-based computer security firm Kaspersky Lab.

"BlackBerry is a more highly secured device," Beardmore said.

"There are a wide variety of services available through the BlackBerry network that you are going to be hard pressed to find in other services."

Typical smartphones route email through telecom service providers, which can intercept data for governments.

Text messages, voice calls, and Internet browsing activity are up for grabs on all smartphones because telecom service providers can see that activity, said Nicholas Percoco, vice president of SpiderLabs at Trustwave Information Security firm.

Online purchases, banking and other financial dealings should be protected by encryption that is standard practice for such transactions.

Percoco wondered whether the move against BlackBerry in the UAE was political backlash.

Two years ago, RIM charged that an update issued by UAE's largest telecom service provider, Etisalat, was actually spyware, and that it enabled unauthorized access to information stored on users' smartphones.

Microsoft makes ActiveSync software for businesses that can encrypt email sent with iPhone, Android, or Windows smartphones, Percoco noted.

Secure, encrypted connections can be made wirelessly from laptops with the help of VPN software from Cisco. Good Technology sells software to protect messages on mobile phones.

"This whole thing may not be security charged, it may be politically charged," Percoco said.

"From a security standpoint, it doesn't really jibe," he continued. "It looks like basically RIM wouldn't let them put a bugging device in the phone."



Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


CYBER WARS
Elite US cyber team courts hackers to fight terrorists
Las Vegas (AFP) Aug 1, 2010
An elite US cyber team that has stealthily tracked Internet villains for more than a decade pulled back its cloak of secrecy to recruit hackers at a DefCon gathering here Sunday. Vigilant was described by its chief Chet Uber as a sort of cyber "A-Team" taking on terrorists, drug cartels, mobsters and other enemies on the Internet. "We do things the government can't," Uber said. "This was ... read more







CYBER WARS
China Leads In Outer Space Pollution

MetOp-B Module Passes Crucial Vacuum Test

Safe And Efficient De-Orbit Of Space Junk Without Making The Problem Worse

RIM unleashes BlackBerry Torch to take on iPhone

CYBER WARS
Mexican navy aircraft to use Telephonics

Raytheon's ASTOR Saving Lives In The Counterinsurgency Battle

Testing Of Australia's Network Centric Command And Control System Completed

Thales UK wins Congo army radio contract

CYBER WARS
New Rocket Launch Period In And Around Tanegashima

Kourou Spaceport Welcomes New Liquid Oxygen And Liquid Nitrogen Production Facility

Sea Launch Signs Agreement With EchoStar

ISRO To Launch GSLV With Cryo Engine Within An Year

CYBER WARS
Russia To Launch 3 Glonass Satellites In September

Soap maker creates unease over Brazil GPS spying stunt

China Launches Fifth Satellite For Its Own Global Navigation Network

Navigation That Makes Sense Of Life's Twists And Turns

CYBER WARS
Hong Kong's Cathay expands as demand returns

Spanish military may replace absent air traffic controllers

China jumbo jet maker picks GE, Eaton as suppliers

Swiss solar plane makes history with round-the-clock flight

CYBER WARS
Protein From Poplar Trees Can Be Used To Greatly Increase Computer Capacity

Polymer Synthesis Could Aid Future Electronics

Acer, Asus and Lenovo lead pack as PC sales surge

Intel posts 'best quarter' ever

CYBER WARS
GOES-13 Satellite Sees Severe Storms Strike US East Coast

Integral Systems Helps DigitalGlobe Enhance Earth Imaging Download Capacity

Cluster Makes Crucial Step In Understanding Space Weather

NASA Satellite Improves Pollution Monitoring

CYBER WARS
Gulf spill: How 3.6 million barrels of crude can disappear

Research needed on underwater dispersants

Gulf spill impact will linger long after oil is gone: study

New study aims to locate underwater oil from Gulf spill


The content herein, unless otherwise known to be public domain, are Copyright 1995-2010 - SpaceDaily. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement