Danish Police Aim to End Anonymity on the Internet

The proposal would require open Internet locations, such as cafes and libraries, to confirm a user's identity before granting access to the Web. Data harvested from the open Internet locations--including, but not limited to, IP addresses, browser histories, and records of who the user has interacted with--will then be reported to the Danish government under the guise of helping to combat terrorism.
This is on par with the censorship enacted by traditionally stricter countries such as Iran and China.
Hackers put Telstra in filter bind

The voluntary internet filter for child abuse is facing a major setback, with Telstra wavering on the commitment it made to the scheme last July.
"One option being considered is the blocking of a list of illegal child sexual abuse sites identified as being the worst globally by international policing body Interpol."
It is understood Telstra was last night still grappling with the decision as to whether to commit to the voluntary filter because of fears of reprisals from the internet vigilantes behind a spate of recent cyber attacks.
ICANN approves plan to vastly expand top-level domains

ICANN apparently recognized that there's a continued interest in expanding gTLDs, and set about creating a mechanism to handle requests as they come in, rather than to consider them in batches on an ad-hoc basis.
Still, the FAQ also makes it clear that grabbing a gTLD won't be an exercise in casual vanity. Simply getting your application processed will cost $185,000 and, should it be approved, you'll end up being responsible for managing it.
Facebook readying launch of iPad app?

The social-networking giant plans to introduce a free app in the coming weeks that is designed and tailored especially for the tablet computer's touch-screen interface.
iPad users have been begging Facebook for an iPad-native app since Apple began selling the device in April 2010, and it's likely that both Facebook and Apple would benefit from such an app.
Man says he lost $500,000 in virtual currency heist

Rumors of the heist have been swirling since Monday, when a Bitcoin user named Allinvain claimed 25,000 Bitcoins, technically valued at close to $500,000, had mysteriously been transferred to an unknown user's account.
"Bitcoins technical details are complex cryptography and there's no way for us (as developers) to figure whether there was a real theft or not," Nils Schneider.
The true value of the loss "would be more like $300,000 and cause the price to drop to around $10. Also, at the time he acquired the coins they probably were worth only $1000 or less. So the loss is in terms of USD is more a theoretical value."
How Citigroup hackers broke in 'through the front door'

They simply logged on to the part of the group's site reserved for credit card customers - and substituted their account numbers which appeared in the browser's address bar with other numbers.
It allowed them to leapfrog into the accounts of other customers - with an automatic computer programme letting them repeat the trick tens of thousands of times.
Chrome extension allows users to hop WSJ's paywall

"Read WSJ" is the latest vulnerability in the armor of the paywall as a concept in the newspaper business. Work-arounds for the New York Times' paywall were being announced before it even went live, and the paper asked Twitter to shut down a feed that also attempted to circumvent the wall.
CNET reached Sara Blask, a spokesperson for DowJones--the Wall Street Journal's parent company, which itself is owned by Rupert Murdoch's News Corp.--on Sunday, who confirmed that the company is working with Google to have the extension taken down, but it has already proliferated to be available for download on other app markets and websites.
A cloud hangs over the sysadmin

Cloud computing will not result in job losses, not least because whatever promise such models may hold in principle, they will take years to enact in practice.
Cloud computing may not be about to put us all out of work, but it may change how some things are done.
The answer depends on whether we are talking about private or public cloud. In the first, an organisation both manages and exploits the cloud infrastructure; in the second the organisation exploits somebody else's infrastructure.
Citigroup latest bank to disclose hack: 200k accounts compromised

The system breached was Citi Account Online, which contains names, addresses, account numbers, and similar information. Citi claimed that more sensitive data-such as dates of birth, social security numbers, and the CVV card security codes-was held elsewhere, and has not been compromised.
The company said that the hacking was detected in early May by routine account monitoring, but offered no information on how the information was taken or by whom it might have been taken. Nor did Citi state whether the information had been used to perform fraudulent transactions.
LulzSec claims FBI affiliate hacked

The data posted online includes the personal info for 180 users at Infragard, which is a private-public partnership between the FBI and U.S. businesses "designed to protect IT systems from hacker attacks and other intrusions."
Though encrypted, the Infragard passwords were also cracked. Of their wide reuse for personal email and other online services, LulzSec adds: "they should be considered imbeciles from this moment until their moment of death."