Showing posts with label News. Show all posts
Showing posts with label News. Show all posts

He returned to piracy e-mails scientific

 

InternetA few days before the UN climate summit in South Africa, as happened on the eve of the climate summit in Copenhagen in 2009, a group of internet hackers sent to a file with 5000 private emails of some leading researchers at the University of East Anglia, UK.

At the time filtration media made a huge noise that turned out to christen the controversy over the content of e-mails as "Climategate", making a pun on words with the famous case of "Watergate," which ended with the mandate of Richard Nixon in the U.S..

Now hackers are breaking the law again for allegedly stealing a lot of emails and make them publicly known through four pages of Internet skeptics of climate change. The information can be downloaded from a Russian server for some time, but during the afternoon of Tuesday the site was blocked and not allowed access to information.

As in the previous edition, the post match discussions of researchers, among which stand out Phil Jones of East Anglia, and Michael Mann of Penn State University (USA).

The University of East Anglia itself says from a statement "there is no recent evidence of a violation of our system. Check if the mails are authentic, the volume of material makes it impossible to confirm that today they are. These emails appear to have been retained after the data theft and e-mails in 2009, to be released at a time intended to cause a maximum effect in the upcoming international talks on climate. "

"It seems to be a carefully planned attempt to reignite the controversy over the science of climate change, although science has been claimed by three separate and independent investigations and a large number of studies, including the last performed by the group surface temperature of the Earth Berkeley ". "As in 2009, extracts the e-mails were taken out of context."

LEGO Universe ends in January

 

 

LEGO is preparing to put an end to LEGO Universe, an MMO based in the world of toy blocks, launched in 2010.

The end of the game implies that 115 jobs will be terminated.

Jesper Vilstrup, LEGO, eslareceu the reasons for the closing of title.

"We now have 2 million players in LEGO Universe, and we have a very positive response from our users. Unfortunately, we were unable to build a business model in satisfying our audience and as such have decided to end the game."

The fate of LEGO Universe will not influence other LEGO videogames, according to Mads Nipper, also from LEGO.

"The development of our digital offerings continues to be an important element of our strategy. Remos more than 20 million visitors each month to LEGO.com, LEGO and video games are among the most sold games for children, with more than 60 million units sold in the last five years. Through our experience we have gained a valuable perspective and have a solid foundation for future digital titles. "

Number of European Ciberconsumers doubles

consumers(Corrected) Between 2005 and 2010, the number of Europeans using the Internet to shop has doubled from 20% to 40%, a study commissioned by the Committee on Internal Market and Consumer Protection of the European Parliament.
For the values ​​achieved have contributed the growth of Internet access in homes of the European Union, which in turn almost doubled in that period analyzed, standing at 70% in 2010, according to the latest figures from Eurostat.
However, the report "Consumer behavior in the digital environment" emphasizes that the largest growth rates were recorded in countries where electronic commerce is more developed, showing that in Southern Europe and Eastern Europe, consumers are less likely shopping online.
Despite the growth of electronic commerce, most Internet users still prefer shopping at national sites, with only 23% to purchase goods and services company Web sites outside of your country.
According to the data gathered, the products are traded over the clothes and accessories and airline tickets, as opposed to computers and electronic products, apparently less desirable to purchase through the Internet for the citizens of the European Union.
Highlighting some benefits of electronic commerce, such as reducing the environmental costs and distribution, responsible for the analysis concluded, however, that the Internet is also a resource that facilitates access to illegal products, suggesting some changes in legislation.
Written under the new agreement Spell
Editor's Note: Corrected information in the first paragraph which states the time interval under consideration.

    Surfing the Internet improves productivity

     

    kid-surfing-web

    Two studies released recently show that after all the policies that seek to restrict free access to the Internet in some enterprises may not be very smart. Studies show that workers who are pauses between the work can be more productive than colleagues who rely on strategies "non-stop."
    On the other hand, stopping to browse the Internet reveals a more positive effect than a break to answer emails or make phone calls, for example. The researchers conclude that is because when you choose to surf the Internet, the user is performing an activity over which it exercises full control. It is he who chooses the sites you are visiting and therefore triggers the experience pleasure, happiness and therefore helps to relax.
    Anyone surfing the Internet during work breaks in the study revealed lower levels of mental exhaustion and boredom, as well as greater capacity for commitment and motivation towards the tasks.
    When surfing the Internet "people choose only the sites they like and it has the same effect as going for a coffee or a snack. Breaks of this kind are nice and refreshing," argues an author on the study quoted by The Wall Street Journal , which details the search results.
    In other activities, such as responding to emails, is required of other types of brain response and so the task does not have the same positive effects, less potential for revealing itself as an aid to recharge and improve the performance of the employee.The study's authors say that this is indeed a task of high potential distractions.
    The studies that infer these conclusions are part of a work called cyberloafing on Psychological Impact of Engagement, Don JQ Chen and Vivien KG Lim, National University of Singapore, presented the United States.
    In one study 96 students were the target of management that were divided into three groups to perform specific tasks. Through these tasks we compared the effects of allowing Internet surfing on breaks from work, with the effects of a ban. Another study examined the behavior of 191 adults and reached similar results.
    The authors point out that as a recommendation to the company a more permissive when it comes to web browsing, personal time and giving workers some permissions to do so. The tasks restrict personal bet is to go through personal email.

    Ballmer: Windows 8 will debut in 2012

     

    windows8

    Microsoft CEO Steve Ballmer said yesterday that Windows 8 will debut in 2012, although the company later called his comments a "misstatement."

    Speaking at a developers conference in Japan yesterday, Ballmer touched upon a variety of topics from Windows Phone to search engines to cloud computing. But the CEO emphasized that Microsoft is working on the next version of Windows and spilled a few details about Windows 8 as the company prepares to make the transition fromWindows 7.

    "We're obviously hard at work on the next version of Windows," Ballmer said, according to a transcript posted on Microsoft's own press site. "Windows 7 PCs will sell over 350 million units this year. We've done a lot in Windows 7 to improve customer satisfaction. We have a brand new user interface. We've added touch, and ink, and speech. And yet, as we look forward to the next generation of Windows systems, which will come out next year, there's a whole lot more coming. As we progress through the year, you ought to expect to hear a lot about Windows 8. Windows 8 slates, tablets, PCs, a variety of different form factors."

    Though Microsoft hasn't quite kept it a secret that it's working on the next version of Windows, the company has yet to officially spill the beans on the exact name and launch date. So this marked the first confirmation at the highest ranks. Ballmer also noted Microsoft's efforts to launch Windows 8 across a variety of platforms from PCs to mobile devices.

    However, it seems Ballmer may jumped the gun by publicly uttering the name and ship year for Windows 8. Following his comments, Microsoft released an official statement saying that its CEO apparently misspoke.

    "It appears there was a misstatement," Microsoft said in a statement released to CNET. "We are eagerly awaiting the next generation of Windows 7 hardware that will be available in the coming fiscal year. To date, we have yet to formally announce any timing or naming for the next version of Windows."

    This isn't the first time Microsoft's feathers have been ruffled over comments specific to the next version of Windows. Intel VP Renee James managed to upset the company last week when she said that Microsoft would release multiple versions of Windows 8 designed for Intel-based PCs as well as ARM-based mobile devices.

    Though it may not debut until next year, Windows 8 could actually make its first stage appearance at next week's All Things Digital D9 conference in California. AllThingsD's Kara Swisher has confirmed that the president of Microsoft's Windows division, Steven Sinofsky, will be one of the speakers.

    Citing a source familiar with Microsoft's plans, tech site WinRumors says Microsoft plans to demo its Windows 8 tablet interface at D9, considered especially likely since the folks in Redmond traditionally tend to unveil new technologies at the annual All Things Digital conference.

    Read more: http://news.cnet.com/8301-10805_3-20065622-75.html#ixzz1Vdpx4ogB

    Technological failure can be used to open prison doors

     

    Cambio-pirata-da-cadeia

    A U.S. researcher has just draw attention to the failures of the electronic system which manages the ports of high security prisons in the U.S.. The vulnerabilities could be used to open the doors to inmates.
    The discovery by John Strauchs promises to become one of the main sights of the DefCon conference, to be held next week in Las Vegas.
    The origin of the vulnerabilities is the use of industrial logic controllers (PLC), which may be the target of attacks by cybercriminals.
    In a statement reproduced by Wired, John Strauchs admits that the authorities will have to protect themselves if they want to avoid greater evils: "Most people do not know how a prison is drawn, and that's why no one ever paid attention to this ".
    Strauchs, who has worked with electronic systems of more than 100 U.S. prisons, ensures that two models of logic controllers from Siemens are vulnerable to malicious code created with the aim of causing the malfunction of various electronic devices that operate in a particular room.
    Most major U.S. prisons are already using logic controllers for opening and closing doors or manage other electronic devices (air conditioners, sensors, lighting). Except that only a portion of these drivers have been supplied by Siemens. This did not prevent Strauchs to develop, together with a colleague who preferred to remain anonymous, an experimental prototype that allows to exploit the vulnerabilities of the Siemens PLC.
    According to researchers in 2500 were enough euros to buy and develop the necessary tools, in just three hours, the program that lets you take advantage of security holes of the PLC.
    To confirm this theory, a part of U.S. prisons will be vulnerable to malicious code Stuxnet that in 2010, has been used to sabotage Iran's nuclear industry

    Hackers can attack car locking systems

    car-hacking

    Systems that allow the blocking of vehicles through text messages sent from a mobile phone can be a target for hackers

    According to two researchers from ISEC, Don Bailey and Matthew Solnik, these systems have different vulnerabilities to be exploited by hackers can remotely take control of these vehicles, which calls into question the safety of both of them as of its users.

    Another of the experts' concerns relates to the fact that this type of technology is also used for remote control of other systems, many related high tech industries, which when accessed by someone malicious could put into question the very safety of a country.

    According to The Register investigators will present the results of their work in the security conference Black Hat, scheduled for next week in Las Vegas

    Amy Winehouse, 27, found dead at her London flat

     

    Amy Winehouse has been found dead at her home in London, it has been reported.

    The Back To Black singer was apparently found at 4pm and her death is believed to be unexplained.

    Winehouse had been seen with her goddaughter Dionne Bromfield earlier this week as the teenager took to the stage at the iTunes festival.

    Passing Amy Winehouse has been found dead at her home this afternoon

    While she didn't perform any tracks, Winehouse apparently begged the crowds to buy Dionne's album.

    A source said: 'Amy staggered onstage and grabbed the mic to beg the crowd to buy her protege’s new album.'

    Winehouse's appearance at the concert came after she cancelled her European tour following a disastrous performance in June when she stumbled onto the stage in Belgrade and gave an incoherent performance appearing very disorientated and removed from reality.

    Following the concert which saw fans enraged and the subsequent video that circulated to millions she cancelled the remaining dates of her European tour.

    A statement released by the troubled singer's spokesperson said that the 27-year-old would be given 'as long as it takes' to recover.

    The statement read: 'Amy Winehouse is withdrawing from all scheduled performances.

    'Everyone involved wishes to do everything they can to help her return to her best and she will be given as long as it takes for this to happen.'

    Google: "A million PCs" steal infected link

    A Google engineer has found clues that show that about one million computers with Windows operating system have been infected with malware that redirects the Internet users' browsing through intermediate servers (proxy).

     

    google.com

     

    Damian Mensch of Google, was conducting routine maintenance when he noticed an unusual traffic still being sent from strange links to the servers. Enlisted the help of experts in cybersecurity and found that these requests came from a group large group of PCs infected with malware proxy redirection.

    The type of attack is not new, but the proportions it has taken this case in the same family of malware, it is "unusual," according to IDGNow.

    The media giant has added a layer to detect and locate this redirects the attack, through which Internet users read on their screens "seems to have been infected."

    "We hope to inform users about the redirection of traffic, we can help you update your antivirus and remove infections," noted Google in his blog.

    Apple delayed iPhone 5 because the A5 chip is overheating?

     

    iphone, rumor, Rumor has it that the iPhone 5 was delayed, and may still be, because Apple's A5 chip has been overheating. The information comes from the Chinese website Sohu (via 9to5Mac).

    The overheating issue is reportedly the reason why Apple pushed back the next iPhone launch from the usual June-July timeframe into the late August-early September timeframe. Apple's silicon team is facing difficulties keeping the dual-core A5 chip cool in the new iPhone's tiny enclosure.

    The iPhone 5 launch has thus been delayed for an unspecified period of time, though many are expecting it to arrive this fall. The rumor claims that it could be pushed back into 2012 though, which would obviously be a big loss for Apple.

    The new iPhone is expected to be thinner and lighter than the current iPhone 4, and will be powered by Qualcomm's wireless chips. Rumors have previously said Apple's iPhone 5 will be an 8MP camera manufactured by Sony featuring dual-LED flash. Higher-resolution pictures and video will be better viewed on the device's rumored larger screen but thinner bezel.

    Apple has been giving some developers access to a device known as the iPhone 4S — an iPhone 4 with upgraded internals. Some argue that's not the next iPhone, claiming the device will reportedly have a radical new case design.

    The iPhone 5 was largely expected to arrive last month, given the iPhone's history, but was delayed. The first iPhone was released on June 29, 2007. The iPhone 3G was introduced on June 9, 2008. The iPhone 3GS was announced on June 8, 2009 and arrived on June 19, 2009 in the first countries. The iPhone 4 was announced on June 7, 2010 and released on June 24, 2010.

    Do you know if your phone is safe?

     

    Mobile_best_worst_phone

     

    How do you rate your mobile phone in terms of radiation emitted? What is the best way to avoid health risks while communicating by phone? These are questions that became more relevant after the warnings from the World Health Organization that the use of mobile phone increases the risk of developing certain cancers.
    A wave of fear is widespread, although there have already been some communication to calm the situation, in particular on the reassessment of the need to study not yet published in full and should be released soon in the journal Lancet Oncology , one of most recognized in this area.
    The warning was the result of work carried out by a group of 31 scientists from 14 countries for the agency for cancer research from the WHO, whose findings indicate that radiation emitted by mobile phones are "potentially carcinogenic". The same classification is assigned to lead fumes from engines and chloroform, for example.
    Underlying the conclusions is that the study shows a growth of 40% in the risk of glioma, a cancer of the central nervous system, including users 'intensive' mobile phones. The participants in the analysis revealed an average of 30 minutes of conversation per day over a period of 10 years. A value that seen in the light of hours users spend on the phone is not even very high ...
    According to data from Anacom for the fourth quarter of 2010, the Portuguese users spent 5.3 billion minutes on the phone, making on average 61 calls per month. Each call lasts an average of 2 minutes and 22 seconds. Doing the math that results in an average of two calls per day, totaling nearly five minutes. But these are average figures, and considering that many users have more than one mobile number is easy to realize it's not casual that the number of these extend far 30 minutes.
    To complicate the problem, the WHO alert is not associated with any list of hazardous equipment or insurance, and ensure that all manufacturers of their equipment emissions are within safety levels set by international organizations, through the SAR (Specific Absorption Rate) which measures the rate of radiation absorption by the body.
    So do the national operators, which contacted by Tek ensure that all equipment is within safety levels and declined to provide a list of the most and least emissions within the current offer.
    But maybe not a reason to get fully rested. Compliance with these SAR levels of security is determined on laboratory equipment, should be guaranteed 2W/kg emissions are below the safe limit according to the recommendations of the World Health Organization, which are prior to these new findings .
    Board is also information that the SAR level may not be the most relevant measure, as the U.S. regulator warns U.S., the FCC, in a communication on the subject . According to the FCC mobile phones have a built-in power control that reduces emissions to a minimum while maintaining the quality of the call. So information about a SAR value alone does not provide enough information about the amount of exposure to Electromagnetic Fields in normal use, preventing the comparison of models of mobile phones.
    Still, the Environmental Working Group (EWG), an American organization profit dedicated to the analysis of issues related to health points out that other studies have already established links between cell phone use and certain cancers, including brain cancer, tumors in the salivary glands and the hearing aid .
    Recently a study indicated also a reduction in bone density and mineral content of bones due to mobile phone use on the body . This analysis was performed with a group of men who used the phone stuck in a waist bag.

    Best and Worst Phones

     

    Prolonged use of mobile phones and continued proximity with this equipment are always increased risk factors pointed out by all studies, so some recommendations should be taken as a precaution as part of the advice compiled by some experts:

    • Keep the phone away from the body when not in use. Not worth having the device in your pocket, or with himself at the desk when you're working. If you use touches will hear the same messages arrive and the call notices.
    • Use the speakerphone feature that allows a lot of equipment already in conversation or refer to ear. Preferably those who already have the wires using Bluetooth also emit radiation.
    • If you do not use any of these systems try not holding the phone to your ear and face, keeping it slightly away.
    • Choose the messages to voice conversations.
    • Avoid calls in places with little sign. The need for tuning the tower increases the radiation emitted.
    • Limit the use of mobile phones by children. Some studies have shown that the lower bone density than the skull becomes more "leaky" to radiation.
    The Environmental Working Group (EWG) has some of these online advice, which joins the recommendation to purchase equipment with the lowest level of radiation. The organization maintains an online guide for anyone who wants to know what the 10 best and 10 worst level of radiation equipment.
    The analysis has been hotly contested - in part because of doubts about the comparison of SAR have mentioned - and also has applicability limits of the Portuguese market models due to differences between the North American market and Europe.

    Android Surpasses iOS in Free Apps

     

    best-android-apps

    Android Surpasses iOS in Free Apps

    In a report released today by PTxServer.NET, the Android Market surpassed Apple’s App Store in the number of available free applications. Android had 134,342, while iOS has 121,845. The report also states that, if the stores continue at their current pace, Google will have the overall largest app store marketplace in the next five to six months, followed by Apple.

    Overall, the app stores across all platforms had slowed down in growth, but that started to pick back up again in March, according to the report. Apple is the slowest is overall growth, although it remains the biggest for the moment.

    Hackers say they have violated Apple security

    1119556

     

    The group announced yesterday AnonymousIRC have managed to violate the security of Apple and to prove it published online 26 user names and passwords obtained in this alleged attack. The information was disclosed to the Twitter account from the group which claims to unite and LulzSec Anonymous.
    This seems to be the latest target of the Anti-Sec campaign, launched by the new group, but in short Twitter message through which publishes the addresses AnonymousIRC also seems to show that now is putting his "commitment" elsewhere, and that there is interest in continuing to attack Apple.
    After the attacks LulzSec deos have checked the computer security agenda in recent weeks, seeking a series of private and public entities, the group keeps hackers AnonymousIRC the campaign you want to keep the operation Anti-Security and defend the manifesto promoted by LulzSec, that however "closed" activity.
    The attack was first reported by The Hacker News but various media Americans reported the news yesterday, including The New York Times. Apple does not comment on security breach that may affect your image, especially at a time when the company prepares to expand its cloud computing services with iCloud.

    German authorities demand that calling parties is prohibited by Facebook

    Facebook Lawsuit

    "When security and public order are threatened the party invitations via Facebook should be banned in advance," he told Welt am Sonntag newspaper the interior minister of the state of Lower Saxony, Uwe Schnemann.

    Also the minister of the Interior of North Rhine Westfalia, Ralf Jger, going the same way. "If there is evidence of danger to participants or to third parties through Facebook called, local officials should prohibit the act," he said.

    Since its Bavarian counterpart, Joachim Hermann, warns that an "innocent invitation" to a birthday party can quickly become "a serious security problem", with unpredictable consequences.

    The controversy about the social networking calls began in early July, when a teenager from Hamburg made an invitation to your 16th birthday Through Facebook (it wrong and did it openly). Flocked to the anniversary more than 1600 people.

    More than a hundred police officers had to be called to control the situation, with 11 participants at the party held for assault, property damage and resisting police.

    In the middle of last month the police were called to disperse several parties through Facebook, including one in Wuppertal, West Germany, to which 800 people spontaneously rushed, and in which the police arrested 41 young people. 16 still led the party injured.

    Schnemann requires that young Germans receive information in schools about the dangers of Facebook and acknowledged that "teens do not know, on many occasions, they can pitch."

    Still, he cautions that these gatherings could potentially become the parents of kids that call upon to cover costs of the situation in many cases thousands of euros.

    On the other hand, Hermann notes that the person making the call might take on other costs, since many of the people who come to these meetings - even without being asked - just do it to cause trouble.

    "If you open an investigation, the charge for the call may even have to assume the costs of police deployment," considers the holder of the Interior of Bavaria.

    Apple could buy the mobile industry !

     

    mobile-phone-industry

    Apple is, according to market capitalization, the largest technology company in the world, currently valued at 301.79 billion U.S. dollars (about 212 600 million), and also has a reserve which, according to one analyst, could buy three quarters of mobile phone industry.

    According to the analyst Horace Dediu of Asymco, the great rivals of Apple mobile phones are Nokia (costing 22.6 billion dollars, about 15.9 billion euros), RIM (13.8 billion dollars, approximately 9.7 billion euros), HTC (25.4 billion dollars, about 17.8 billion euros) and Motorola (4.2 billion U.S. dollars, approximately 2.9 billion euros ).

    All these companies, 66 billion dollars (about 46 400 million) represents 75% of sales of mobile phones worldwide, according Dediu.

    If you were to spend even more, Apple could add to the "shopping list" LG (10 billion dollars, about seven billion euros) and Sony Ericsson (three billion U.S. dollars, approximately 2.1 billion euros ), adding a "cake" of 79 billion dollars (some 55.6 billion euros).

    The successor to the PSP can only reach Europe in 2012.

    PSVita

    According to VG247, PlayStation Vita can only be launched in Europe next year.

    The information is given by an unofficial source joins another from a retailer, which points in January / February 2012 as the time of launch.

    However, it is not ruled out the possibility that the laptop arrive later this year to the United States.

    Remember that Kaz Hirai has promised to Vita for the end of 2011, but later came to Jack Tretton in the fiscal year ending in March 2012 said.

    Data from 1.29 million customers were stolen in an attack Sega "hacker"

    sega-sonic

    The Sega Pass site, operated by the Sega Europe, headquartered in London, did not contain credit card information, assured the company. But hackers have stolen, on Friday, names, birth dates, and encrypted passwords of customers, Sega said. Also the Japanese company Sony has recently been the victim of attacks performed by hackers.

    The last attack was claimed on June 6 by a group of "hackers" American, known as the LulzSec, who said he had had access to more than one million passwords, e-mail and other information SonyPictures. com.

    A Sony spokesman confirmed to EFE that opened an investigation about this case that happens after hackers stealing data from mid-April more than 100 million users of various Internet services company.

    The group of "hackers" LulzSec claimed responsibility for the attack last few hours online to Sony nipónica after the company announced the restoration of the network for video games PlayStation Network.

    This attack on the Sony was another episode of the supposed "crusade" started several months ago by some groups of hackers against the giant Japanese electronics and is a setback for the company in May announced losses of 2,250 million in fiscal year 2010, after also have been affected by the earthquake and tsunami of 11 March in the Northeast.

    Cell Phone Dangers – Are you willing to risk cancer?

    CellDangerIn today’s technology driven world, we rarely pause long enough to question the possible health risks associated with using modern communication devices. Almost everyone in the world today has a cell phone, in fact the statistics show there are currently over 4 billion cell phones in use today. That equates to 66% of all people have a cell phone or live with someone that does. Have you considered cell phones may be creating health hazards that may not show up for 20 years?

    There are many studies showing strong correlations to cell phone usage and brain tumors! Cell phone dangers are not just isolated to brain tumors or cancer but actually can cause sleeping disorders, headaches and increased stress to the body. The disorders are caused by the radio frequencies emitted by the cell phone antennas. Cell phones transmit information to your local provider via microwave transmissions. These signals are absorbed by your body and is the basis for these health issues.

    I don’t believe the worlds population should be exposed to this rather large scientific experiment! We are the proving ground for the industry to determine if there is really a health risk to using cell phones. Until there is conclusive evidence cell phone can be hazardous to our health, much of the world is just ignoring the evidence and pretending there is no risk.

    There are some things we can do as consumers to help avoid the health risks of using cell phones.

    • Don’t use your cell phone for extended periods of time
    • Keep the phone 6″ from your ear
    • Use your land line for most of your calls
    • Use a headset, thus the phone is away from your body
    • Text more and talk less
    • Purchase a radio frequency shield for your phone

    Children are more at risk than adults. They have brains that are more susceptible to these radio frequencies as their skulls are thinner and brains are smaller. This allows the radio frequencies to penetrate further into the brain.  Also, children will be exposed to the emissions from phones for a longer period of time as they are young and will be using cell phones for most of their lives.

    Take charge of your health! Be aware of cell phone dangers and take precautions to prevent health issues in the future. Our store has devices which will eliminate or drastically decrease the effects of cell phone usage.Cell Phone Protection Devices here.

    IMF ( FMI ) was the target of hacking

    The International Monetary Fund (IMF), which holds sensitive information about the vast financial situation of many countries, was the target of a "complex" computer attack recently, reports the New York Times today.

    fmi_simbolo_logo_Washington_epa

    The report said the hacking was revealed in the IMF's internal information circulated on Wednesday and was considered "complex" and its dimensions are still unknown.

    "This is a failure (security) is too large," said the New York Times an IMF staff, who said that the attack occurred over the past few months.

    David Hawley, a spokeswoman for the IMF, said the incident is being investigated but that the international institution "operates in full."

    The IMF coordinates the rescue programs in Portugal, Greece and Ireland, also in possession of sensitive information about other countries as well as other data that may affect the markets.

    With AFP

    S.A.D - JUST SURF AND DESTROY

    Surf And Destroy _ LogoThe S.A.D. is created by a group of friends as a brand of surf wear and more hard-core old school that has a concept  more underground and less commercial compared to other surf brands currently available. .... JUST SURF AND DESTROY!

     

    Facebook Webpage ( Portugal ) : here

    Translate Website

    ShareThis