Cyberculture agenda: A new secret malware, Regin…Facebook and your mental health…EFF Co-launches Global Coalition on Net Neutrality…

Complex malware known as Regin is the suspected technology behind sophisticated cyberattacks conducted by U.S. and British intelligence agencies on the European Union and a Belgian telecommunications company, according to security industry sources and technical analysis conducted by The Intercept.

Researchers Uncover Government Spy Tool Used to Hack Telecoms and Belgian Cryptographer

Piecing together new information from various researchers, it’s clear the ‘Regin” malware is one of the most sophisticated nation-state spy tools ever found.


Computer security experts Symantec say their researchers have uncovered a sophisticated malware tool on Windows PCs across the globe, that appears to be used for spying and data collection, reports Recode.

For many years, a sophisticated and unprecedented cyberespionage campaign known as “Regin” has been targeting hundreds of computers and networks in dozens of countries around the world. Yet its existence has only been unearthed in the last couple of days

Today EFF is proud to join 35 groups from 19 countries around the world to officially launch the campaign website of a new global coalition for net neutrality, at

Global Net Neutrality Coalition

The breadth and diversity of this coalition underlines how net neutrality has truly become aglobal issue. While Internet users in the United States are speaking up in favor of thereclassification of broadband as a telecommunications service, across the Atlantic activists are also fighting to preserve Europe’s open Internet, which has been placed in jeopardy again this week. (Europeans can take action here.)

Can Facebook damage your mental health?

Studies are starting to reveal how social media are changing our lives—for better and for worse.

Credit: All rights reserved.

BoredTeenager650The latest study to report bad news for Facebook on the topic of teens didn’t focus on number of users, but rather, on frequency of visits.


Today, nearly every resident of a developed country can easily afford a smartphone, thereby gaining inexpensive access to a universe of human knowledge that, until a generation ago, only the richest could afford. Is it possible that conventional measures of inequality and income vastly underestimate just how good we have it?

Nobody knew how to automatically identify creativity until researchers at Yahoo Labs began studying the Vine livestream.

Hacker Lexicon: What Is End-to-End Encryption?

Hacker Lexicon: What Is End-to-End Encryption?

Plenty of companies brag that their communications app is encrypted. But that marketing claim demands a followup question: who has the key?

Why Malvertising Is Cybercriminals’ Latest Sweet Spot

Of all the cyber threats driving headlines, malvertising – seeding malicious code in online advertisements to infect unsuspecting users – might be the most jarring and difficult for many Web surfers to fathom. No one expects to get infected with malware when they visit trusted sites like YouTube or Reuters – hardly the seedy sides of the

Anonymous social media platforms, such as Ello, have caused a furore among digital marketers. Does this herald a rejection of brand ‘engagement’ on social media, or simply a rejection of social media used as advertisement channel?

The Guardian newspaper (London) is putting the future of social media marketing under the microscope – and it wants to hear from YOU!

AP Exclusive: Before Snowden, a debate inside NSA – Ken Dilanian – Nov 19, 5:20 PM – WASHINGTON (AP) — Years before Edward Snowden sparked a public outcry with the disclosure that the National Security Agency had been secretly collecting American telephone records, some NSA executives voiced strong objections to the program


English versus Chinese color descriptors

Color study

Color exists on a continuous spectrum, but we bin them with names and descriptions that reflect perception and sometimes culture. We saw this with gender a while back. Wikipedia has a short description on culture differences and color naming.

data sets design
Humans are walking data centers and our interactions and behaviors, no matter how minuscule, are building a near infinite pool of aggregate data over the course of our lifetime.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.