Off the Wire

Off The Wire Archive

News items for October 2006

MySpace 'to block illegal files'
Social networking site MySpace is to block users from uploading copyrighted music to its pages. [more]
Tuesday, 31 October 2006, 6:01 PM CET


Microsoft mandates Office piracy check
Microsoft on Friday made an anti-piracy check by Microsoft Office XP and 2003 mandatory for users of most versions of the application suite, the company said. [more]
Tuesday, 31 October 2006, 1:41 PM CET


How to setup and verify a backup solution for MySQL
The value of data stored in MySQL grows exponentially. For companies who are using MySQL in production, loss of data can be catastrophic, resulting in lost revenues, lost customers and lost reputations. Setting up a backup and restore process for MySQL databases typically takes up a lot of a DBA's time and attention. [more]
Tuesday, 31 October 2006, 1:38 PM CET


Attack of the bots
The latest threat to the Net: autonomous software programs that combine forces to perpetrate mayhem, fraud, and espionage on a global scale. How one company fought the new Internet mafia – and lost. [more]
Tuesday, 31 October 2006, 1:37 PM CET


New Windows attack can kill firewall
Malicious ackers have published code that could let an attacker disable the Windows Firewall on certain Windows XP machines. [more]
Tuesday, 31 October 2006, 1:34 PM CET


Virus writers target web videos
The growing popularity of online video has caught the attention of malicious hackers and hi-tech criminals. [more]
Tuesday, 31 October 2006, 1:31 PM CET


1,200 Dutch e-voting machines vulnerable to hacking
Dutch intelligence service AIVD has ruled 1,200 e-voting computers inadequate for next month's national elections after testing showed the machines could be be easily intercepted from 20 to 30 metres away. [more]
Tuesday, 31 October 2006, 1:31 PM CET


Mass spam uses BMW to dupe users
Hey, you've won €950,000 and a brand new BMW 5 Series. [more]
Tuesday, 31 October 2006, 1:15 PM CET


Tricky new malware challenges vendors
Worm propagates via e-mail, can then download new versions of itself every 30 minutes. [more]
Tuesday, 31 October 2006, 12:00 AM CET


Ohio child hospital hack exposes 230,000 files
Hackers broke into the systems of an Ohio hospital last month raising fears that the personal details of up to 230,000 patients or their family members, and banking information on around 12,000 financial donors, might have been compromised. [more]
Monday, 30 October 2006, 6:22 PM CET


Cyber crimewatch
The world’s security forces are fighting back in their efforts to contain the threat of internet crime. [more]
Monday, 30 October 2006, 6:10 PM CET


Feds leapfrog RFID privacy study
The story seems simple enough. An outside privacy and security advisory committee to the Department of Homeland Security penned a tough report concluding the government should not use chips that can be read remotely in identification documents. [more]
Monday, 30 October 2006, 2:02 PM CET


Australian spammer prosecuted
First prosecution under Australian spam act. [more]
Monday, 30 October 2006, 2:01 PM CET


Recover data from a dead hard drive using ddrescue
Like dd, dd_rescue does copy data from one file or block device to another.dd_rescue is a tool to help you to save data from crashed partition. [more]
Monday, 30 October 2006, 12:42 AM CET


Copying own CDs 'should be legal'
A think-tank has called for outdated copyright laws to be rewritten to take account of new ways people listen to music, watch films and read books. [more]
Monday, 30 October 2006, 12:16 AM CET


FBI raids boarding pass maker's house, seizes computers
Sometime after 2:00 a.m. Central Time Saturday morning, the FBI searched the home and seized computers belonging to Christopher Soghoian, an Indiana University Ph.D. student who created a DIY boarding pass generator, according to a post on his blog. Backstory. [more]
Monday, 30 October 2006, 12:03 AM CET


User tricks, security treats
Because sometimes dealing with folks at the office is a dark art. [more]
Monday, 30 October 2006, 12:01 AM CET


Taking mobile security to new heights
"Security is increasingly a key function for mobile phones as they become loaded with more sophisticated features," said NTT DoCoMo spokeswoman Mamiko Tanaka. "Handset makers are all competing to come up with interesting ways to strengthen security." [more]
Friday, 27 October 2006, 7:39 PM CET


MySpace accounts compromised by phishers
Netcraft has discovered that the social networking site, MySpace, appears to have been compromised by phishers who have presented a spoof login form on the main site. [more]
Friday, 27 October 2006, 4:22 PM CET


Test Your Knowledge of CCNP Topics
One of the best mid-level certifications currently available is CCNP (Cisco Certified Network Professional). [more]
Friday, 27 October 2006, 2:37 PM CET


Federal biometric smart-card deadline looms
Most agencies on track for compliance. [more]
Friday, 27 October 2006, 2:36 PM CET


Security vendor circumvents Windows Vista's Patchguard
Microsoft vows to block shortcut. [more]
Friday, 27 October 2006, 2:30 PM CET


Public key cryptography celebrates anniversary
Dignitaries from the computer security field took the stage at the Computer History Museum Thursday evening to note the 30th anniversary of public key cryptography and wax historical about academic, governmental and commercial developments in security and ponder the future. [more]
Friday, 27 October 2006, 2:29 PM CET


IE7 hit by URL spoofing flaw
First security flaw hits new Microsoft browser. [more]
Friday, 27 October 2006, 7:33 AM CET


Microsoft wins case against German spammer
Microsoft has won a court case against a German spammer charged with forging e-mail and making it appear to come from Microsoft's hotmail.com domain. [more]
Friday, 27 October 2006, 6:59 AM CET


Is your DBA a spy? Don't fall victim to internal security threats
Probably 80% of the threats to corporate data come from outside the company walls, but organizations should have those pretty well under control today," says Jerald Murphy, senior vice president and director of research operations at The Robert Frances Group. [more]
Friday, 27 October 2006, 6:57 AM CET


BitTorrent site admin sent to prison
The 23 year old Grant Stanley has been sentenced to five months in prison, followed by five months of home detention, and a $3000 fine for the work he put in the private BitTorrent tracker Elitetorrents. [more]
Friday, 27 October 2006, 6:56 AM CET


Mozilla team downplays first Firefox 2.0 bug reports
Bug trackers have had a couple false starts with the release of Firefox 2.0, a top Mozilla Corp. engineer said Thursday. [more]
Friday, 27 October 2006, 6:51 AM CET


VoIP, hackers, botnets among challenges cyberprotectors face
A legal system rife with outdated laws never designed to cope with such new technologies as VoIP is just one of the worries facing Stephen Treglia, chief of the technology crime unit in the district attorney’s office of New York's Nassau County. [more]
Friday, 27 October 2006, 6:50 AM CET


Authentication the message for next round in spam fight
Microsoft, Sendmail kick off efforts to bolster e-mail authentication. [more]
Friday, 27 October 2006, 6:46 AM CET


Super power password protection - watching you watching me
Not a day goes by without some story hitting the wires about yet another piece of confidential information appearing in somebody’s inbox. So who can have access to information, and why in spite of all the security that organisations have in their IT infrastructure is this still a daily occurrence? [more]
Thursday, 26 October 2006, 1:08 PM CET


China jails Internet dissident for three years
A Chinese court on Wednesday jailed a dissident for three years for inciting subversion with an Internet essay praising pro-rights protests in Hong Kong, a human rights group said. [more]
Thursday, 26 October 2006, 8:44 AM CET


How to steal an election by hacking the vote
What if I told you that it would take only one person—one highly motivated, but only moderately skilled bad apple, with either authorized or unauthorized access to the right company's internal computer network—to steal a statewide election? [more]
Thursday, 26 October 2006, 8:43 AM CET


Security, networks to converge, and move offshore
A few years ago, when networking technology experts and traditional security experts got together, they could barely communicate. Now, the two areas are converging at a rapid pace and business leaders should plan for more changes ahead, according to several experts who spoke Wednesday. [more]
Thursday, 26 October 2006, 2:43 AM CET


Data storage security – quo vadis
Today, industry trends are forcing security in the data center to be re-thought. In particular, the trend towards consolidation results in increasingly centralised data storage which in turn creates new security vulnerabilities. [more]
Thursday, 26 October 2006, 1:52 AM CET


Provide a trusted platform for mobile electronic payment
With the growing intelligence and popularity of mobile phones and the trend of cellular networks convergence to IP-based networks, more and more mobile applications are emerging in the marketplace. [more]
Thursday, 26 October 2006, 1:00 AM CET


Verisign backs Vista security green streak
The Mozilla Foundation risks losing the browser battle if it fails to keep up with Microsoft by incorporating new security technology into Firefox, a Verisign exec has claimed. [more]
Thursday, 26 October 2006, 1:00 AM CET


Cyber crime high on FBI priority list, help wanted
The FBI places cyber attacks among its top three priorities, said Mark Mershon, assistant director in charge of the New York City field office. [more]
Thursday, 26 October 2006, 12:51 AM CET


Developing a secure e-mail strategy
Message encryption, along with other measures, should be a critical part of your overall security strategy. [more]
Thursday, 26 October 2006, 12:40 AM CET


Online ID fraud is hyped; real problem is off-line
Despite incidents such as the $22 million in losses suffered by E-Trade Financial Corp. and TD Ameritrade Holding Corp. from online identity fraudsters, the problem of online identity theft is vastly hyped when compared with its more prevalent off-line equivalent, according to one analyst group. [more]
Thursday, 26 October 2006, 12:36 AM CET


Financial firms join security audit program
Five banks have become the latest U.S. financial organizations to join an effort to streamline the assessment of online banking security. [more]
Thursday, 26 October 2006, 12:08 AM CET


Tunneling with SSH
This article describes the setup of a simple SSH client connecting to an AIX- or Linux-based SSH server that allows a typical, technically literate individual the ability to set up, configure, and operate a flexible means of tunneling data and services over the SSH service. [more]
Wednesday, 25 October 2006, 8:45 AM CET


Florida 'botmaster' charged with Akamai DDoS attack
A Florida man was in federal court today, accused of launching a DDoS attack on Akamai which brought much of the internet to its knees - for a few hours. [more]
Wednesday, 25 October 2006, 8:36 AM CET


Faulty IP address data leads to Shaq attack on innocent family
Anyone who follows the slate of lawsuits against music fans is cognizant of the crucial role that IP addresses play in attempts to cow suspected file sharers. [more]
Wednesday, 25 October 2006, 8:34 AM CET


In contest for talent, intelligence agencies lose out
After devastating personnel cuts in the 1990s, intelligence agencies don’t have the workers they need who can speak foreign languages, analyze data and anticipate threats to the nation’s security. [more]
Wednesday, 25 October 2006, 2:37 AM CET


Viruses, phishing, and Trojans for profit
Following the 2006 International Virus Bulletin Conference, Kelly Martin takes a look at the profit motives of the cyber criminals behind modern viruses, targeted trojans, phishing scams and botnet attacks that are stealing millions from organizations and individuals. [more]
Wednesday, 25 October 2006, 2:34 AM CET


UK police count 8,500 victims in data theft
Sprawling operation also snagged personal information from people in 60 other countries. [more]
Wednesday, 25 October 2006, 1:24 AM CET


What does the future of malware look like?
The truth is, no one knows. [more]
Wednesday, 25 October 2006, 12:48 AM CET


Building an (ironclad) IT security plan
Network security receives much more attention and budget support than it did just a few years ago. Having a good security plan in place has become a necessity for any security-conscious organization. But like any plan, the devil is in the details – or lack there of in many cases. [more]
Wednesday, 25 October 2006, 12:42 AM CET


Keeping your computer security program on-message
Some security managers want to incorporate ethics into their security awareness presentations. I am very much against that. [more]
Wednesday, 25 October 2006, 12:30 AM CET


Microsoft opens Sender ID Framework
Microsoft's Sender ID Framework is not the only technology that sorts spam from legitimate messages. [more]
Wednesday, 25 October 2006, 12:24 AM CET


Vista kernel fix 'worse than useless'
Microsoft has modified Windows Vista to prevent a high-profile exploit demonstrated at security conferences this summer but the fix creates as many problems as it solves, according to the security researcher who identified the original problem. [more]
Wednesday, 25 October 2006, 12:20 AM CET


The importance of wireless security
Why is it that security is such a big worry for organizations when it comes to deploying wireless networks, applications and devices to improve employee productivity? [more]
Wednesday, 25 October 2006, 12:09 AM CET


Build a centralized log management and monitoring system
Seasoned system administrators know that routinely reading system logs is an important task, but reading endless lines from logs is both time-consuming and boring, especially if you are responsible for a large number of busy servers. [more]
Wednesday, 25 October 2006, 12:06 AM CET


Staff hold key to successful security
Research says boardroom backing is most important factor in securing data. [more]
Tuesday, 24 October 2006, 2:33 PM CET


Chicago voter info vulnerable to hackers
The city is investigating a security glitch in its elections Web site that hackers could have used to swipe Social Security numbers and the personal information of about 1.3 million voters, officials said. [more]
Tuesday, 24 October 2006, 1:49 PM CET


Anti-virus vendors trade insults over Vista
A row has broken out between rival anti-virus companies about their readiness to provide protection for Microsoft's new operating system. [more]
Tuesday, 24 October 2006, 1:46 PM CET


Hacking contactless credit cards made easy
US security researchers have demonstrated how easy it might be for crooks to read sensitive personal information from RFID-based credit and debit cards. [more]
Tuesday, 24 October 2006, 1:46 PM CET


Cahoot taking steps to fill security gaps
Online banking security survey shows serious failures. [more]
Tuesday, 24 October 2006, 1:45 PM CET


How to hacker-proof your business
Is the information stored by your company secure? Here's how to make sure your confidential data remains top secret. [more]
Tuesday, 24 October 2006, 1:00 PM CET


U.S. e-passports hitting market
The first generation of electronic passports is debuting now at a port of entry near you. [more]
Tuesday, 24 October 2006, 12:23 PM CET


'ID theft risk' on bank websites
Three UK banks are failing to prevent the possible theft of online customers' identity, an online security company has warned. [more]
Tuesday, 24 October 2006, 12:21 PM CET


Survey reveals security doubts shape Internet behaviour
Symantec announced that more than 50 percent of Australian and New Zealand PC users consider the Internet fundamental to their daily lives but 80 percent of them remain unaware of online threats. [more]
Tuesday, 24 October 2006, 9:13 AM CET


Microsoft delays Service Pack 3 again
Microsoft quietly let it be known this week that it plans yet again to delay the release of Service Pack 3 for Windows XP users, this time until some point in the first half of 2008. [more]
Tuesday, 24 October 2006, 12:33 AM CET


Cybercrime flourishes in online hacker forums
Criminals covet your identity data like never before. What's more, they've perfected more ways to access your bank accounts, grab your Social Security number and manipulate your identity than you can imagine. [more]
Tuesday, 24 October 2006, 12:24 AM CET


Trial challenging Child Online Protection Act begins
A federal trial that began Monday in Philadelphia will decide whether operators of Web sites can be jailed and fined for not blocking children's access to materials deemed "harmful" to them. [more]
Tuesday, 24 October 2006, 12:21 AM CET


Hackers hit online brokerages
Computer hackers in Eastern Europe and Asia have stepped up fraudulent attacks against customer accounts at U.S. online brokerage firms including E*Trade Financial and TD Ameritrade, according to executives from the companies. [more]
Tuesday, 24 October 2006, 12:03 AM CET


Cybercrime cooperation advances
Interview: DOJ's security expert Christopher Painter discusses steps the G8 countries are taking to fight burgeoning computer crime. [more]
Tuesday, 24 October 2006, 12:01 AM CET


How safe is Web 2.0?
Technology commentator Bill Thompson says the latest incarnation of the web, dubbed Web 2.0, is prone to the same flaws as its predecessor. [more]
Tuesday, 24 October 2006, 12:00 AM CET


Cost of hack attacks soars
Average cost now $182 per compromised record. [more]
Monday, 23 October 2006, 5:01 PM CET


Exchange Server bug sets meetings ahead an hour
Problem only affects GMT time zone. [more]
Monday, 23 October 2006, 4:51 PM CET


Multifactor security
BioPassword software might just make network security via password protection alone obsolete. [more]
Monday, 23 October 2006, 4:44 PM CET


Irish passports go RFID, and naked
The Irish government has begun issuing RFID passports with biometric data that can be read at a distance to comply with US regulations for its visa waiver programme. [more]
Monday, 23 October 2006, 4:43 PM CET


Security risk found in new credit cards
They call it the "Johnny Carson attack," for the entertainer's comic pose as a psychic divining the contents of an envelope. [more]
Monday, 23 October 2006, 4:42 PM CET


Is Oracle downplaying security vulnerabilities?
Several researchers say vendor skewed recent threat rating scores. [more]
Monday, 23 October 2006, 9:22 AM CET


The changing faces of Internet security threats
"MSSPs must overcome customer concerns that routine business activities will be mistakenly blocked -- and that as outsiders, the MSSPs will be too slow to realize and react to that situation," said Kelly Kavanagh of Gartner's Internet security and privacy group. [more]
Monday, 23 October 2006, 12:15 AM CET


Hackers' project disguises security-busting code
Secret not-a-toy surprise designed to evade AV software. [more]
Monday, 23 October 2006, 12:01 AM CET


Beer fingerprints to go UK-wide
The government is is funding the roll out of fingerprint security at the doors of pubs and clubs in major English cities. [more]
Friday, 20 October 2006, 8:29 PM CET


Computers, networks and theft
Cybercrime has evolved considerably over the past few years with new technologies being created and applied. As a result, cybercrime is no longer committed by individual amateurs; it’s become a lucrative business run by highly organized groups. [more]
Friday, 20 October 2006, 7:08 PM CET


Keeping up with advancing malware
Vendors are finding increasingly more effective ways to battle malware such as viruses, Trojans, and bots. Unfortunately, malicious programmers continue to concoct newer, nastier code, and companies need to update their security arsenal and defense plan accordingly. [more]
Friday, 20 October 2006, 2:12 PM CET


Organised crime fails to stop script kiddies
About a year ago, I attended a top-level roundtable meeting of malware experts, where we discussed organised crime on the internet, and came to the conclusion that, in one sense, it might be a good thing for users. [more]
Friday, 20 October 2006, 12:55 PM CET


Top 10 security companies to watch
These companies aim to simplify, extend, boost security. [more]
Friday, 20 October 2006, 11:22 AM CET


Microsoft to test security firms' patience until 2008
Redmond will not release APIs to provide access to Vista kernel for some time. [more]
Friday, 20 October 2006, 11:15 AM CET


Snort 2.6 and Afterglow
Snort started out as a signature, rules-based Intrusion Detection System. Afterglow is a visual log analysis tool. [more]
Friday, 20 October 2006, 11:05 AM CET


Vista security discussions off to bad start
Technical glitch keeps key security rivals from joining first online discussion of contentious Vista kernel seccurity. [more]
Friday, 20 October 2006, 11:03 AM CET


How to catch a MySpace creep
Six months ago, Wired News launched an investigation of MySpace with the goal of comparing the company's 120 million user profiles against public sex offender registries to see how many matches we could find. [more]
Friday, 20 October 2006, 11:02 AM CET


Web viruses wilt but spyware soars
Latest findings from internet global threat report. [more]
Friday, 20 October 2006, 11:01 AM CET


So who has access to your email?
In a company of 15,000 employees, 20 to 30 IT workers normally have access to executive-level email. [more]
Friday, 20 October 2006, 1:02 AM CET


Onerous Vista activation - a time bomb?
Do we really need Windows Genuine Advantage? [more]
Friday, 20 October 2006, 12:50 AM CET


Microsoft chips away at piracy in the UK
Microsoft's Keep IT Real program has cut the piracy rate for Windows XP faster than expected. [more]
Friday, 20 October 2006, 12:45 AM CET


Already a security vulnerability in Internet Explorer 7
A vulnerability has been discovered in Internet Explorer, which can be exploited by malicious people to disclose potentially sensitive information. [more]
Friday, 20 October 2006, 12:33 AM CET


Hacking for profit
“Hackers aren’t looking for fame anymore,” says Yuval Ben-Itzhak, CTO of Israeli security firm Finjan. Unlike in earlier years, their fondest hope is no longer that their PC-crashing code prompts headlines and TV news coverage around the globe. [more]
Friday, 20 October 2006, 12:21 AM CET


New 'e-passports' raise security issues
A new generation of United States passports, equipped with short-range radio tags, are arriving in mailboxes across the country. [more]
Friday, 20 October 2006, 12:06 AM CET


D-Link introduces new WiMAX router
"We know the 'last mile' in reaching potential broadband customers can be the most expensive to complete," said D-Link CEO Steve Joe. D-Link's new router, he said, will let phone companies and other providers bring true broadband to customers in spots that are too remote for DSL and cable. [more]
Friday, 20 October 2006, 12:03 AM CET


Interview with Marc Vaillant, CEO of Criston
In this interview, he discusses the biggest security threats, security ROI, patch analysis, and more. [more]
Thursday, 19 October 2006, 12:11 PM CET


Documenting and evaluating the security guarantees of your apps
In this article, I'll present a case study of an extension to SDL which, if adopted, could translate into a much better flow of information between users and designers of the security features of software products. [more]
Thursday, 19 October 2006, 11:54 AM CET


Survey: More phishing suckers out there than we thought
Indiana University simulates e-mail scams used to swipe data from eBay customers. [more]
Thursday, 19 October 2006, 11:52 AM CET


FBI head calls for data retention rules
Do you hear it? That rhythmic beat is the sound of the data retention drum being thumped by politicians and security figures. [more]
Thursday, 19 October 2006, 11:26 AM CET


The architecture of security
In his book, Code and Other Laws of Cyberspace, Lawrence Lessig describes how decisions about technological infrastructure -- the architecture of the internet -- become embedded and then impracticable to change. [more]
Thursday, 19 October 2006, 11:20 AM CET


Uncover security design flaws using the STRIDE approach
There are multiple approaches to threat modeling, and anyone who tells you his method is the only right one is mistaken. [more]
Thursday, 19 October 2006, 11:17 AM CET


Deductive and inductive reasoning
Both types of reasoning play different roles in investigations/forensics/science/etc. [more]
Thursday, 19 October 2006, 11:10 AM CET


California may mandate Wi-Fi warnings
Legislature wants to mandate reminder to secure hotspots. [more]
Thursday, 19 October 2006, 1:00 AM CET


Steal my ID, steal my fingers - the public gets nervous
So how many fingers do you need anyway? [more]
Thursday, 19 October 2006, 12:45 AM CET


Net is terror training tool - US security chief
The internet is a dangerous tool of radical ideologies, according to the US Homeland Security Secretary Michael Chertoff. [more]
Thursday, 19 October 2006, 12:32 AM CET


Microsoft: Excuses on iPod virus not credible
Redmond virus scanning expert offers to help clean up iPod mess. [more]
Thursday, 19 October 2006, 12:27 AM CET


8 simple rules for developing more secure code
This article discusses several key points that will enable you to develop more secure code. [more]
Thursday, 19 October 2006, 12:21 AM CET


Study: U.S. loaded with Internet addicts
The new study on Internet addiction by Stanford researchers found that among the habits online users develop is strong compulsion to check e-mail, post blog entries, or visit Web sites or chat rooms. [more]
Thursday, 19 October 2006, 12:12 AM CET


Internet user admits 'web-rage'
An internet user has been found guilty of what police said was Britain's first "web-rage" attack. [more]
Wednesday, 18 October 2006, 5:21 PM CET


New SQL truncation attacks and how to avoid them
Exploits using SQL injection have drawn a lot of attention for their ability to get through firewalls and intrusion detection systems to compromise your data layers. [more]
Wednesday, 18 October 2006, 4:58 PM CET


Music piracy crackdown targets seventeen countries
The International Federation of the Phonographic Industry has launched more than 8,000 legal cases against illegal music downloaders across 17 countries in recent weeks. [more]
Wednesday, 18 October 2006, 4:56 PM CET


How well do you know your network?
The information security officer for a network of healthcare centers in New York found an employee sending confidential payroll information to a recruiter. [more]
Wednesday, 18 October 2006, 4:55 PM CET


Hackers' project hides browser-busting code
VoMM creates new versions of known exploit code to make it undetectable by antivirus software. [more]
Wednesday, 18 October 2006, 4:52 PM CET


Passwords jotted down by 1 in 3 workers
Study shows IT security risk, urges companies to adopt biometrics instead. [more]
Wednesday, 18 October 2006, 4:51 PM CET


Hackers' project disguises security-busting code
Secret not-a-toy surprise designed to evade AV software. [more]
Wednesday, 18 October 2006, 10:02 AM CET


Oracle's mega-patch shuts 101 doors
Oracle today published the mother of all security patches containing 101 fixes for flaws in its database, application server, E-Business Suite and PeopleSoft and JD Edwards applications. [more]
Wednesday, 18 October 2006, 10:01 AM CET


Microsoft to release privacy guidelines
Marc Rotenberg, executive director of the Electronic Privacy Information Center, said Microsoft has spent more time thinking about these types of issues than some of its younger competitors, which may not have yet faced the privacy problems Microsoft has dealt with. [more]
Wednesday, 18 October 2006, 12:01 AM CET


E-passport launched in Ireland
Ireland has launched its e-passport, just days ahead of a US deadline to bring in biometric passports or risk being booted from the visa waiver scheme. [more]
Tuesday, 17 October 2006, 5:09 PM CET


Nvidia rooted by Linux graphics bug
Security researchers have published an exploit that highlights a long-standing security bug in Nvidia graphic drivers for Linux. [more]
Tuesday, 17 October 2006, 2:18 PM CET


Needed: a national cyber security law
Paul Kurtz, head of the Cyber Security Industry Alliance, says it's time for Congress to pass a law aimed at preventing security breaches. [more]
Tuesday, 17 October 2006, 9:16 AM CET


MySpace predator caught by code
Serial child molester Andrew Lubrano was looking to hook up with underage boys on MySpace, when a computer search by Wired News picked him out of the site's million-plus user base, along with over 700 other registered sex offenders. MySpace says it can't do the same. [more]
Tuesday, 17 October 2006, 2:41 AM CET


BT cracking down on botnet operators
BT estimates that some 80 percent of e-mail messages, or 6.5 billion e-mails a day, are spam, with a significant portion of these messages containing Trojans or other viruses. BT's new "spam buster" system is designed to identify and shut down major spammers operating botnets around its network. [more]
Tuesday, 17 October 2006, 2:00 AM CET


Time to update your employee monitoring policy?
You have no expectation of privacy!" So say most corporate privacy policies for employees, like a bullying reminder of the obvious. [more]
Tuesday, 17 October 2006, 1:42 AM CET


Privacy perils plague Net
If you don't like what your favorite internet search engine or e-commerce site does with information it collects about you, your options are limited to living with it or logging off. [more]
Tuesday, 17 October 2006, 1:30 AM CET


Secret service agents question teen over bush threat on MySpace
Federal agents questioned a 14-year-old high school freshman in Sacramento, Calif., last week after they found threatening comments posted on her Web page on MySpace.com. [more]
Tuesday, 17 October 2006, 1:12 AM CET


Approaches to fighting spam in an Exchange Server environment
Unsolicited e-mail messages, also known as junk e-mail messages or spam, are messages sent from a single source with the intent of broadcasting to many mailboxes at one time. [more]
Tuesday, 17 October 2006, 1:00 AM CET


Insecurity in open source
Debates over what methods result in the best software often pit those who favor an open-source approach against proponents of proprietary, or closed-source, development. [more]
Tuesday, 17 October 2006, 12:27 AM CET


Data protection management: shedding light on complex infrastructures
Data protection strategies have become significantly more complex in recent years. Companies that used to rely on a single-vendor tape backup solution are now using disk-based backup, tape-based archive, snapshot, replication, and a host of other strategies to cope with new business requirements and exponential data growth. [more]
Tuesday, 17 October 2006, 12:10 AM CET


EU plans to block terror sites, but doesn't know how
Commission at 'early stage' of bafflement. [more]
Tuesday, 17 October 2006, 12:09 AM CET


Spam fighters face attacks on blacklists
Spamhaus is one of many spam-busters that emerged to aid ISPs and businesses desperate to filter out spam before it reaches consumers. [more]
Tuesday, 17 October 2006, 12:03 AM CET


Radio tags spark privacy worries
A perceived threat to privacy posed by radio tags has emerged as the main fear in an EU study of the technology. [more]
Monday, 16 October 2006, 3:45 PM CET


Spyware infection prompts McDonalds MP3 recall
McDonalds Japan has launched a recall after discovering that MP3 players it offered as a prize were loaded with a particularly nasty strain of malware. [more]
Monday, 16 October 2006, 3:32 PM CET


Lenovo introduces newly secure ThinkPads
ThinkPad notebooks from Chinese computer-maker Lenovo, which already let the user log on with a thumbprint instead of a password, will now allow users to encrypt their hard drives at the press of a finger. [more]
Monday, 16 October 2006, 3:31 PM CET


Privacy under attack, but does anybody care?
It's vanishing, but there's no consensus on what it is or what should be done. [more]
Monday, 16 October 2006, 3:30 PM CET


OpenAjax to focus on security, complexity
IBM, alliance wants to make mashups safer, easier to develop. [more]
Monday, 16 October 2006, 12:31 PM CET


419 scammers launch shipping sites
Nigerian 419 advance fee Fraudsters operating from Amsterdam and Rotterdam, have created copies of the websites of express transportation company DHL and Lufthansa Cargo. [more]
Monday, 16 October 2006, 12:31 PM CET


What’s happened to corporate hackers?
The people that were once the scourge of the IT systems of big business have switched sides,
writes David Rae. [more]
Monday, 16 October 2006, 11:59 AM CET


Java EE and .NET security interoperability
This chapter covers the features of Java and .NET security that make interoperability easier. [more]
Monday, 16 October 2006, 12:45 AM CET


OpenSSH with public key cryptography tutorial
This tutorial is intended for people with at least basic Unix knowledge, such as mounting filesystems and copying files. [more]
Monday, 16 October 2006, 12:33 AM CET


Microsoft now decides to accept outside security for Vista
Microsoft agreed to make it easier for customers of its forthcoming Vista operating system to use outside security vendors, such as those who make popular antivirus and anti-spyware programs. [more]
Monday, 16 October 2006, 12:21 AM CET


New military voting process lacks security
An electronic system set up last month by the U.S. Department of Defense to help overseas soldiers and other military personnel and contractors cast ballots in U.S. elections lacks security safeguards, critics say. [more]
Monday, 16 October 2006, 12:09 AM CET


British ISP fires back at spammers
BT to terminate spammers, help revivify zombie bots. [more]
Friday, 13 October 2006, 7:10 PM CET


.htaccess tips and tricks
By creating this hidden file in the root folder (or any sub folder) of your website, it is possible to set/unset almost all the server directives that can be set in the apache main configuration file. [more]
Friday, 13 October 2006, 7:10 PM CET


Anti-piracy plan may harm YouTube
Copyright protection technology being adopted by video sharing Web site YouTube may give the site a dose of legal legitimacy. However, some fear the technology might also hurt YouTube's edgy appeal. [more]
Friday, 13 October 2006, 7:08 PM CET


Windows CE, Symbian wide open to attack
Growing number of vulnerabilities turning up in both platforms. [more]
Friday, 13 October 2006, 7:07 PM CET


Microsoft security chief is reassigned
Security czar Ben Fathi will head up the development of Windows core components as Microsoft reorganizes its OS division. [more]
Friday, 13 October 2006, 3:32 PM CET


Disk encryption with Microsoft's Vista
Microsoft’s Vista operating system promises perfect protection but there are always some risks. [more]
Friday, 13 October 2006, 2:48 PM CET


Technology 'can beat film piracy'
New technology is the key to beating movie piracy, the UK film minister has told industry executives. [more]
Friday, 13 October 2006, 2:46 PM CET


Airport to tag passengers
Airport security chiefs and efficiency geeks will be able to keep close tabs on airport passengers by tagging them with a high powered radio chip developed at the University of Central London. [more]
Friday, 13 October 2006, 9:19 AM CET


Hackers steal US$500,000 out of U.S. Virgin Islands government bank accounts
Malicious hackers have exploited weaknesses in the security technology of a Puerto Rican bank to siphon hundreds of thousands of US dollars (euros) out of two U.S. Virgin Islands government accounts, a finance official said Thursday.
[more]
Friday, 13 October 2006, 9:15 AM CET


Converged security threats mean business
Professional programmers writing viruses. [more]
Friday, 13 October 2006, 9:14 AM CET


For Microsoft, Patch Tuesday often becomes exploit Thursday
Over the past several months news of exploits targeting previously undocumented flaws in Windows and other Microsoft applications have surfaced within hours of each Patch Tuesday. [more]
Thursday, 12 October 2006, 7:32 PM CET


Cyber-criminals clone Google Italy site
'Evil twin' site attempts to infect visitors with Trojans. [more]
Thursday, 12 October 2006, 6:03 PM CET


The American way of secrecy
A recent article in The Washington Post described how researchers at George Washington University’s National Security Archive were surprised to find 1970’s statistics on the size of the American nuclear arsenal blacked out in documents they had obtained. [more]
Thursday, 12 October 2006, 6:02 PM CET


Security vs. usability: No one's winning
Experts say wretched usability's scaring crypto newbies away. [more]
Thursday, 12 October 2006, 8:30 AM CET


Vista’s security: incompatible with humans
With Windows XP service pack 1 having now gone gold (thank you, I’ll be here all week), Microsoft is ramping up focus on its new glass-flavoured-jellybean operating system. [more]
Thursday, 12 October 2006, 8:29 AM CET


Oracle to rank, summarize its patches
Simplifying process in response to calls for prioritization. [more]
Thursday, 12 October 2006, 12:41 AM CET


ICANN: we can't shut down Spamhaus
The organization says it does not have the ability or authority to do so. [more]
Thursday, 12 October 2006, 12:15 AM CET


End-to-end encryption strategies
"In order for encryption to be used consistently, it has to be implemented by default and be as transparent as possible," says Stephen Roll, product manager at Iron Mountain, a data protection company. [more]
Thursday, 12 October 2006, 12:14 AM CET


E-crime deters online banking
Users fear personal information will be misused, says report. [more]
Wednesday, 11 October 2006, 6:43 PM CET


UK police search for ID theft victims
UK police are attempting to reach thousands of Brits who have become victims of malware-powered ID theft scam. [more]
Wednesday, 11 October 2006, 3:37 PM CET


Flaw count hits a high
It isn't over yet, but 2006 is already a record year when it comes to security vulnerabilities. But there's a silver lining: A smaller chunk of them are high-risk flaws. [more]
Wednesday, 11 October 2006, 3:35 PM CET


Networking snafu gums up Microsoft security patches
Networking problems have kept Microsoft from distributing its latest security patches to users of its automatic update services. [more]
Wednesday, 11 October 2006, 9:18 AM CET


Microsoft fixes record 26 security holes
Microsoft today issued a record-breaking number of security updates, fixing at least 26 separate security holes in its Windows operating system and other products, including 16 vulnerabilities in Microsoft Office and Office components. [more]
Wednesday, 11 October 2006, 9:13 AM CET


Trapping hackers in the honeypot
In this second part of our investigation using the BBC honeypot we recount what happened when we let the machine get infected rather than just log attacks. [more]
Tuesday, 10 October 2006, 6:36 PM CET


Teleworkers know (and ignore) security risks, study says
More than 20% of the employees surveyed allow friends, family members, or other non-employees to use their work computer to access the Internet. [more]
Tuesday, 10 October 2006, 6:36 PM CET


Swiss gov 'mulls' spyware to tap VoIP calls
The Swiss government is "considering" the use of a spyware application called Superintendent Trojan to eavesdrop on IP telephony conversation, Heise Security reports. [more]
Tuesday, 10 October 2006, 5:56 PM CET


Is your DNS server configured wrong?
Study finds more than half are configured incorrectly, increasing security risks. [more]
Tuesday, 10 October 2006, 5:55 PM CET


Microsoft promises Vista security
A senior Microsoft executive has promised that its new operating system will be more secure than ever. [more]
Tuesday, 10 October 2006, 5:48 PM CET


High-tech school security is on the rise
Each morning, the 16,000 students in the Spring Independent School District in suburban Houston swipe their ID tags as they climb onto the school bus. [more]
Tuesday, 10 October 2006, 5:16 PM CET


Spamhaus fights US court domain threat
Spamhaus is at risk of losing its domain because of court action by a firm it has labelled as a spammer. [more]
Tuesday, 10 October 2006, 5:13 PM CET


Security lessons from Sun Tzu and Hannibal
History books are full of lessons relevant to today’s data security battles. Hackers understand history’s lessons and reduce their risk by carefully studying a potential target before designing attacks with a high probability of overcoming defenses. [more]
Tuesday, 10 October 2006, 12:32 AM CET


Microsoft enters the anti-virus bear-pit
Microsoft is setting the cat among the pigeons at this year's Virus Bulletin conference, the big chinwag for the security software industry. [more]
Monday, 9 October 2006, 6:17 PM CET


Hackers post fake notice on Google blog
A bug enabled the fake notice to be posted. The bug was fixed and the notice was taken down a day after it went up. [more]
Monday, 9 October 2006, 6:16 PM CET


Tracking down hi-tech crime
If every hour a burglar turned up at your house and rattled the locks on the doors and windows to see if he could get in, you might consider moving to a safer neighbourhood. [more]
Monday, 9 October 2006, 1:18 PM CET


Tactile passwords could stop ATM 'shoulder-surfing'
Entering passwords using a Braille-like device could prevent snoopers from stealing sensitive computer codes, such as ATM numbers, researchers say. [more]
Monday, 9 October 2006, 10:42 AM CET


A challenge for Vista bug exterminators
The Office package, for example, has been tested by more than 3.5 million users; last month alone, more than 700,000 PC’s were running the software, generating more than 46 million separate work sessions. At Microsoft, 53,000 employee computers are running test versions. [more]
Monday, 9 October 2006, 10:42 AM CET


Internet crime: scarier than mugging?
The British public fear phishing and 419 scams more than car theft, burglary, and even mugging. according to figures unveiled by government-backed campaign Get Safe Online. [more]
Monday, 9 October 2006, 10:39 AM CET


Top 10 Web 2.0 attack vectors
Web 2.0 is bringing in new security concerns and attack vectors. Yamanner, Samy and Spaceflash type worms are exploiting “client-side” AJAX frameworks, providing new avenues of attack and compromising some of the confidential information. On the “server-side”, XML based Web services are replacing some of the key functionalities and providing distributed application access through Web services interfaces. Here is the list of 10 attack vectors along with a brief overview of each. [more]
Monday, 9 October 2006, 8:29 AM CET


Chinese crackers attack US.gov
Chinese hackers have launched a sustained attack against the web systems of the US Department of Commerce. [more]
Monday, 9 October 2006, 7:38 AM CET


Beware the bots
Malicious code that turns computers into zombies is wreaking all kinds of havoc. [more]
Monday, 9 October 2006, 7:37 AM CET


Net crime 'big fear' for Britons
More Britons fear net crime than they do burglary, a survey suggests. [more]
Monday, 9 October 2006, 5:36 AM CET


Proxy/firewall detection with PVS
During the past year, the Passive Vulnerability Scanner's rules were modified to detect network proxies and firewalls. [more]
Monday, 9 October 2006, 1:21 AM CET


Microsoft awards MVP status to 'adware' distributor
Microsoft has come under fire for naming the developer of a program that can install adware on user's PCs as one of its Most Valued Professionals. [more]
Monday, 9 October 2006, 1:13 AM CET


$100 laptop may be at security forefront
The $100 laptops planned for children around the world might turn out to be as revolutionary for their security measures as for their low-cost economics. [more]
Monday, 9 October 2006, 12:42 AM CET


Microsoft SPP the ultimate security risk?
While Microsoft is busily spreading the word about how it is going to crack down on pirate copies of Vista, there are some quite disturbing issues being raised by commentators and bloggers about the way the software company intends to go about its task. [more]
Monday, 9 October 2006, 12:30 AM CET


Google Code Search peers into programs' flaws
Security professionals warned developers on Thursday that they need to be aware that their open-source repositories can now be easily mined, allowing attackers to target programs that are likely to be flawed. [more]
Monday, 9 October 2006, 12:21 AM CET


Future of the hard drive 'secure'
With all the developments in memory technology you could be forgiven for thinking that the lowly hard drive is dead. [more]
Monday, 9 October 2006, 12:12 AM CET


Viruses, spyware cost users $7.8 billion
Consumers paid as much $7.8 billion over two years to repair or replace computers that got infected with viruses and spyware, a Consumer Reports survey found. [more]
Monday, 9 October 2006, 12:06 AM CET


Gartner forecasts security troubles
"These guys [security vendors] are pretty fat and happy right now," said Peter Firstbrook, research director with Gartner, who spoke at Gartner's I.T. Security Summit in London. "They've got a very healthy profit margin. Don't feel sad for your antivirus vendor or your antivirus sales rep." [more]
Friday, 6 October 2006, 3:15 PM CET


Got phish? Drop 'em in the 'Phishtank'
Chances are that you regularly receive "phish" in your inbox -- e-mail messages that try to lure you into giving away your personal and financial data at fake bank or e-commerce Web sites. [more]
Friday, 6 October 2006, 5:08 AM CET


Your next wireless security problem
Just when you think you've got the network locked down... [more]
Friday, 6 October 2006, 4:42 AM CET


Browser history hack compromises user privacy
Proof-of-concept code demonstrates search history 'theft'. [more]
Friday, 6 October 2006, 4:41 AM CET


Vulnerable PC found in DHS inspector general's office
The Department of Homeland Security's office of the inspector general, which is responsible for auditing the department's information security practices, is itself doing a poor job protecting sensitive data on laptops computers. [more]
Friday, 6 October 2006, 4:40 AM CET


Set up a personal, home SSH server
Anyone who's done any Unix work has used SSH to connect to other computers and perform tasks like transferring files. [more]
Friday, 6 October 2006, 4:37 AM CET


Heavy sentence handed to cyber-blackmailers
Forget fines; they're jailing extortionists in Russia now. [more]
Friday, 6 October 2006, 4:35 AM CET


Bugging offices is not a crime (in UK)
Bugging offices in the UK is not a criminal offence, according to surveillance and legal experts speaking to OUT-LAW radio. [more]
Friday, 6 October 2006, 4:34 AM CET


Windows Vista piracy cripples OS
New Windows Vista anti-piracy features partially cripple the OS if a pirated license is suspected. [more]
Friday, 6 October 2006, 4:32 AM CET


Play chess on your nearest e-voting machine
IT professionals in the Netherlands have demonstrated that the type of e-voting machines chosen by the Irish government for election counts can be secretly hacked. [more]
Friday, 6 October 2006, 4:29 AM CET


Schwarzenegger nixes California RFID measure
But the sponsor of the RFID security bill vows to reintroduce it. [more]
Friday, 6 October 2006, 4:28 AM CET


The illusion of security
In the aftermath of a string of terrorist attacks such as 9/11 governments and organizations have hired more security personnel, bought more cameras, invested in new security technologies, passed new security laws, and inundated the populous with stories of fear, uncertainty and doubt. After all of this, are we safer? [more]
Thursday, 5 October 2006, 2:49 AM CET


Alleged bugs in Windows Vista’s ASLR implementation
I've had some people ask me about a paper that was recently published detailing alleged bugs in Address Space Layout Randomization in Windows Vista. It's great to see people looking at and scrutinizing Windows Vista before we ship. [more]
Thursday, 5 October 2006, 2:09 AM CET


Data security for mobile workers
This summer was eventful in the world of data security -- lack thereof -- if you have followed the press. The theft of a Veterans Administration laptop computer with the personal data of thousands of Veterans, including yours truly, is a good example of this. [more]
Thursday, 5 October 2006, 2:01 AM CET


Banks wary of two-factor model
More UK banks have expressed concerns over industry plans for a standard card reader to be used for authenticating online banking transactions. [more]
Thursday, 5 October 2006, 1:45 AM CET


DHS progresses in IT security
Homeland Security Department officials cited progress in securing IT systems across the sprawling organization as reflected in an Inspector General Office report issued today. They expressed confidence that their department would receive a passing grade for the first time in next year’s federal IT security report card. [more]
Thursday, 5 October 2006, 1:27 AM CET


HP insiders facing indictments
California's attorney general will seek criminal indictments against former Hewlett-Packard chairwoman Patricia Dunn and four others involved in the corporate spying scandal, according to news reports. [more]
Thursday, 5 October 2006, 1:12 AM CET


Ajax developers seen playing with security fire
Security overlooked in web2.0 land grab. [more]
Thursday, 5 October 2006, 12:59 AM CET


Appeals court okays continuing NSA surveillance program
Challenges to wiretap program moving through the courts. [more]
Thursday, 5 October 2006, 12:54 AM CET


Attackers get 8 years for extorting $4 million
Russian courts sentenced on Tuesday three members of an Internet gang to serve 8 years in prison after finding them guilty of extorting nearly $4 million from U.K. e-commerce firms, according to reports in the Russian media. [more]
Thursday, 5 October 2006, 12:43 AM CET


Social networkers risk losing their identities
Many adult users of social network sites such as MySpace and Facebook expose themselves to risk from identity thieves and hackers, according to a new US study. [more]
Thursday, 5 October 2006, 12:35 AM CET


Auditors say health records are at risk
The network handling Medicare claims transmits extremely personal information, such as a patient's diagnosis, the types of drugs the patient takes, plus the type of treatment facility they visited, including treatment centers for substance abuse or mental illness. [more]
Thursday, 5 October 2006, 12:30 AM CET


Wiretap laws may criminalize use of spyware
A secret Internet tool once reserved for use by savvy marketers and vicious identity thieves is now working to the benefit of estranged spouses, say family law attorneys who spoke last week at The Missouri Bar Annual Meeting. [more]
Wednesday, 4 October 2006, 12:38 PM CET


Beware malicious sites as hacker kit use explodes
About 1 in every 6 sites set up by criminals to steal information is created with hacking-for-dummies-style "toolkits," a security researcher said Tuesday. [more]
Wednesday, 4 October 2006, 12:37 PM CET


Testing for security in the age of Ajax programming
Web applications have become prime targets for malicious users and hackers performing SQL injection and similar attacks. [more]
Wednesday, 4 October 2006, 12:31 PM CET


Quantum encryption sets long-distance record
Extremely sensitive photon detectors have enabled researchers to transmit an encrypted quantum key over a record-breaking distance of 184.6 km. [more]
Wednesday, 4 October 2006, 12:30 PM CET


Limited Vista access hurts security effort, McAfee says
McAfee warned that Microsoft's move to lock down Vista's technical core could "hamstring" it and other security software vendors by keeping them from accessing a key element of the upcoming operating system. [more]
Wednesday, 4 October 2006, 2:20 AM CET


What are the advantages of distributed vulnerability scanning?
This blog entry discusses the advantages of using multiple scanners for both Nessus users and Security Center operators. [more]
Wednesday, 4 October 2006, 12:44 AM CET


Hackers crash the social networking party
Huge crowds in social networking sites draw money-minded malware authors. [more]
Wednesday, 4 October 2006, 12:42 AM CET


Mozilla duped by hacker's 'humorous' presentation
Mozilla researchers spent most of Sunday and Monday scrambling to determine if exploit code was a real threat. [more]
Wednesday, 4 October 2006, 12:40 AM CET


Security fears raised at conference
Concerns over the latest hi-tech security vulnerabilities have been highlighted at a conference in Kuala Lumpur, Malaysia. [more]
Wednesday, 4 October 2006, 12:37 AM CET


Gmail smartens up about spam
Google Gmail is reportedly getting nearly 15 times better at separating real messages from spam, while Microsoft's Hotmail--also called Windows Live Mail--is showing only a slight improvement and a more negative false-positive rating. [more]
Wednesday, 4 October 2006, 12:37 AM CET


Flight disaster phishing scam lands in Brazil
Pond-dwelling scammers are seeking to exploit interest in last weekend's Brazilian airline disaster to tempt potential victims onto a site hosting a Trojan downloader. [more]
Wednesday, 4 October 2006, 12:35 AM CET


Recent security enhancements in NetBSD
Running on almost twenty different architectures, and easily portable to others, NetBSD gained its reputation as the most portable operating system on the planet. [more]
Wednesday, 4 October 2006, 12:31 AM CET


Could crypto resolve the voting machine controversy?
With mid-term elections in the U.S. just a few weeks away, and the balance of power in both houses of Congress made more tenuous with the emergence of even more political scandals, the likelihood is growing that the outcome of close elections this November may be challenged if the technology relied upon to secure those elections comes under question. [more]
Wednesday, 4 October 2006, 12:27 AM CET


Share the Vista vision, Microsoft tells security rivals
Microsoft has callied on security software firms to provide more than just 'basic' products for Windows Vista. [more]
Tuesday, 3 October 2006, 12:05 PM CET


Super Grub Disk delivers easy boot record recovery
Super Grub Disk (SGD) is a specialty rescue CD for emergency repairs on boot sectors. Despite its name, SGD not only manipulates the Grand Unified Bootloader (GRUB), but also works with the content of other master boot records as well. [more]
Tuesday, 3 October 2006, 12:04 PM CET


Firefox zero-day exploit surfaces
Critical flaws in the way Firefox handles JavaScript code create a possible means for hackers to commandeer vulnerable PCs, according to security researchers. [more]
Tuesday, 3 October 2006, 11:45 AM CET


Corporate leak probes walk a fine line
Debate swirls about the ethics of pretexting, investigating leaks. [more]
Tuesday, 3 October 2006, 2:08 AM CET


Mozilla investigating new Firefox flaw
The security team at Mozilla Corp. is looking into a flaw in its Firefox Web browser that hackers exposed at a conference in San Diego over the weekend. [more]
Tuesday, 3 October 2006, 1:44 AM CET


YouTube and the DMCA
Larry Lessig once proposed a fee to renew copyrights - not to make the creative process more expensive but to ensure that the public retains effective access to intellectual property even if the creator/rights owner no longer sees any value in. [more]
Tuesday, 3 October 2006, 1:19 AM CET


Hacking your way to better security
If you want to improve IT security, think like a hacker. [more]
Tuesday, 3 October 2006, 1:07 AM CET


DVD Jon Fairplays Apple
DRM-buster DVD Jon has reverse-engineered Apple’s Fairplay and is starting to license it to companies who want their media to play on Apple’s devices. [more]
Tuesday, 3 October 2006, 1:07 AM CET


Parents struggle to monitor safety as kids spread wings online
Snooping through the family computer, a woman discovered that her 13-year-old daughter and some girlfriends had posted profiles on the Internet site MySpace. Word spread, and soon the other moms had ordered the youngsters to delete their profiles. [more]
Tuesday, 3 October 2006, 1:00 AM CET


Instant messaging and the security pro
Enterprise packages balance security, comm concerns. [more]
Tuesday, 3 October 2006, 12:53 AM CET


10 tips to secure client VPNs
If you have given your trusted employees and key contractors remote access to your network via a client virtual private network (VPN), congratulations! By now, you have seen the productivity and cost benefits from allowing collaboration that surmounts geographical separation. [more]
Monday, 2 October 2006, 7:34 PM CET


Microsoft 'taking security risks'
Microsoft is taking security risks with its forthcoming Vista operating system, says software firm McAfee. [more]
Monday, 2 October 2006, 7:27 PM CET


EU.biz mired by complex security systems
European companies are becoming bogged down in their increasingly complicated IT security arrangements, according to new research. [more]
Monday, 2 October 2006, 7:25 PM CET


Alleged 'unfixable' exploit in Firefox
An overflow of stories concerning an alleged Firefox 1.5 exploit hit the Web over the weekend, emerging from an underground users' conference in San Diego. [more]
Monday, 2 October 2006, 7:24 PM CET


Attacks prompt third parties to fix flaw
Attacks targeting the latest flaw in Microsoft's operating system have convinced two groups to release temporary fixes to protect users while the software giant develops its own patch. [more]
Monday, 2 October 2006, 7:23 PM CET


A new approach to data protection and management
Many enterprises have turned to tiered storage architectures in an attempt to regain control over the operational costs of managing and protecting differing classes of data. The rise of this type of storage architecture has in turn created an opportunity to change the way enterprises protect and manage backup data. [more]
Monday, 2 October 2006, 10:08 AM CET


Data breaches near 94 million
N.C. driver data among stolen. [more]
Monday, 2 October 2006, 9:33 AM CET


IT risks rise on USB drives
Auto-run apps add to security threats. [more]
Monday, 2 October 2006, 9:32 AM CET


Will the next election be hacked?
Chris Hood remembers the day in August 2002 that he began to question what was really going on in Georgia. [more]
Monday, 2 October 2006, 9:20 AM CET


New security measures for mobiles
Security experts have devised a system which triggers a high-pitched screech on a mobile phone if it is stolen. [more]
Monday, 2 October 2006, 9:18 AM CET


A security monitoring system for grid computing
In a computational grid, it is difficult to monitor security because hundreds of resources are shared by a large number of users. [more]
Monday, 2 October 2006, 9:17 AM CET


When "full disclosure" equals collusion, users are in danger
Gone are the days when "full disclosure" meant the immediate public release of information about vulnerabilities or exploits uncovered by security researchers. [more]
Monday, 2 October 2006, 2:15 AM CET


Can watchful cybercitizens curb ID theft?
Since May, good Samaritan Steven Peisner has scoured the Internet forums of cybercrooks, looking for the names of ID-theft victims whose personal information is for sale online. [more]
Monday, 2 October 2006, 2:13 AM CET


Warcraft gamers locked out after Trojan attack
Keylogging scammers are once again laying siege to World of Warcraft gamers. [more]
Monday, 2 October 2006, 2:09 AM CET


Secure programming with the OpenSSL API
Without secure server applications, the need for secure client applications is nonexistent. [more]
Monday, 2 October 2006, 2:08 AM CET


Spotlight

IoT devices are filled with security flaws, researchers warn

Posted on 30 July 2014.  |  We are living in an increasingly interconnected world, and the so-called Internet of Things is our (inescapable) future. But how safe will we, our possessions and our information be as these wired and interconnected devices begin to permeate our lives?


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Jul 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //