<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar/24008684?origin\x3dhttp://g1rma.blogspot.com', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe", messageHandlersFilter: gapi.iframes.CROSS_ORIGIN_IFRAMES_FILTER, messageHandlers: { 'blogger-ping': function() {} } }); } }); </script>

53cur!ty 6109

Girma Nigusse

Update: EMC to acquire RSA Security for almost $2.1B

June 30, 2006

The companies hope to position themselves more effectively in the data security market

Todd Weiss

In a deal that marries one of the IT industry's biggest data storage vendors and one of its best-known security companies, EMC Corp. today unveiled plans to acquire RSA Security Inc.

Source: http://www.computerworld.com/

Microsoft faces class-action suit over WGA tool

The antipiracy tool gathers data on a user's computer and sends it to Microsoft

Jeremy Kirk

In introducing WGA, Microsoft has found that computer users are already sensitized to the question of how they are notified about software installation and privacy issues. Late last year, Sony BMG Music Entertainment provoked controversy by shipping 15 million music CDs containing invasive copy protection software that installed itself on buyers' computers.

Source: http://www.computerworld.com/

Thinking about email security

By: Joe 'Zonker' Brockmeier

With the National Security Agency (NSA) monitoring our phone calls, now might be a good time to think seriously about the security of our email as well. In particular, you might want to think about encrypting your email, and about whether it's safe in the hands of third-party providers like Yahoo!, Google, and Microsoft.

The law and email
The perils of webmail
Security and privacy are in your hands

Source: http://business.newsforge.com/

Making your Linux installation (more) malware-proof

Improving the security odds for an already-strong OS

Scott Spanbauer

The first reason your Linux system is probably safe from attack: Recent versions of Linux (kernels 2.4 and 2.6) include a built-in firewall called "iptables" that simply drops all uninvited incoming connections by default. If a worm or a person tries to break into your Linux box from afar, or not so afar, iptables simply turns away and ignores the incoming connection -- the attacker won't know whether a system even exists at the attacked address.

Source: http://www.computerworld.com/

Looking ahead to life without passwords

By Bill Brenner, Senior News Writer

"The urgency of people getting information is such that people put passwords on a sticky note, or several people try to share passwords on one machine, and so accountability is tossed out," Janmohamed said.

Source: http://searchsecurity.techtarget.com/

E-commerce security a myth?

However regarldess of if I am working with a tiny open source php script, or someone as large as amazon, I have found security vulnerabilities to be consistently present and ignored. Its disgusting the sort of disregard some companies have towards security and how easy it is for a security vulnerability to fall through the cracks and be forgotten about before it reaches the right person to be fixed.

Source: http://blogs.hackerscenter.com/

Related link: http://www.computerworld.com/

What Is Rich Media, Really?

BY Ian Schafer

Rich media describes digital advertising that deviates from "standard" display advertising in that it is interactive, engaging, or informational or it breaks free of basic, accepted IAB-determined online standards, often taking advantage of broadband connectivity.
...
What's amazing is there are still so many places rich media hasn't yet entered. E-mail has been notoriously bereft of rich media advertising due to security issues, which the next version of Outlook is sure to address.
...
Source: http://www.clickz.com/

Higher Performance with Less CPUs

by Reiner Hartenstein
TU Kaiserslautern

The End of Moore's Law
Classical Parallelism Does Not Scale
Escape the Software Development Paradigm Trap
Crooked Labeling
FPGAs Became Mainstream Years Ago in Embedded Systems
FPGA-based Scientific Computing
CPUs Outperformed by FPGAs
Massively Slashing the Electricity Bill and Equipment Cost
The von Neumann Paradigm is Loosing its Dominance
The Reconfigurable Computing Paradox
Educational Deficits
Advantages of Coarse-Grained Reconfigurability
The Personal Supercomputer is Near
Management Deficits

Source: http://www.hpcwire.com/

Symantec CEO: 'Not worried about Microsoft at all'

June 28, 2006

John Thompson discusses the competition to come

Robert McMillan

Symantec Corp. Chief Executive Officer (CEO) John Thompson has had a bumpy ride over this past year. He closed one of the largest software company acquisitions in history -- last year's $10.2 billion purchase of Veritas Software -- and has been dealing with executive departures and a company reorganization. But perhaps the most serious disruption of all has come from a formidable new competitor into the company's security software business: Microsoft Corp.

Source: http://www.computerworld.com/

Microsoft and Unisys take the SIS

Pair win Euro data sharing deal...

By Jo Best

Microsoft and Unisys have secured a deal to build the second generation of the Schengen Information System (SIS) and Visa Information System (VIS), which will allow law enforcement agencies within the European Union to share data.

Source: http://www.silicon.com/

SAS using Biometrics from Precise Biometrics for enhanced Security

Precise Biometrics has been selected as the overall supplier to Scandinavian Airlines as it becomes the first airline to introduce biometric security checks on domestic flights in Sweden. To guarantee that the person handing the baggage really is the same person boarding the plane, Scandinavian Airlines will be using biometric security solutions at baggage check-in and boarding gates. Precise Biometrics' solution means that personal privacy will be maintained, in that the temporarily stored fingerprints are deleted once they have been used.

Source: http://www.asiatraveltips.com/

Ohio University admits security faults

The announcement by school officials highlights the significant damage to a large organization's image and reputation that is possible when IT security is not taken seriously enough.

Source: http://www.securityfocus.com/

Study: Fed 'Guidelines' Imperil E-Voting Security

By Michael Hickins

One of the flaws, according to experts, is that voting machines are enabled with wireless communication devices.

They maintain that wireless features can be used on Election Day to trigger malware that has been hidden in the machine's source code.

Despite being aware of this vulnerability, the TGDC did not ban wireless features, because many jurisdictions already use voting machines with those functions, said Quesenbery.

Source: http://www.internetnews.com/

Radiology centre accesses remote data without a VPN

USB-like device connects care providers to computing resources

by Vawn Himmelsbach

“I can log into my computer in my office if I want to work on reports or letters while I'm away on a business trip,” said Williams. “It keeps me in touch so I have less anxiety about being away than I used to.”

Source: http://www.itbusiness.ca/

Week 10 : Simon Singh

This week's video podcast of The Teaching Challenge features bestselling author, mathematics and science writer Simon Singh using secret codes to inspire a class of Year 11 boys.

Source: http://education.guardian.co.uk/

Global Biometrics Industry Analysed in Latest Research Report

June 27, 2006

Companies Mentioned

Biometrics, Inc., (Canada)
A Vision (USA)
Accu-Time Systems, Inc. (USA)
Acroprint Time Recorder Company (USA)

...

Source: http://www.genengnews.com/

Biometrics - Global Strategic Business Report

The Biometrics Market in Germany 2004-2009: Anti-terrorism Laws Drive Growth
Pacific Biometrics Inc New - Competitor Report
Antidepressants - Global Strategic Business Report
Pacific Biometrics Inc New - Product Pipeline Report
Biometrics in France: A Strategic Entry Report, 1998
Biometrics in Japan: A Strategic Entry Report, 1999
Proteomics 2003: A Strategic Market Outlook and Business Analysis
Monoclonal Antibody Based Products - Global Strategic Business Report

Source: http://www.researchandmarkets.com/

ASUS Adds New AuthenTec Fingerprint Sensor to Second PC; Biometrics Provide Extreme Security for New Notebook PCs; EntrePad 1610 is World's Smallest S

June 26, 2006

ASUS added the newest sensor from AuthenTec - the world leader in fingerprint sensor security, innovation and sales -- to its new F2 notebook PC. The EntrePad 1610 is integrated with the Trusted Platform Module (TPM) as part of ASUS' total security management solution that protects data integrity via both software and hardware features. The sensor is an integral part of the trusted security chain -- from initial authentication through the entire TPM security platform.

Source: http://home.businesswire.com/

You Can Never Be Too Thin or Too Secure

Our manager takes inventory of what's been done to secure her agency's network and what still lies ahead.

C. J. Kelly

The best security approach is applied in layers. You can apply the layers from the inside out or the outside in, but most companies start from the outside, putting firewalls at every entry point to the network.

Source: http://www.computerworld.com/

Ohio University approves $4 million computer budget

Associated Press

The decision comes after an audit criticized the university's Computer and Network Services division for making security a low priority for more than 10 years, though it had an annual budget averaging $11 million and recent annual surpluses averaging $1.4 million.

Source: http://www.ohio.com/

All-in-One Guides: E-mail Security

June 24, 2006

This All-in-One Guide is a collection of resources to help you secure your e-mail systems regardless of where you are in the learning or buying process.

Source: http://searchsecurity.techtarget.com/

Tech firms protest 'extreme' copyright

p2p news / p2pnet: An alliance of Canadian technology security companies has sent an open to Bev Oda, minister of Canadian heritage, and Maxime Bernier, industry minister, calling on the Canadian government to reject calls for "extreme copyright laws".

Source: http://www.p2pnet.net/

Computer Security Hopes and Fears

June 22, 2006

- successful consumer protection on the internet has generally involved a much higher degree of co- and self-regulation than other media
- effective consumer protection requires more significant levels of international co-operation, and
- the Internet places a much greater responsibility than before on consumers to take action to protect themselves.

Source: http://www.mrweb.com/

RFIDsec Unveils Privacy-Protected Tags

The company's RFID system is designed to prevent unauthorized activation of tags attached to consumer products.

By Jonathan Collins

... These tags were designed specifically to protect consumer privacy.

The tag's microchip operates at 13.56 MHz and is based on the ISO 14443-A standard. RFIDsec will be selling tags embedded in RFID labels. The tags work in conjunction with access-management software that permits the encoding and reading of the tag, as well as a product-authentication application to enable owners of tagged products to authenticate the tags. This is designed to ensure that the original tag has not been tampered with, cloned or otherwise compromised.

Source: http://www.rfidjournal.com/

Online security: Making it simple

Products aim to better serve computer users befuddled by ever-changing threats.

BY JULIO OJEDA-ZAPATA
Pioneer Press

Gary Stevens has lots of computers in his house, but one machine proved problematic until recently.

The Windows-based PC, set aside for his two sons, would repeatedly become crippled by viruses and other online infestations even though commercial security software was installed on it. Stevens would have to wipe its hard drive and reinstall its operating system at regular intervals.

Source: http://www.twincities.com/

Co-op users back pay-by-touch

Dave Friedlos, Computing 22 Jun 2006

Supermarket chain Midcounties Co-operative is extending trials of pay-by-touch fingerprint scanning after a pilot at three retail outlets in Oxford proved a hit with customers.

Source: http://www.vnunet.com/

Facing the reality of biometrics

By Eileen Yu, ZDNet Asia

It may been championed as the highest level of security, but biometrics still have some way to go before it is widely deployed as an end-user application.

Source: http://www.zdnetasia.com/

Worm lures victims with 'Naked World Cup'

Robert McMillan

Soccer purists can breathe a sigh of relief. There is no Naked World Cup.

IT professionals, on the other hand, may want to be a little more vigilant because a new e-mail worm is on the loose that preys on the intense worldwide interest in the international sporting event.

Source: http://www.computerworld.com/

Want to outwit hackers? Hire an ethical one.

June 21, 2006

A growing number of courses worldwide train 'ethical hackers' to prevent malicious attacks.

Source: http://www.csmonitor.com/

Ohio U. suspends two over hackers' theft

THE ASSOCIATED PRESS

Ohio University said Tuesday it has suspended two information technology supervisors over recent breaches by hackers who may have stolen 173,000 Social Security numbers from school computers.

The school did not identify the director of communications network services - identified on the school's Web site as Thomas Reid - and manager of Internet and systems. Both were suspended pending the school's investigation of the breaches, five of which have happened since March 2005.

Source: http://seattlepi.nwsource.com/

Behold, All My Dirty Secrets Is your home computer a treasure trove of scandalous, wicked material? Great. So is mine

By Mark Morford,

I confess. There is, right this minute, quite a lot of very hot pornography on the PowerBook computer upon which I am typing this column. I know, shocking.

The websites you visit, your chat conversations, and all of your Internet and other PC files ... could get you into a heap of trouble. (From a piece of alarmist e-mail spam currently circulating on the Net, hawking disk-erasing software called Evidence Nuker)

Source: http://www.sfgate.com/

RFIDsec Product launch: The first privacy enabled and secure RFID tag on the market

RFIDsec announced the availability of the World's first series of RFID solutions that completely block unauthorized access to a RFID tag.

Source: http://www.morerfid.com/

Sony boost security to sell more sexy laptops

Author: Bob Crabtree

The new VAIO models have two-way protection - fingerprint recognition and what's described as hardwired, chip-level security that prevents anyone but the owner "ever getting in and stops malicious software from harvesting vital information like passwords and encryption keys - by storing sensitive data on the chip itself."

Source: http://lifestyle.hexus.net/

3.2 million World Cup tickets RFID chipped

By Jo Best

All of the 3.2 million tickets issued for this year's tournament will come equipped with an RFID chip inside, which is scanned whenever a fan arrives at the gates of any of the 12 stadiums.

Source: http://networks.silicon.com/

Hackers hit Microsoft France site

0wn-la-la! Third-party hosting leads to 'criminal' attack

Robert McMillan

Part of Microsoft Corp.'s French Web site has been taken offline by hackers, who apparently took advantage of a misconfigured server at the software vendor's Web hosting provider.

Source: http://www.computerworld.com/

Interview: Why DNS defences need bolstering

Phil Muncaster

IT Week: As vice-president of marketing for Domain Name System [DNS] server specialist Nominum, can you describe the security threats in this field?

Source: http://www.vnunet.com/

Network security is virtually here

Build security resources into the net and make them usable from anywhere.
By Bryan Betts, Techworld

Network security will be one of the next areas for virtualisation, reckons Scott Lucas, the director of product marketing at Extreme Networks. The aim, he says, is to move away from applying security at specific places in the network, and instead make it available throughout.

Source: http://www.techworld.com/

Students to learn art of computer hacking

June 19, 2006

Jason Allardyce

Professor Lachlan MacKinnon, head of Abertay’s school of computing and creative technologies, said that the course was necessary because the techniques featured in movies such as War Games were now in common use. “The bottom line is if you want to be secure disconnect your computer now because there is nothing that will make it secure. If someone wanted to steal your money, your identity, your house, they could do it,” he said.

Source: http://www.timesonline.co.uk/

Encryption can save data in laptop lapses

By STEPHEN MANNING

Reports of data theft often conjure up images of malicious hackers breaking into remote databases to filch Social Security numbers, credit card records and other personal information.

But a lot of the time, the scenario is much simpler: A careless worker at company or agency with weak security policies falls prey to a low-tech street thug who runs off with a laptop loaded with private data.

Source: http://seattlepi.nwsource.com/

Yahoo! 'virus writer' claims he just wants a job

By Will Sturgeon

silicon.com has been contacted by an individual claiming to have written the Yamanner virus which targeted users of the Yahoo! webmail service earlier this week. The man claims to be from Iran and says he is just trying to find work by advertising his programming credentials.

Source: http://software.silicon.com/

Steganos Security Suite 2006

During my search for an easy to use encryption package for my Laptop computer, I recently came across Steganos Security Suite 2006. Although this software package is designed for the Windows 2000 and Windows XP operating systems, without current support for the Pocket PC platform, I felt this would still make for an interesting and informative review.

Steganos, a leading German company for consumer encryption software, were more than happy to assist with this review.

Source: http://www.mtekk.com.au/

net.wars: Security vs security part II

June 17, 2006

by Wendy M Grossman

It's funny. Half the time we hear that the security of the nation depends on the security of its networks. The other half the time we're being told by governments that if the networks are too secure the security of the nation is at risk.

source: http://www.newswireless.net/

security events

If you are holding, attending an event or know about a computer security conference, seminar, or workshop, and would like to see it posted on this page, please send e-mail about the event and an URL where we can link to the NIST CSRC Webmaster We will try to post the event on our page as long as it follows within our web policy.

source: http://csrc.nist.gov/

Passlogix to release v-GO Credential Manager for easy management of smart cards, tokens, biometrics and proximity cards

Passlogix, Inc. has announced the upcoming release of v-GO Credential Manager (v-GO CM), a solution for issuing, managing and revoking strong authentication devices such as smart cards, tokens, biometrics and proximity cards. This add-on to Passlogix's v-GO Sign-On Platform will be the first credential management system that supports devices and readers from all leading vendors, freeing administrators to select, mix and migrate to the devices of their choice without being locked into proprietary systems.

source: http://www.securitypark.co.uk/

Porn download at state office puts taxpayers at risk

SALEM, Ore. - Electronic files containing personal data of up to 2,200 Oregon taxpayers may have been compromised by an ex-employee's unauthorized use of a computer, the Oregon Department of Revenue said Tuesday.
Amy McLaughlin, an information technology security officer with the state, said the incident apparently occurred when an employee downloaded a contaminated file from a porn site.

Source: http://www.katu.com/

Why isn't Europe suffering a wave of security breaches?

Jay Cline

Did you hear the one about the German company that had the big security breach? Probably not, because security breaches don't dominate the headlines in Die Welt, Le Monde or El Pais like they do in USA Today. Our national preoccupation with identity theft has no equivalent in the Old World. So what's the rub? Are Europeans that much better at privacy and security than we are?


That wasn't the finding of a survey recently released by Ponemon Institute LLC and the law firm White & Case LLP. They asked 47 U.S. and EU multinational companies about eight aspects of their privacy practices: privacy management, data security methods, communications and training, privacy policy, choice and consent, cross-border data transfer, privacy compliance, and customer-dispute resolution. It was the first survey of its kind that I've seen. What did it discover?

Source: http://www.computerworld.com/

E-mail from MySQL includes addresses for 9,300 customers

Jaikumar Vijayan

An improperly composed mass e-mail sent yesterday by open-source database vendor MySQL AB erroneously included some 9,300 customer e-mail addresses in the body of the note -- not the information about a series of summer support specials the company meant to announce.

The error apparently occurred when a MySQL employee mistakenly pasted the e-mail addresses into the body of the e-mail as a message, rather than placing the addresses into the recipient address box on the e-mail form.

Source: http://www.computerworld.com/

Cryptography and Security

June 16, 2006

This page contains pointers to other web pages dealing with cryptography and security, organized into the following sections:

Source: http://theory.csail.mit.edu/

Interview with Kenny Paterson, Professor of Information Security at Royal Holloway, University of London

June 14, 2006

by Mirko Zorz

...
Your research lead you to the discovery of a high-profile vulnerability. Give us some details.

In late 2004, Arnold Yau (a PhD student in the group) and I began an investigation into IPsec security, in particular the security of the "encryption only" configuration of IPsec. The relevant standards are pretty clear that this configuration should be avoided, but they also mandate it be supported, mostly for reasons of backwards compatibility.

Source: http://www.net-security.org/

Characterizing Biometric Applications

Cooperative vs. Non-Cooperative
Overt vs. Covert
Habituated vs. Non-Habituated
Attended vs. Non-Attended
Standard vs. Non-Standard Environment
Public vs. Private
Open vs. Closed

Source: http://www.eff.org/

Protecting Sensitive Data: Researchers Develop Fail-Safe Techniques for Erasing Magnetic Storage Media

After a U.S. intelligence-gathering aircraft was involved in a mid-air collision off the coast of China four years ago, the crew was unable to erase sensitive information from magnetic data storage systems before making an emergency landing in Chinese territory.

That event underscored the need for simple techniques to provide fail-safe destruction of sensitive data aboard such aircraft.

Source: http://gtresearchnews.gatech.edu/

Digital security added to U.S. nuclear lab

Diego wireless network developer WFI has delivered a high-tech security system for the Oak Ridge National Laboratory in Tennessee.

The Tactical Survey system provides a flood of comprehensive information, maps and imagery about the entire facility where scientists work on a number of U.S. government projects, including nuclear weapons programs.

Source: http://www.upi.com/

Hacker gets private information from computer at Lawrence Livermore Lab

Source: http://www.kesq.com/

Internet pioneers warn of VoIP wiretap danger

Cert, Diffie say new security risks could result

Grant Gross

A Federal Communications Commission rule requiring providers to allow wiretapping by May 2007 would either require a massive re-engineering of the Internet or introduce broad cybersecurity risks, said authors of a new study released by the Information Technology Association of America (ITAA), an IT vendor trade group.

Source: http://www.computerworld.com/

'Demolish Barsebäck' - radiation agency

June 13, 2006

The Swedish Radiation Protection Agency (SSI) says it is risky to wait 15 years to demolish Barsebäck, the nuclear power plant in southwest Sweden, which was completely shut down in 2005.

But its owner, Barsebäck Kraft – owned jointly by Sweden’s Vattenfall and Germany’s Eon - wants to wait until there is new storage available for the radioactive waste that remains at the plant.

Source: http://www.thelocal.se/

Nuclear agency computers hacked; data on 1,500 employees taken

(AP) -- A computer hacker stole a file containing the names and Social Security numbers of 1,500 people working for the Energy Department's nuclear weapons agency.

Officials told a congressional hearing Friday that the department's senior managers were informed only two days ago of last September's incident, which was somewhat similar to recent problems at the Veterans Affairs Department. None of the victims was notified, they said.

Source: http://www.physorg.com/

OU has been getting an earful about huge data theft

By Jim Phillips

Ohio University has spent more than $77,000 sending letters to alumni and students affected by a computer security breach.

It's harder to put a price tag on the blow to alumni goodwill, as the number of people affected by hacking of OU computer databases continues to rise with the discovery of new hacking incidents.

"This is damaging OU's reputation far more than its drunk football coach, magazine pictorials or its #2 party-school ranking, and you can tell (OU President Roderick) McDavis that this really sucks. A lot!" wrote one incensed alum May 10.

Source: http://www.athensnews.com/

Hacking scare: Cybercriminals pursuing profit

June 12, 2006

A security expert warns of techniques used to break into computer systems of banks, businesses and even the military.

By Andy Vuong

The thrill-seeking teenager is no longer the face of computer hacking.

Sophisticated computer experts looking to profit from their technical skills are driving the new wave of cybercrimes, a national expert told 100 security officials Tuesday at the state Capitol.

Source: http://www.denverpost.com/

Audio of Bruceter Schneier's Monthly Crypto-Gram security Newslet

Source: http://crypto-gram.libsyn.com/

Information Security

June 09, 2006

From policies to perimeters to patch management
Topics in the Information Security Research Center:·Architecture
·Policies
·Viruses
·Crime
·Wireless
·Metrics
·Advisor
·Events
·Newsletters

Source: http://www.csoonline.com/

Analysts wary of U.K. cybercrime law revamp

June 08, 2006

Tougher penalties, but can the law stay up to date?

Jeremy Kirk

The U.K. has sought to tighten the Computer Misuse Act of 1990 to more precisely target denial-of-service (DoS) attacks, which have been used to extort operators of online gambling sites.

In November, a judge threw out a case against David Lennon, who allegedly crashed his former employer's e-mail server in a DoS attack in early 2004 using an automated program to send 5 million messages.

Source: http://www.computerworld.com/

Microsoft Live Labs Relay Service


A common problem when developing connected, peer-to-peer applications is to enable connections with applications through network devices like firewalls and network address translators (NATs).

Network devices like these typically allow applications to initiate outbound network connections but prevent them from accepting inbound network connections.

Source: http://relay.labs.live.com/

Microsoft Live Labs Security Token Service

An online identity management service that lets you offload authentication functions, whether you are a user signing-in to web sites and services or a site or service owner who needs to authenticate users.

Source: http://sts.labs.live.com/

U.K. study: Don't legislate DRM

British raise concerns over restrictions on file access

Jeremy Kirk

June 05, 2006 (IDG News Service) -- In a report released Monday, a group of lawmakers advised the British government not to make DRM (digital rights management) systems mandatory, citing concerns over how the technology restricts access to digitized files.

The All Party Parliamentary Internet Group (APPIG) said it is not aware of efforts in Europe to make DRM enforced by law, although some publishing groups favor it.

Source: http://www.computerworld.com/

Google Spreadsheets turns up heat on Excel

June 07, 2006

By Elinor Mills

Google is set to launch on Tuesday a Web-based spreadsheet program that will allow people to view and simultaneously edit data while conducting "in-document" chat, a company product manager said Monday.

Source: http://news.com.com/

Web users to 'patrol' US border

A US state is to enlist web users in its fight against illegal immigration by offering live surveillance footage of the Mexican border on the internet.
The plan will allow web users worldwide to watch Texas' border with Mexico and phone the authorities if they spot any apparently illegal crossings.

Source: http://news.bbc.co.uk/

Pirate Bay Back, But Not For Long

By K.C. Jones, TechWeb News

The Pirate Bay, a BitTorrent tracking site made good on its promise to return after authorities seized its entire server farm, but it was down again late Monday.
Authorities shut down the the Swedish sitelast week. It was up again Saturday but, by Monday, it contained a vague message about why it was not operating. The shut down was the latest in a tug-of-war between Pirate Bay and authorities and a larger battle between tech-savvy entertainment fans and hackers and entertainment companies.

The BitTorrent tracking site raised the ire of the Motion Picture Association of America (MPAA), which referred to it as one of the world's largest most well known facilitators of online piracy. The site directs people to more than 157,000 movies, according to the MPAA, which filed a criminal complaint in 2004.

Source: http://www.techweb.com/

Cross Match Buys German Biometric Firm

June 06, 2006

Cross Match Technologies Inc., a U.S.-based biometrics company, says it has bought Germany-based C-VIS GmbH, another biometric firm, for an undisclosed amount. C-VIS, founded in 1992, specializes in facial recognition technology.

Source: http://www.cardtechnology.com/

Gummi Bears Can Also Fool Fingerprint Scanners

By Alice Hill, RealTechNews

About 6 months ago we ran a piece on how a finger made out of Play Doh could foil many retail fingerprint scanners. Not to be outdone, a Japanese cryptographer named Tsutomu Matsumoto has found that Gummi Bears make an even better fake fingerprint, and are the cornerstone of a do it yourself fake fingerprint lab that require bears, a digital camera, and a PC. According to Mastsumoto, the gelatin used to make Gummi bears can be poured into a mold to make a finger, and this fake finger was able to fool scanners 4 out of five times. Not to be outdone, using the fumes from superglue, Matsumoto was able to highlight a print from a drinking glass and photograph it with a digital camera, and then imprint the high res print on the gummi bear finger using a photo sensitive printed circuit board he picked up in a hobby shop. And it worked - so well that cryptography experts are recommending that these systems go right back to the drawing board.

Source: http://www.realtechnews.com/

Yahoo CEO to be paid $1 salary

CEO Terry Semel will also receive at least six million stock options

By Steven Schwankert, IDG News Service

Yahoo Chairman and Chief Executive Officer Terry Semel will receive just $1 as salary, along with at least six million stock options to soften the blow.

Source: http://www.infoworld.com/

Security -- Who Does It?

Storage should be the realm of security

John Webster

There’s a job to be done in IT. It’s called security. Everyone in IT knows security has to be done, but who does it remains an open question.

Source: http://www.computerworld.com/

HP printer drivers hit with Funlove virus

Blast from the past mainly affects Asian market

Robert McMillan

Hewlett-Packard Co. on Thursday pulled a printer driver from its Web site after security vendor BitDefender reported that the software was infected with the same computer virus that infected HP's drivers more than five years ago.

A BitDefender partner notified the security vendor of the infected driver software on Wednesday, and the company's security researchers soon determined that it had the same Funlove virus that had plagued HP in December 2000.

Source: http://www.computerworld.com/

Cybersecurity: A job for Uncle Sam

Orson Swindle rethinks his 'culture of security'

Sarah D. Scalet

What's your perception of the state of information security today, and how close are we to creating this "culture of security" that you've envisioned? We do have problems. I don't think the problems are nearly as bad as they are perceived, and part of that has to do with how the media covers things. This past year we've had probably in excess of 100 disclosed breaches, but the jump from disclosed breaches to grievous harm having occurred is a huge one. You'll hear "40 million credit cards compromised," but it's a much smaller number than that -- a very low number -- where harm has actually occurred. Oftentimes a disclosure is an emotional thing. It causes people to overreact. But that is not to say we don't have a problem.

Source: http://www.computerworld.com/

Microsoft flaw affects XP, Server 2003

Flaw could lead to DoS attack

Jeremy Kirk

A new flaw found in Microsoft Corp.'s software could be exploited to cause a denial-of-service attack on certain applications although the bug isn't viewed as being severe.

The flaw could be exploited through a buffer overflow attack, security vendor Secunia reported yesterday. A buffer overflow occurs when excess data flows into an area of memory, spilling over so that it overwrites data in adjacent areas or causes unintended code to execute.

Source: http://www.computerworld.com/

FBI wants Internet records kept two years: source

Records would be used in terrorism, child porn investigations

Jeremy Pelofsky and Michele Gershberg

The FBI wants U.S. Internet providers to retain Web address records for up to two years to aid investigations into terrorism and child pornography, a source familiar with the matter said.

The request came during a May 26 meeting between U.S. Attorney General Alberto Gonzales and FBI Director Robert Mueller with top executives at companies like Google Inc., Microsoft Corp. and Time Warner Inc.'s AOL.

Source: http://www.computerworld.com/

Symantec sees identity as key to 'Security 2.0'

June 04, 2006

User input critical to establishing who can be trusted

Robert McMillan

"We're making significant investments in something we call Security 2.0, which is ultimately the next generation of consumer security," said Enrique Salem, group president of Symantec's Consumer Products group, speaking at an analyst event in San Mateo, California.

Before the Security 2.0 products ship, however, Symantec plans to refresh its Norton product line and deliver two new consumer products that will offer improved identity-theft protection. The products are a security and backup service called Norton 360, as well as an online commerce security product called Norton Confidential.

Source: http://www.computerworld.com/

Security researchers to produce new tools

barbara black

He explained, “The tremendous success of Internet related technologies, such as Web services, voiceover IP, mobile telephony, and so on, coupled with advances in hardware and software engineering are giving rise to challenging and very interesting research problems.

Source: http://cjournal.concordia.ca/

DHS report faults use of RFID for human identification

Says threat to privacy outweighs benefits

Marc L. Songini

"Most difficult and troubling is the situation in which RFID is ostensibly used for tracking objects (medicine containers, for example), but can be in fact used for monitoring human behavior. These types of uses are still being explored and remain difficult to predict. For these reasons, we recommend that RFID be disfavored for identifying and tracking human beings," the report said.

Source: http://www.computerworld.com/

Explore the secret world of codes

So, in case there are some would-be cryptographers amongst you, I am offering a collection of sites on the subject.

1. http://aboutfacts.net/
2. www.khouse.org
3. http://www.daytondailynews.com/
4. www.teacheroz.com
5. www.iwm.org.uk
6. http://www.simonsingh.net/
7. www.secretcodebreaker.com
8. http://math.arizona.edu

Source: http://news.cincypost.com/

PROBLEMS AND SOLUTIONS IN QUANTUM COMPUTING AND QUANTUM INFORMATION 2nd Edition

by Willi-Hans Steeb & Yorick Hardy (Rand Afrikaans University, South Africa)

Quantum computing and quantum information are two of the fastest growing and most exciting research fields in physics. The possibilities of using the non-local behavior of quantum mechanics to factor integers in random polynomial time have also added to this new interest. This book supplies a collection of problems in quantum computing and quantum information together with their detailed solutions, which will prove to be invaluable to students as well as to research workers in these fields. All the important concepts and topics such as quantum gates and quantum circuits, entanglement, teleportation, Bell states, Bell inequality, Schmidt decomposition, quantum Fourier transform, magic gate, von Neumann entropy, quantum cryptography, quantum error correction, coherent states, squeezed states, POVM measurement, beam splitter and Kerr Hamilton operator are included. The topics range in difficulty from elementary to advanced. Almost all problems are solved in detail and most of the problems are self-contained.

Source: http://physicsweb.org/

Beating the Crunch

June 01, 2006

By: Nicolas Boillot

The Internet Protocol, the basic building block of our online world, needs an overhaul
...
And that’s only one of the ways in which IPv4 is falling behind the times. IPv4 calls for very little in the way of security standards, which is one of the reasons security on the Internet is tough to enforce. If security were woven more deeply into the Internet’s very fabric, malicious hackers would have a much harder time trying to do any damage. An additional protocol, IPsec, helps with Internet security today, but it is not a mandatory part of IPv4. That gives worms, viruses, spyware, and other malware plenty of wiggle room. IPv4 has very little support for real-time applications—telephony, videoconferencing, online games, live sports-watching, and so on—that do not tolerate transmission lags of even a few hundred milliseconds. Although such services are available today, reliability is not guaranteed, so dropped or stuttering connections are common.
...
Source: http://www.spectrum.ieee.org/

Precise Biometrics launches ANSI 378 compliant Match-On-Card technology

LUND, SWEDEN -- (MARKET WIRE) -- 05/30/2006 -- Precise Biometrics AB (publ.), a world-leading biometric company that develops and sells user-friendly biometric security solutions based on fingerprints and smart cards, has strengthen its market position in the further. The company is launching its smart card solution, Precise Match-On-Card™, in a version compliant with the US Federal government standard, American National Standards Institute (ANSI 378). The standard is an important requirement in implementing the US Federal Government Homeland Security Presidential Directive 12 (HSPD-12) and the closely aligned Federal Information Processing Standards 201 (FIPS 201). By fall this year all US Government agencies must initiate the deployment of smart card based ID cards, the so called PIV (Personal Identity Verification) Cards.

Source: http://www.marketwire.com/

Concordia’s Computer Security Laboratory wins grants and award

The Concordia Institute for Information Systems Engineering is an interdisciplinary fundamental research and R&D learning institute.

Source: http://news.concordia.ca/

Symantec squashes antivirus bug

It fixes flaw in corporate antivirus software

Robert McMillan

Symantec Corp. has patched a widely reported flaw in the English versions of its corporate antivirus software.

Source: http://www.computerworld.com/

Microsoft ships Windows Live OneCare

Software maker enters the security market

Robert McMillan

Microsoft Corp. is set to release today a fully supported version of its Windows Live OneCare software, marking its entry into the security software market.

OneCare includes firewall, antivirus and backup software, as well as Microsoft's Windows Defender antispyware technology, which is still in beta form. The product also handles routine maintenance tasks such as defragmenting the hard disk and cleaning up unused temporary files.

Source: http://www.computerworld.com/

Ice Cube with O'Shea Jakson Jr.



Source: MSNBC Picture stories