June 30, 2006
The companies hope to position themselves more effectively in the data security market
Todd Weiss
In a deal that marries one of the IT industry's biggest data storage vendors and one of its best-known security companies, EMC Corp. today unveiled plans to acquire RSA Security Inc.
Source:
http://www.computerworld.com/
The antipiracy tool gathers data on a user's computer and sends it to Microsoft
Jeremy Kirk
In introducing WGA, Microsoft has found that computer users are already sensitized to the question of how they are notified about software installation and privacy issues. Late last year, Sony BMG Music Entertainment provoked controversy by shipping 15 million music CDs containing invasive copy protection software that installed itself on buyers' computers.
Source:
http://www.computerworld.com/
By: Joe 'Zonker' Brockmeier
With the National Security Agency (NSA) monitoring our phone calls, now might be a good time to think seriously about the security of our email as well. In particular, you might want to think about encrypting your email, and about whether it's safe in the hands of third-party providers like Yahoo!, Google, and Microsoft.
The law and email
The perils of webmail
Security and privacy are in your hands
Source:
http://business.newsforge.com/
Improving the security odds for an already-strong OS
Scott Spanbauer
The first reason your Linux system is probably safe from attack: Recent versions of Linux (kernels 2.4 and 2.6) include a built-in firewall called "iptables" that simply drops all uninvited incoming connections by default. If a worm or a person tries to break into your Linux box from afar, or not so afar, iptables simply turns away and ignores the incoming connection -- the attacker won't know whether a system even exists at the attacked address.
Source:
http://www.computerworld.com/
By Bill Brenner, Senior News Writer
"The urgency of people getting information is such that people put passwords on a sticky note, or several people try to share passwords on one machine, and so accountability is tossed out," Janmohamed said.
Source:
http://searchsecurity.techtarget.com/
However regarldess of if I am working with a tiny open source php script, or someone as large as amazon, I have found security vulnerabilities to be consistently present and ignored. Its disgusting the sort of disregard some companies have towards security and how easy it is for a security vulnerability to fall through the cracks and be forgotten about before it reaches the right person to be fixed.
Source:
http://blogs.hackerscenter.com/Related link:
http://www.computerworld.com/
BY Ian Schafer
Rich media describes digital advertising that deviates from "standard" display advertising in that it is interactive, engaging, or informational or it breaks free of basic, accepted IAB-determined online standards, often taking advantage of broadband connectivity.
...
What's amazing is there are still so many places rich media hasn't yet entered. E-mail has been notoriously bereft of rich media advertising due to security issues, which the next version of Outlook is sure to address.
...
Source:
http://www.clickz.com/
by Reiner Hartenstein
TU Kaiserslautern
The End of Moore's Law
Classical Parallelism Does Not Scale
Escape the Software Development Paradigm Trap
Crooked Labeling
FPGAs Became Mainstream Years Ago in Embedded Systems
FPGA-based Scientific Computing
CPUs Outperformed by FPGAs
Massively Slashing the Electricity Bill and Equipment Cost
The von Neumann Paradigm is Loosing its Dominance
The Reconfigurable Computing Paradox
Educational Deficits
Advantages of Coarse-Grained Reconfigurability
The Personal Supercomputer is Near
Management Deficits
Source:
http://www.hpcwire.com/
June 28, 2006
John Thompson discusses the competition to come
Robert McMillan
Symantec Corp. Chief Executive Officer (CEO) John Thompson has had a bumpy ride over this past year. He closed one of the largest software company acquisitions in history -- last year's $10.2 billion purchase of Veritas Software -- and has been dealing with executive departures and a company reorganization. But perhaps the most serious disruption of all has come from a formidable new competitor into the company's security software business: Microsoft Corp.
Source:
http://www.computerworld.com/
Pair win Euro data sharing deal...
By Jo Best
Microsoft and Unisys have secured a deal to build the second generation of the Schengen Information System (SIS) and Visa Information System (VIS), which will allow law enforcement agencies within the European Union to share data.
Source:
http://www.silicon.com/
Precise Biometrics has been selected as the overall supplier to Scandinavian Airlines as it becomes the first airline to introduce biometric security checks on domestic flights in Sweden. To guarantee that the person handing the baggage really is the same person boarding the plane, Scandinavian Airlines will be using biometric security solutions at baggage check-in and boarding gates. Precise Biometrics' solution means that personal privacy will be maintained, in that the temporarily stored fingerprints are deleted once they have been used.
Source:
http://www.asiatraveltips.com/
The announcement by school officials highlights the significant damage to a large organization's image and reputation that is possible when IT security is not taken seriously enough.
Source:
http://www.securityfocus.com/
By Michael Hickins
One of the flaws, according to experts, is that voting machines are enabled with wireless communication devices.
They maintain that wireless features can be used on Election Day to trigger malware that has been hidden in the machine's source code.
Despite being aware of this vulnerability, the TGDC did not ban wireless features, because many jurisdictions already use voting machines with those functions, said Quesenbery.
Source:
http://www.internetnews.com/
USB-like device connects care providers to computing resources
by Vawn Himmelsbach
“I can log into my computer in my office if I want to work on reports or letters while I'm away on a business trip,” said Williams. “It keeps me in touch so I have less anxiety about being away than I used to.”
Source:
http://www.itbusiness.ca/
This week's video podcast of The Teaching Challenge features bestselling author, mathematics and science writer Simon Singh using secret codes to inspire a class of Year 11 boys.
Source:
http://education.guardian.co.uk/
June 27, 2006
Companies Mentioned
Biometrics, Inc., (Canada)
A Vision (USA)
Accu-Time Systems, Inc. (USA)
Acroprint Time Recorder Company (USA)
...
Source:
http://www.genengnews.com/
The Biometrics Market in Germany 2004-2009: Anti-terrorism Laws Drive Growth
Pacific Biometrics Inc New - Competitor Report
Antidepressants - Global Strategic Business Report
Pacific Biometrics Inc New - Product Pipeline Report
Biometrics in France: A Strategic Entry Report, 1998
Biometrics in Japan: A Strategic Entry Report, 1999
Proteomics 2003: A Strategic Market Outlook and Business Analysis
Monoclonal Antibody Based Products - Global Strategic Business Report
Source:
http://www.researchandmarkets.com/
June 26, 2006
ASUS added the newest sensor from AuthenTec - the world leader in fingerprint sensor security, innovation and sales -- to its new F2 notebook PC. The EntrePad 1610 is integrated with the Trusted Platform Module (TPM) as part of ASUS' total security management solution that protects data integrity via both software and hardware features. The sensor is an integral part of the trusted security chain -- from initial authentication through the entire TPM security platform.
Source:
http://home.businesswire.com/
Our manager takes inventory of what's been done to secure her agency's network and what still lies ahead.
C. J. Kelly
The best security approach is applied in layers. You can apply the layers from the inside out or the outside in, but most companies start from the outside, putting firewalls at every entry point to the network.
Source:
http://www.computerworld.com/
Associated Press
The decision comes after an audit criticized the university's Computer and Network Services division for making security a low priority for more than 10 years, though it had an annual budget averaging $11 million and recent annual surpluses averaging $1.4 million.
Source:
http://www.ohio.com/
June 24, 2006
This All-in-One Guide is a collection of resources to help you secure your e-mail systems regardless of where you are in the learning or buying process.
Source:
http://searchsecurity.techtarget.com/
p2p news / p2pnet: An alliance of Canadian technology security companies has sent an open to Bev Oda, minister of Canadian heritage, and Maxime Bernier, industry minister, calling on the Canadian government to reject calls for "extreme copyright laws".
Source:
http://www.p2pnet.net/
June 22, 2006
- successful consumer protection on the internet has generally involved a much higher degree of co- and self-regulation than other media
- effective consumer protection requires more significant levels of international co-operation, and
- the Internet places a much greater responsibility than before on consumers to take action to protect themselves.
Source:
http://www.mrweb.com/
The company's RFID system is designed to prevent unauthorized activation of tags attached to consumer products.
By Jonathan Collins
... These tags were designed specifically to protect consumer privacy.
The tag's microchip operates at 13.56 MHz and is based on the ISO 14443-A standard. RFIDsec will be selling tags embedded in RFID labels. The tags work in conjunction with access-management software that permits the encoding and reading of the tag, as well as a product-authentication application to enable owners of tagged products to authenticate the tags. This is designed to ensure that the original tag has not been tampered with, cloned or otherwise compromised.
Source:
http://www.rfidjournal.com/
Products aim to better serve computer users befuddled by ever-changing threats.
BY JULIO OJEDA-ZAPATA
Pioneer Press
Gary Stevens has lots of computers in his house, but one machine proved problematic until recently.
The Windows-based PC, set aside for his two sons, would repeatedly become crippled by viruses and other online infestations even though commercial security software was installed on it. Stevens would have to wipe its hard drive and reinstall its operating system at regular intervals.
Source:
http://www.twincities.com/
Dave Friedlos, Computing 22 Jun 2006
Supermarket chain Midcounties Co-operative is extending trials of pay-by-touch fingerprint scanning after a pilot at three retail outlets in Oxford proved a hit with customers.
Source:
http://www.vnunet.com/
By Eileen Yu, ZDNet Asia
It may been championed as the highest level of security, but biometrics still have some way to go before it is widely deployed as an end-user application.
Source:
http://www.zdnetasia.com/
Robert McMillan
Soccer purists can breathe a sigh of relief. There is no Naked World Cup.
IT professionals, on the other hand, may want to be a little more vigilant because a new e-mail worm is on the loose that preys on the intense worldwide interest in the international sporting event.
Source:
http://www.computerworld.com/
June 21, 2006
A growing number of courses worldwide train 'ethical hackers' to prevent malicious attacks.
Source:
http://www.csmonitor.com/
THE ASSOCIATED PRESS
Ohio University said Tuesday it has suspended two information technology supervisors over recent breaches by hackers who may have stolen 173,000 Social Security numbers from school computers.
The school did not identify the director of communications network services - identified on the school's Web site as Thomas Reid - and manager of Internet and systems. Both were suspended pending the school's investigation of the breaches, five of which have happened since March 2005.
Source:
http://seattlepi.nwsource.com/
By Mark Morford,
I confess. There is, right this minute, quite a lot of very hot pornography on the PowerBook computer upon which I am typing this column. I know, shocking.
The websites you visit, your chat conversations, and all of your Internet and other PC files ... could get you into a heap of trouble. (From a piece of alarmist e-mail spam currently circulating on the Net, hawking disk-erasing software called Evidence Nuker)
Source:
http://www.sfgate.com/
RFIDsec announced the availability of the World's first series of RFID solutions that completely block unauthorized access to a RFID tag.
Source:
http://www.morerfid.com/
Author: Bob Crabtree
The new VAIO models have two-way protection - fingerprint recognition and what's described as hardwired, chip-level security that prevents anyone but the owner "ever getting in and stops malicious software from harvesting vital information like passwords and encryption keys - by storing sensitive data on the chip itself."
Source:
http://lifestyle.hexus.net/
By Jo Best
All of the 3.2 million tickets issued for this year's tournament will come equipped with an RFID chip inside, which is scanned whenever a fan arrives at the gates of any of the 12 stadiums.
Source:
http://networks.silicon.com/
0wn-la-la! Third-party hosting leads to 'criminal' attackRobert McMillan
Part of Microsoft Corp.'s French Web site has been taken offline by hackers, who apparently took advantage of a misconfigured server at the software vendor's Web hosting provider.
Source:
http://www.computerworld.com/
Phil Muncaster
IT Week: As vice-president of marketing for Domain Name System [DNS] server specialist Nominum, can you describe the security threats in this field?
Source:
http://www.vnunet.com/
Build security resources into the net and make them usable from anywhere.By Bryan Betts, Techworld
Network security will be one of the next areas for virtualisation, reckons Scott Lucas, the director of product marketing at Extreme Networks. The aim, he says, is to move away from applying security at specific places in the network, and instead make it available throughout.
Source:
http://www.techworld.com/
June 19, 2006
Jason Allardyce
Professor Lachlan MacKinnon, head of Abertay’s school of computing and creative technologies, said that the course was necessary because the techniques featured in movies such as War Games were now in common use. “The bottom line is if you want to be secure disconnect your computer now because there is nothing that will make it secure. If someone wanted to steal your money, your identity, your house, they could do it,” he said.
Source:
http://www.timesonline.co.uk/
By STEPHEN MANNING
Reports of data theft often conjure up images of malicious hackers breaking into remote databases to filch Social Security numbers, credit card records and other personal information.
But a lot of the time, the scenario is much simpler: A careless worker at company or agency with weak security policies falls prey to a low-tech street thug who runs off with a laptop loaded with private data.
Source:
http://seattlepi.nwsource.com/
By Will Sturgeon
silicon.com has been contacted by an individual claiming to have written the Yamanner virus which targeted users of the Yahoo! webmail service earlier this week. The man claims to be from Iran and says he is just trying to find work by advertising his programming credentials.
Source:
http://software.silicon.com/
During my search for an easy to use encryption package for my Laptop computer, I recently came across Steganos Security Suite 2006. Although this software package is designed for the Windows 2000 and Windows XP operating systems, without current support for the Pocket PC platform, I felt this would still make for an interesting and informative review.
Steganos, a leading German company for consumer encryption software, were more than happy to assist with this review.
Source:
http://www.mtekk.com.au/
June 17, 2006
by Wendy M Grossman
It's funny. Half the time we hear that the security of the nation depends on the security of its networks. The other half the time we're being told by governments that if the networks are too secure the security of the nation is at risk.
source:
http://www.newswireless.net/
If you are holding, attending an event or know about a computer security conference, seminar, or workshop, and would like to see it posted on this page, please send e-mail about the event and an URL where we can link to the NIST CSRC Webmaster We will try to post the event on our page as long as it follows within our web policy.
source:
http://csrc.nist.gov/
Passlogix, Inc. has announced the upcoming release of v-GO Credential Manager (v-GO CM), a solution for issuing, managing and revoking strong authentication devices such as smart cards, tokens, biometrics and proximity cards. This add-on to Passlogix's v-GO Sign-On Platform will be the first credential management system that supports devices and readers from all leading vendors, freeing administrators to select, mix and migrate to the devices of their choice without being locked into proprietary systems.
source:
http://www.securitypark.co.uk/
SALEM, Ore. - Electronic files containing personal data of up to 2,200 Oregon taxpayers may have been compromised by an ex-employee's unauthorized use of a computer, the Oregon Department of Revenue said Tuesday.
Amy McLaughlin, an information technology security officer with the state, said the incident apparently occurred when an employee downloaded a contaminated file from a porn site.
Source:
http://www.katu.com/
Jay Cline
Did you hear the one about the German company that had the big security breach? Probably not, because security breaches don't dominate the headlines in Die Welt, Le Monde or El Pais like they do in USA Today. Our national preoccupation with identity theft has no equivalent in the Old World. So what's the rub? Are Europeans that much better at privacy and security than we are?
That wasn't the finding of a survey recently released by Ponemon Institute LLC and the law firm White & Case LLP. They asked 47 U.S. and EU multinational companies about eight aspects of their privacy practices: privacy management, data security methods, communications and training, privacy policy, choice and consent, cross-border data transfer, privacy compliance, and customer-dispute resolution. It was the first survey of its kind that I've seen. What did it discover?
Source:
http://www.computerworld.com/
Jaikumar Vijayan
An improperly composed mass e-mail sent yesterday by open-source database vendor MySQL AB erroneously included some 9,300 customer e-mail addresses in the body of the note -- not the information about a series of summer support specials the company meant to announce.
The error apparently occurred when a MySQL employee mistakenly pasted the e-mail addresses into the body of the e-mail as a message, rather than placing the addresses into the recipient address box on the e-mail form.
Source:
http://www.computerworld.com/
June 16, 2006
This page contains pointers to other web pages dealing with cryptography and security, organized into the following sections:
Source:
http://theory.csail.mit.edu/
June 14, 2006
by Mirko Zorz
...
Your research lead you to the discovery of a high-profile vulnerability. Give us some details.In late 2004, Arnold Yau (a PhD student in the group) and I began an investigation into IPsec security, in particular the security of the "encryption only" configuration of IPsec. The relevant standards are pretty clear that this configuration should be avoided, but they also mandate it be supported, mostly for reasons of backwards compatibility.
Source:
http://www.net-security.org/
Cooperative vs. Non-Cooperative
Overt vs. Covert
Habituated vs. Non-Habituated
Attended vs. Non-Attended
Standard vs. Non-Standard Environment
Public vs. Private
Open vs. Closed
Source:
http://www.eff.org/
After a U.S. intelligence-gathering aircraft was involved in a mid-air collision off the coast of China four years ago, the crew was unable to erase sensitive information from magnetic data storage systems before making an emergency landing in Chinese territory.
That event underscored the need for simple techniques to provide fail-safe destruction of sensitive data aboard such aircraft.
Source:
http://gtresearchnews.gatech.edu/
Diego wireless network developer WFI has delivered a high-tech security system for the Oak Ridge National Laboratory in Tennessee.
The Tactical Survey system provides a flood of comprehensive information, maps and imagery about the entire facility where scientists work on a number of U.S. government projects, including nuclear weapons programs.
Source:
http://www.upi.com/
Cert, Diffie say new security risks could result
Grant Gross
A Federal Communications Commission rule requiring providers to allow wiretapping by May 2007 would either require a massive re-engineering of the Internet or introduce broad cybersecurity risks, said authors of a new study released by the Information Technology Association of America (ITAA), an IT vendor trade group.
Source:
http://www.computerworld.com/
June 13, 2006
The Swedish Radiation Protection Agency (SSI) says it is risky to wait 15 years to demolish Barsebäck, the nuclear power plant in southwest Sweden, which was completely shut down in 2005.
But its owner, Barsebäck Kraft – owned jointly by Sweden’s Vattenfall and Germany’s Eon - wants to wait until there is new storage available for the radioactive waste that remains at the plant.
Source:
http://www.thelocal.se/
(AP) -- A computer hacker stole a file containing the names and Social Security numbers of 1,500 people working for the Energy Department's nuclear weapons agency.
Officials told a congressional hearing Friday that the department's senior managers were informed only two days ago of last September's incident, which was somewhat similar to recent problems at the Veterans Affairs Department. None of the victims was notified, they said.
Source:
http://www.physorg.com/
By Jim Phillips
Ohio University has spent more than $77,000 sending letters to alumni and students affected by a computer security breach.
It's harder to put a price tag on the blow to alumni goodwill, as the number of people affected by hacking of OU computer databases continues to rise with the discovery of new hacking incidents.
"This is damaging OU's reputation far more than its drunk football coach, magazine pictorials or its #2 party-school ranking, and you can tell (OU President Roderick) McDavis that this really sucks. A lot!" wrote one incensed alum May 10.
Source:
http://www.athensnews.com/
June 12, 2006
A security expert warns of techniques used to break into computer systems of banks, businesses and even the military.
By Andy Vuong
The thrill-seeking teenager is no longer the face of computer hacking.
Sophisticated computer experts looking to profit from their technical skills are driving the new wave of cybercrimes, a national expert told 100 security officials Tuesday at the state Capitol.
Source:
http://www.denverpost.com/
June 09, 2006
From policies to perimeters to patch management
Topics in the Information Security Research Center:·Architecture
·Policies
·Viruses
·Crime
·Wireless
·Metrics
·Advisor
·Events
·Newsletters
Source:
http://www.csoonline.com/
June 08, 2006
Tougher penalties, but can the law stay up to date?
Jeremy Kirk
The U.K. has sought to tighten the Computer Misuse Act of 1990 to more precisely target denial-of-service (DoS) attacks, which have been used to extort operators of online gambling sites.
In November, a judge threw out a case against David Lennon, who allegedly crashed his former employer's e-mail server in a DoS attack in early 2004 using an automated program to send 5 million messages.
Source:
http://www.computerworld.com/
A common problem when developing connected, peer-to-peer applications is to enable connections with applications through network devices like firewalls and network address translators (NATs).
Network devices like these typically allow applications to initiate outbound network connections but prevent them from accepting inbound network connections.
Source:
http://relay.labs.live.com/
An online identity management service that lets you offload authentication functions, whether you are a user signing-in to web sites and services or a site or service owner who needs to authenticate users.
Source:
http://sts.labs.live.com/
British raise concerns over restrictions on file access
Jeremy Kirk
June 05, 2006 (IDG News Service) -- In a report released Monday, a group of lawmakers advised the British government not to make DRM (digital rights management) systems mandatory, citing concerns over how the technology restricts access to digitized files.
The All Party Parliamentary Internet Group (APPIG) said it is not aware of efforts in Europe to make DRM enforced by law, although some publishing groups favor it.
Source:
http://www.computerworld.com/
June 07, 2006
By Elinor Mills
Google is set to launch on Tuesday a Web-based spreadsheet program that will allow people to view and simultaneously edit data while conducting "in-document" chat, a company product manager said Monday.
Source:
http://news.com.com/
A US state is to enlist web users in its fight against illegal immigration by offering live surveillance footage of the Mexican border on the internet.
The plan will allow web users worldwide to watch Texas' border with Mexico and phone the authorities if they spot any apparently illegal crossings.
Source:
http://news.bbc.co.uk/
By K.C. Jones, TechWeb News
The Pirate Bay, a BitTorrent tracking site made good on its promise to return after authorities seized its entire server farm, but it was down again late Monday.
Authorities shut down the the Swedish sitelast week. It was up again Saturday but, by Monday, it contained a vague message about why it was not operating. The shut down was the latest in a tug-of-war between Pirate Bay and authorities and a larger battle between tech-savvy entertainment fans and hackers and entertainment companies.
The BitTorrent tracking site raised the ire of the Motion Picture Association of America (MPAA), which referred to it as one of the world's largest most well known facilitators of online piracy. The site directs people to more than 157,000 movies, according to the MPAA, which filed a criminal complaint in 2004.
Source:
http://www.techweb.com/
June 06, 2006
Cross Match Technologies Inc., a U.S.-based biometrics company, says it has bought Germany-based C-VIS GmbH, another biometric firm, for an undisclosed amount. C-VIS, founded in 1992, specializes in facial recognition technology.
Source:
http://www.cardtechnology.com/
By Alice Hill, RealTechNews
About 6 months ago we ran a piece on how a finger made out of Play Doh could foil many retail fingerprint scanners. Not to be outdone, a Japanese cryptographer named Tsutomu Matsumoto has found that Gummi Bears make an even better fake fingerprint, and are the cornerstone of a do it yourself fake fingerprint lab that require bears, a digital camera, and a PC. According to Mastsumoto, the gelatin used to make Gummi bears can be poured into a mold to make a finger, and this fake finger was able to fool scanners 4 out of five times.
Not to be outdone, using the fumes from superglue, Matsumoto was able to highlight a print from a drinking glass and photograph it with a digital camera, and then imprint the high res print on the gummi bear finger using a photo sensitive printed circuit board he picked up in a hobby shop. And it worked - so well that cryptography experts are recommending that these systems go right back to the drawing board.
Source:
http://www.realtechnews.com/
CEO Terry Semel will also receive at least six million stock options
By Steven Schwankert, IDG News Service
Yahoo Chairman and Chief Executive Officer Terry Semel will receive just $1 as salary, along with at least six million stock options to soften the blow.
Source:
http://www.infoworld.com/
Storage should be the realm of security
John Webster
There’s a job to be done in IT. It’s called security. Everyone in IT knows security has to be done, but who does it remains an open question.
Source:
http://www.computerworld.com/
Blast from the past mainly affects Asian market
Robert McMillan
Hewlett-Packard Co. on Thursday pulled a printer driver from its Web site after security vendor BitDefender reported that the software was infected with the same computer virus that infected HP's drivers more than five years ago.
A BitDefender partner notified the security vendor of the infected driver software on Wednesday, and the company's security researchers soon determined that it had the same Funlove virus that had plagued HP in December 2000.
Source:
http://www.computerworld.com/
Orson Swindle rethinks his 'culture of security'
Sarah D. Scalet
What's your perception of the state of information security today, and how close are we to creating this "culture of security" that you've envisioned? We do have problems. I don't think the problems are nearly as bad as they are perceived, and part of that has to do with how the media covers things. This past year we've had probably in excess of 100 disclosed breaches, but the jump from disclosed breaches to grievous harm having occurred is a huge one. You'll hear "40 million credit cards compromised," but it's a much smaller number than that -- a very low number -- where harm has actually occurred. Oftentimes a disclosure is an emotional thing. It causes people to overreact. But that is not to say we don't have a problem.
Source:
http://www.computerworld.com/
Flaw could lead to DoS attack
Jeremy Kirk
A new flaw found in Microsoft Corp.'s software could be exploited to cause a denial-of-service attack on certain applications although the bug isn't viewed as being severe.
The flaw could be exploited through a buffer overflow attack, security vendor Secunia reported yesterday. A buffer overflow occurs when excess data flows into an area of memory, spilling over so that it overwrites data in adjacent areas or causes unintended code to execute.
Source:
http://www.computerworld.com/
Records would be used in terrorism, child porn investigations
Jeremy Pelofsky and Michele Gershberg
The FBI wants U.S. Internet providers to retain Web address records for up to two years to aid investigations into terrorism and child pornography, a source familiar with the matter said.
The request came during a May 26 meeting between U.S. Attorney General Alberto Gonzales and FBI Director Robert Mueller with top executives at companies like Google Inc., Microsoft Corp. and Time Warner Inc.'s AOL.
Source:
http://www.computerworld.com/
June 04, 2006
User input critical to establishing who can be trusted
Robert McMillan
"We're making significant investments in something we call Security 2.0, which is ultimately the next generation of consumer security," said Enrique Salem, group president of Symantec's Consumer Products group, speaking at an analyst event in San Mateo, California.
Before the Security 2.0 products ship, however, Symantec plans to refresh its Norton product line and deliver two new consumer products that will offer improved identity-theft protection. The products are a security and backup service called Norton 360, as well as an online commerce security product called Norton Confidential.
Source:
http://www.computerworld.com/
barbara black
He explained, “The tremendous success of Internet related technologies, such as Web services, voiceover IP, mobile telephony, and so on, coupled with advances in hardware and software engineering are giving rise to challenging and very interesting research problems.
Source:
http://cjournal.concordia.ca/
Says threat to privacy outweighs benefits
Marc L. Songini
"Most difficult and troubling is the situation in which RFID is ostensibly used for tracking objects (medicine containers, for example), but can be in fact used for monitoring human behavior. These types of uses are still being explored and remain difficult to predict. For these reasons, we recommend that RFID be disfavored for identifying and tracking human beings," the report said.
Source:
http://www.computerworld.com/
by Willi-Hans Steeb & Yorick Hardy (Rand Afrikaans University, South Africa)
Quantum computing and quantum information are two of the fastest growing and most exciting research fields in physics. The possibilities of using the non-local behavior of quantum mechanics to factor integers in random polynomial time have also added to this new interest. This book supplies a collection of problems in quantum computing and quantum information together with their detailed solutions, which will prove to be invaluable to students as well as to research workers in these fields.
All the important concepts and topics such as quantum gates and quantum circuits, entanglement, teleportation, Bell states, Bell inequality, Schmidt decomposition, quantum Fourier transform, magic gate, von Neumann entropy, quantum cryptography, quantum error correction, coherent states, squeezed states, POVM measurement, beam splitter and Kerr Hamilton operator are included. The topics range in difficulty from elementary to advanced. Almost all problems are solved in detail and most of the problems are self-contained.
Source:
http://physicsweb.org/
June 01, 2006
By: Nicolas Boillot
The Internet Protocol, the basic building block of our online world, needs an overhaul
...
And that’s only one of the ways in which IPv4 is falling behind the times. IPv4 calls for very little in the way of security standards, which is one of the reasons security on the Internet is tough to enforce. If security were woven more deeply into the Internet’s very fabric, malicious hackers would have a much harder time trying to do any damage. An additional protocol, IPsec, helps with Internet security today, but it is not a mandatory part of IPv4. That gives worms, viruses, spyware, and other malware plenty of wiggle room. IPv4 has very little support for real-time applications—telephony, videoconferencing, online games, live sports-watching, and so on—that do not tolerate transmission lags of even a few hundred milliseconds. Although such services are available today, reliability is not guaranteed, so dropped or stuttering connections are common.
...
Source:
http://www.spectrum.ieee.org/
LUND, SWEDEN -- (MARKET WIRE) -- 05/30/2006 -- Precise Biometrics AB (publ.), a world-leading biometric company that develops and sells user-friendly biometric security solutions based on fingerprints and smart cards, has strengthen its market position in the further. The company is launching its smart card solution, Precise Match-On-Card™, in a version compliant with the US Federal government standard, American National Standards Institute (ANSI 378). The standard is an important requirement in implementing the US Federal Government Homeland Security Presidential Directive 12 (HSPD-12) and the closely aligned Federal Information Processing Standards 201 (FIPS 201). By fall this year all US Government agencies must initiate the deployment of smart card based ID cards, the so called PIV (Personal Identity Verification) Cards.
Source:
http://www.marketwire.com/
The Concordia Institute for Information Systems Engineering is an interdisciplinary fundamental research and R&D learning institute.
Source:
http://news.concordia.ca/
It fixes flaw in corporate antivirus software
Robert McMillan
Symantec Corp. has patched a widely reported flaw in the English versions of its corporate antivirus software.
Source:
http://www.computerworld.com/
Software maker enters the security market
Robert McMillan
Microsoft Corp. is set to release today a fully supported version of its Windows Live OneCare software, marking its entry into the security software market.
OneCare includes firewall, antivirus and backup software, as well as Microsoft's Windows Defender antispyware technology, which is still in beta form. The product also handles routine maintenance tasks such as defragmenting the hard disk and cleaning up unused temporary files.
Source:
http://www.computerworld.com/