July 11, 2006
Hacker known as 'Solo' will stand trial in America
Jeremy Kirk
U.K. Home Secretary John Reid approved an extradition request this week to send a computer hacker to the United States, where he'll be tried for allegedly crippling military networks shortly after the terrorist attacks in September 2001.
Source:
http://www.computerworld.com/
"A lot of people buy a (wireless router), plug it in and if it's working, it must be fi ne," Berkuta said. "People have to be educated to harden up their systems, make sure their security is turned on." More than a third of wi-fi networks in London, New York, Frankfurt and San Francisco had basic security features turned off, according to a 2005 survey of the networks by RSA Security Inc.
Source:
http://www.canada.com/
IEEE Security & Privacy and Cigital are please to present Cigital CTO and author
Gary McGraw in conversation with prominent security experts.
Source:
http://www.computer.org/
Bram Cohen, creator of Bit Torrent, gives multiple reasons why developers shouldn't hack his network to get around ISP bandwidth restrictions in Obfuscating BitTorrent. These include: * No benefit. Most ISPs don't discriminate against P2P (yet). Plus much P2P traffic can be identified by profile even if disguised. * Incompatibility with other network clients. * Any ISP caching (a good thing) would be useless. * It's bad form and a poor use of developer time.
Source:
http://www.p2p-weblog.com/
July 07, 2006
Our manager is flexible on the matter but has concerns about protecting intellectual property.
Mathias Thurman
I just returned from Moscow, where I visited a company we outsource some of our software development to. Outsourcing software development can be a risky business. The theft of my company's source code could hit revenue hard. Now that USB pocket drives and other small, removable media have capacities as high as 5GB, it would be scarily easy for someone to put years' worth of software development on an external drive and walk out the door with it.
Source:
http://www.computerworld.com/
Quentin Reade
A leading computer security company says malware is so rampant on PCs, home users should switch to Macs.
In a report out today looking at the past six months of cyber crime, Sophos said the top threats all target Microsoft systems, and recommended that home computer users buy an Apple.
Source:
http://www.webuser.co.uk/
But the number of serious outbreaks is dropping
Robert McMillan
Although widespread virus outbreaks may be a thing of the past, the total amount of malicious software being written is on the rise, according to McAfee Inc.
Source:
http://www.computerworld.com/
They watch you surf the Web. They plague you with pop-up ads. Then they cripple your hard drive.
Source:
http://www.businessweek.com/
Biometric security is used by 5% of firms in a survey just conducted amongst 227 information security professionals. Advanced biometric testing is used by one in 20 firms, the survey found, yet 49% of firms have no firewalls on PCs.
Source:
http://www.out-law.com/
July 05, 2006
Hatfield, Hertfordshire - 5 July 2006
British researchers are working on new techniques which they hope will allow security authorities to identify people on the basis of their speech patterns.
Source:
http://www.bsn.org.uk/
A group of researchers at the University of Cambridge claims to have found a way to circumvent China's Internet content controls, but some doubt whether their findings really offer a breakthrough.
Source:
http://www.computerpartner.nl/Paper:
http://www.cl.cam.ac.uk/Related link:
http://www.pcadvisor.co.uk/