<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d24008684\x26blogName\x3d53cur!ty+6109\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dSILVER\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://g1rma.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://g1rma.blogspot.com/\x26vt\x3d7463756522070264080', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe", messageHandlersFilter: gapi.iframes.CROSS_ORIGIN_IFRAMES_FILTER, messageHandlers: { 'blogger-ping': function() {} } }); } }); </script>

53cur!ty 6109

Girma Nigusse

U.K. approves McKinnon extradition order

July 11, 2006

Hacker known as 'Solo' will stand trial in America

Jeremy Kirk

U.K. Home Secretary John Reid approved an extradition request this week to send a computer hacker to the United States, where he'll be tried for allegedly crippling military networks shortly after the terrorist attacks in September 2001.

Source: http://www.computerworld.com/

Wi-fi creates new world of computer security woes

"A lot of people buy a (wireless router), plug it in and if it's working, it must be fi ne," Berkuta said. "People have to be educated to harden up their systems, make sure their security is turned on." More than a third of wi-fi networks in London, New York, Frankfurt and San Francisco had basic security features turned off, according to a 2005 survey of the networks by RSA Security Inc.

Source: http://www.canada.com/

Cigital CTO, author, and S&P editorial board member Gary McGraw in conversation with prominent security experts.

IEEE Security & Privacy and Cigital are please to present Cigital CTO and author
Gary McGraw in conversation with prominent security experts.

Source: http://www.computer.org/

"Obfuscating BitTorrent"

Bram Cohen, creator of Bit Torrent, gives multiple reasons why developers shouldn't hack his network to get around ISP bandwidth restrictions in Obfuscating BitTorrent. These include: * No benefit. Most ISPs don't discriminate against P2P (yet). Plus much P2P traffic can be identified by profile even if disguised. * Incompatibility with other network clients. * Any ISP caching (a good thing) would be useless. * It's bad form and a poor use of developer time.

Source: http://www.p2p-weblog.com/

No Rush to Give Russian Engineers Net Access

July 07, 2006

Our manager is flexible on the matter but has concerns about protecting intellectual property.

Mathias Thurman

I just returned from Moscow, where I visited a company we outsource some of our software development to. Outsourcing software development can be a risky business. The theft of my company's source code could hit revenue hard. Now that USB pocket drives and other small, removable media have capacities as high as 5GB, it would be scarily easy for someone to put years' worth of software development on an external drive and walk out the door with it.

Source: http://www.computerworld.com/

Security firm says: 'Switch to Macs'

Quentin Reade

A leading computer security company says malware is so rampant on PCs, home users should switch to Macs.

In a report out today looking at the past six months of cyber crime, Sophos said the top threats all target Microsoft systems, and recommended that home computer users buy an Apple.

Source: http://www.webuser.co.uk/

McAfee sees 400,000 virus definitions by 2008

But the number of serious outbreaks is dropping

Robert McMillan

Although widespread virus outbreaks may be a thing of the past, the total amount of malicious software being written is on the rise, according to McAfee Inc.

Source: http://www.computerworld.com/

The Plot To Hijack Your Computer

They watch you surf the Web. They plague you with pop-up ads. Then they cripple your hard drive.

Source: http://www.businessweek.com/

Biometrics protect one in 20 firms, says survey

Biometric security is used by 5% of firms in a survey just conducted amongst 227 information security professionals. Advanced biometric testing is used by one in 20 firms, the survey found, yet 49% of firms have no firewalls on PCs.

Source: http://www.out-law.com/

SPEECH PATTERNS- NEW SECURITY POTENTIAL

July 05, 2006

Hatfield, Hertfordshire - 5 July 2006

British researchers are working on new techniques which they hope will allow security authorities to identify people on the basis of their speech patterns.

Source: http://www.bsn.org.uk/

Researchers claim Great Firewall workaround

A group of researchers at the University of Cambridge claims to have found a way to circumvent China's Internet content controls, but some doubt whether their findings really offer a breakthrough.

Source: http://www.computerpartner.nl/
Paper: http://www.cl.cam.ac.uk/
Related link: http://www.pcadvisor.co.uk/