April 30, 2007
Economics of information security : News Archive : News : BCS: "He outlined ten trends that were changing the landscape of information security, and how viewing these trends in economic terms could help unravel some of the paradoxes of practical information security."
Source
Leave a comment
Managing Information News: "“Identity Management is one of the most misused and abused expressions in modern computing.” Say Toby Stevens, “The vested interests behind identity cards, biometric technologies and single sign on systems have created an environment where it is almost impossible to distinguish between technology fact, science fiction and commercial propaganda."
Source
Leave a comment
Are Rootkits the Next Big Threat to Enterprises? - Security Feed - News - CSO Magazine: "Rootkits date back to the earliest years of the Internet, when crackers created cloaked variants of Unix commands to ensure their deeds on compromised systems would go undetected."
Source
Leave a comment
April 10, 2007
"Software that could be used to turn a Web browser into an unwitting hacker's tool has been posted to the Internet, after it was downloaded by a quick-thinking attendee at last month's Shmoocon hacker conference."
source
Leave a comment
"the practice of making the details of security vulnerabilities public -- is a damned good idea. Public scrutiny is the only reliable way to improve security, while secrecy only makes us less secure.
Unfortunately, secrecy sounds like a good idea."
source
Leave a comment
Kim Cameron’s Identity Weblog » Without BE, templates ARE your biometrics: "conventional biometric templates can be easily correlated across databases. Most biometric matching algorithms work this way: a fresh biometric sample is acquired and processed; a fresh template is extracted from it; and this template is matched against previously enrolled template."
source
Leave a comment
Fingerprint foreboding - The Boston Globe: "In the 19th century, calipers were applied to skulls and other body parts, but such measurements were imprecise and cumbersome. "
source
Leave a comment
NION :: Do we still have freedom if we lack privacy?: "In theory we have civilian control over military activities. Also in theory, we can change these attitudes and such actions by those we elect to high office. In theory. Remember, Robert Kennedy approved of the wire-tapping of Martin Luther King, Jr. It was Truman who authorized the creation of much of the apparatus of the national security state, including both the CIA and the NSA, and it was on his watch that the Attorney General was directed to establish a list of possible subversive organizations."
source
Leave a comment
$1.5 billion in annual revenues projected for Iris Recognition Market - find BIOMETRICS: "Iris recognition will achieve 16% market share-the largest of any single biometric modality generating $1.5 billion in annual revenues"
source
Leave a comment
IBM and Higgins | Reg Developer: "The first technology is an ‘identity mixer’ that will let users pick and choose what information to disclose about themselves and next (in July) an identity selector for choosing the sources of information to use."
source
Leave a comment
April 04, 2007
Hacker's progress: how McKinnon pierced Pentagon security | Special Reports | Guardian Unlimited Politics: "The biggest loopholes had been created by users who failed to follow basic security measures - such as changing their password from the default 'password'."
source
Leave a comment
Theft of 45.6M Card Numbers Largest Heist Yet: "In filings with the U.S. Securities and Exchange Commission last week, the company said 45.6 million credit and debit card numbers were stolen from two of its systems over a period of more than 18 months by an unknown number of intruders. "
source
Leave a comment
KRT Wire | 03/30/2007 | Post-9-11 security fears fuel boom in high-tech ID business: "The growth of the identification industry also has spawned an aggressive push-back from privacy advocates against what they call an emerging 'industrial surveillance complex.'"
source
Leave a comment
April 03, 2007
Security Park - The Art of Cyber-War: "Cyber Security has proved to be an elusive goal that now requires a radical shift in the mental models of IT practitioners. The first issue stems from the idealised concept of security with the implicit belief that a system can be made invulnerable to attack. This is an unattainable goal if we are dealing with any complex IT System, and by complex I mean any network containing more than 2 computers to which human users have access."
Source
Leave a comment
James Governor’s Monkchips » Top Ten Ways To Make Privacy A CEO-Level Concern: "4. Tell him you lost the corporate archives
3. Re-route his security camera to YouTube
2. Remove sticky notes, with his passwords, from his computer screen
1. Spend $1,000 to do a security check on him"
source
Leave a comment