April 30, 2007
Economics of information security : News Archive : News : BCS: "He outlined ten trends that were changing the landscape of information security, and how viewing these trends in economic terms could help unravel some of the paradoxes of practical information security."
Source
Managing Information News: "“Identity Management is one of the most misused and abused expressions in modern computing.” Say Toby Stevens, “The vested interests behind identity cards, biometric technologies and single sign on systems have created an environment where it is almost impossible to distinguish between technology fact, science fiction and commercial propaganda."
Source
Are Rootkits the Next Big Threat to Enterprises? - Security Feed - News - CSO Magazine: "Rootkits date back to the earliest years of the Internet, when crackers created cloaked variants of Unix commands to ensure their deeds on compromised systems would go undetected."
Source
April 10, 2007
"Software that could be used to turn a Web browser into an unwitting hacker's tool has been posted to the Internet, after it was downloaded by a quick-thinking attendee at last month's Shmoocon hacker conference."
source
"the practice of making the details of security vulnerabilities public -- is a damned good idea. Public scrutiny is the only reliable way to improve security, while secrecy only makes us less secure.
Unfortunately, secrecy sounds like a good idea."
source
Kim Cameron’s Identity Weblog » Without BE, templates ARE your biometrics: "conventional biometric templates can be easily correlated across databases. Most biometric matching algorithms work this way: a fresh biometric sample is acquired and processed; a fresh template is extracted from it; and this template is matched against previously enrolled template."
source
Fingerprint foreboding - The Boston Globe: "In the 19th century, calipers were applied to skulls and other body parts, but such measurements were imprecise and cumbersome. "
source
NION :: Do we still have freedom if we lack privacy?: "In theory we have civilian control over military activities. Also in theory, we can change these attitudes and such actions by those we elect to high office. In theory. Remember, Robert Kennedy approved of the wire-tapping of Martin Luther King, Jr. It was Truman who authorized the creation of much of the apparatus of the national security state, including both the CIA and the NSA, and it was on his watch that the Attorney General was directed to establish a list of possible subversive organizations."
source
666 Mark of The Beast 666 » End Times Prophecy: "“We read your veins like barcodes - and no two are alike,” "
source
$1.5 billion in annual revenues projected for Iris Recognition Market - find BIOMETRICS: "Iris recognition will achieve 16% market share-the largest of any single biometric modality generating $1.5 billion in annual revenues"
source
IBM and Higgins | Reg Developer: "The first technology is an ‘identity mixer’ that will let users pick and choose what information to disclose about themselves and next (in July) an identity selector for choosing the sources of information to use."
source
April 04, 2007
Hacker's progress: how McKinnon pierced Pentagon security | Special Reports | Guardian Unlimited Politics: "The biggest loopholes had been created by users who failed to follow basic security measures - such as changing their password from the default 'password'."
source
Theft of 45.6M Card Numbers Largest Heist Yet: "In filings with the U.S. Securities and Exchange Commission last week, the company said 45.6 million credit and debit card numbers were stolen from two of its systems over a period of more than 18 months by an unknown number of intruders. "
source
KRT Wire | 03/30/2007 | Post-9-11 security fears fuel boom in high-tech ID business: "The growth of the identification industry also has spawned an aggressive push-back from privacy advocates against what they call an emerging 'industrial surveillance complex.'"
source
April 03, 2007
Security Park - The Art of Cyber-War: "Cyber Security has proved to be an elusive goal that now requires a radical shift in the mental models of IT practitioners. The first issue stems from the idealised concept of security with the implicit belief that a system can be made invulnerable to attack. This is an unattainable goal if we are dealing with any complex IT System, and by complex I mean any network containing more than 2 computers to which human users have access."
Source
James Governor’s Monkchips » Top Ten Ways To Make Privacy A CEO-Level Concern: "4. Tell him you lost the corporate archives
3. Re-route his security camera to YouTube
2. Remove sticky notes, with his passwords, from his computer screen
1. Spend $1,000 to do a security check on him"
source