FUD Watch: Patch Tuesday Panic? No Thanks
Are security vendors right to bang the alarm bell every Patch Tuesday? Yes. But only to a point.
Read more
Microsoft warns: Get ready for IE 8
Mary Jo Foley: Microsoft is cautioning Web site owners now that they need to be prepping now for possible problems the new, more standards-compliant browser may cause.
Mary Jo Foley: Microsoft caves: 'Super-standards' mode to become IE 8 default
The 16 TB RAM PC: When?
Robin Harris: The next version of Mac OS X will address 16 TB of RAM. Who will ever have 16 TB--16,000 GB--of RAM on a home computer? If the past is any guide, it might be a while.
Will The RIAA Sue Judge Kozinski For Sharing MP3s?
from the just-wondering dept
While judge Alex Kozinski is getting a ton of press for accidentally sharing pornographic images from his webserver, Justin Levine notes that the report concerning what was on the server also found music MP3s from musicians like Johnny Cash, Bob Dylan and Weird Al Yankovic. Levine wonders if the RIAA will now sue this federal judge as well. In fact, things could get tricky in that some research suggests not only was Kozinski storing MP3s, he may have actively been sharing some of those MP3s as well. That same link mentions that in one of many copyright infringement lawsuits concerning the company Perfect 10, Kozinski wrote a dissenting opinion suggesting that facilitating copyright infringement should be seen as infringement as well:
Do You Need To Schedule Your Technology Down Time?
from the shut-down-and-go-outside dept
One of the best decisions I made when I first start blogging on Techdirt oh-so-many-years ago, was that I wouldn't blog on weekends. While it wasn't on purpose, it's worked out nicely as it gives me plenty of time on weekends to disconnect and do other stuff. I've found (surprising to some, I'm sure) that it's not at all difficult for me to pretty much ignore my computer for the weekend if I need to. And, then, there are some weekends where I do end up using the computer, either for fun or to catch up on some work-related things. However, I never considered setting up an official "schedule" of tech down time. Yet, Mark Glaser, over at MediaShift notes that a growing number of people are setting aside "tech sabbaths" to force themselves to disconnect.
Even Lawyers Are Confused About What's Legal Or Not In The Prince/Radiohead Spat
UK Police Accused Of Violating Copyright By Listening To Music In Police Stations
from the keep-quiet dept
While we've seen performing rights groups like ASCAP be overly aggressive in trying to collect money from anyone holding a "performance" of music, it seems that the UK's "Performing Right Society" (PRS) is pushing the boundaries even more. This is the same group that we noted last year had sued a bunch of auto mechanics for listening to radios in their garages loud enough that customers in the waiting room could hear them. Yes, the PRS insisted that this required a performance license.
Job-Hunter Forged SEC Letter, Feds Say
MANHATTAN (CN) - A man trying to get hired as CFO of an international company has been charged with forging a letter on SEC letterhead, claiming to be from an SEC attorney, recommending him for the $300,000 job.
Report: Data breaches, stolen data, organized crime rampant
Chuck Miller June 12, 2008
A new report from Verizon Business Security Solutions shows that there is an escalating worldwide black market for stolen data.
Congressmen allege China-based PC hackings
Dan Kaplan June 11, 2008
Two lawmakers said on Wednesday that their office computers were infiltrated by hackers operating out of China.
British Hacker Faces Extradition Hearing Next WeekPC World - Fri Jun 13, 6:00 AM ET
A British hacker fighting extradition to the U.S. on charges of computer hacking is preparing for his final U.K. appeal on...
EU states extend life of Internet security body Reuters - Thu Jun 12, 10:28 AM ET
LUXEMBOURG (Reuters) - European Union telecoms ministers agreed on Thursday to extend the life of the bloc's Internet security watchdog by three years as threats to the Web increase.
Japan and France Agree to Closer Ties on Cybercrime PC World - Thu Jun 12, 5:20 AM ET
Japanese and French government ministers agreed at a meeting in Tokyo on Thursday to work more closely on cybercrime.
38,000 Credit Card Numbers Stolen From The Cotton Traders Website By Hackers By Grey McKenzie Today
Uniloc’s Top Ten Rules for Combating Cyber Attacks on Critical Infrastructure By Grey McKenzie Today
Cyber-Dissident Huang Qi kidnapped & Foreign Journalists Arrested In Sichuan By Grey McKenzie Today
United States Cyber Security Policy Frustrating & Dysfunctional Says Former DHS Official By Grey McKenzie Yesterday
NVD Primary Resources
Vulnerability Search Engine (CVE software flaws and CCE misconfigurations)
National Checklist Program (automatable security configuration guidance in XCCDF and OVAL)
ISAP/SCAP (program and protocol that NVD supports)
SCAP Compatible Tools
SCAP Data Feeds (CVE, CCE, CPE, CVSS, XCCDF, OVAL)
Product Dictionary (CPE)
Impact Metrics (CVSS)
Common Weakness Enumeration (CWE)
"Differences in the type of memory and I/O controllers used in USB drives can make one device perform two or three times faster and last 10 times longer than another, even if both sport the USB 2.0 logo, according to a Computerworld story. While a slow USB drive may be fine for moving a few dozen megabytes of files around, when you get into larger data transfers, that's when bandwidth contrictions become noticeable. In 2009, controller manufacturers are expected to begin shipping drives with dual- and even four-channel controllers, which will increase speeds even for slower drives."
Top 5 Security Reasons to Use Windows Vista
by Derek Melber
Articles / Windows OS Security
The top 5 security based reasons to move to Windows Vista for all users in the environment. The reasons are valid and very reasonable.
Study: consumers lust after high-speed broadband, not HDTV
Top Secret Al Qaeda Documents Left on London Train
Oops. At least they were found and returned.
Keith Vaz MP, chairman of the powerful Home Affairs select committee told the BBC: "Such confidential documents should be locked away...they should not be read on trains."
You think?
Malware Silently Alters Wireless Router Settings
http://blogs.washingtonpost.com/securityfix/
A new Trojan horse masquerading as a video "codec" required to view content on certain Web sites tries to change key settings on the victim's Internet router so that all of the victim's Web traffic is routed through servers controlled by the attackers.
http://www.routerpasswords.com/ has all the manufacturer's default passwords.
The 2008 Olympics and Your Privacy
Businesses and federal officials are being warned that attendance at the 2008 Olympics will likely put data on laptops and e-mail devices at risk. Chinese intelligence services may actively work to breach data devices in search of secrets, install surveillance technology, and access secure networks.
Olympic visitors' data is at risk, USA Today, June 10, 2008
Posted by EPIC on June 12, 2008.Permanent link to this item.
Verizon Study Links External Hacks to Internal Mistakes - 6/12/2008 10:50:00 AM Most breaches come from outside the company, but they are often triggered by unfound errors on the inside
Danish filter catches Romanian child-porn sites
Experts: Spyware legislation needs more work
ACLU files lawsuit on behalf of Virginia privacy advocate
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment