Wednesday, July 2, 2008

Wednesday News Feed 7/2/08

Survey: More than 10,000 laptops lost each week at airports




PCI Standards Expanded to Include Unattended Devices
- 7/1/2008 5:40:00 PM New specs respond to emerging threats posed at kiosks, ATM devices





Cracking Physical Identity Theft - 6/30/2008 5:50:00 PM Social engineering expert reveals brick-and-mortar identity theft risks in banks, ISPs, and other firms






Apple patches 25 Mac OS X security vulnerabilities





MySpace users struggle to overcome cybervandalism





Teenage creator of Nugache worm reaches plea agreement





Hackers hijack critical Internet organization sites






Jury convicts Web site operator in P2P case
A former administrator at EliteTorrents.org has been convicted of conspiracy and felony copyright infringement in a Virginia court. It's the first time in the U.S. that a peer-to-peer user has been convicted by a jury of copyright infringement, the Department of Justice said today.





IT Jobs: Too Many or Too Few?
Do we have a shortage of IT jobs in the US or not enough skilled professionals to fill them? Recent articles are sending conflicting messages, and we'd better get our facts straight.
Read more





July 01, 2008 Three strokes of a bamboo cane for Singapore forum 'scammer'
http://www.crime-research.org/news/01.07.2008/3433/





June 30, 2008 Azerbaijan: joining European Convention on Cybercrime
http://www.crime-research.org/news/30.06.2008/3431/





Reagan National Airport's Plans to Peer Under Travelers' Clothes
The airport plans to deploy body imaging devices that use millimeter wave length technology in an effort to virtually disrobe air travelers. The technology allows very detailed scans of persons entering the device and may disclose personal medical devices, surgeries, and medical conditions that are not otherwise apparent. Earlier versions of the technology were known as Backscatter X-ray systems.
Get Ready to Strip At Reagan National, Washington Post, June 22, 2008






More SQL Injection with Fast Flux hosting






Kill Switches and Remote Control
http://www.schneier.com/blog/
It used to be that just the entertainment industries wanted to control your computers -- and televisions and iPods and everything else -- to ensure that you didn't violate any copyright rules. But now everyone else wants to get their hooks into your gear.

OnStar will soon include the ability for the police to shut off your engine remotely. Buses are getting the same capability, in case terrorists want to re-enact the movie Speed. The Pentagon wants a kill switch installed on airplanes, and is worried about potential enemies installing kill switches on their own equipment.

Microsoft is doing some of the most creative thinking along these lines, with something it's calling "Digital Manners Policies." According to its patent application, DMP-enabled devices would accept broadcast "orders" limiting capabilities. Cellphones could be remotely set to vibrate mode in restaurants and concert halls, and be turned off on airplanes and in hospitals. Cameras could be prohibited from taking pictures in locker rooms and museums, and recording equipment could be disabled in theaters. Professors finally could prevent students from texting one another during class.
...






Posted at 01:04 PM ET, 07/ 1/2008
Amazon: Hey Spammers, Get Off My Cloud!
http://blogs.washingtonpost.com/securityfix/
...But the most interesting aspect of this attack (at least to me) was left out of the Websense advisory: All of the spam came from Amazon's Elastic Compute Cloud (EC2) servers, which are marketed to companies -- mainly small to mid-sized businesses -- that want to purchase access to any number of computer applications hosted on the Internet, from data crunching and storage to on-demand computer processing power...
Continue reading this post »»






Feds: Companies need to report cybercrimesNews Brief, 2008-06-30Corporations need to reliably report cybercrime incidents to federal law enforcement to help the government more effectively combat online attackers, officials say.





"Variety reports on a recent study that says TV viewership's median age is outside the 18-49 years demographic: "The broadcast networks have grown older than ever — if they were a person, they wouldn't even be a part of TV's target demo anymore."

These totals exclude DVR users, and apparently the oldest since they started tracking it. Of course you know what the means... TV is for old people! The internet has confirmed it.
Read More...






"In some shocking news out of Texas, PC repair will now require a PI License. Surely this stands to have a substantial impact on small repair shops around the state if upheld. Never fear, however, as the first counter-suit has already been filed."
Read More...






"For Tracy Mooney, a married mother of three in Naperville, Ill., the decision to abandon cyber-sense and invite e-mail spam into her life for a month by participating in a McAfee experiment was a bit of a lark. The idea of the Spammed Persistently All Month (S.P.A.M.) experiment — which fittingly started on April Fool's Day — was to have 50 volunteers from around the world answer every spam message and pop-up ad they got. Mooney was game, especially since McAfee was giving a free PC to all participants. She told her story to Network World."
Read More...







MS to make volume licenses 'evergreen'





European Politicians Discuss 'The Blogger Problem'





Face Scanning Vending Machine Fooled By Photos
from the like-we-couldn't-see-that-coming dept
Last year, we wrote about how cigarette vending machines in Japan were using facial recognition software to make sure the buyer was of an appropriate age. As we noted at the time, it seemed unlikely that such a system would work very well, and, indeed, The Raw Feed lets us know that it's easily fooled by a magazine photo of an older person. Not too surprising, of course, but you would think that someone would have tested for such things before putting the machines into practice. Unless, of course, they really don't care about the age of the buyers.






Class Of Attorneys Sues DOJ Over Job Denials Based on Ideology






The End of Exponential Malware Growth?






Robot Learns to Use Tools
By Kristina GrifantiniTuesday, July 01, 2008
By shoving objects around on a table, UMan figures out how they work.






China Inspired Interrogations at Guantánamo






PRC Cyber Space Capabilities
"...I would also point out on this slide that it’s really important to get the lexicon right. In the open source media and other forums, you hear the term “cyber attack” used rather liberally, and you won’t hear anyone in the Department of Defense use that term in the context of cyber reconnaissance or network intrusions. What we are seeing today are network intrusions."

No comments: