RIAA seeks sanctions against defense lawyer in copyright case The RIAA accused New York attorney Ray Beckerman of engaging in "vexatious litigation" in a case involving an alleged copyright violator. Read more...
Palin e-mail intruder left digital trailNews Brief, 2008-09-19One screenshot left by the attacker shows enough detail to likely foil any anonymization, while law enforcement authorities investigate a trail pointing to the son of a Democratic lawmaker.
Report: Tenn. legislator confirms son is at center of Palin hack chatter
EFF files surveillance lawsuit against NSA, Bush, Cheney
Security researchers ponder possible Palin hacks
Web proxy firm working with FBI to trace Palin e-mail hacker
NTSB: Train engineer in deadly crash was texting while on job
Facebook's Beacon 'returns' for some bloggers
Hacked Texas National Guard site serves up malware
EFF, Public Knowledge sue feds over secret IP pact
Researchers Discover Security Flaw in QuickTime Researchers at Intego have discovered a bug in Apple's recently released QuickTime 7.5.5 media software that could be used as...
Hacker posts QuickTime zero-day attack code
Pix Firewalls Out, Unified Threat Management In - 9/19/2008 12:45:00 PM
AirIQ selects Check Point UTM solution as its new perimeter security architecture
Porn Operators Hijack Pages on AARP Website - 9/18/2008 5:45:00 PM
Multi-pronged attack shows weakness in custom content management systems, researcher says
Hacking Tool Lets You Target Your Own End Users - 9/18/2008 4:25:00 PM
New open-source attack platform that performs email-based Web attacks debuts next week at OWASP conference
Five Trends Driving the Need for Better Mobile Security
Mformation Chief Marketing Officer Matt Bancroft outlines five mobile security trends keeping CSOs up at night.
Read more
EA relents, changes Spore DRM. Too little, too late?
arstechnica.com — The story of Spore has become the story of EA and DRM: the company is now loosening the install limit and working on ways to get your installs back after use them up. For many gamers, however, any limit remains intolerable.More…
http://www.fitbit.com/ is a cool gadget to help you lose weight.
Microsoft Live Mesh: What are the Security Implications?
by Deb Shinder
Articles / Web Application Security
The security implications of cloud computing in general and Live Mesh in particular, and what mechanisms Microsoft has built in to protect your "meshed" devices and data.
Analysis: new spying lawsuit asks "can computers eavesdrop?"
Ars analyzes EFF's lawsuit against President Bush and Bush administration officials who approved warrantless NSA wiretaps. EFF's chances for success hinge on a single question: can computers eavesdrop?
September 19, 2008 - 09:07AM CT - by Julian Sanchez
German Court Bans VoIP On The iPhone; Says It's Unfair
from the felony-interference-with-a-business-model dept
We've pointed to a bunch of stories that involved Apple somewhat arbitrarily forbidding or banning iPhone apps, but now it appears that the courts are getting in on the game as well. A German court has banned a VoIP iPhone app after T-Mobile, the mobile operator who offers the iPhone in Germany, complained. The court says that this VoIP app "makes use of unfair business practices," though it's difficult to see how. VoIP is a perfectly acceptable application, so why is it unfair? The court's explanation here seems a bit stretched as well. Apparently, the only way to run this particular VoIP app is on a jailbroken iPhone, and T-Mobile's contract forbids jailbreaking the phone. Of course, if that's true, isn't it an issue between T-Mobile and its customers who broke the contract? Why should the app maker be blamed? All it did was build a useful app? This seems like yet another case where a company is arguing that interference with a business model should be illegal.
25 Comments Leave a Comment..
Why Your Laptop Is Definitely Lost
...
I decided to blog on this subject because it was just yesterday that I was a speaker at the Eurosec’2008 conference in Paris. Just after my talk, someone working in the counterespionage and counterterrorism circles explained that data theft and reselling equipment on the black market were not the only targets of thieves. 30 percent of these thefts are dedicated to industrial espionage, he said. In 70 percent of the instances, they are stolen to attempt unlawful acts of software piracy, for downloading pedophilia images, browsing terrorist and extremist web sites, exchanging information via blogs and forums, and for sending terror email for intimidation or for claiming responsibility for bombings.
When a burglary occurs, thieves often use stolen cars. Some days after the crime, the police often find the charred car at the bottom of a forest. Now, the same method is being used by cybercriminals; after it’s been used, the computer is destroyed and never found again. And it’s far easier to steal a laptop than an automobile.
Report: 60 percent of businesses hit by cybercrime
Sue Marquette Poremba September 18, 2008
A recent U.S. Department of Justice survey indicates that the majority of American businesses have detected one or more cyberattacks.
DHS To Co-ordinate Protection Of "Federal Networks" Regarding National Cyber Security By Grey McKenzie 09/16/2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment