For Bob:
Obama Unveils High-Speed Rail Plan
nytimes.com — President Barack Obama on Thursday highlighted his ambition for the development of high-speed passenger rail lines in at least 10 regions.More…
----------
Botnets: 4 Reasons It's Getting Harder to Find and Fight Them
Researchers say vulnerable Web 2.0 applications and peer-to-peer architecture are making it easy for hackers to maintain armies of hijacked computers.
Read more
----------
The Pirate Bay verdict: guilty, with jail time
A Swedish district court has ended The Pirate Bay's "spectrial" with a guilty verdict. The defendants split a 30 million kronor fine and will each spend a year in jail, though one already says he would rather burn all the money he owns than pay up.
----------
DOJ wants Microsoft antitrust oversight extended into 2011
----------
A warning against premature adoption of cloud computing
about 5 hours ago - by Ryan Paul Posted in: Uptime
A new report on cloud computing indicates that building and operating a data center is still more cost-effective than adopting cloud computing services like EC2 for many large companies.
Read more
----------
They're gone! After outcry, Time Warner uncaps the tubes
about 23 hours ago - by Nate Anderson Posted in: Law & Disorder
After a public outcry and the attention of several members of Congress, Time Warner Cable has stopped its trial of Internet data caps, but not before making "metered billing" a tough sell for all other American ISPs.
Read more
----------
Apple growth turns negative as worldwide PC shipments plunge
----------
Online proxy users won't get stiffer sentences after all
a day ago - by John Timmer Posted in: Law & Disorder
A proposal that would have directed judges to consider the use of proxy servers when sentencing those convicted of online crimes has been dropped at the urging of technology advocates.
Read more
----------
Microsoft April 2009 patches:
April 2009 Monthly Bulletin Release
----------
Token Kidnapping
Posted Tuesday, April 14, 2009 10:36 AM by MSRCTEAM
Hello everyone,
As you can see from the April 2009 release summary, we addressed the Token Kidnapping issue with bulletin MS09-012. This issue allowed an attacker to gain full control of a server if the attacker can first run malicious code on the server as a lesser privileged user.
----------
EPIC Demands Disclosure on DHS "Virtual Strip Search" at Airports
Today, EPIC filed a Freedom of Information Act request demanding disclosure of records detailing airport scanners that take naked pictures of American travelers. Security experts describe the "whole body imaging" scanners as virtual strip searches. The Transportation Security Administration plans to make the scans mandatory at all airport security checkpoints, despite prior assurances that whole body imaging would be optional. EPIC's request seeks documents concerning the agency's ability to store and transmit detailed images of naked U.S. citizens. For more information, see EPIC's Whole Body Imaging page and EPIC's FOIA Litigation Manual (Apr. 14)
EPIC on April 15, 2009 11:04 PMPermanent link to this item.
----------
World's First Mac Botnet? Not Quite.
Permalink
This morning, as I scrolled down the list of security Web sites I normally check via my RSS reader, I noticed several items referencing news about the "world's first Mac botnet." As I read on, it became clear this was neither news nor a first.
...
----------
Vulnerabilities in Linux allow root privileges
According to a number of Linux distributors, a bug in the Linux udev service allows root privileges to be obtained more…
----------
17 April 2009
SQL injection reloaded: access to the operating system
SQL injection lets attackers not only manipulate a database, but immediately take control of a complete server along with the operating system. The sqlmap tool fully automates the process more…
----------
17 April 2009
A new Linux rootkit technique presented
Anthony Lineberry, a Linux expert, has presented a method for incorporating and hiding rootkits via the /dev/mem interface. He has developed a libmemrk library to help do this more…
----------
Researcher Offers Tool to Hide Malware in .Net PC World - Fri Apr 17, 7:20 AM ET
A computer security researcher has released an upgraded tool that can simplify the placement of difficult-to-detect malicious software in Microsoft's .Net framework on Windows computers.
----------
Phishers get more wily as cybercrime grows Reuters - Fri Apr 17, 5:46 AM ET
WASHINGTON (Reuters) - Phishing scams have grown up from the unsophisticated swindles of the past in which fake Nigerian princes e-mailed victims, who would get a big windfall if they just provide their bank account number.
----------
Full disk encryption comes to SSDs for mobile devices, laptops
Dell adds encrypted drives to its Latitude line of laptops
April 16, 2009 (Computerworld)
Samsung Electronics Co. announced today it is shipping its first self-encrypting solid-state disk (SSD) drives. The drives will come in 1.8-in. and 2.5-in. sizes for handheld devices and laptops, respectively.
In tandem with Samsung's announcement, Dell Inc. promptly introduced a suite of mobile data security technologies for its Latitude line of laptops, with native drive encryption expected to be available in the next few months.
----------
Verizon: Organized Crime Caused Spike in Data Breaches
A new study from Verizon Business claims that organized crime is responsible for a large increase in the number of breached corporate electronic records.
----------
11 Percent of PCs Still Unpatched Against Conficker Security experts say PC users should smarten up and patch their PCs against threats such as conficker.
----------
Microsoft Partners With Network Security Vendors For 'Stirling'
Apr 16,2009 Microsoft releases new beta version of next-gen security suite, announces first Forefront security service
----------
Study: Despite Increased Security Spending, Severity Of Breaches Is On The Increase
Apr 14,2009 CompTIA study says human error is the most frequent cause of breaches worldwide
----------
This may alter how we do business:
HP, Microsoft, VMware to expand desktop virtualization
Dana Gardner: As the sour economy pushes more companies into the arms of virtual desktop infrastructure (VDI) for cost cutting, the vendor community is eagerly wiping out obstacles to adoption by broadening the appeal of desktops as a service.
----------
Law Firm Twisting Open Source License Ruling To Mislead About Open Source Software
from the that's-not-what-it-says-at-all dept
When CAFC ruled last summer about the legality of open source licenses and their connection to copyright in the Jacobsen case, we were a little worried that the ruling appeared to conflict with some other copyright rulings, in a way that could eventually cause problems. However, on the whole, it was a good ruling, putting weight behind the core concept behind open source/Creative Commons-style license, which mostly rely on copyright to backstop what those licenses require. However, a law firm has been running around trying to push the idea that the ruling means using any open source software increases your copyright infringement liability. Of course, that's only true if you don't abide by the terms of the license. In other words, the risks are no different than if you're using proprietary code: if you obey the terms of the license, there's no problem. If you don't, there is. All the ruling really stated was that there could be greater damages to those who don't abide by the license. So, really, the law firm's advice seems to be directed entirely to firms who plan to not live up to the requirements of an open source license. That's hardly an increased liability for those who comply.
----------
H-1B visa use cuts U.S. programmer, software engineer wages by up to 6%
http://cwflyris.computerworld.com/t/4834258/6339517/184146/0/
----------
Twitter teen hacker hired by Web app developer
http://cwflyris.computerworld.com/t/4834258/6339517/184147/0/
----------
Va. man pleads guilty to selling $1M worth of counterfeit software
http://cwflyris.computerworld.com/t/4834258/6339517/184153/0/
----------
Hackers prey on Ford Motor Co. searches to boost rankings
http://www.scmagazineus.com/Hackers-prey-on-Ford-Motor-Co-searches-to-boost-rankings/article/130635/
Attackers are using the Ford Motor Co. name to poison search engine results with some 1.2 million malicious links that lead to rogue security software, according to PandaLabs.Attackers use search-engine optimization (SEO) to get their malicious sites to the top of results on Google and other search engines. On Monday night, researchers at PandaLabs started tracking this threat, which is ongoing, Sean-Paul Correll, threat researcher and security evangelist for Panda Security, told SCMagazineUS.com Tuesday.
----------
Stock Jocks Proved Clueless On FiOS$24 billion investment didn't 'doom' Verizon after all...01:01PM Friday Apr 17 2009 by Karl Bode
When Verizon first announced their $24 billion fiber to the home project, there was no shortage of critics in the investment community, many of whom thought the act of future-proofing the carrier's network would somehow "doom" them. In reality, investors just didn't have the patience to wait for returns on the investments, analysts like Sanford Bernsteins's Craig Moffett taking every opportunity to thrash the carrier for actually upgrading from copper.
----------
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment