Monday, June 15, 2009

Monday 06/15/09

Seriously, we need to get one of these ASAP for testing:

FAQ: How to get an iPhone 3G S on Friday

  http://cwflyris.computerworld.com/t/5274688/6339517/197392/0/

----------

The future of online identity?

Twitter power players get shiny 'verified' badges

Under legal pressure, the microblogging site has started rolling out a background-checking system so that prominent users can prove that accounts belong to them.

Fri, Jun 12 10:29:00 PDT 2009 | Read full story

----------

Wall Street Journal
- Jun 12, 2009
- Jun 12, 2009
The Pakistani conspirators allegedly sold phone service from phone lines that were hacked into and used the funds to support terrorist activities, ...
 
----------
 
SlashGear
, USA
- Jun 15, 2009
- 1 hour ago
Hacking the Pre isn't just about running Doom on the smartphone: it also promises to unlock currently forbidden functionality such as tethering. ...
 
----------
 
ABS CBN News
- Jun 15, 2009
- 4 hours ago
The report said Italian law enforcers raided 10 locations in four regions of Italy and arrested five financiers of the phone hacking syndicate. ...
 
----------
 
WRGB
, USA
- Jun 12, 2009
- Jun 12, 2009
State Police have arrested a Clifton Park student they say tried to tamper with his school's computers. Matthew Beighey, 16, was arrested for using another ...
----------

After plenty of coverage about how its Bing search engine makes it all too easy for kids to find and view porn, Microsoft has made some changes that will make it easier for parents to block or monitor what their kids are viewing on the site.

In a blog post, Microsoft announced that it is making two changes the company thinks will help address the issue.

According to the post, "explicit images and video content will now be coming from a separate single domain, explicit.bing.net. This is invisible to the end customer, but allows for filtering of that content by domain, which makes it much easier for customers at all levels to block this content regardless of what the SafeSearch settings might be."

 
----------
 

TECH FOR THE PEOPLE
The U.K. integrates citizen databases

 
----------
 
Cybersecurity head calls for improved public-private cooperation
According to Melissa Hathaway, the U.S. National Security Council's cybersecurity chief, the government needs to improve its relationships with private companies if it wants them to share information about potential threats to national security. As of now, she says, many companies are wary of sharing confidential information with the government due to fears that the information may be mishandled. CIO.com/IDG News Service (6/12)
 
----------
 
Coleman: GSA can help U.S. agencies transition to the cloud
The U.S. General Services Administration has been tasked with spearheading a government-wide push for cloud computing, according to agency CIO Casey Coleman, and has partnered with private industry to streamline the process. Part of the GSA's role, she says, is to standardize systems and vendors so that other government agencies can easily transition their own operations to the cloud. InformationWeek
 
----------
 
Tech Insight: Free SIM Tools Save Money -- And Maybe Your Data
A rundown of the range of freebie and low-cost security information management options for the cash-strapped -- or still-shopping -- organization
 
----------
 
Researcher Attempts To Dispel Damaging Botnet Myth
Enterprises that assume botnets use a single form of malware are the ones being bitten, researcher says
 
----------
 
 
 
----------

No comments: