Wednesday, July 12, 2006

Microsoft plugs wormhole / State Dept. hacked / Lax policy blamed in VA loss

Hacker to fight US extradiction
Gary McKinnon is prepared to take his case all the way to the European Court of Human Rights if necessary to fight the UK decision to extradite him to the US. - BBC News

Two-factor too scarce at consumer banks
Far too many online banking solutions targeted at consumers do not use adequate security measures. - CIO Magazine

Microsoft plugs wormhole in Windows
Microsoft has issued security patches for 18 vulnerabilities in Windows and Office, some of which could be exploited by a network worm. - CNET News.com

State department investigating computer anomalies

The U.S. State Department is investigating an anomalie that has been reported as a large scale break-in on its computer network. - Reuters

Hackers target State Department computers
Hackers may have breached security at U.S. State Department's main office and regional offices, according to reports. - AP/CNN.com

Patchwork policy can't protect data: VA IG
A security policy that was fragmented across different departments is partly to blame for the risk of compromising personal data that hit the Veterans Affairs Dept. last month. - Government Computer News

Defense: Government was out to get UBS
The defense for the former UBS system administrator, who is on trial for planting a logic bomb on the company's systems, said that his client has been framed by the government. - InformationWeek

High prison time for Shadowcrew culprit
Another member of the ID theft gang Shadowcrew has been sentenced to 90 months in prison. - Internetnews.com

Security experts Google for malicious sites
Google has begun indexing binary files on websites, and security experts have figured out how to use this feature to find websites containing malicious code. - InternetWeek.com

Investigators faults VA, employee for data loss
The employee, who took the laptop containing personal information home, showed poor judgement, investigators say. His supervisors are also to blame for lax policies. - AP/MSNBC

Mobile users face knotty security issues

The recent incidents of data loss from lost mobile devices may indicate that network executives are using trial and error to find the best security for mobile users. - Network World Fusion

Gordon Brown sets up ID fraud taskforce
A new U.K. taskforce is being set up to explore future identity management systems and their possible use in private and public sectors. - Silicon.com

Emails probed in 'Cash for honours' swoop
Forensic software is now being used to dig out deleted emails in the ongoing investigation about loans to members of the Labour Party in the U.K. - Silicon.com

Anti-Cyber Terrorism spending to reach $6.3bn
Federal and corporate spending on measures against cyber terrorism will climb to $6.3 billion in 2011, market research firm estimates. - TechWeb

Outsourced data must be protected, says privacy chief
Even if a data breach happens at a third party facility as part of an outsourcing deal, the company that has outsourced the task is still responsible. - The Register

Small businesses risk data loss
Many one person business do not backup vital financial or other business related information, even though this information resides on a single computer. - Vnunet.com

Malware writers turn to zero-hour viruses
Virus writers are switching from large scale attacks to smaller attacks using zero-hour exploits to avoid detection. - Vnunet.com

Hacker spawns a french Watergate

A hacking into a bank in Luxembourg is becoming a central piece of a large scandal in France, as the bank records were apparently modified to implicate politicians, celebrities. - Wired News

1 Comments:

At 9:50 AM, Blogger Jesper Stein Sandal said...

It's been a week now, and I have made a few changes underways. The most obvious has been the design changes, but under the surface I have also refined the proces to pick the articles to link to.

Right now I do not link to articles about mergers or new products. This is only a general rule. If something is significant enough, I may link to it anyway.

There is also a grey area between where security ends and privacy begins. I link to articles about protecting privacy, but I may not link to everything about the bigger image of privacy.

There is also a lot of redundancy. Many stories can live for days or weeks as it moves on from media to media. I try to find the original source, and I generally only link to another article about an "old" story, if it has new information. This may change later on to help the people, who may not read this blog daily.

 

Post a Comment

<< Home