Microsoft plugs wormhole / State Dept. hacked / Lax policy blamed in VA loss
Hacker to fight US extradictionGary McKinnon is prepared to take his case all the way to the European Court of Human Rights if necessary to fight the UK decision to extradite him to the US. - BBC News
Two-factor too scarce at consumer banks
Far too many online banking solutions targeted at consumers do not use adequate security measures. - CIO Magazine
Microsoft plugs wormhole in Windows
Microsoft has issued security patches for 18 vulnerabilities in Windows and Office, some of which could be exploited by a network worm. - CNET News.com
State department investigating computer anomalies
The U.S. State Department is investigating an anomalie that has been reported as a large scale break-in on its computer network. - Reuters
Hackers target State Department computers
Hackers may have breached security at U.S. State Department's main office and regional offices, according to reports. - AP/CNN.com
Patchwork policy can't protect data: VA IG
A security policy that was fragmented across different departments is partly to blame for the risk of compromising personal data that hit the Veterans Affairs Dept. last month. - Government Computer News
Defense: Government was out to get UBS
The defense for the former UBS system administrator, who is on trial for planting a logic bomb on the company's systems, said that his client has been framed by the government. - InformationWeek
High prison time for Shadowcrew culprit
Another member of the ID theft gang Shadowcrew has been sentenced to 90 months in prison. - Internetnews.com
Security experts Google for malicious sites
Google has begun indexing binary files on websites, and security experts have figured out how to use this feature to find websites containing malicious code. - InternetWeek.com
Investigators faults VA, employee for data loss
The employee, who took the laptop containing personal information home, showed poor judgement, investigators say. His supervisors are also to blame for lax policies. - AP/MSNBC
Mobile users face knotty security issues
The recent incidents of data loss from lost mobile devices may indicate that network executives are using trial and error to find the best security for mobile users. - Network World Fusion
Gordon Brown sets up ID fraud taskforce
A new U.K. taskforce is being set up to explore future identity management systems and their possible use in private and public sectors. - Silicon.com
Emails probed in 'Cash for honours' swoop
Forensic software is now being used to dig out deleted emails in the ongoing investigation about loans to members of the Labour Party in the U.K. - Silicon.com
Anti-Cyber Terrorism spending to reach $6.3bn
Federal and corporate spending on measures against cyber terrorism will climb to $6.3 billion in 2011, market research firm estimates. - TechWeb
Outsourced data must be protected, says privacy chief
Even if a data breach happens at a third party facility as part of an outsourcing deal, the company that has outsourced the task is still responsible. - The Register
Small businesses risk data loss
Many one person business do not backup vital financial or other business related information, even though this information resides on a single computer. - Vnunet.com
Malware writers turn to zero-hour viruses
Virus writers are switching from large scale attacks to smaller attacks using zero-hour exploits to avoid detection. - Vnunet.com
Hacker spawns a french Watergate
A hacking into a bank in Luxembourg is becoming a central piece of a large scandal in France, as the bank records were apparently modified to implicate politicians, celebrities. - Wired News
1 Comments:
It's been a week now, and I have made a few changes underways. The most obvious has been the design changes, but under the surface I have also refined the proces to pick the articles to link to.
Right now I do not link to articles about mergers or new products. This is only a general rule. If something is significant enough, I may link to it anyway.
There is also a grey area between where security ends and privacy begins. I link to articles about protecting privacy, but I may not link to everything about the bigger image of privacy.
There is also a lot of redundancy. Many stories can live for days or weeks as it moves on from media to media. I try to find the original source, and I generally only link to another article about an "old" story, if it has new information. This may change later on to help the people, who may not read this blog daily.
Post a Comment
<< Home