NewsBits for April 13, 2006 ************************************************************ British 'hacker' fears Guantanamo A British man accused of being behind the largest ever hack of US government computer networks could end up at Guantanamo Bay, his lawyer has claimed. http://news.bbc.co.uk/2/hi/uk_news/4905036.stm http://www.theregister.co.uk/2006/04/13/mckinnon_extradition_fears/ - - - - - - - - - - Cape teen held on computer child porn charges A Cape Coral teenager was arrested today by FBI agents and sheriffs deputies on computer child porn charges, federal authorities said. Brandon James Garcia, 19, of 508 S.W. Ninth Ave., faces charges of possessing child pornography and receiving child pornography through the Internet, mail or other shipping method, U.S. prosecutors said. http://www.news-press.com/apps/pbcs.dll/article?AID=/20060413/NEWS0101/60413027/1075 - - - - - - - - - - 'Phishing' assault on Trade Me Trade Me executives have posted a security warning to clients that emails are circulating, purporting to be from Trade Me, asking them to confirm their log-on details. "It directs you to a site that looks like Trade Me and asks you to log in," Trade Me said. "This is not from Trade Me. " If you have already responded to the email please change your password immediately." http://www.stuff.co.nz/stuff/0,2106,3636046a11275,00.html Design Flaw in Human Brain Prevents Detection of Phishing http://www.it-observer.com/news/6095/design_flaw_human_brain_prevents_detection_phishing/ - - - - - - - - - - Mobile grand jury to hear former cop's child porn case The search of a Mobile police officer's home in January, prompted by a complaint that he had used a hidden video camera to film a 12- year-old girl taking a shower, turned up no such film, but investigators did find images of child pornography on a computer, a judge was told Wednesday. http://www.al.com/news/mobileregister/index.ssf?/base/news/1144919729129480.xml - - - - - - - - - - Man wanted over child porn images A Melbourne court has issued a warrant for the arrest of a man accused of owning more than 60,000 images of child pornography. Jonathan Robert Clift, 50, of Dandenong, has been charged with one count each of possessing child pornography, producing child pornography, and using an online information service to publish child pornography. http://www.sundaytimes.news.com.au/common/story_page/0,7034,18806628%255E1702,00.html - - - - - - - - - - MySpace hires former cybercrime investigator Community Web site MySpace announced this week that the company had hired Hemanshu Nigam, a security investigator at Microsoft and a former prosecutor, to strengthen what many have claimed are lax protections against cyberstalkers and online predators. http://www.securityfocus.com/brief/185 - - - - - - - - - - Data Security Top Concern of Office Managers The call for increased data security, and the surprising revelation that far-from- foolproof security methods are the norm in many enterprises, emerged from a market research survey conducted by Certeon. Fifty-one percent of respondents disclosed that branch data security is a critical concern in their enterprises. http://www.it-observer.com/news/6087/data_security_top_concern_office_managers/ Build Effective Security Awareness Program http://www.it-observer.com/articles/1112/build_effective_security_awareness_program/ Security Best Practices Without Question? http://www.it-observer.com/articles/1113/security_best_practices_without_question/ - - - - - - - - - - Mozilla Plugs Firefox Code Execution Hole Mozilla has released a new version of the Firefox Web browser with what is described as "significant security and stability improvements." http://www.eweek.com/article2/0,1759,1949471,00.asp - - - - - - - - - - HP printers are hackers dream MAKER OF printer ink, HP. has admitted that the software used on two of its laser printers could be a back door for hackers. http://www.theinquirer.net/?article=30878 - - - - - - - - - - ActivIdentity releases new identity sign-on product Consolidating passwords onto a smart card simplifies user access. IT security vendor ActivIdentity Inc. has released a new version of its single sign-on identity management product for large businesses, including new integrated support for smart cards, the company said Wednesday. http://www.computerworld.com/securitytopics/security/story/0,10801,110456,00.html - - - - - - - - - - Can Cell Phones Compromise Your Network? We insist on being connected. Many executives carry smartphones -- mobile devices that do more than just store phone numbers. In the past year, sales of smartphones have exploded. During the third quarter of 2005 alone, 12.6 million smartphones were shipped worldwide, more than triple the number from a year earlier. http://www.it-observer.com/news/6086/____can_cell_phones_compromise_your_network/ Smartphone Users Concerned About Data Security, Viruses http://www.it-observer.com/news/6084/smartphone_users_concerned_about_data_security_viruses/ - - - - - - - - - - Data exposure: Counties across the U.S. posting sensitive info online Broward County, Fla., Maricopa County, Ariz., Fort Bend County, Texas. Three counties separated by hundreds of miles with something in common: Theyre among potentially hundreds of counties in several states that in recent years have made Social Security numbers, driver's license information, bank account numbers and a variety of other personally sensitive data belonging to residents available to anyone in the world with Internet access. http://www.computerworld.com/securitytopics/security/story/0,10801,110453,00.html Data exposure: Using software to redact personal data from public documents http://computerworld.com/securitytopics/security/story/0,10801,110486,00.html - - - - - - - - - - Virtualization for security Sometimes we don't really see what our eyes are viewing. That's true with your computer screen, and it's true in nature as well. Oh sure, we can say what we think we're seeing, but we're missing the big story such as the man behind the curtain, to recall a famous phrase from an even more beloved movie. http://www.securityfocus.com/columnists/397 - - - - - - - - - - The Fourth Generation of Malware Worms, Trojans, viruses, denial of service attacks; many of these seem only to be recent threats to our network environments over the last five years. However, this past January marked the 20th anniversary of the Pakistani Brains virusthe first ever PC virus to replicate itself and spread from one computer to another. http://www.it-observer.com/news/6090/the_fourth_generation_malware/ Malware Evolution Report: January - March 2006 http://www.it-observer.com/news/6093/malware_evolution_report_january_march_2006/ Will Malware Prompt Broad Shift to VMs? http://www.it-observer.com/news/6092/will_malware_prompt_broad_shift_vms/ Linux and Viruses Explained http://www.it-observer.com/news/6094/linux_viruses_explained/ - - - - - - - - - - 10 Steps for Locking Your Wireless Network SMBs love wireless. It's fast, convenient, based on readily supported standards and it often saves you the cost of wiring. What's not to like? Security that's what. Even today, totally secure wireless is still more art than a standard part of the WiFi feature set. http://www.it-observer.com/news/6083/10_steps_locking_your_wireless_network/ *********************************************************** Search the NewsBits.net Archive at: http://www.newsbits.net/search.html *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits (www.newsbits.net) should be cited as the source of the information. Copyright 2000-2006, NewsBits.net, Campbell, CA.