NewsBits for April 13, 2006
************************************************************
British 'hacker' fears Guantanamo
A British man accused of being behind
the largest ever hack of US government
computer networks could end up at
Guantanamo Bay, his lawyer has claimed.
http://news.bbc.co.uk/2/hi/uk_news/4905036.stm
http://www.theregister.co.uk/2006/04/13/mckinnon_extradition_fears/
- - - - - - - - - -
Cape teen held on computer child porn charges
A Cape Coral teenager was arrested today
by FBI agents and sheriffs deputies
on computer child porn charges, federal
authorities said. Brandon James Garcia,
19, of 508 S.W. Ninth Ave., faces charges
of possessing child pornography and
receiving child pornography through
the Internet, mail or other shipping
method, U.S. prosecutors said.
http://www.news-press.com/apps/pbcs.dll/article?AID=/20060413/NEWS0101/60413027/1075
- - - - - - - - - -
'Phishing' assault on Trade Me
Trade Me executives have posted a security
warning to clients that emails are circulating,
purporting to be from Trade Me, asking them
to confirm their log-on details. "It directs
you to a site that looks like Trade Me and
asks you to log in," Trade Me said. "This
is not from Trade Me. " If you have already
responded to the email please change your
password immediately."
http://www.stuff.co.nz/stuff/0,2106,3636046a11275,00.html
Design Flaw in Human Brain Prevents Detection of Phishing
http://www.it-observer.com/news/6095/design_flaw_human_brain_prevents_detection_phishing/
- - - - - - - - - -
Mobile grand jury to hear former cop's child porn case
The search of a Mobile police officer's home
in January, prompted by a complaint that he
had used a hidden video camera to film a 12-
year-old girl taking a shower, turned up no
such film, but investigators did find images
of child pornography on a computer, a judge
was told Wednesday.
http://www.al.com/news/mobileregister/index.ssf?/base/news/1144919729129480.xml
- - - - - - - - - -
Man wanted over child porn images
A Melbourne court has issued a warrant
for the arrest of a man accused of owning
more than 60,000 images of child pornography.
Jonathan Robert Clift, 50, of Dandenong,
has been charged with one count each of
possessing child pornography, producing
child pornography, and using an online
information service to publish child
pornography.
http://www.sundaytimes.news.com.au/common/story_page/0,7034,18806628%255E1702,00.html
- - - - - - - - - -
MySpace hires former cybercrime investigator
Community Web site MySpace announced this
week that the company had hired Hemanshu
Nigam, a security investigator at Microsoft
and a former prosecutor, to strengthen what
many have claimed are lax protections against
cyberstalkers and online predators.
http://www.securityfocus.com/brief/185
- - - - - - - - - -
Data Security Top Concern of Office Managers
The call for increased data security, and
the surprising revelation that far-from-
foolproof security methods are the norm
in many enterprises, emerged from a market
research survey conducted by Certeon.
Fifty-one percent of respondents disclosed
that branch data security is a critical
concern in their enterprises.
http://www.it-observer.com/news/6087/data_security_top_concern_office_managers/
Build Effective Security Awareness Program
http://www.it-observer.com/articles/1112/build_effective_security_awareness_program/
Security Best Practices Without Question?
http://www.it-observer.com/articles/1113/security_best_practices_without_question/
- - - - - - - - - -
Mozilla Plugs Firefox Code Execution Hole
Mozilla has released a new version of the Firefox
Web browser with what is described as "significant
security and stability improvements."
http://www.eweek.com/article2/0,1759,1949471,00.asp
- - - - - - - - - -
HP printers are hackers dream
MAKER OF printer ink, HP. has admitted
that the software used on two of its laser
printers could be a back door for hackers.
http://www.theinquirer.net/?article=30878
- - - - - - - - - -
ActivIdentity releases new identity sign-on product
Consolidating passwords onto a smart card
simplifies user access. IT security vendor
ActivIdentity Inc. has released a new version
of its single sign-on identity management
product for large businesses, including
new integrated support for smart cards,
the company said Wednesday.
http://www.computerworld.com/securitytopics/security/story/0,10801,110456,00.html
- - - - - - - - - -
Can Cell Phones Compromise Your Network?
We insist on being connected. Many executives
carry smartphones -- mobile devices that do
more than just store phone numbers. In the
past year, sales of smartphones have exploded.
During the third quarter of 2005 alone, 12.6
million smartphones were shipped worldwide,
more than triple the number from a year earlier.
http://www.it-observer.com/news/6086/____can_cell_phones_compromise_your_network/
Smartphone Users Concerned About Data Security, Viruses
http://www.it-observer.com/news/6084/smartphone_users_concerned_about_data_security_viruses/
- - - - - - - - - -
Data exposure: Counties across the U.S. posting sensitive info online
Broward County, Fla., Maricopa County, Ariz.,
Fort Bend County, Texas. Three counties
separated by hundreds of miles with something
in common: Theyre among potentially hundreds
of counties in several states that in recent
years have made Social Security numbers,
driver's license information, bank account
numbers and a variety of other personally
sensitive data belonging to residents
available to anyone in the world with
Internet access.
http://www.computerworld.com/securitytopics/security/story/0,10801,110453,00.html
Data exposure: Using software to redact personal data from public documents
http://computerworld.com/securitytopics/security/story/0,10801,110486,00.html
- - - - - - - - - -
Virtualization for security
Sometimes we don't really see what our
eyes are viewing. That's true with your
computer screen, and it's true in nature
as well. Oh sure, we can say what we
think we're seeing, but we're missing
the big story such as the man behind
the curtain, to recall a famous phrase
from an even more beloved movie.
http://www.securityfocus.com/columnists/397
- - - - - - - - - -
The Fourth Generation of Malware
Worms, Trojans, viruses, denial of service
attacks; many of these seem only to be recent
threats to our network environments over the
last five years. However, this past January
marked the 20th anniversary of the Pakistani
Brains virusthe first ever PC virus to
replicate itself and spread from one
computer to another.
http://www.it-observer.com/news/6090/the_fourth_generation_malware/
Malware Evolution Report: January - March 2006
http://www.it-observer.com/news/6093/malware_evolution_report_january_march_2006/
Will Malware Prompt Broad Shift to VMs?
http://www.it-observer.com/news/6092/will_malware_prompt_broad_shift_vms/
Linux and Viruses Explained
http://www.it-observer.com/news/6094/linux_viruses_explained/
- - - - - - - - - -
10 Steps for Locking Your Wireless Network
SMBs love wireless. It's fast, convenient,
based on readily supported standards and
it often saves you the cost of wiring.
What's not to like? Security that's what.
Even today, totally secure wireless is
still more art than a standard part of
the WiFi feature set.
http://www.it-observer.com/news/6083/10_steps_locking_your_wireless_network/
***********************************************************
Search the NewsBits.net Archive at:
http://www.newsbits.net/search.html
***********************************************************
The source material may be copyrighted and all rights are
retained by the original author/publisher. The information
is provided to you for non-profit research and educational
purposes. Reproduction of this text is encouraged; however
copies may not be sold, and NewsBits (www.newsbits.net)
should be cited as the source of the information.
Copyright 2000-2006, NewsBits.net, Campbell, CA.