Apr 15 2009

Conquest Vacations closes – Toronto Star


CTV.ca

Conquest Vacations closes
Toronto Star
Package holiday-seller Conquest Vacations has suddenly ceased operations amid the economic downturn, blaming a competitive market and "unreasonable demands" by some of its creditors.
Credit squeeze shuts Conquest Vacations Reuters Canada
Conquest Vacations goes belly up iNews880.com
SYS-CON Media (press release) – Canoe.ca – CTV British Columbia
all 103 news articles
Share

Apr 15 2009

'Gordon Campbell can't be trusted': Carole James – The Province


CTV British Columbia

'Gordon Campbell can't be trusted': Carole James
The Province
BC NDP leader Carole James speaks at the BC Rail/ CN Rail yard in West Vancouver, BC WeJdnesday morning, April 15, 2009 while on the BC NDP provincial election campaign.
NDP promises inquiry into BC Rail scandal CTV British Columbia
Employment insurance, workers, seniors focus of BC Liberal The Canadian Press
News1130 – Vancouver Sun – Globe and Mail – CTV.ca
all 292 news articles
Share

Apr 15 2009

Puntland court jails 37 Somali pirates – AFP


ABC News

Puntland court jails 37 Somali pirates
AFP
MOGADISHU (AFP) – The supreme court in Somalia's northern breakaway state of Puntland on Wednesday handed down three-year prison terms to 37 pirates detained by the French and US navies, officials said.
Video: Somalia: pirates improving methods for night attack France 24
Fighting off the Somali pirates BBC News
The Associated Press – Reuters – Times Online – RIA Novosti
all 18,996 news articles  Langue : Français
Share

Apr 15 2009

DIGG: (Yet) Another DiggBar Update

“Since we launched the DiggBar, we’ve received valuable feedback from the Digg community, publishers, SEO industry experts and Google…”

Share

Apr 15 2009

Human Ear Could Be Next Biometric System

narramissic writes “A team of researchers at the University of Southampton, UK, has received funding from the UK’s Engineering and Physical Sciences Research Council to learn whether otoacoustic emissions (OAE), the ear-generated sounds that emanate from within the spiral-shaped cochlea in the inner ear, can be used as a viable biometric technology like fingerprints and IRIS recognition. According to a report in New Scientist, someday instead of asking for passwords or pin numbers, a call center or bank would simply use a device on their telephone to produce a brief series of clicks in the recipient’s ear to confirm the person is who they say they are.” Try faking that with gummy bears.

Read more of this story at Slashdot.

Share

Apr 15 2009

The Rootkit Arsenal

Nicola Hahn writes “One of the first things I noticed while flipping through this hefty book is the sheer number of topics covered. Perhaps this is a necessity. As the author puts it, rootkits lie “at the intersection of several related disciplines: computer security, forensics, reverse-engineering, system internals, and device drivers.” Upon closer inspection, it becomes clear that great pains have been taken to cover each subject in sufficient depth and to present ideas in a manner that’s both articulate and well organized. This accounts for the book’s girth; it weighs in at roughly 900 pages.” Keep reading for the rest of Nicola’s review.

Read more of this story at Slashdot.

Share

Apr 15 2009

Malicious Activity Grew At a Record Pace In 2008

An anonymous reader writes “Symantec announced that malicious code activity continued to grow at a record pace throughout 2008, primarily targeting confidential information of computer users. According to the company’s Internet Security Threat Report Volume XIV (PDF), Symantec created more than 1.6 million new malicious code signatures in 2008. This equates to more than 60 percent of the total malicious code signatures ever created by Symantec — a response to the rapidly increasing volume and proliferation of new malicious code threats. These signatures helped Symantec block an average of more than 245 million attempted malicious code attacks across the globe each month during 2008.” Another anonymous reader notes a related report from Verizon (PDF), which says 285 million records were compromised in 2008, more than the total of the previous four years combined.

Read more of this story at Slashdot.

Share

Apr 15 2009

First Look at Microsoft Exchange Server 2010 Beta

snydeq writes “InfoWorld’s Martin Heller takes a first look at Microsoft’s Exchange Server 2010 Beta, noting several usability, reliability, and compliance improvements over Exchange 2007. Top among Exchange 2010’s new features are OWA support for Firefox 3 and Safari 3; improved storage reliability; conversation views; mail federation between trusted companies; and MailTips, a sort of Google Mail Goggles for the corporate environment. ‘Database availability groups give you redundant mail stores with continuous replication; database-level failover gives you automatic recovery. I/O optimizations make Exchange less “bursty” and better suited to desktop-class SATA drives; JBOD support lets you concatenate disks rather than stripe them into a redundant array.’ Exchange 2010 will, however, require shops to upgrade to Windows Server 2008, as support for Windows Server 2003 has been dropped. Microsoft will release technical previews of other products in the suite, including Office 2010, SharePoint Server 2010, Visio 2010, and Project 2010, in the third calendar quarter.”

Read more of this story at Slashdot.

Share

Apr 15 2009

The Ecological Impact of Spam

krou writes “A new study entitled ‘The Carbon Footprint of Spam’ (PDF) published by ICF International and commissioned by McAfee claims that spam uses around 33 billion kilowatt hours of energy annually, which is approximately enough to power 2.4 million US homes (or roughly 3.1 million cars) for a year. They calculated that the average CO2 emission for a spam email is around 0.3 grams. Interestingly, the majority of energy usage (around 80%) comes from users viewing and deleting spam, and searching for legitimate emails within spam filters. They also claim that ‘An individual company can find that one fifth of the energy budget of its email system is wasted on spam.’ One of the report’s authors, Richi Jennings, writes on his blog that ‘spam filtering actually saves an incredible amount of energy.’ He continues, ‘Imagine if every inbox were protected by a state-of-the-art spam filter. We could save about 75% of the spam energy used today — 25 TWh per year; that’s like taking 2.3 million cars off the road.””

Read more of this story at Slashdot.

Share

Apr 15 2009

Subverting PIN Encryption For Bank Cards

An anonymous reader sends in a story at Wired about the increasingly popular methods criminals are using to bypass PIN encryption and rack up millions of dollars in fraudulent withdrawals. Quoting: “According to the payment-card industry … standards for credit card transaction security, [PINs] are supposed to be encrypted in transit, which should theoretically protect them if someone intercepts the data. The problem, however, is that a PIN must pass through multiple HSMs across multiple bank networks en route to the customer’s bank. These HSMs are configured and managed differently, some by contractors not directly related to the bank. At every switching point, the PIN must be decrypted, then re-encrypted with the proper key for the next leg in its journey, which is itself encrypted under a master key that is generally stored in the module or in the module’s application programming interface, or API. ‘Essentially, the thief tricks the HSM into providing the encryption key,’ says Sartin. ‘This is possible due to poor configuration of the HSM or vulnerabilities created from having bloated functions on the device.'”

Read more of this story at Slashdot.

Share