Feb 15 2009

Do We Need a New Internet?

Richard.Tao and a number of other readers sent in a NYTimes piece by John Markoff asking whether the Internet is so broken it needs to be replaced. “…[T]here is a growing belief among engineers and security experts that Internet security and privacy have become so maddeningly elusive that the only way to fix the problem is to start over. What a new Internet might look like is still widely debated, but one alternative would, in effect, create a ‘gated community’ where users would give up their anonymity and certain freedoms in return for safety. Today that is already the case for many corporate and government Internet users. As a new and more secure network becomes widely adopted, the current Internet might end up as the bad neighborhood of cyberspace. You would enter at your own risk and keep an eye over your shoulder while you were there.” A less alarmist reaction to the question was blogged by David Akin: “If you build a new Internet and you want me to get a license to drive on it, sorry. I’m hanging out here in v.1.”

Read more of this story at Slashdot.

Share

Feb 14 2009

Reverse Engineering a Missile Launcher Toy’s Interface

nitro writes “A fairly in-depth technical report by the security researchers at TippingPoint was released on how to reverse engineer the proprietary protocol for controlling a USB missile-launching toy system. They develop an iPhone application to control the device. ‘The hardware is coupled with a simple GUI controller written in Delphi (MissileLauncher.exe) and a USB Human Interface Device (HID) interface written in C++ (USBHID.dll). The toys lost their allure within minutes of harassing my team with a barrage of soft missile shots. That same night I thought I would be able to extend the fun factor by coding up a programmatic interface to the launchers in Python. … One interesting thing is that we have a lot more granular control of the turret movement now than we did with the original GUI. I wrote two simple loops to count the number of possible horizontal and vertical ticks and the results were 947 horizontal and 91 vertical versus 54 and 10 from the original GUI respectively. Granular control allows you to slowly and quietly reposition the turret for stealthy attacks.'”

Read more of this story at Slashdot.

Share

Feb 14 2009

Microsoft Offers $250000 Bounty For Worm Authors

The company has formed a cybersecurity posse with technology companies, academic organizations, and Internet infrastructure firms to dismantle the Conficker/Downandup worm’s infrastructure.

Share

Feb 13 2009

Google to offer paid cellphone applications – Reuters


Reuters

Google to offer paid cellphone applications
Reuters – 48 minutes ago
By Alexei Oreskovic SAN FRANCISCO (Reuters) – Google Inc will allow developers to sell applications for its Android cell phone operating system beginning next week in the United States.
Google lets programmers sell Android apps CNET News
mocoNews.net – For Sale: Google Says Android Market Will Start Washington Post
Register – eWeek – InformationWeek – TG Daily
all 66 news articles
Share

Feb 12 2009

Microsoft Slaps $250K Bounty On Conficker Worm

alphadogg writes “The spreading Conficker/Downadup worm is now viewed as such a significant threat that it’s inspired the formation of a posse to stop it, with Microsoft leading the charge by offering a 0,000 reward to bring the Conficker malware bad guys to justice. The money will be paid for ‘information that results in the arrest and conviction of those responsible for illegally launching the Conficker malicious code on the Internet,’ Microsoft said today in a statement, adding it is fostering a partnership with Internet registries and DNA providers such as ICANN, ORG, and NeuStar as well as security vendors Symantec and Arbor Networks, among others, to stop the Conficker worm once and for all. Conficker, also called Downadup, is estimated to have infected at least 10 million PCs. It has been slowly but surely spreading since November. Its main trick is to disable anti-malware protection and block access to anti-malware vendors’ Web sites.”

Read more of this story at Slashdot.

Share

Feb 12 2009

US Nuclear Weapons Lab Loses 67 Computers

pnorth writes “Officials from New Mexico’s Los Alamos nuclear weapons laboratory have confessed that 67 of its computers are missing, with no less than 13 of them having disappeared over the past year alone. A memo [PDF] leaked by the Project on Government Oversight watchdog brought the lost nuclear laptops to the public’s attention, but the Energy Department’s National Nuclear Security Administration dismissed fears the computers contained highly-sensitive or classified information, noting it was more likely to cause ‘cybersecurity issues.’ Three of the 13 computers which went missing in the past year were stolen from a scientist’s home on January 16 and the memo also mentioned a BlackBerry belonging to another staff member had been lost ‘in a sensitive foreign country.’ The labs faced similar issues back in 2003 when 22 laptops were designated as being ‘unlocated.'”

Read more of this story at Slashdot.

Share

Feb 12 2009

The Real Risks of Obama’s BlackBerry

An anonymous reader writes “When the mainstream media first announced Barack Obama’s ‘victory’ in keeping his BlackBerry, the focus was on the security of the device, and keeping the US president’s e-mail communications private from spies and hackers. The news coverage and analysis by armchair security experts thus far has failed to focus on the real threat: attacks against President Obama’s location privacy, and the potential physical security risks that come with someone knowing the president’s real-time physical location. In this article, a CNET blogger digs into the real risks associated with the President carrying around a tracking device at all times.”

Read more of this story at Slashdot.

Share

Feb 12 2009

Cambridge, Mass. Moves To Nix Security Cameras

An anonymous reader writes “Citing privacy concerns, the Cambridge, Mass. City Council has voted 9-0 to remove security cameras scattered throughout the city. ‘Because of the slow erosion of our civil liberties since 9/11, it is important to raise questions regarding these cameras,’ said Marjorie Decker, a Cambridge city councilor. Rather than citing privacy, WCBVTV is running the story under the headline ‘City’s Move To Nix Security Cams May Cost Thousands.'”

Read more of this story at Slashdot.

Share

Feb 11 2009

CA Releases New GRC Tool to Unify Enterprise Risk Management Efforts – eWeek


Sarbanes-Oxley Compliance Journal

CA Releases New GRC Tool to Unify Enterprise Risk Management Efforts
eWeek – 9 Feb 2009
By Brian Prince CA looks to leapfrog competitors in the governance, risk and compliance space with the latest version of its new tool, CA GRC Manager 2.0.
CA tools help raise risk IQ Computer Business Review
CA unveils GRC Manager 2.0 for risk management GCN.com
WELT ONLINE – PR Newswire (press release) – Response Source (press release) – eWeek
all 30 news articles
Share

Feb 11 2009

CA Releases New GRC Tool to Unify Enterprise Risk Management Efforts – eWeek


Sarbanes-Oxley Compliance Journal

CA Releases New GRC Tool to Unify Enterprise Risk Management Efforts
eWeek – 9 Feb 2009
By Brian Prince CA looks to leapfrog competitors in the governance, risk and compliance space with the latest version of its new tool, CA GRC Manager 2.0.
CA tools help raise risk IQ Computer Business Review
CA unveils GRC Manager 2.0 for risk management GCN.com
WELT ONLINE – PR Newswire (press release) – Response Source (press release) – eWeek
all 30 news articles
Share