New York Times columnist John Tierney must think it is much too light. In a column on Tuesday he says that he is almost convinced by a theory that society might benefit more from executing a virus writer than from giving a lethal injection to a murderer.
The guide was distributed last month to more than 3,500 school counselors, administrators and educators at education conferences and has been made available online, the International Information Systems Security Certification Consortium, or (ISC)2, said this week.
Microsoft sponsored the 35-page guide, which is titled "Decoding the Information Security Profession." The booklet offers a description of information security, typical jobs, titles, industries and organizations, professional requirements, certification options, typical … Read more
For Majoras, her credit card information was stolen, along with approximately 1.4 million other customers in the company's database. Majoras, in her role with the FTC, is responsible for such tasks as safeguarding consumers from such hazards as fraud, misleading advertising, antitrust violations and, yes, identity theft.
The fight against malicious … Read more
A new security device for the BlackBerry handheld may make losing or misplacing one less of a nightmare.
Research in Motion (RIM), which makes the wireless gadget, announced its BlackBerry smart card reader this week. The device can be clipped to a purse or a belt and uses Bluetooth wireless technology and high-level security encryption standards (AES-256) to help authenticate a user.
The BlackBerry owner simply slips his or her smart card into the wearable add-on hardware; presses in a PIN code or password and off they go.
This is particularly good news for companies and organizations that use both … Read more
CardSystems Solutions hasn't been talking since a security breach at the payment processor was disclosed earlier this month. But pressure is mounting on the company to end the silence.
The attorneys general of 44 U.S. states want CardSystems to come clean on the cyber break-in that exposed about 40 million credit cards to fraud. In a letter (view PDF), the law enforcement officials also demand that the payment processor informs all affected consumers immediately.
A hacked server, that is. The system was broken into on Oct. 26, 2003, most likely during a broad Internet attack, according to a notice posted on the university's Web site. The break-in went unnoticed until earlier this month.
In the attack, an attempt was made to install a backdoor on the server. That attempt failed, according to the university. The attack was possible because of a software flaw for which a patch was unavailable at the time. There is no evidence indicating that any attacker actually accessed data on the server, the university said.
The server has held … Read more
Microsoft late last week released a second "refresh" of the first Windows AntiSpyware beta. This refresh is not to be confused with the official second beta version, which is still due sometime later this year, according to a Microsoft representative. Also, there is still no word on when a final version of the product is due.
Microsoft released the first Windows AntiSpyware beta on Jan. 6, a month after it announced the acquisition of Giant Software, which specialized in spyware-fighting tools. A first refresh of the beta came on Feb. 16. The second beta refresh contains several enhancements … Read more
In a move provide more information to its customers about cyber security issues, AT&T in the next nine to 12 months plans to offer a streaming video channel with Internet security news , a company spokeswoman confirmed Thursday.
The effort is being led by AT&T Labs, the company's research arm. The vision is for a 24/7 news channel, like CNN, but it may end up just being available when security incidents occur, AT&T spokeswoman Joyce Van Duzer said.
Programming on the channel will likely include news and interviews with experts, but those plans … Read more
In a column two months ago, I recommended a three-part series of privacy reforms at the U.S. Department of Homeland Security. The argument: DHS's own privacy officer simply didn't have enough authority to do her job.
It turns out that the right members of Congress are reading News.com, because a bill to implement exactly those three suggestions is in the works.
Mississippi Rep. Bennie Thompson, the top Democrat on the Homeland Security committee, has drafted the four-page bill -- called the POWER Act -- and plans to introduce it on Wednesday. (POWER stands for Privacy Officer … Read more
A consumer group on Monday charged that pharmacy chain CVS had lax procedures for guarding sensitive data about purchases by customers using a loyalty card.
The Associate Press on Tuesday said the security hole prompted the company to "pull Internet access to the data." CVS did not return calls for comment Tuesday.
Consumers Against Supermarket Privacy Invasion and Numbering on Monday said it was easy to gain access to data about potentially embarrassing purchases such as condoms and enema kits by consumers using CVS' ExtraCare card. The group said all someone needed to obtain the information was the … Read more