Bluefire's bid joins them to the ranks of other security vendors who have created mobile versions of their desktop apps. I got a chance to preview Mobile Defender at CTIA 2008 in Las Vegas. The app, currently available in private beta for Windows Mobile phones, has a simple four-button interface, with each button corresponding to an element of protection--firewall, SMS and MMS spam-blocking, an application protection shield that guards against auto-installing malware, and a … Read more
WASHINGTON--A plan to expand the number of government police and security agencies that can tap into detailed satellite images is proceeding, despite concerns from Congress, the head of the U.S. Department of Homeland Security said Wednesday.
During a roundtable discussion with bloggers and journalists here, Secretary Michael Chertoff said a "charter has been signed" to create a new office, which will serve as a clearinghouse for requests from law enforcement, border security, and other domestic homeland security agencies to view feeds from powerful satellites. It will be called the National Applications Office.
"I think the way … Read more
WASHINGTON--In the long-running Real ID staring match, the U.S. Department of Homeland Security ended up being the first to blink.
Homeland Security announced Wednesday that all 50 states and the District of Columbia will be technically Real ID-compliant by the May 11, 2008 deadline--even though many states actually have rejected the concept and have zero plans to embrace a national ID card.
This means Americans will face no new hassles when using their drivers licenses to enter federal buildings or fly on airplanes starting on May 11. That's a good thing.
But the way this turned out is … Read more
Flickr has a helpful new way to let you find people you know who have Flickr accounts. It's called find friends, and it will tap into your Yahoo Mail, Gmail, or Windows Live Hotmail to cross check those e-mails with Flickr users. When it finds matches it serves them up in a list--all of which require you to opt them in one at a time as one of Flickr's somewhat ambiguous friends classifications.
Assuming you've got accounts for all three, the odds are good you'll be able to discover some people using Flickr you hadn't … Read more
Owen Thor Walker, an 18-year-old bot herder from Whitianga, New Zealand, plead guilty on Monday to six charges resulting from a botched botnet upgrade that led to a 2007 denial-of-service attack on the University of Pennsylvania.
Walker plead guilty to two charges of accessing a computer for dishonest purposes; two charges of accessing computer systems without authorization; one of damaging or interfering with computer systems; and one of possessing software for committing a crime. He could face five years in jail. However, according to reports from The New Zealand Herald, Judge Arthur Tompkins is considering Walker's age and cooperation … Read more
Don't click on that silly April Fools' Day e-mail, says one security expert.
In a blog, Arbor Networks' Jose Nazario reports that within the last 24 hours he's seeing new releases of the Storm worm designed to take advantage of the first day of April. This new spam campaign is a lure to infect new computers that will become part of the larger Storm worm botnet.
The e-mail body is spartan: the words "Doh! April Fools" followed by a numeric URL. If a user clicks on that URL, the default Internet browser will open to a … Read more
Unless you're too busy doing the rickrolling that's so popular with the kids these days, you probably saw that a MacBook Air got hacked at CanSecWest last week.
In a repeat of last year's "PWN 2 Own" contest, organizers this time offered three different laptops running three different operating systems.
David Maynor says:
I hope this puts to rest the myth that OSX is more secure but I am sure the zealots will have a million reasons why this is a fixed or rigged contest.
Well, the Macalope for one has already acceded to his … Read more
The MIT Kerberos Consortium, a security authentication and authorization group, announced Monday that Microsoft has joined its shindig.
The consortium, which launched in September with Google, Apple, Sun Microsystems and a collection of universities, noted Microsoft is coming aboard as a founding sponsor.
Kerberos aims to offer consumers the same single sign-on authentication and authorization system that corporate America has been using to allow employees to access network services with one log-on. Kerberos is an offshoot of MIT's Project Athena, which was developed back in the 1980s.
Microsoft uses the Kerberos network authentication protocol in such products as its … Read more
A recent contest pitted Mac OS X, Windows Vista, and Ubuntu Linux against each other in terms of security. It took all of two days to hack the Mac (via a web browser exploit). Ubuntu Linux? Three days into the contest, it still hadn't been hacked.
It's very possible that the Mac was the first targeted because everyone wanted the prize: A spiffy new MacBook Air. But that's not the point. Using Firefox may well have resolved the problem, rather than sticking with Apple's Safari browser.
No, the point is that no one could hack Linux.… Read more
There's simply no reason for any computer user to lose important data.
My hat is off to the tech companies that provide the hardware, software, and services we rely on every day. From Microsoft's Shadow Copy feature in Windows Vista (though only partially implemented in the Home Edition), down to the smallest Web start-ups offering free and easy online storage (though you have to pay for unlimited storage capacity), they have made tremendous strides in helping to keep our valuable data safe. Now it's up to us to take advantage of these great products and services.
For … Read more