Friday, June 03, 2005

Hacker stole password to raid bank account

INSIDE JoongAng Daily: "June 04, 2005 �� A 20-year-old high school dropout who found a way to hack into the computers of unsuspecting citizens managed to steal Internet banking passwords that enabled him to transfer 50 million won ($50,000) out of one Seoul woman's account, the police reported yesterday.
The man, now under arrest, developed software that, once installed through a simple ruse, gave him the power to monitor another's computer secretly. "

Six Steps For SOX Compliance by Insurance Networking News

Six Steps For SOX Compliance by Insurance Networking News: "Understanding Sarbanes-Oxley

By Brian McDonnell

June 1, 2005 - What are the most important IT considerations for complying with Section 404 of the Sarbanes-Oxley Act of 2002? By July 15, all U.S. companies under $75 million in annual revenue must demonstrate they know the answer to that question, because that's the deadline for complying with Section 404.
However, due to the lack of specific directives and knowledge, many companies are struggling with how to reach compliance by that date-let alone wondering how they will afford continued compliance year after year."

Convergence or collision?

Infoconomy - Analysis: "Convergence or collision?

The convergence of fixed and mobile communications networks is almost a reality. But service providers have yet to work out how it will be paid for.

Today's separation of fixed and mobile networks is a 'glaring weakness' in the way enterprise communications systems are set up. As Jeremiah Caron, research director for enterprise telephony at market watchers Current Analysis explains: 'The main problem is that the way mobile communications are managed within any enterprise is horrendous. It's a huge financial black hole and nobody really likes the way it's set up. Gaining control over those costs and making them predictable, even if they don't lower them dramatically, is a main aim for any IT department. But it's a very complex process.' "

Wednesday, June 01, 2005

Sour Grapes Follow Microsoft's Blogger Lunch

InformationWeek Windows Weblog: "Microsoft officials don�t deny the company mishandled the way it distributed copies of the in-development Longhorn operating system to bloggers and other WinHEC attendees this week, only to demand that screen captures of Longhorn �build 5048� be removed from Web sites that posted them. But Microsoft isn�t backing down. �Protecting its intellectual property is always a concern of Microsoft�s,� says a spokeswoman. �This is particularly true with the WinHEC Longhorn build.�"

Tuesday, May 31, 2005

Laptop with credit card info for 80,000 DOJ workers stolen - Computerworld

Laptop with credit card info for 80,000 DOJ workers stolen - Computerworld
MAY 31, 2005 (COMPUTERWORLD) - The FBI and Fairfax, Va., police are investigating the theft of a laptop containing the names and credit card numbers of about 80,000 U.S. Department of Justice workers.
Gina Talamona, a DOJ spokeswoman, said the laptop was stolen between May 7 and May 9 from the Fairfax, Va., headquarters of Omega World Travel, a travel agency used by the DOJ for its employees.

Camera phones wear out welcome

Seattle Post-Intelligencer: "At Apple Computer's shareholder meeting in April, attendees weren't allowed to take pictures. So what did security personnel check for, among other things? Cell phones."

Achieving Data Privacy in the Enterprise

IT Observer : "In spite of a range of security technologies being deployed, devastating thefts of sensitive data continue to occur. To address these threats, many organizations are looking to deploy data privacy solutions- solutions that ensure the security of data inside the enterprise. "

Medi-Cal recipients' data in stolen laptop

L.A. Daily News - News: "SACRAMENTO -- State health officials have begun notifying more than 20,000 Medi-Cal recipients that they could become targets of identity theft because a laptop computer was stolen."

Mideast increasingly at risk from cyber-crime

Lack of awareness and limited expenditure on security leaves region vulnerable
: "BEIRUT: Almost halfway through 2005 and it already seems as though this year will far surpass 2004 as the worst year on record for global cyber-crime. Perhaps more disturbingly, despite having racked up impressive numbers last year - online viruses grew by more than 50 percent and identity theft attempts rose by more than 30 percent - recent reports of widespread breaches at some of the biggest U.S. corporations have finally seemed to offer compelling proof that even the most sophisticated networks are vulnerable to corruption, eavesdropping and outright larceny."

Israeli police arrest 18 in industrial espionage ring "TEL AVIV (AFX) - Eighteen people, including top executives from some of Israel's most prestigious companies, have been arrested in a huge undercover industrial espionage investigation, police and media sources said. "