-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Does Microsoft care about their customersâ security?
,----[ Quote ]
| A few days before the launching of
| Microsoftâs last operating system, FSFE
| wondered about usersâ security since an
| important vulnerability has been silently
| ignored. I then asked myself the question,
| in what way Free Software is different
| regarding security?
|
| It appears that our allegations were true
| and should have been taken seriously. As an
| article in Computerworld reports, Microsoft
| finally issued a security advisory about
| that high-risk vulnerability three days
| ago. The problem is still not fixed though.
|
| Whatâs important there is that this
| vulnerability already triggered a warning
| (en) by the BSI agency more than a month
| ago! Despite the consequences, Microsoft
| meanwhile decided not to tell its customers
| in order to avoid bad publicity around the
| launching of Windows7.
`----
http://blogs.fsfe.org/hugo/?p=119
Most security products fail to perform
,----[ Quote ]
| Nearly 80 percent of security products fail
| to perform as intended when first tested
| and generally require two or more cycles of
| testing before achieving certification,
| according to a new ICSA Labs report. The
| âICSA Labs Product Assurance Reportâ - co-
| authored by the Verizon Business Data
| Breach Investigations Report research team
| - details lessons gleaned from testing
| thousands of security products over 20
| years.
|
| The report found the number one reason why
| a product fails during initial testing is
| that it doesnât adequately perform as
| intended. Across seven product categories
| core product functionality accounted for 78
| percent of initial test failures. For
| example, an anti-virus product failing to
| prevent infection and for firewalls or an
| IPS product not filtering malicious
| traffic.
`----
http://www.net-security.org/secworld.php?id=8506
Gang sentenced for UK bank trojan
,----[ Quote ]
| London's Southwark Crown Court on Friday
| imposed sentences of as much as 4 and a
| half years on the men. According to IDG
| News, they used a trojan known as PSP2-BBB
| to stealthily monitor victims' browsers. It
| inserted special fields into banking pages
| that asked for sensitive information and
| then sent it to the criminals when the user
| complied.
`----
http://www.theregister.co.uk/2009/11/16/bank_trojan_gang_sentenced/
Spam net snared a quarter million bots, says conqueror
,----[ Quote ]
| Over five days, 487,340 unique IP addresses
| reported to the ad-hoc server. Using
| findings derived from last year's take-down
| of the separate Srizbi botnet, FireEye
| estimates that the figure translates to
| 248,590 unique machines.
`----
http://www.theregister.co.uk/2009/11/16/mega_d_size_estimate/
Age of cyber warfare is 'dawning'
,----[ ]
| Compiled by security firm McAfee, it bases
| its conclusion on analysis of recent net-
| based attacks.
`----
http://news.bbc.co.uk/1/hi/technology/8363175.stm
Related:
Bots rule in cyberspace
,----[ Quote ]
| USA TODAY REPORTS that on an average day, 40 per cent of the 800 million
| computers connected to the Internet are bots used to send out spam, viruses
| and to mine for sensitive personal data.
`----
http://www.theinquirer.net/gb/inquirer/news/2008/03/17/bots-rule-cyberspace
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAksDWcUACgkQU4xAY3RXLo5iPQCeKh7euvTCVeAtlkJi5K9E+83P
rcMAoKRl7HaGc+v/3LJ0aCl9UmPt1LTi
=q2wa
-----END PGP SIGNATURE-----
|
|