Security Bytes

October 2007

Information security policies, procedures and guidelines

  • More Storms on the horizon

    David Schneier - R.I.S.C. Associates 19 Oct 2007
  • The news on the Storm worm just keeps getting worse. In just the last few days, there have come reports that the worm's author (or other criminals who have bought copies of the worm) is using to ...

  • Schwarzenegger strikes a blow for the big guy

    David Schneier - R.I.S.C. Associates 16 Oct 2007
  • Like many other things in life, the legislative process often mystifies me. But the one thing that is clear is that the outsized influence of special interest groups and lobbying organizations has ...

  • ‘Tens of thousands’ of user accounts exposed

    Leigha Cardwell - TechTarget 16 Oct 2007
  • Mikko Hypponen, director of antivirus research at F-Secure Corp., has a sobering blog posting this morning about an unknown group that publicly posted information about tens of thousands of user ...

  • VeriSign in dispute over news content

    Robert Westervelt - TechTarget 10 Oct 2007
  • VeriSign is in hot water over a dispute with the Associated Press over the use of AP content by its Moreover Technologies news aggregation service. The AP filed the lawsuit in U.S. District Court ...

  • More IDs compromised: 450,000 in the Bay State

    Leigha Cardwell - TechTarget 05 Oct 2007
  • Another day, another batch of identities exposed. This time, the bad news comes from Massachusetts, where the state's Division of Professional Licensure (DPL) mailed off 28 computer disks with ...

  • TJX seeks experienced IT security manager

    Leigha Cardwell - TechTarget 03 Oct 2007
  • Here's some actual proof that TJX is trying to do something about the security holes that allowed hackers to repeatedly access its network and steal data on some 45 million customers: A job posting ...

  • Rain Forest Puppy is back, and he’s been busy

    David Schneier - R.I.S.C. Associates 03 Oct 2007
  • The topic of how the shift to Web-based applications affects the work that security researchers do has been coming up quite a bit lately, and it's an interesting discussion to have. I wrote a ...