
More here.
Information Security News and Comments
Total damage to the airplane, according to sources inside the Pentagon: $1.28 million. Not only did the firefighters ruin the canopy, which cost $286,000, they also scuffed the coating on the airplane's skin which will cost about $1 million to replace.
More here.or
intitle:”Live View / - AXIS” | inurl:view/view.shtml^
On-board wired and wireless devices may also have access to parts of
the airplane's digital systems that provide flight critical functions.
These new connectivity capabilities may result in security
vulnerabilities to the airplane's critical systems. For these design
features, the applicable airworthiness regulations do not contain
adequate or appropriate safety standards for protection and security of
airplane systems and data networks against unauthorized access.
Chris Rutkowski says the 2006 Canadian UFO Survey recorded the third largest number of sightings in its 17-year history and shows there’s still a great deal of interest in unexplained phenomena in the sky.
They are putting forward the theory that radiation given off by mobile phones and other hi-tech gadgets is a possible answer to one of the more bizarre mysteries ever to happen in the natural world - the abrupt disappearance of the bees that pollinate crops. Late last week, some bee-keepers claimed that the phenomenon - which started in the US, then spread to continental Europe - was beginning to hit Britain as well.
Full story here.
Their mom called Best Buy's Geek Squad for help with their computer. Now two sisters are suing Best Buy, claiming the technician who showed up secretly taped one of them in the shower.Full story here.
"The computer was protected by two layers of security, a unique user-identifier and a multiple-character, alpha-numeric password."Whew, that's a relief! Press release here.
"Protiviti is a leading provider of independent internal audit and business and technology risk consulting services."Now I know where not to bank and who not to pick as my auditor...
Hugh McArthur, director of information systems security at Online Resources Corp. in Chantilly, Va., said that in general, Microsoft’s 100-day turnaround time for patching the so-called ANI vulnerability doesn’t seem all that unusual.
It wasn’t as if the software vendor was “just sitting back and doing nothing,” McArthur said. “My take is that Microsoft was hoping they could get the fix written and tested prior to an exploit being written. In this case, they didn’t make it.”
Despite all the hoopla, the vulnerability “ultimately wasn’t a big issue” for Online Resources, McArthur said. But he added that the online bill-processing company treated the threat “very seriously” and made sure that its antivirus software was up to date and that its monitoring tools were configured to detect any exploit attempts on its systems.
etch, after 21 months of constant development. Debian GNU/Linux is a free operating system which supports a total of eleven processor architectures and includes the KDE, GNOME and Xfce desktop environments. It also features cryptographic software and compatibility with the FHS v2.3 and software developed for version 3.1 of the LSB.
Using a now fully integrated installation process, Debian GNU/Linux 4.0 comes with out-of-the-box support for encrypted partitions. This release introduces a newly developed graphical frontend to the installation system supporting scripts using composed characters and complex languages; the installation system for Debian GNU/Linux has now been translated to 58 languages.
How to get it here.
Police launched a probe last week after a navy officer married to a Chinese woman was found to have taken home a computer disk containing information about the high-tech Aegis radar system, domestic media said.
Aegis is used on Japanese destroyers that are to be fitted with SM-3 missile interceptors from this year as part of the missile defence program. The officer told police he accidentally copied the confidential data onto his computer's hard disk when copying porn from a computer belonging to a crew member from another destroyer, the Yomiuri newspaper reported.
Story here.At the Black Hat Conference in Amsterdam, security experts from India demonstrated a special boot loader that gets around Vista's code signing mechanisms. Indian security experts Nitin and Vipin Kumar of NV labs have developed a program called the VBootkit that launches from a CD and boots Vista, making "on the fly" changes in memory and in files being read. In a demonstration, the "boot kit" managed to run with kernel privileges and issue system rights to a CMD shell when running on Vista RC2 (build 5744), even without a Microsoft signature.
Experts say that the fundamental problem that this highlights is that every stage in Vista's booting process works on blind faith that everything prior to it ran cleanly. The boot kit is therefore able to copy itself into the memory image even before Vista has booted and capture interrupt 13, which operating systems use for read access to sectors of hard drives, among other things.
More here.
"When “LED City” Raleigh and Cree Inc. turned on new light-emitting diodes (LEDs) in the Avery C. Upchurch Government Complex’s parking garage, people’s opinions about the quality of the lighting improved threefold."More here.
Forty Years of Reconnaissance. This is actually a music video about the NRO. Sample lyrics:
"And we'll be there when you call
Even Friday night's all right
We'll see and hear it all
Taking it on with all our might."
[5min, 37sec]