Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Windows XP SP2 For Embedded Devices Is Out

Posted on December 1, 2004December 30, 2021 by admini

The latest is a version for embedded devices running Windows XP Embedded.
http://www.microsoft-watch.com/article2/0,1995,1734101,00.asp
The embedded XP SP2 release includes many of the same security fixes and new features as Microsoft delivered in the full version of SP2.

http://www.microsoft-watch.com/article2/0,1995,1734130,00.asp?kc=MWRSS02129TX1K0000535

Read more

IT pros called to become boys in blue

Posted on December 1, 2004December 30, 2021 by admini

The request has apparently been welcomed by commissioner of the Metropolitan police Sir John Stevens.

“I think we should be using special constables,” said chairman of EURIM Brian White, MP. “IT managers could be given special powers. If they were trained in evidence gathering, they could report straight to the Crown Prosecution Service. Secure crime scenes and give records to court, for example.”

The recommendations follow findings earlier this year that only 240 people were qualified to work in digital forensics and evidence recovery. EURIM is proposing to increase the number of skilled police officers patrolling the cyber world.

White said that legislation alone was not enough to fight cybercrime, and more had to be done to improve the level of skilled police for the Internet. As part of EURIM’s proposals, White added that the UK needed better methods of reporting cybercrime because local police stations were ill-equipped to handle the task.

EURIM also proposed that some of the barriers to becoming a special constable should be removed, especially for IT specialists.

“One of the things you need to be [to join the special constables] is physically fit,” said Philip Virgo, secretary general for EURIM. “There would probably be lots of people who could monitor Internet chat rooms who couldn’t police the town on a Friday night. There are lots of boundaries to this that don’t need to be there.”

EURIM also called for IT specialists to contribute ideas for Internet policing, as the debate for what role the Serious Organised Crime Agency will play will begin over the next few weeks.

EURIM said it wanted to use the opportunity to ensure that people had a centralised point of contact when they needed to report a cybercrime.

http://news.zdnet.co.uk/0,39020330,39175660,00.htm

Read more

Customer ID: Frontier Bank Seeks New Level Of Security

Posted on December 1, 2004December 30, 2021 by admini

New account holders had to be verified to near certainty and screened against the OFAC database and other government watch lists to thwart crooks, scam artists and potential terrorists.

The bank needed a cost-effective and compliance-ready solution through automated ID verification software, a niche IT product that seamlessly works with existing new account procedures to enhance identity safeguards and build a database of documentation showing the bank’s compliance with Section 326, the customer identity regulations in the Patriot Act.

The answer, in this case eFunds’ ID verification system, which came packaged with Scottsdale, AZ-based eFunds’ ChexSystems fraud prevention and risk management solution already employed by Frontier.

The new system could track what records new account reps were pulling for customer verification, allowing Roush to determine which employees are not completing full records checks, or those who aren’t clearing up “false positives” that mistakenly rejected customers.

Bankers Systems acquired Atchley Systems in October 2003 to broaden its Patriot Act compliance offerings.

Sheshunoff Information Services bank compliance consultant Lorraine Hyde believes most banks are largely taking the necessary steps from a “safety and soundness standpoint,” but not just for examinations.

http://www.banktechnews.com/article.html?id=20041101ZV7Q0QP5

Read more

I.T. Security a People Problem; Workforce To Nearly Double by 2008

Posted on November 30, 2004December 30, 2021 by admini

The research shows that enterprises worldwide will hire about 800,000 more security professionals by 2008. The research leaves no doubt that human beings will be needed to thwart the threats caused by other human beings.

Among other findings of the IDC/ISC research: The compounded annual growth rate of hires worldwide between 2003 and 2008 should be 13.7 percent.

“There are still many organizations around the globe that haven’t fully addressed their security issues,” Carey noted. Some of the most insidious damage to data is accomplished as inside jobs.

When viewed from a macro level the striking characteristic of threats is change. “It’s a continuously dynamic environment,” Carey added.

The vulnerabilities of networks and data centers evolve, just as the methods employed by hackers do.

The key to a successful security strategy is involvement.

It appears the enterprises that remain the free of viruses, break-ins and thefts will be those that refrain from throwing money or software at problems, and instead bring people in to respond to the shifting sands of I.T. hazards

http://www.cio-today.com/story.xhtml?story_title=I_T__Security_a_People_Problem__Workforce_To_Nearly_Double_by_____&story_id=28254

Read more

The Threats To Come

Posted on November 30, 2004December 30, 2021 by admini

As security pros protect their applications and networks from today’s most common attacks, hackers are preparing to wage new wars. As new technologies such as Web services, radio-frequency identification, and smart phones loaded with complex operating systems become prevalent, new attack techniques against business-technology systems will follow.

The days of the hacker interested in intruding upon networks, cracking systems, and writing viruses and worms for the joy of the challenge or the mischievous thrill are turning into the days of the hacker as profit-motivated mercenary. The profit to be made through identity theft, corporate espionage, or using hacker skills to attack business competitors will continue to rise (see Extortion Online).

“It’s common for security professionals to continue to focus on fighting their most previous battles,” says Pete Lindstrom, research director with Spire Security. “But it’s important to prepare for the next front line.”

Last month one of the most complex attacks to strike the Internet targeted unsuspecting Web surfers who visited certain Web pages. Attackers infiltrated an Internet marketing company’s server and redirected Web surfers who visited sites displaying banner ads transmitted via the infected ad network to sites containing malicious code. Earlier this year, hackers attacked Web surfers via another Internet Explorer flaw by infecting Web sites and attaching malicious code to JPG image files.

As more companies deploy Web services, security experts predict hackers will find weaknesses in both Web-services security standards and companies’ implementation of these relatively new standards. Expect attackers to attempt to tamper with Web-services transaction data, deploy transactions that could contain potentially malicious payloads, and launch denial-of-service attacks (see Motorola Secures Web Services).

Spyware is one of the fastest-growing Internet threats. Unlike worms, viruses, and denial-of-service attacks, which are obvious when they strike, the crafters of spyware don’t want their work to be discovered.

Virus authors have written applications such as the Cabir virus, which spread via Bluetooth, and the Skulls Trojan, which disguised itself as a cell-phone wallpaper or ring tone but actually disabled some cell-phone functionality and turned icons on the screen into images of skulls (see Worm Is First To Target Mobile Phones).

Expect hackers to exploit weaknesses in RFID tags to attempt to wreck havoc on supply-chain systems by changing details stored on the tags, including pricing and the actual product.

http://www.informationweek.com/showArticle.jhtml;jsessionid=E3MTPP5V3IO0OQSNDBCCKHSCJUMEKJVN?articleID=54201336

Read more

HP to release Virus Throttler for Windows in 2005

Posted on November 30, 2004December 30, 2021 by admini

The Virus Throttler technology is designed to slow the propagation of a virus or worm within an infected server so that administrators have time to identify the infected system and take appropriate action, said Tony Redmond, vice president and chief technology officer of HP Services.

HP first discussed the technology at the RSA Security conference in February, but in August Redmond acknowledged that HP was having difficulty making the technology work with Microsoft Corp.’s Windows Server software.

Any administrator who has had to disinfect a bank of afflicted PCs or servers knows how quickly viruses can spread, Redmond said.

HP’s virus-throttling technology will help contain the spread of those viruses or worms by slowing the rate at which they multiply within a network, Redmond explained.

http://www.computerworld.com/securitytopics/security/virus/story/0,10801,97940,00.html

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme