InfoSec News

Intel considered acquiring either Symantec or McAfee for years before it announced last week that it would buy the latter, former Intel senior vice president Pat Gelsinger said on Thursday.
 
China is stepping up efforts to keep the security systems that protect its critical infrastructure in the hands of local firms, and that could be bad news for companies based outside the country.
 
The Dell Inspiron M101z isn't much more than a handful, but I'm fond of it. Just big enough to use comfortably with my gigantic hands (they're like bear paws), it's also small enough to easily toss into a bag, even a tiny man-purse. I like it a lot for its form factor and the $580 price point.
 
A Gmail bug that caused messages to be re-sent multiple times, mortifying senders and annoying recipients, has been fixed, Google said Thursday.
 
Users quickly embraced Apple's iPad as an e-book reading platform in the second quarter, while e-reading on BlackBerries declined, according to cloud-based e-book provider Wattpad.
 
Hewlett-Packard has raised its offer for 3PAR to $27 per share, outbidding Dell once more as the battle to acquire the California-based storage vendor continues.
 
MPEG LA, the firm that controls licensing for a number of video and other standards, announced on Thursday that it will never charge any royalties for Internet video encoded using the H.264 standard that Apple favors, as long as that video is free to end-users.
 
Intel's upcoming next-generation laptop chips will have a dozen new features to improve graphics performance and will be able to play Blu-ray 3D movies, the company said on Thursday.
 
Why did Google add voice capability to Gmail -- and what's next? Consider these five facts to put the new Google Voice in perspective.
 
The FCC should collect more data about the nation's mobile industry in an effort to better assess competition in the space, the U.S. Government Accountability Office said in a report released Thursday.
 

3 Areas Where FUD Needs to Stop
CIO
There is a new breed of animal appearing in the infosec community, according to Dr. Jimmy Blake, chief security officer for Mimecast, a cloud-services ...

and more »
 
Hard on the heels of a report that a USB drive was used to compromise U.S. military networks in 2008, a security company today claimed 25% of all new worms are designed to spread through the portable storage devices.
 
In effort to get a stronger footing in smartphone market, Intel reportedly ready to buy Infineon's wireless chip unit
 
Google's real-time search engine, which indexes and serves up status updates, messages and other public content from sites like Twitter and Facebook, now has its own Web address and contains new filtering capabilities.
 
Rumors swirled once again this week regarding a possible takeover of Red Hat, this time by SAP, but a number of industry observers said Thursday that the prospect is unlikely at best.
 
MIT researchers have used nanotechnology to develop a robot that can autonomously navigate across the surface of the ocean to clean up an oil spill.
 
Research In Motion has offered to lead an industry forum in India that aims to support the lawful access needs of law enforcement agencies, while preserving the corporate information security needs.
 

3 areas where FUD needs to stop
CSO
Beware of what you see and hear about these topics, according to infosec veteran Jimmy Blake. If it's a security story about Facebook or anything with an ...

and more »
 
The Federal Trade Commission announced it has dropped an investigation into the file sharing software distributed by embattled LimeWare.
 
Since CES, Microsoft's Windows 7 tablet strategy has largely been to spin its wheels - while iPad sales surge and Android-based tablets gain momentum. Has Microsoft fallen behind its rivals?
 
Mozilla this week said it's unlikely that the final version of Firefox 4 will run on older Macs equipped with PowerPC processors.
 
The recent approval of the Bluetooth 4.0 specification has caught the eye of watchmakers, who think the new spec could be used to add wireless capabilities to watches or other small devices.
 
Listen is a Google Labs app designed to help you get on top of, and stay on top of, a steady diet of podcasts. As a beginning podcast subscriber I found the app cleanly designed and easy to use.
 
The bidding war between Dell and Hewlett-Packard for virtualized storage vendor 3PAR continued on Thursday, with Dell increasing its bid to $24.30 per share, or about $1.6 billion.
 
The company expands former Borland automated testing products SilkTest and SilkCentral Test Manager
 
Advanced Micro Devices is considering the implementation of its upcoming low-power netbook chips based on the new Bobcat architecture in low-end servers, the company said this week.
 
Sun is the king of unpatched software vulnerabilities followed closely by Microsoft and Mozilla, according to the mid-year security report by IBM's X-Force.
 
California Attorney General Edmund Brown Jr. has filed criminal charges against the owner and two managers of a San Jose electronic waste recycling firm, accusing them of submitting $1 million in fraudulent reimbursement claims for more than 2 million pounds of waste they never recycled.
 
Germany is considering a law that would ban employers from mining information on prospective job candidates from social networking sites such as Facebook to protect people's privacy.
 
Beta 4 of Firefox 4 brings with it some interesting new abilities, including tab organization and improved syncing.
 
How storage virtualization technologies allow you to keep pace with ever-increasing storage requirements while maintaining high availability and service levels
 
Reader John is having a problem with Internet Explorer 6 (which he's running on Windows XP Pro SP3): When he shift-clicks a link to open a page in a new browser window, that window shows up blank.
 
Hardware-based security is in use at some enterprises and gains in virtualization are predicted on the horizon, but the technology has seen slow adoption.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google

McAfee - Intel Corporation - Technology - Security - Business
 
On Thursday Hewlett-Packard announced it acquired Stratavia, which specializes in tools for deploying, configuring and managing databases and middleware in an automated fashion.
 
The bidding war between Dell and Hewlett-Packard for virtualized storage vendor 3PAR continued on Thursday, with Dell increasing its bid to $24.30 per share, or about $1.6 billion.
 
Google has overtaken Microsoft to secure the top spot in a major Japanese survey of corporate brand perception.
 
Facebook today announced that chat support for Microsoft's IE6 browser will be dropped on Sept. 15.
 
It's time to wait and see whether the search alliance between Microsoft and Yahoo can make a dent in Google's huge lead over its top opponents.
 
Paper archives can survive centuries of benign neglect. Digital archives require careful management if they are to last more than a few years. Without such management, all bits will die.
 
Brocade Communications claims in a suit filed earlier this month that the founder of A10 Networks improperly used trade secrets and recruited top employees in order to build application delivery products that competed with those offered by Brocade.
 
InfoSec News: Gov't hype surrounds "Operation Buckshot Yankee": http://vmyths.com/2010/08/26/oby/
By Rob Rosenberger Vmyths.com Aug 26, 2010
Let's cut to the chase. U.S. Deputy Defense Secretary William J. Lynn III wrote an op-ed for a commercial publication in which he claims a single USB thumb drive caused the worst military data breach in history. [...]
 
InfoSec News: Hackers accidentally give Microsoft their code: http://www.zdnet.com.au/hackers-accidentally-give-microsoft-their-code-339305548.htm
By Josh Taylor ZDNet.com.au August 26th, 2010
When hackers crash their systems while developing viruses, the code is often sent directly to Microsoft, according to one of its senior [...]
 
InfoSec News: Sticks and stones: Picking on users AND security pros: http://www.csoonline.com/article/605764/sticks-and-stones-picking-on-users-and-security-pros
By Bill Brenner Senior Editor CSO August 25, 2010
I took my share of name-calling as a kid. I did my share of name-calling, too. We're taught that nothing good comes of such behavior. [...]
 
InfoSec News: California Legislation Would Require Companies To Specify The Data Exposed In Breaches: http://www.darkreading.com/database_security/security/attacks/showArticle.jhtml?articleID=227001108
By Kelly Jackson Higgins DarkReading Aug 25, 2010
A privacy breach notification bill recently passed by the California legislature would expand the state's existing law for how organizations [...]
 
InfoSec News: CAO site probe as hackers strike again: http://www.independent.ie/national-news/cao-site-probe-as-hackers-strike-again-2311981.html
By John Walshe Education Editor Independent.ie August 26 2010
THE Central Applications Office (CAO) website yesterday came under attack from cyber hackers for the second time in three days. [...]
 
Facebook and Twitter users are complaining about their accounts being compromised and then being used to spam friends with suspicious "free iPad offers."
 

Posted by InfoSec News on Aug 25

http://vmyths.com/2010/08/26/oby/

By Rob Rosenberger
Vmyths.com
Aug 26, 2010

Let's cut to the chase. U.S. Deputy Defense Secretary William J. Lynn
III wrote an op-ed for a commercial publication in which he claims a
single USB thumb drive caused the worst military data breach in history.
And according to Wikipedia, that one little USB stick led to the
creation of the Pentagon's new Cyber Command.

Breathless reports like this one say this...
 

Posted by InfoSec News on Aug 25

http://www.zdnet.com.au/hackers-accidentally-give-microsoft-their-code-339305548.htm

By Josh Taylor
ZDNet.com.au
August 26th, 2010

When hackers crash their systems while developing viruses, the code is
often sent directly to Microsoft, according to one of its senior
security architects, Rocky Heckman.

When the hacker's system crashes in Windows, as with all typical Windows
crashes, Heckman said the user would be prompted to send the error...
 

Posted by InfoSec News on Aug 25

http://www.csoonline.com/article/605764/sticks-and-stones-picking-on-users-and-security-pros

By Bill Brenner
Senior Editor
CSO
August 25, 2010

I took my share of name-calling as a kid. I did my share of
name-calling, too. We're taught that nothing good comes of such
behavior. I've been thinking a lot about that since writing an article
two weeks ago called "Security blunders 'dumber than dog snot'" during
the 2010 USENIX Security...
 

Posted by InfoSec News on Aug 25

http://www.darkreading.com/database_security/security/attacks/showArticle.jhtml?articleID=227001108

By Kelly Jackson Higgins
DarkReading
Aug 25, 2010

A privacy breach notification bill recently passed by the California
legislature would expand the state's existing law for how organizations
notify consumers of a data breach.

California's existing data breach law does not specify what the breach
notification should include information-wise....
 

Posted by InfoSec News on Aug 25

http://www.independent.ie/national-news/cao-site-probe-as-hackers-strike-again-2311981.html

By John Walshe
Education Editor
Independent.ie
August 26 2010

THE Central Applications Office (CAO) website yesterday came under
attack from cyber hackers for the second time in three days.

The latest incident triggered the automatic issuing of 22,000 new
passwords to applicants.

It also led the CAO to shut down parts of the website during the day...
 

Internet Storm Center Infocon Status