Conheça a nossa empresaNotícias de informática e segurançaBoletins, artigos, livros e dicas sobre segurançaO que oferecemosArquivos sobre segurançaUm apoio culturalFale com a Pangeia






Assunto [S] N.Y. County Enacts Wireless Security Law
Data Fri, 21 Apr 2006 10:54:36 -0300
Enviada por: Nelson Murilo

N.Y. County Enacts Wireless Security Law

by The Associated Press (AP)

April 20, 2006

Westchester County on Thursday enacted a law that is designed to limit identity theft by forcing local businesses to install basic security measures for any wireless network that stores customers' credit card numbers or other financial information.

The law also requires that businesses offering Internet access -- coffeehouses and hotels, for example -- post signs warning that users should have firewalls or other security measures.

As he signed the bill, County Executive Andrew Spano said the county had been unable to find any law like it in the country and had received inquiries about the legislation from other states and from Great Britain, South Korea and the Czech Republic.

Assunto [S] When Silence =?iso-8859-1?Q?isn=B4t?= Golden
Data Thu, 20 Apr 2006 10:00:27 -0300
Enviada por: Nelson Murilo

Security Header

Microsoft Patches: When Silence Isn't Golden
By Ryan Naraine
April 19, 2006

News Analysis: The software maker admits to withholding details on security vulnerabilities to protect customers from bad guys, but critics say that policy increases the risk for everyone.

Microsoft has 'fessed up to hiding details on software vulnerabilities that are discovered internally, insisting that full disclosure of every security-related product change only serves to aid attackers.

The company's admission follows criticisms from a security researcher that its policy of silently fixing software flaws is "misleading" and not in the spirit of Microsoft's push for transparency.

In an interview with eWEEK, Mike Reavey, operations manager of the MSRC (Microsoft Security Response Center), said the company's policy is to document the existence of internally discovered flaws as well as the area of functionality where the change occurred, but that full details on the fixes are withheld for a very good reason.

"We want to make sure we don't give attackers any d information that could be used against our customers. There is a balance between providing information to assess risk and giving out information that aids attackers," Reavey said.

Assunto [S] Islamic hackers attack Danish sites
Data Thu, 9 Feb 2006 10:31:30 -0200
Enviada por: Nelson Murilo

Islamic hackers attack Danish sites
Cartoon protest spills onto cyberspace
By John Leyden
Published Thursday 9th February 2006 11:44 GMT

Protests over cartoon images of the prophet Mohammed have spilled onto cyberspace with a series of attacks against Danish and other western websites. Islamic ire over the publication of the "satiric pictures" portraying the prophet Mohammed, first published in Denmark, has resulted in 1,000 attacks against web servers, according to defacement archive Zone-H. Danish sites have copped the majority of attacks, but the barrage of assaults has also hit Israeli and other western web servers.

Hacker groups from different Muslim nations have united in attacks that promote both moderate and extremist manifestos. Some defacements promote a boycott against Danish products, while others (such as those by the self-styled IIB - Internet Islamic Brigades) threaten suicide bombing attacks on Denmark.

The number of politically motivated attacks against Danish servers gives a small measure of the strength of feeling over the issue. Violence during demonstrations over the issue has claimed six lives in Afghanistan and elsewhere in the Muslim world.

Assunto [S] Chip and PIN doesn't mean the end of the war on card fraud
Data Tue, 7 Feb 2006 11:19:01 -0200
Enviada por: Nelson Murilo

Chip and PIN doesn't mean the end of the war on card fraud

The magnetic stripe under the spotlight
Add Comment Printer Friendly Email Story

By Dan Ilett

Published: Tuesday 7 February 2006

A Friday night drinking session had certainly not cost 500, Richard Wolfe thought when he opened his bank statement.

But his statement showed a big withdrawal from his bank account shortly after he'd been to a cash machine that weekend.

"It's really weird," said Wolfe who works for a London PR company. "I went to use a cash machine, put my card in and it jammed in the machine.
Where's fraud going to go? It's going to America. But the majority of the world is going to chip and PIN so that will cut down the options.

Assunto [S] Microsoft security chief bitten by rogue dialler
Data Wed, 7 Sep 2005 22:32:43 -0300
Enviada por: Nelson Murilo

Microsoft security chief bitten by rogue dialler
Tom Espiner
September 06, 2005, 17:10 BST

No-one is above the threat posed by rogue diallers, it seems: Microsoft's top security man in the UK recently found himself with a whopping BT bill

Rogue diallers have claimed a high-profile victim . Microsoft UK's chief security advisor Ed Gibson.

Speaking to ZDNet UK on Tuesday, Gibson revealed that he has recently been hit by a 450 bill from BT after his computer was infected with a rogue dialler.

Rogue diallers are malicious applications that hijack an Internet connection and redirect it to a premium rate number, often based abroad. They only affect dial-up connections, but some broadband users have been hit because they also have dial-up connections as a back-up.

Gibson was speaking at the London "eConfidence . Spam and Scams" conference, at which he delivered a passionate attack on rogue diallers.


Copyright © 1995 - 2004 Pangeia Informática LTDA. Todos os direitos reservados.