Sony’s problems with the distribution of copy protected CDs is getting worst. They’ve been the subject of a lot of negative publicity over the past few days and now (according to the BBC) there’s word of lawsuits having been filed.
Last week, an unsigned Microsoft Word document critical of Samuel A. Alito Jr., a federal appeals court judge who has been nominated to the Supreme Court by President Bush, was the subject of discussion on many right wing blogs. Apparently, an analysis of meta data that was contained in the document revealed that the origin was the Democratic National Committee.
I guess the DNC needs a refresher lesson on the dangers of sending Word documents.
Continue reading Need to watch out for meta data
A cross-border alliance of consumer advocacy groups (Center for Democracy and Technology (CDT) and the Canadian Internet Policy and Public Interest Clinic) has formal complaints being filed with the Federal Trade Commission and the Canadian Competition Bureau urging the agencies to consider filing civil lawsuits against Montreal-based software distributor Integrated Search Technologies (IST), a company that the consumer groups claim utilizes aggressive and unethical installation practices.
Continue reading Consumer Groups Want Action Against Spyware Company
It seems that the independent security evaluation of their product may have raised more questions than it answered.
Continue reading Skype Security Report Raises Questions
USA today has an interesting article regarding the risks associated with online banking. The article describes the ordeals of an Ameritrade customer that had $60,000 worth of securities transferred out of his account and a Bank of America business customer that had over $90,000 transferred out from his bank account.
Continue reading Risks with Online Banking
The Voice Over IP Security Alliance (VOIPSA) has published a VOIP Security and Privacy Threat Paper which provides a good overview of the various types of security threats facing VOIP communications. According to the VOIPSA, this VoIP Security Threat Taxonomy is meant to define the many potential security threats to VoIP deployments, services, and end users. Part of the challenge of devising effective VoIP security protections requires identifying these threats in the first place. The overall goal of this project is to help ground VoIP security awareness in the industry, press, and general public.
The National Security Agency has developed and published configuration guides for securing various operating systems. These guides are currently being used throughout the government and by numerous entities as a security baseline their systems.
Security Configuration Guides – Operating Systems (PDF)