This journal attempts to record signifcant security related events that transpire during the current week.
Our plan is to create a snapshot of events related by time and their revelance to Information System Security.
Week Two Week Three Week Four
|THE ISO17799 NEWSLETTER, EDITION 8||This is the newsletter associated with ISO 1799. This standard is titled "Information Technology – Code of practice for information security management." It is an interesting document. And one that correlates well with the CISSP CBK.|
|Free Adrian||Well known publicity hacker Adrian Lamo turned himself in today. When he meet the FBI at a Starbucks, he was wearing a wire and Tech TV was rolling video. Kevin Mitnick's girl friend did the FeeLamo site.
Read more about Adrian in Wired.
|Beyond Fear Review||
Bruce Schneier's new book, Beyond Fear, is reviewed in Business Week.
In this interview, the author makes the point that "We've made some bad Security Tradeoffs." His point is that it's not only whether a security countermeasure is effective, it's whether it's worth it.
Read more about Schneier here.
|Australian's Customs Loses Mainframes!||
On the night of Wednesday, August 27, two men dressed as computer technicians and carrying tool bags entered the cargo processing and intelligence centre at Sydney International Airport.
When they left, they took to of Custom's mainframes with them. Read how it happened here.
|Welchia worm shuts down U.S.State Department computer!||
Due to a Welchia worm infection, the U.S.State Department was temporarily unable to check visa applicants for terrorist or criminal history. The system failed worldwide late Tuesday.
Specifically, the virus crippled the department's Consular Lookout and Support System, known as CLASS. This system contains more than 12.8 million records from the FBI, State Department and U.S. immigration, drug-enforcement and intelligence agencies.
|Pace of new online threats picks up||
According to the latest Internet Security Threat Report from Symantec Corp.,
new more efficient worms are appearing more quickly than in the past.
Alfred Huger, senior director of development for Symantec Security Response was quoted as saying "The people who are designing worms are learning from their mistakes."
These are among the findings of Symantec's recently released fourth semiannual security report that compares security data from the first six months of 2003 with the same period from last year.
|The e-spy who loves you could be a felon||
A company calling itself Lover Spy is selling online greeting cards that contain a Trojan.
Marketed as a way to "catch a cheating lover," Lover Spy offers to send an e-mail greeting card to lure the victim to a Web site that downloads onto the victim's computer a Trojan. At a cost of $89 (up to five computers), Lover Spy software, records anything the victim does on the computer, including all keystrokes, passwords, e-mail, chats and screen shots and even turning on the victim's Web camera.
According to the company's Web site, the spy program discreetly sends the information to the Lover Spy server, which then forwards it to the person who paid for the software, maintaining the purchaser's anonymity.
According to several 'security experts' this practice violates U.S. Law.
When I attempted to go to Lover-Spy's home page, the site appeared to be down!
|Suing Your Customers: A Winning Business Strategy?||
In an apparent effort to improve sales, the RIAA has taken recently begun to sue hundreds of its customers. Many universities are getting dozens of inquiries monthly regarding what the RIAA regards violations of the DMCA.
Are the RIAA's efforts likely to be successful? This question is answered by Wharton legal studies professor G. Richard Shell in this article. He provides a historical context by citing the unsuccessful legal cases brought against Henry Ford 100 years ago.
He concludes with a quote from Henry Ford: " … lawsuits against new technologies provide "opportunities for little minds ... to usurp the gains of genuine inventors ... and under the smug protest of righteousness, work a hold-up game in the most approved fashion."