Internet Security Systems (ISS) says it has identified a backdoor password in the Red Hat Linux Piranha product that could allow an attacker to compromise a Web server and deface and destroy a Web site.
The Canadian teen-ager known as Mafiaboy who was arrested last week in connection with an attack against the CNN Web site is an amateur who simply copied tactics used by far more sophisticated attackers who may never be caught, security analysts said.
The U.S. State Department said this week that the U.S. Federal Bureau of Investigation is leading an investigation into the disappearance two months ago of a State Department laptop computer that might have contained classified information. A department spokeswoman could not confirm whether any sensitive data that might have been stored on the missing laptop was encrypted.
After four months of number-crunching, a large, distributed network of computers worldwide has cracked an encryption method that will likely secure the next generation of wireless phones and other devices. The unprecedented effort revealed the strength of the encryption system but also highlighted some potential weaknesses.
The Canadian teen-ager known as Mafiaboy, who was arrested this week in connection with an attack against the CNN Web site in February, is an amateur who simply copied tactics used by far more sophisticated attackers who may never be caught, security analysts say.
The Canadian teenager known as Mafiaboy, who was arrested this week in connection with an attack against the CNN Web site in February, is an amateur who simply copied tactics used by far more sophisticated attackers who may never be caught, security analysts say.
The chief privacy officer at Microsoft Corp. said last week that the company plans to release free software tools that could spur the adoption of Internet privacy standards.
Intel Corp. in Santa Clara, Calif., yesterday said it plans to offer via free download an open-source version of its software based on the Common Data Security Architecture (CDSA). The move is intended to encourage use of the software by letting software developers review the code for possible flaws and to give Linux users a common security architecture.
The growth of e-commerce and the corresponding need for privacy and security are eclipsing government attempts to curb strong encryption worldwide, according to a study released this week by the Washington-based Electronic Privacy Information Center (EPIC).
Attempts by governments to curb the worldwide use of strong encryption are being eclipsed by the growth of electronic commerce and the corresponding need for privacy and Internet security, according to a study released by the Washington-based Electronic Privacy Information Center (EPIC).
A U.S. Appeals Court judge ruled this week that encryption source code is constitutionally protected speech and not subject to prior restrictions imposed by the U.S. Export Administration. The U.S. government had limited its distribution until January of this year. The decision could have far-reaching implications for other pending cases concerning the freedom to distribute controversial software.
A federal ruling on a collection of programs that decoded Cyber Patrol filtering software is raising questions about the power of U.S. courts to force the removal of information from Web sites. The case could also have implications for the reverse-engineering of commercial software and attempts by companies to halt the practice, which they say damages the marketability of their products.
A federal ruling on the use of Internet blocking software is raising questions about the power of U.S. courts to force the removal of information from Web sites. The case, which involves Cyber Patrol, could also have implications for the reverse engineering of commercial software and attempts by companies to halt the practice, which they say damages the marketability of their products.
French smart-card users were in an uproar this week after officials at French interbank group Groupement des Cartes Bancaires in Paris revealed that a known algorithm could be used to create forged cards for certain transactions.
Cyberattacks cost U.S. organizations US$266 million last year -- more than double the average annual losses for the previous three years, according to a newly published report.