Sunday, July 16, 2006

July 16, 2006

http://www.bespacific.com/mt/archives/011820.html

July 13, 2006

2006 CSI/FBI Computer Crime and Security Survey

Press release: The Computer Security Institute (CSI) with the participation of the San Francisco Federal Bureau of Investigation's (FBI) Computer Intrusion Squad today released its 2006 report citing that virus attacks are the leading cause of financial losses. The top four categories -- virus attacks, unauthorized access to networks, lost/stolen laptops or mobile hardware and theft of proprietary information or intellectual property -- according to the 2006 Computer Crime and Security Survey, account for more than 74 percent of financial loss."

  • 2006 CSI/FBI Computer Crime and Security Survey (30 pages, PDF)

[from the report: There were, however, three areas in which average losses increased. Losses from laptop or mobile hardware theft increased from $19,562 per respondent in 2005 to $30,057 per respondent in 2006.



http://www.bespacific.com/mt/archives/011814.html

July 14, 2006

AT&T Agrees to Pay FCC Imposed Fine for Violating Customer Privacy

EPIC: "In a settlement (11 pages, PDF) reached with the Federal Communications Commission, AT&T agreed to pay $550,000 in a case concerning consumer privacy. According to the settlement, AT&T may have improperly used customer data for marketing purposes. AT&T also agreed to improve procedures for opt-out notification. This investigation was prompted by an EPIC petition submitted to the FCC in August 2005."



http://www.bespacific.com/mt/archives/011818.html

July 14, 2006

New CRS Report on Terror Financing Program's Access to Global Banking Data

Follow-up to postings on documents and news related to the terror finance tracking program, this recently published CRS report, posted by FAS: Treasury's Terrorist Finance Program's Access to Information Held by the Society for Worldwide Interbank Financial Telecommunication (SWIFT), July 7, 2006.



for animation. And it's free!

http://it.slashdot.org/article.pl?sid=06/07/15/1919251&from=rss

Blender 2.42 Has Been Released

Posted by Zonk on Saturday July 15, @04:07PM from the makes-good-juice dept. Graphics IT

bartv writes "Blender 2.42 has been released. It features an impressive list of new features for professional users. The most important improvements are: a new render pipeline, node editors for compositing and materials, support for anisotropic materials, improved fluid simulation and new character animation tools. Most of these features are the result of the production of Elephants Dream, the first Open Movie. During this project, Blender's lead developer Ton Roosendaal was coding the features that were required by the artists to produce their movie."



Surely this surprises no one...

http://yro.slashdot.org/article.pl?sid=06/07/15/1940205&from=rss

The Fine Print On Wiretapping Review

Posted by Zonk on Saturday July 15, @06:46PM from the always-read-before-you-sign dept. The Courts Privacy Politics

notarus writes "Congress' new bill to 'force' the wiretapping program to be reviewed by FISA has some very doublespeak provisions. One nice line: 'Nothing in this Act shall be construed to limit the constitutional authority of the President to collect intelligence with respect to foreign powers and agents of foreign powers.'"



Geek Stuff

http://digg.com/programming/Free_10_Week_Online_AJAX_Course_by_Sun_Microsystems

Free 10 Week Online AJAX Course by Sun Microsystems

SearchEngines submitted by SearchEngines 3 hours 31 minutes ago (via http://www.javapassion.com/ajaxcodecamp/ )

A free 10-week "AJAX Programming" online course is about to start from August 4th, 2006. This course is for anyone who wants to learn AJAX for the first time or increase their knowledge on AJAX. In this 10-week course, students learn basic concept of AJAX as well as how to use various AJAX frameworks and toolkits....



Geek stuff... anyone 12 or younger probably already knows about this...

http://digg.com/tech_news/Hacking_Techniques_in_Wireless_Networks

Hacking Techniques in Wireless Networks

NJShadow submitted by NJShadow 12 hours 35 minutes ago (via http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/WirelessHacks/Mateti-WirelessHacks.htm )

A HUGE directory on how to hack wireless networks.

No comments: