Wednesday, August 31, 2011

A La the Lower Merion School District case, finding a stolen laptop does not require you to read the users mail or look at their pictures?

Publicly Shaming Laptop Thieves Catches Bystanders in the Crossfire

"Embarrassing thieves by exposing them using laptop recovery software makes for fun tech stories, but what about a case of a person being literally exposed after cops and a software company got their hands on naked photos she exchanged with her long-distance boyfriend, not realizing the machine was stolen? (She bought it for $60 so she should have known, but still). The case is going to trial in Ohio in September. The plaintiffs argue that the software company had the right to get the computer's location in order to recover it, but that it should not have intercepted the nude photos and shared those with the cops. Seems like a legitimate complaint and the plaintiffs are especially sympathetic in not realizing the device was stolen."



Good luck with that guys...

Pakistan Bans Encryption

"After some rumors of this last month, Pakistan has now officially told all of the country's ISPs that they need to block all encrypted VPNs since content running over such services cannot be monitored by the government."


(Related)

http://www.itbusinessedge.com/cm/community/news/sec/blog/twitter-starting-to-make-ssl-encryption-the-default/?cs=48440

Twitter Starting to Make SSL Encryption the Default



Heads up for your Computer Security manager...

http://www.makeuseof.com/tag/worm-prays-weak-helpless-passwords-windows-remote-desktop-news/

New Worm Preys On Weak & Helpless Passwords For Windows Remote Desktop

Like many previous worms, this new threat is not technically sophisticated but remains effective due to its persistence. While only a small number of systems may be accessible with the passwords that Morto tries, the worm uses every infected machine to scan for additional targets and spreads itself relentlessly. One infection on a network can quickly turn into a full-blown PC plague. Infected machines also have their security software discreetly terminated, making the worm more difficult to find and remove.

… Protection against Morto is simple. Disabling Windows Remote Desktop will cut off its means of infection. Alternatively, a strong password containing random letters and numbers can thwart the worm.



Just a reminder...

http://viaforensics.com/security/secure-business-partners.html

You’re only as secure as your business partners

… Almost every company could be owned just as RSA and Sony were, even firms that embrace the security best practices I’ve advocated for the past 20 years, including better end-user education, faster and more inclusive patching, stronger authentication, improved monitoring, and quicker response to incidents. Of course, my regular readers have been taken all these important measures for a long time — but how about your partners? If they haven’t, they might well be putting your organization at risk.



Shocking?

Wikileaks: MPAA ‘Secret Pusher’ of BitTorrent Trial Against Aussie ISP

We’ve covered the landmark court battle between the Australian Federation Against Copyright Theft (AFACT) and the Aussie ISP iiNet in great detail here at TorrentFreak.

AFACT wants to hold iiNet responsible for the copyright infringing activities of their users, but they have been unsuccessful thus far.

Interestingly enough, a Wikileaks cable that was just released reveals that the MPAA (thus the American movie studios) are a main facilitator of the legal action.



Sounds like they have a point (or two)

EPIC Files For Rehearing In Body Scanner Case

"The Electronic Privacy Information Center has filed for a rehearing in their case against DHS regarding airport body scanners. In their latest court filing (PDF), EPIC argues that last month's ruling requiring a public comment period but no other changes was based on incorrect information. From TFA: '"The court overstated the effectiveness of the body scanner devices and understated the degree of the privacy intrusion to the travelling public," stated EPIC President Marc Rotenberg. EPIC's petition challenged the Court's finding that the devices detect "liquid and powders," which was never established and was not claimed by the government. EPIC also argued that the court wrongly concluded that the TSA is not subject to a federal privacy law that prohibits video voyeurism. The panel found that TSA body scanner employees are "engaged in law enforcement activity," contrary to the TSA's own regulations.' Note that this is a request for a rehearing with the same court that rejected their request to stop TSA's use of body scanners. It is not an appeal to a higher court. Is EPIC likely to obtain a more favorable ruling from the same court?"



One more tail twitch from the snake that wouldn't die?

Novell Wins Against SCO Again

"The Tenth Circuit Court of Appeals has just affirmed the District Court ruling in SCO v Novell (PDF) in its entirety. The decision is quite a good read and lays out the reasons why the court has rejected, in toto, SCO's attempt to re-argue the case before the Court of Appeals. Is this the last gasp for SCO or will they try to appeal this to the Supreme Court? The betting lines open at 11..."

Realistically this is the end of the line for the case.



Increasingly, this sounds like HP is still in the game – or at least they want to keep their manufacturing arm going until they can spin them off...

One Final Manufacturing Run of Touchpads

"HP has announced a limited manufacturing run of Touchpads to be available in the next few weeks. The HP employee making the announcement posted 'I think it's safe to say we were pleasantly surprised by the response' to their massively discounted, sold-at-a-huge-loss tablet."


No comments: