China game boss sniped rivals, took down Internet An attack by a Chinese online game provider meant to cripple the servers of its rivals ballooned to cause an Internet outage in much of the country in May, according to police. FTC rules outlawing those damned annoying robocalls hit Sept. 1 Nearly a year after announcing the plan, new Federal Trade Commission rules prohibiting most robocalls are set to take effect Tuesday, Sept. 1. Researcher plots downfall of GSM phone security A US-based researcher has published a new method of attacking the encryption used to secure GSM mobile phones that he believes will force networks to revise the current generation of call security. Snow Leopard's old and new annoyances Almost a year ago, I shared my list of ten things I found annoying about Leopard. With the release of Snow Leopard, I thought I'd take a look at the new OS to see whether or not it fixes them. At the same time, I kept an eye out for new glitches. U.K. launches privacy initiative Recently I've been talking about identity-related initiatives from both the U.S. and Canadian governments. There was even a mention of some privacy issues raised by the Canadians. So as not to be overlooked, today I want to mention a new privacy initiative from the U.K. government. FBI investigating laptops sent to U.S. governors The U.S. Federal Bureau of Investigation is trying to figure out who is sending laptop computers to state governors across the U.S., including West Virginia Governor Joe Mahchin and Wyoming Governor Dave Freudenthal. Some state officials are worried that they may contain malicious software. Court ruling limits electronic searches A federal appeals court this week ruled that government investigators cannot retain incriminating information found in electronic searches unless it is within the scope of a search warrant. Pentagon reviews Stealth encryption prototype The Stealth encryption prototype from Unisys has been accepted by the Pentagon for review in a technical-evaluation program as a required first step that could, if successful, make Stealth a candidate for future use in secure IP-based communications across the military. August Giveaways Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31. Network World on Twitter? You bet we are |
No comments:
Post a Comment