hypnosec writes "Toshiba Information Systems has been given a slap on the wrist by the Information Commissioner's Office (ICO), following a data spillage. This happened during an on-line competition that Toshiba organized last year. Back in September 2011, a concerned member of the public contacted the ICO and informed the body that some data pertaining to those registered for the competition was accessible. In fact, the personal details of 20 entrants were compromised in a security flaw on the site. Those details included names, addresses and dates of birth, along with other contact information. The ICO investigated and found that Toshiba's security measures weren't thorough enough, and hence, didn't detect the vulnerability — from a mistake, made by a third-party web designer. A fine hasn't been levied, but Toshiba has signed an undertaking to ensure this doesn't happen again."
Have you META-MODERATED today? Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25.×
benrothke writes "While Julius Caesar likely never said 'Et tu, Brute?' the saying associated with his final minutes has come to symbolize the ultimate insider betrayal. In The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes, authors Dawn Cappelli, Andrew Moore and Randall Trzeciak of the CERT Insider Threat Center provide incontrovertible data and an abundance of empirical evidence, which creates an important resource on the topic of insider threats. There are thousands of companies that have uttered modern day versions of Et tu, Brute due to insidious insider attacks and the book documents many of them." Read on for the rest of Ben's review.
An anonymous reader writes "Austrian police have arrested a 15-year-old student suspected of hacking into 259 companies across the span of three months. Authorities allege the suspect scanned the Internet for vulnerabilities and bugs in websites and databases that he could then exploit. As soon as he was questioned, the young boy confessed to the attacks, according to Austria's Federal Criminal Police Office (BMI)."
Qedward writes in with a link about the gap between the tech side of business and the bean counters. "CIOs are being dismissed by CEOs as too techie and not aligned with business activities. According to recent Gartner survey of 220 CEOs across the world, business leaders expect spending on IT to rise, but without a corresponding rise in the importance of the role of the CIO within the organization. CIOs appear to be failing in the eyes of CEOs in terms of alignment with the rest of the business. The research showed the stereotype of the head of IT being too preoccupied with technical issues to be effective business leaders persists. He said they were perceived as unable to bring a breadth of business perspective to the table."
scibri writes "Ron Fouchier, one of the researchers involved in the controversy over whether to publish research on mutant versions of H5N1 bird flu, has said he plans to submit his paper to Science without applying for an export control license as demanded by the Dutch government. Failing to get the license means he could face penalties including up to six years in prison. Whether the paper falls under export-control laws is unclear. The Netherlands implements European Union (EU) legislation on export controls, which require an export permit for 'dual-use' materials and information — those that could have both legitimate and malicious uses — including those relating to dangerous pathogens. But the EU law allows an exception for 'basic scientific research' that is 'not primarily directed towards a specific practical aim or objective,' which Fouchier says should cover his work."
snydeq writes "With rising popularity of Internet-enabled TVs, the usual array of attacks and exploits will soon be coming to a screen near you. 'Will Internet TVs will be hacked as successfully as previous generations of digital devices? Of course they will. Nothing in a computer built into a TV makes it less attackable than a PC. ... Can we make Internet TVs more secure than regular computers? Yes. Will we? Probably not. We never do the right things proactively. Instead, we as a global society appear inclined to accept half-baked security solutions that are more like Band-Aids than real protection.'"
ErichTheRed writes "Yet another move by IBM out of end-user hardware, Toshiba will be buying IBM's retail point-of-sale systems business for $850M. Is it really a good idea for a company defined by good (and in this case, high-margin) hardware to sell it off in favor of nebulous consulting stuff? 'Like IBM's spin-offs of its PC, high-end printer, and disk drive manufacturing businesses to Lenovo, Ricoh, and Hitachi respectively in the past decade, IBM is not just selling off the RSS division but creating a holding company where it will have a stake initially but which it will eventually sell.' Is there really no money in hardware anymore? "
judgecorp writes "Despite the accusations that have flown both ways between the countries, the US and China have co-operated in wargames, held in secret in Beijing and Washington, designed to head off escalations in hostilities. From the article: 'During the first exercise, both sides had to describe what they would do if they were attacked by a sophisticated computer virus, such as Stuxnet, which disabled centrifuges in Iran's nuclear program. In the second, they had to describe their reaction if the attack was known to have been launched from the other side.'"
First time accepted submitter Kelerei writes "Windows 8 has been confirmed as the official name for the next x86/x64 version of Windows, which will be released in two editions: a home edition (simply named 'Windows 8') featuring an updated Windows Explorer, Task Manager, improved multi-monitor support and 'the ability to switch languages on the fly,' while a professional edition ('Windows 8 Pro') adds features for businesses and technical professionals such as encryption, virtualization and domain connectivity. Windows Media Center will not be included in the Pro edition and will be available separately as part of a 'media pack' add-on. A third edition, branded as 'Windows RT,' will be available for ARM-based systems."
retroworks writes "Dinei Florencio and Cormac Herley write that cybercrime depleted gullible and unprotected users, producing diminishing returns (over-phishing). They argue that the statistics on the extent of losses from cybercrime are flawed because there is never an under-estimation reported. Do they underestimate the number of suckers gaining internet access born every minute? Or has cybercrime become the 'shark attack' that gets reported more often than it occurs?"
bdking writes "In an effort to protect sensitive data from internal security threats, some organizations are 'using new technology to look at the language of their IT staff's emails to determine whether their behavior or mind-set has changed,' the Wall Street Journal reports. Is secretly spying on and linguistically interpreting employee emails going too far in the name of security? From the article: 'I understand the need to be aware of the attitudes of workers with high-level access to data and networks, but this strikes me as creepy. What if an IT employee suddenly has relationship problems or family issues? Will they then be flagged by HR as potentially troublesome or even a data security risk? And all without them even knowing there's a dossier being created of them and their "suspect" behavior?'"
bobwrit writes in with a story about Boeing's new secure government phones project. "Earlier this week, it was revealed that aerospace firm Boeing was working on a high security mobile device for the various intelligence departments. This device will most likely be released later this year, and at a lower price point than other mobile phones targeted at the same communities. Typically, phones in this range cost about 15,000-20,000 per phone, and use custom hardware and software to get the job done. This phone will most likely use Android as it's main operating system of choice, which lowers the cost per phone, since Boeing's developers don't have to write their own operating system from scratch."
New submitter Sekrimo writes "This article discusses an interesting advantage to writing documentation. While the author acknowledges that developers often write documentation so that others may better understand their code, he claims documenting can also be a useful way to find bugs before they ever become an issue. Taking the time to write this documentation helps to ensure that you've thought through every aspect of your program fully, and cleared up any issues that may arise."
An anonymous reader writes "Another Mac OS X Trojan has been spotted in the wild; this one exploits Java vulnerabilities just like the Flashback Trojan. Also just like Flashback, this new Trojan requires no user interaction to infect your Apple Mac. Kaspersky refers to it as 'Backdoor.OSX.SabPub.a' while Sophos calls it at 'SX/Sabpab-A.'"
suraj.sun writes "We've seen quite a few Android malware discoveries in the recent past, mostly on unofficial Android markets. There was a premium-rate SMS Trojan that not only sent costly SMS messages automatically, but also prevented users' carriers from notifying them of the new charges, a massive Android malware campaign that may be responsible for duping as many as 5 million users, and an malware controlled via SMS. Ars Technica is now reporting another Android malware discovery made by McAfee researcher Carlos Castillo, this time on Google's official app market, Google Play, even after Google announced back in early February that it has started scanning Android apps for malware. Two weeks ago, a separate set of researchers found malicious extensions in the Google Chrome Web Store that could gain complete control of users' Facebook profiles. Quoting the article: 'The repeated discoveries of malware hosted on Google servers underscore the darker side of a market that allows anyone to submit apps with few questions asked. Whatever critics may say about Apple's App Store, which is significantly more selective about the titles it hosts, complaints about malware aren't one of them.'"