Big Brother im Tunnel


Auf deutschen Straßen sollen Autokennzeichen per Video registriert und mit Daten aus dem Fahndungscomputer abgeglichen werden.



¬> <a href="www.spiegel.de"target="_blank"> zur Geschichte

... Link (0 comments) ... Comment



Auf der Suche nach Computerpower


Ein britischer Student wollte die Computer am Fermi-Lab zum Herunterladen von Musik und Filmen benutzen.

¬> <a href="www.heise.de"target="_blank"> zur Geschichte

... Link (0 comments) ... Comment



Identix BioTouch USB Fingerprint Reader


The Identix BioTouch USB fingerprint reader is a standalone plug and play peripheral for securing access to computers and networks. Identix increases security and reduces the total cost of computing by eliminating the need to support costly passwords. Passwords are often lost, stolen, shared, forgotten, easily compromised and are inconvenient. With the simple touch of a finger you can access confidential content on your PC/Network.

¬> eyenetwatch.com

Aus den pdf "When it comes to proof of identity, it’s hard to beat the fingerprint." KLAR abba OS ? beim starten treiber rausnehmen funkt hier sicher auch - so wie bei den "usb-keys".

... Link (0 comments) ... Comment



Cisco warns of holes in PIX firewalls


Network equipment maker Cisco is warning customers about security holes in its PIX firewall product and firewall software that runs on the Catalyst 6500 Series and 7600 Series switches.

Cisco issued two security advisories on Monday describing vulnerabilities that could allow remote attackers to shut down Cisco firewalls using HTTP or SNMP requests designed to exploit the weaknesses.

¬> Network World

... Link (0 comments) ... Comment



Devices on limo saved Musharraf's life


High-tech jamming devices saved Pakistan's president from an assassination attempt, delaying by a few crucial seconds the detonation of a bomb that targeted his motorcade, intelligence officials told The Associated Press on Wednesday.

¬> salon.com

... Link (0 comments) ... Comment



Taking Cues from Mother Nature to Foil Cyber Attacks


Taking their cues from Mother Nature and biodiversity, computer scientists at Carnegie Mellon University and the University of New Mexico are collaborating on a National Science Foundation (NSF)-supported project to study "cyber-diversity" for computer systems as a way to fend off malicious viruses, worms and other cyber attacks.

In nature, diseases are most devastating when an infection-causing organism encounters a "monoculture," a vast swath of genetically similar individuals, each susceptible to the organism's method of attack. In the same vein, computer viruses and worms exploit the same flaw on every computer running the same software.

¬> nsf.gov

... Link (0 comments) ... Comment



MSN Messenger users forced to upgrade due to security flaw


Version 6.1.01xx users are being made to upgrade to MSN Messenger 6.1.0203. A post to the vulnerability mailing list NTBugTraq, detailed the travails of one user who attempted to sign in and was presented with a window, informing him that he had to upgrade to version 6.1 in order to continue.

¬> the age

... Link (0 comments) ... Comment



Cybercops and robbers growing trickier on World Wide Web


When the World Summit on the Information Society convenes in Geneva December 10-12, leaders will seek to build on their success in developing better cross-border guidelines to fight online crime.

Investigators say child pornography is just the tip of an ever-growing iceberg, in which pedophiles, organized crime rings and even terror groups are using the Internet to expand their reach and exploit the web's anonymity to stay one step ahead of the law.

¬> afp

... Link (0 comments) ... Comment



DIE DNS-JÄGER


Die enorme Erfolgsquote von Gen-Tests ermutigt Polizisten, die Jagd nach DNS-Proben zu verschärfen. Wissenschaftler in aller Welt arbeiten daran, die letzten Geheimnisse des Zellkerns in den Dienst der Fahndung zu stellen.

¬> <a href="www.spiegel.de"target="_blank"> zur Geschichte

... Link (0 comments) ... Comment



Alice und die grinsende Schrödingerkatze


Das erste Quantenkryptografiesystem ist auf dem Markt erhältlich und gleichzeitig kommen Zweifel auf, ob wirklich kein Dritter heimlich mithören kann.

¬> <a href="www.heise.de"target="_blank"> zur Geschichte

... Link (0 comments) ... Comment



Zeig mir deinen Chip und ich sag' dir wer du bist ...


Applied Digital Solutions richtet sich mit seiner Idee des bei Menschen implantierbaren Chips nun an Finanzunternehmen.

¬> <a href="www.heise.de"target="_blank"> zur Geschichte

... Link (0 comments) ... Comment



Rumsfeld lässt Hyperschallwaffen entwickeln


Die USA wollen ihre militärische Dominanz weiter ausbauen: Das Pentagon steckt bis zu 9,4 Millionen Dollar in erste Entwürfe für so genannte Hyperschallwaffen. Mit ihnen soll die US-Luftwaffe jedes Ziel der Welt innerhalb von zwei Stunden angreifen können.


¬> <a href="www.spiegel.de"target="_blank"> zur Geschichte

... Link (0 comments) ... Comment