Topic: SECURITY - on December 28, 2003 at 11:21:00 PM CET
Big Brother im Tunnel
Auf deutschen Straßen sollen Autokennzeichen per Video registriert und mit Daten aus dem Fahndungscomputer abgeglichen werden.

¬> <a href="www.spiegel.de"target="_blank"> zur Geschichte
... Link (0 comments) ... Comment
Topic: SECURITY - on December 19, 2003 at 11:28:20 AM CET
Auf der Suche nach Computerpower
Ein britischer Student wollte die Computer am Fermi-Lab zum Herunterladen von Musik und Filmen benutzen.
... Link (0 comments) ... Comment
Topic: SECURITY - on December 18, 2003 at 6:21:38 PM CET
Identix BioTouch USB Fingerprint Reader
The Identix BioTouch USB fingerprint reader is a standalone plug and play peripheral for securing access to computers and networks. Identix increases security and reduces the total cost of computing by eliminating the need to support costly passwords. Passwords are often lost, stolen, shared, forgotten, easily compromised and are inconvenient. With the simple touch of a finger you can access confidential content on your PC/Network.

... Link (0 comments) ... Comment
Topic: SECURITY - on December 18, 2003 at 2:00:04 PM CET
Cisco warns of holes in PIX firewalls
Network equipment maker Cisco is warning customers about security holes in its PIX firewall product and firewall software that runs on the Catalyst 6500 Series and 7600 Series switches.
Cisco issued two security advisories on Monday describing vulnerabilities that could allow remote attackers to shut down Cisco firewalls using HTTP or SNMP requests designed to exploit the weaknesses.
... Link (0 comments) ... Comment
Topic: SECURITY - on December 18, 2003 at 1:20:44 PM CET
Devices on limo saved Musharraf's life
High-tech jamming devices saved Pakistan's president from an assassination attempt, delaying by a few crucial seconds the detonation of a bomb that targeted his motorcade, intelligence officials told The Associated Press on Wednesday.
... Link (0 comments) ... Comment
Topic: SECURITY - on December 15, 2003 at 11:25:27 PM CET
Taking Cues from Mother Nature to Foil Cyber Attacks
Taking their cues from Mother Nature and biodiversity, computer scientists at Carnegie Mellon University and the University of New Mexico are collaborating on a National Science Foundation (NSF)-supported project to study "cyber-diversity" for computer systems as a way to fend off malicious viruses, worms and other cyber attacks.
In nature, diseases are most devastating when an infection-causing organism encounters a "monoculture," a vast swath of genetically similar individuals, each susceptible to the organism's method of attack. In the same vein, computer viruses and worms exploit the same flaw on every computer running the same software.
... Link (0 comments) ... Comment
Topic: SECURITY - on December 8, 2003 at 4:06:10 PM CET
MSN Messenger users forced to upgrade due to security flaw
Version 6.1.01xx users are being made to upgrade to MSN Messenger 6.1.0203. A post to the vulnerability mailing list NTBugTraq, detailed the travails of one user who attempted to sign in and was presented with a window, informing him that he had to upgrade to version 6.1 in order to continue.
... Link (0 comments) ... Comment
Topic: SECURITY - on December 7, 2003 at 3:47:24 PM CET
Cybercops and robbers growing trickier on World Wide Web
When the World Summit on the Information Society convenes in Geneva December 10-12, leaders will seek to build on their success in developing better cross-border guidelines to fight online crime.
Investigators say child pornography is just the tip of an ever-growing iceberg, in which pedophiles, organized crime rings and even terror groups are using the Internet to expand their reach and exploit the web's anonymity to stay one step ahead of the law.
... Link (0 comments) ... Comment
Topic: SECURITY - on November 29, 2003 at 10:14:39 AM CET
DIE DNS-JÄGER
Die enorme Erfolgsquote von Gen-Tests ermutigt Polizisten, die Jagd nach DNS-Proben zu verschärfen. Wissenschaftler in aller Welt arbeiten daran, die letzten Geheimnisse des Zellkerns in den Dienst der Fahndung zu stellen.
... Link (0 comments) ... Comment
Topic: SECURITY - on November 28, 2003 at 2:22:04 AM CET
Alice und die grinsende Schrödingerkatze
Das erste Quantenkryptografiesystem ist auf dem Markt erhältlich und gleichzeitig kommen Zweifel auf, ob wirklich kein Dritter heimlich mithören kann.
... Link (0 comments) ... Comment
Topic: SECURITY - on November 27, 2003 at 9:30:42 AM CET
Zeig mir deinen Chip und ich sag' dir wer du bist ...
Applied Digital Solutions richtet sich mit seiner Idee des bei Menschen implantierbaren Chips nun an Finanzunternehmen.
... Link (0 comments) ... Comment
Topic: SECURITY - on November 26, 2003 at 11:59:31 PM CET
Rumsfeld lässt Hyperschallwaffen entwickeln
Die USA wollen ihre militärische Dominanz weiter ausbauen: Das Pentagon steckt bis zu 9,4 Millionen Dollar in erste Entwürfe für so genannte Hyperschallwaffen. Mit ihnen soll die US-Luftwaffe jedes Ziel der Welt innerhalb von zwei Stunden angreifen können.

¬> <a href="www.spiegel.de"target="_blank"> zur Geschichte
... Link (0 comments) ... Comment