NewsBits for March 2, 2004 sponsored by, Southeast Cybercrime Institute - ************************************************************ Blaster beats up British business Half of UK businesses suffered from computer virus infection or denial of services attacks over the last 12 months. This was up from 41 per cent in 2002 and 16 per cent in 2000, The Department of Trade and Industry's 2004 Information Security Breaches Survey reveals. Yet again, computer viruses were the biggest problem.,39020375,39147959,00.htm Computer worms overwhelm inboxes - - - - - - - - - - Court revisits claim of censorship in law shielding kids porn The Bush administration's top Supreme Court lawyer says he typed the words ``free porn'' into an Internet search engine on his home computer and got a list of more than 6 million Web sites. That's proof, Solicitor General Theodore Olson told the Supreme Court on Tuesday, of the need for a law protecting children from a tide of online smut. - - - - - - - - - - Senators Try to Smoke Out Spyware Three U.S. senators are tackling the growing problem of "spyware," software programs that track what people do online, alter their Web browser settings and turn their computers into unwitting Internet advertising generators. - - - - - - - - - - Government backs quantum cryptography The government is putting its weight behind quantum cryptography as a key way of making communications hack-proof. - - - - - - - - - - Level of computer piracy in Ukraine goes down There is stable downtrend of computer piracy in Ukrainian software market nowadays. Software experts cam to such conclusion at discussion of development scenarios of Ukrainian software market held by GfK-USM company in frames of Ukrainian software market research carried out by request of Coalition for Intellectual Property Rights. Representatives of software companies and state authorities took part in discussion. IT and organized crime - - - - - - - - - - New fraud in the Internet Be watchful receiving email from legal Internet companies with requests to provide personal and financial information. Never give your credit card numbers, social insurance, date of birth, account numbers, phone numbers, address and even name. In order to provide such information you should contact with sender by phone and certain of legality of the letter. - - - - - - - - - - Security experts hit back at presidential advisor Security experts have been quick to hit back at an advisor of President Bush for criticising software developers' coding practices. Security experts have hit back at an advisor to the US's Homeland Security Council and President Bush for criticising the software industry for producing flawed code.,39020375,39147967,00.htm On one-year anniversary, Bush gives Homeland Security 'gold star' - - - - - - - - - - Through the security looking glass The annual RSA Conference, which just concluded in San Francisco, is the technology industry's premier security event. After covering a half-dozen RSA conferences in the 1990s (including several for CNET, I returned this year for the first time since 1999. Talk about a time warp. - - - - - - - - - - Spammers tout banned DVD technology It's been just a few days since start-up 321 Studios reluctantly complied with a court's order to remove the "ripping" feature, which allowed computer users to make copies of Hollywood studio films, from its popular line of software.,39020651,39147940,00.htm - - - - - - - - - - Bolstering Security With Smart Cards And Tokens When it comes to security, user names and passwords aren't getting the job done. And the threats are growing. The solution, security vendors say, is to make it more difficult to access business networks and applications, while still keeping procedures easy enough so users don't rise up in protest. - - - - - - - - - - HIPAA Security Rule: what it is & how to comply with it Thousands of US organizations must comply with the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. The Security Rule is a key part of HIPAA -- federal legislation that was passed into law in August 1996. The overall purpose of the act is to enable better access to health insurance, reduce fraud and abuse, and lower the overall cost of health care in the United States. - - - - - - - - - - 'This goes no further...' Following revelations about bugging at the United Nations, is there any way of ensuring that your private conversations stay that way? News that Kofi Annan and other senior UN figures may have been routinely bugged by US or British security services has caused a huge political row around the world. But it will also have caused alarm among other people in the public eye who deal with sensitive information - or anyone, indeed, who values their privacy. - - - - - - - - - - Lawmaker calls for hearings into delay in merging of watch lists The ranking Democrat on the House Select Committee on Homeland Security has called for immediate hearings to determine what is hampering consolidation of the governments terrorist watch lists. - - - - - - - - - - Troops in Iraq get high-tech noisemaker to keep enemies away U.S. soldiers in Iraq have new gear for dispersing hostile crowds and warding off potential enemy combatants. It blasts earsplitting noise in a directed beam. *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2004,, Campbell, CA.