NewsBits for April 11, 2006 ************************************************************ Man stabbed as laptop thefts rocket Hardware the new black in mugging terms Police in San Francisco are reporting soaring laptop thefts, following the increased use of Wi-Fi hotspots in the city. San Francisco had 18 public laptop thefts in 2004, but this rose to 48 last year and the number could head above 100 this year, according to figures obtained by the San Francisco Chronicle. Perps beware: 'Jacking Macs' could prove hazardous At a time when laptop thefts are on the rise in high-tech corridors like San Francisco, an entrepreneur has rigged portable computers with a security measure that car owners have relied on--and sleepers have complained about--for decades. - - - - - - - - - - Former Tech Student Receives 10 Year Prison Sentence A former Texas Tech student receives a jail sentence for possession child pornography. Cole Cosby, 23, was given the maximum sentence of 10 years in prison. He had been convicted back in January. - - - - - - - - - - NYC assistant principal pleads guilty to child porn charge An assistant principal at a New York City high school pleaded guilty Monday to distributing child pornography to entice children into meeting him for sex, prosecutors announced.,0,2246871.story - - - - - - - - - - Beauregard teacher on trial for child pornography A Beauregard Parish teacher is on trial today facing a federal child pornography charge. Jury selection in Timothy Brannon's trial got underway this morning. Timothy Brannon is on administrative leave from his teaching job at Pine Wood Elementary School in DeRidder. The 34 year old was arrested last April after students said he inappropriately touched them. - - - - - - - - - - PA child porn fugitive caught in Canada A man who was convicted of possession of child pornography after he failed to show up on the third day of his trial was caught Monday in Canada, Pennsylvania authorities said. - - - - - - - - - - NM tipster leads to child porn arrested In Maine Police in Maine are investigating a child porn case thanks to someone in Albuquerque. Belfast police arrested Kenneth Joondeph after someone in Albuquerque mailed them photos taken from a website last month. The pictures show Joondeph engaged in a sex act with his 11 year-old son. - - - - - - - - - - Roommates tip police to child porn suspect When Kelly Mayhew and her boyfriend Martin Getz found a house to rent that was close to both their respective schools, they were thrilled -- their new roommate seemed friendly and the house was large, everything they wanted. But a few months after moving into the Fletcher Avenue house, Mayhew and Getz learned the comforts of home were overshadowed by their unsavory roommate. - - - - - - - - - - Child-porn charges leveled The owner of a Mount Vernon modeling agency has been charged with more than 200 counts of child pornography. Donald Martin, 47, owns Southern Stars Modeling Agency in Mount Vernon, said Detective Matt Bryant of the Rockcastle Sheriff's Department. He said three clients, age 11 to 13, have told the sheriff's department that pornographic pictures were taken of them. - - - - - - - - - - Child-porn offender not listed on state Web site Reason for mistake unclear, but officials say Stephen Hood has complied with all requirements. A former University of South Alabama professor convicted on a federal child pornography charge does not appear on Alabama's sex offender Web site, but state and local officials disagree about who is to blame. - - - - - - - - - - MySpace reaching out to parents The media frenzy around has struck a nerve with parents fretting about what their kids are doing online. Now the social networking site, along with other Net companies and child advocate groups, is trying to calm those parents about what their kids are doing online and what tools they have to deal with it. hires child safety czar from Microsoft - - - - - - - - - - Porn Law Goes Too Far, 11th Circuit Rules An 11th U.S. Circuit Court of Appeals panel has unanimously struck down part of a federal law prohibiting the offering or advertising of material presented as child pornography, saying the provisions were too broad and vague. - - - - - - - - - - Phishers use phone instead of net for new scam A new type of phishing scam targeting Chase Bank customers has been detected which redirects recipients to a 1800 telephone number rather than a fraudulent web site. Factor Authentication in Online Banking Web Rebates Steals Confidential Personal Information - - - - - - - - - - Tax-time scamers now go 'phish' The Internal Revenue Service has a new warning for Americans: Don't touch that e-mail. Back off the mouse. A modern con has wormed its way onto the tax-collectors' "Dirty Dozen" tax schemes for 2006 posted at - - - - - - - - - - Users urged to fix browser flaw PC users are being urged to apply software patches that close "critical" vulnerabilities in Microsoft Windows. Since coming to light in late March, the flaws have proved very popular with malicious hackers keen to steal confidential data from PCs. 'Critical' megapatch sews up 10 holes in IE Update: Microsoft releases critical Internet Explorer patch,10801,110412,00.html - - - - - - - - - - Warning over new Oracle flaw A security expert has warned that a vulnerability on Oracle Server could allow all users to read, modify, and delete data. Oracle Server flaw sparks warning Oracle releases, then pulls, zero-day database exploit code,10801,110387,00.html Cross-platform virus poses little risk Oracle's oops on security flaw - - - - - - - - - - Three New Vulnerabilities in PHP PHP is an HTML-embedded scripting language. Much of its syntax is borrowed from C with a couple of unique PHP-specific features thrown in. The goal of the language is to allow web developers to write dynamically generated pages quickly. - - - - - - - - - - Phone records for sale A dozen companies selling records of private phone calls in the U.S. have been subpoenaed by U.S. House Energy and Commerce Committee Chairman Joe Barton. The committee launched an inquiry on February 3rd into the sale of private phone records and other personal information over the Internet. - - - - - - - - - - New Zealand sites vulnerable to Google hacking Google hacking is on the rise, according to a study by graduate student Natalia Nehring and Ellen Rose, senior lecturer at the Institute of Information and Mathematical Sciences at Massey University.,10801,110392,00.html - - - - - - - - - - Watchfire Offers Web Security as a Service Betting that security applications will follow in the footsteps of CRM tools and similar technologies, Web site testing specialist Watchfire is launching a hosted version of its software.,1759,1948202,00.asp?kc=EWRSS03129TX1K0000614 How Good is Your Security Policy? Can You Recommend a Checklist for a Network Security Policy? Gemplus tempts SMEs with smart tokens - - - - - - - - - - Microsoft tool aims to stymie typosquatters Microsoft released a program on Friday to allow consumers to detect when a misspelled domain name sends them to an unwanted site and block referrals to pornographic sites. - - - - - - - - - - DOD turns to industry for the Internet it wants The Defense Department recognizes Version 6 of the Internet Protocols as central to its concept of network-centric warfare. But enabling a worldwide network to pass IPv6 packets is not enough to realize its goal. It requires applications and tools. This is the job of the World Wide Consortium for the Grid. Security agency scrutinizes secure storage - - - - - - - - - - QinetiQ to steer UK cybercrime policy group Qinetiq, the former Ministry of Defence research lab, has been given chairmanship of a UK group designed to develop government security policy. The committee, which comprises government officials, academics, and other experts, will help inform UK government policy on issues such as the introduction of biometric-based identity cards and the establishment of ecommerce projects, the FT reports. - - - - - - - - - - DJ typing style used to securely distribute music A technique used by Bletchley Park cryptographers to identify operators is being applied to distribute musical recordings to DJs securely using the internet. - - - - - - - - - - Monitoring Employee Communications in the Enterprise The rationale behind monitoring employees is that a computer at work is a corporate tool for enhancing the employee's productivity. Because some people abuse that privilege by sending personal e-mail and viewing movies during working hours, employers feel they have little choice but to monitor what their workers are doing. - - - - - - - - - - Kernel Mode Ircbot: Code and Information The world of malware and rootkits has evolved a lot over the last two years, the most significant developments have been in the sophistication of rootkits. In case the term rootkit doesn't mean much, a rootkit is basically a program that subverts the operating system, and allows the attacked to hide certain files and programs from the user. Microsoft exec warns of rootkits - - - - - - - - - - Hacking Network Printers Hack a printer you say, what kind of toner have you been smoking, Irongeek? Well, Im here to tell you, theres more that can be done with a printer to compromise network security than one might realize. - - - - - - - - - - Build your own gateway firewall Learn how to build your own gateway firewall using FreeBSD and old PC parts. The firewall will consist of the PF firewall, Snort IDS, various IPS applications, Squid proxy, and some intuitive web interfaces for auditing. - - - - - - - - - - Blogosphere suffers spam explosion Boing Boing would allow its readers to leave comments and engage in a discussion on the wildly popular blog, if it weren't for spam. - - - - - - - - - - Security report sponsorship defended This year's DTI Information Security Breaches Survey has found that the cybercrime threat is growing. But should it be sponsored by companies who sell security products? PricewaterhouseCoopers has defended vendor involvement in a major survey into T security conducted on behalf of the Department of Trade and Industry.,39020330,39262550,00.htm - - - - - - - - - - Web's role in terrorism examined Investigations into the Madrid and London bombings highlight two worrying trends for European security services--the emergence of autonomous, homegrown radical cells and their skilled exploitation of the Internet. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2006,, Campbell, CA.