SaferPC.info

Security News and Issues

Each day owning a computer and maintaining it online becomes more of a challenge. Security is a major concern to computer users. SaferPC brings you Security News and Issues of interest to security conscious PC users.

     
 Title   Date   Author   Host 

Burglar Steals Customer Records From Wells Fargo Branch
NBC
November 21, 2003

Wells Fargo Offers Reward

Wells Fargo & Company is offering a reward of $100,000 for information that can help police track down a burglar who stole customer records from one of its Concord bank branches earlier this month.

Human testing for Ebola vaccine
BBC News
November 19, 2003

Testing has begun on humans for an experimental vaccine against the deadly Ebola virus, US researchers have said.

The National Institute of Allergy and Infectious Diseases is administering the vaccine to 27 volunteers.<br><br>The virus for one of the world's most lethal diseases originated in Africa and the US has expressed fears that it could be used as a biological weapon.

Stop Carnivore Now
Stop Carnivore.org
by Lance Brown
September 5, 2003

Federal wiretapping has gone too far.

The biggest threat would be the FBI's new ability to mandate Internet law. One of the great powers of the Internet is the fact that it exists beyond the control of any one person or agency. Almost all efforts to introduce Internet legislation has either been defeated or postponed, usually because enforcement is found to be impractical. Also, any activity that the U.S. might try to prohibit can still be conducted in another country with different laws, and, through the Internet, can still be accessed by Americans. <a href="http://stopcarnivore.org/what_can_carnivore_do.htm" target="_blank" title="What is Carnivore capable of-">More...</a>

The Hitler Test
lewrockwell.com
by Butler Shaffer
August 22, 2003

In previous years, and on the first day of class, I have given my new students a ballot, indicating that "it is time to elect the leader of a great nation," and offering them two candidates, A and B.

Candidate A is identified as "a well-known critic of government, this man has been involved in tax protest movements, and has openly advocated secession, armed rebellion against the existing national government, and even the overthrow of that government. He is a known member of a militia group that was involved in a shoot-out with law enforcement authorities. He opposes gun control efforts of the present national government, as well as restrictions on open immigration into this country. He is a businessman who has earned his fortune from such businesses as alcohol, tobacco, retailing, and smuggling."

Bad Raps for Non-Hacks
securityfocus.com
by Mark Rasch
June 16, 2003

A few odd cases show that you don't have be a digital desparado to be accused of a cybercrime... particularly if you embarrass the wrong bureaucrats.

Some recent (and not so recent) cases illustrate how computer security professionals and well intentioned whistle-blowers face a genuine risk of running afoul of computer crime statutes simply for forgetting to ask the right person, "May I'," before doing a computer security assessment. Take the case of Scott Moulten, a computer security professional in Georgia. He was the principal person responsible for computer security (through a private company) for a county in Georgia. The county worked with various cities coordinating and providing 911 Emergency Response Services. When one city wanted to hook up to the county's 911 network, Moulten performed a port scan and throughput test on that city's network to see if the computers were vulnerable to exploit.

A Guide to Surviving as a Juror
counterpunch.org
by Clay S. Conrad
February 5, 2003

Government has a boundless appetite to inflict senseless pain on Americans, in the guise of the war on drugs, even at the cost of degrading Federalism and the needs and values of the American people. A recent case demonstrates this arrogance handily.

Ed Rosenthal was a medical marijuana supplier who, in compliance with the California Compassionate Use Act, had been growing marijuana for seriously ill people under a doctor's advice and care. Rosenthal was arrested in February, 2002 and accused of supplying marijuana to the Harm Reduction Center in San Francisco. Rosenthal had been deputized by the city of Oakland, California and made the official supplier of a city-sponsored medical marijuana dispensary. The Compassionate Use Act passed with 78 percent of the vote in San Francisco. It took a total of eighty jurors to find twelve willing to convict Rosenthal. Most of those summoned for jury duty said they would not be willing to brand someone a felon for growing or distributing medical marijuana...

Child porn swoop nets 90 police
theguardian.com
by Martin Bright and Paul Harris
October 19, 2002

Hundreds of child welfare professionals, including police officers, care workers and teachers, have been identified as 'extremely high-risk' paedophiles by an investigation into internet porn.

The discovery came after US authorities passed on more than 7,000 names of UK subscribers to an American-based child porn website. When police examined a sample of the most dedicated users, they discovered that many worked with children. Investigators knew paedophiles targeted jobs which brought them into contact with children, but were shocked by how many British suspects had been undetected by the usual checks. The discovery that many were working in jobs of the highest sensitivity will send shock waves through the child protection world and lead to calls for even more stringent safeguards.

Remember Ruby Ridge
cato.org
by Tim Lynch
August 21, 2002

"Ruby Ridge" used to refer to a geographical location in the state of Idaho, but after an incident that took place there 10 years ago on Aug. 21, the phrase has come to refer to a scandalous series of events that opened the eyes of many people to the inner workings of the federal government, including the vaunted Federal Bureau of Investigation. Now that 10 years have passed, the feds will accelerate their ongoing effort to "move forward" and have the scandal declared "ancient history." But the Ruby Ridge episode should not be soon forgotten.

Year of the Worm
CNet
by Robert Lemos
March 15, 2001

Software worms have become the weapons of choice for vandals to spread their latest creations, surpassing all malicious-code predecessors in popularity.

Four hours. That's how long it took for a glamorous tennis player to become the talk of the Net, for countless companies to shut down their e-mail gateways, and for a new virus to spread across the Atlantic.

FDA's new regulations won't allow non-GMO, GMO-free label
non-gmoreport.com
March 2, 2001

New regulations propose strict guidelines for voluntary labeling of non-GMO productsIn mid-January, the US FDA announced new regulations requiring biotech companies to consult with the FDA at least 120 days before marketing new GM foods.

Previously, such consultations were voluntary. Biotech companies must provide health safety data about the new GM foods to the FDA, and the agency said it would make this information available on the Internet. While biotechnology and food industry representatives praised the new regulations, consumer and environmental groups criticized them, saying they didn't go far enough, particularly in terms of labeling GM foods. The FDA rejected consumer demands for labeling.

     

Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Shawn K. Hall © 2003-2019 Powered by 12 Point Design
Professional Web Hosting and Design Services: 12 Point DesignAt Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling painReliable Answers - developer information, current news, human interest and legislative newsLocal Homeschool provides the most up-to-date support group listings in a geographical and searchable indexTwain Harte, CA - The closest you can get to Heaven on EarthSaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security
Google

AddThis Social Bookmark Button