Browsing Archive: April, 2009

Report: Facebook to open up to developers

Posted by Saumil on Monday, April 27, 2009,

Facebook plans to announce at a developer event Monday that it will open up user-contributed information to third-party developers, according to a report Sunday in The Wall Street Journal.

The move would allow developers to build applications and services that--with users' permission--access user videos, photos, notes, and comments. The move would be a significant change for the social-networking site, which had previously retained tight control over the site and how developers interact with...


Continue reading ...
 

British Council Violated Data Protection Act, Says Information Commissioner's Office

Posted by Saumil on Wednesday, April 22, 2009, In : Infosec 
The UK Information Commissioner's Office says that the British Council's loss of an unencrypted disk containing personally identifiable information constitutes a breach of the Data Protection Act. The disk holds sensitive data belonging to more than 2,000 staff members. The breach was reported to the ICO promptly; the ICO has required the British Council to officially agree to a number of security measures to guard against future data loss. Among those measures are ensuring that all portable ...
Continue reading ...
 

Spies Penetrate Pentagon's Joint Fighter-Jet Project

Posted by Saumil on Wednesday, April 22, 2009, In : Infosec 
Cyber spies have stolen tens of terabytes of design data on the US's most expensive costliest weapons system -- the $300 billion Joint Strike Fighter project. Similar breaches have been found in the Air Force's Air Traffic Control System. The attacks began as far back as 2007 and continued into 2008. The spies encrypted the data that they stole, making it difficult for investigators to know exactly what data was taken. The fact that fighter data was lost to cyber spies was first disclosed by ...
Continue reading ...
 

Microsoft 10 Immutable Laws of Security

Posted by Saumil on Saturday, April 11, 2009, In : Infosec 

Microsoft technet has an article listing ten immutable laws of security according to Microsoft. I personally agree with these laws which are:

  • Law #1: If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore
  • Law #2: If a bad guy can alter the operating system on your computer, it’s not your computer anymore
  • Law #3: If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore
  • Law #4: If you allow a bad guy to upload p...

Continue reading ...
 
 
Make a Free Website with Yola.