"A computer hacker gained access to internal admissions records at Harvard, Stanford and other top business schools, then helped applicants log on and learn their fate weeks ahead of schedule, officials said Thursday."
Despite recent denials, it has been revealed that ChoicePoint was indeed victim to identity thieves earlier than had been previously reported.
I'm sure everyone's read of M$ latest security blunder relating to it's media player, but I particularly like David Coursey's stance. He says, "By focusing not on the largest number of potential victims but on patching its most current software, Microsoft reveals its tendency to "encourage" customers to buy new software by letting them sway in the breeze for a while."
The Seattle Times is running an interesting piece on a new trend of targetting children and young adults by identity thieves. They contend it's because so many years may pass before it's discovered.
"Multiple vulnerabilities in two popular open-source projects-phpMyAdmin and phpBB-could put users at risk of cross-site scripting and information disclosure attacks, security researchers warned Thursday."
"The FBI warned Tuesday that a computer virus is being spread through unsolicited e-mails that purport to come from the FBI."
"ChoicePoint, under fire for being duped into allowing criminals to access its massive database of personal information, said yesterday that consumers in all 50 states, the District of Columbia and three U.S. territories may have been affected by the breach of the company's credentialing process."
"The way you type is as unique as your eye color or speech patterns and can be used instead of a password to protect your computer, researchers at Louisiana Tech and Penn State say."
Battles continue today in the M$ security war. Yesterday news began circulating that M$ Windows2003 server was found to be more secure than Redhat Enterprise. I'm skeptical until details of the study are released, as apparently they used the criteria of
"Erik Sjölund has reported some vulnerabilities in KDE, which can be exploited by malicious, local users to gain escalated privileges and potentially by malicious people to compromise a vulnerable system."