For those that remember dotcom hysteria, it is a little unnerving to hear the NSW Science Minister Frank Sartor pining for a return to those halcyon days with the growth of Biotech, excitedly saying: “The bio industries will [dominate] in the near future and will make the IT industry look trivial.” Scary!

Which large Telco just settled out of court on two court cases dealing with bullying within its management ranks? These Mobster-style tactics might ensure projects are delivered, but which general ledger code is used to post the $100K it cost to meet deadlines?


So far, SuSE Linux AG isn’t losing any sleep over a legal battle brewing between IBM and the SCO Group, which has accused the US hardware and software company of, among other things, copying Unix source code into the open-source Linux operating system. But SCO, which owns the copyright to Unix, has been losing money and could surprise the Nuremberg, Germany, Linux distributor with an unexpected wake-up call.

“SuSE and its customers have nothing to worry about because the company has a contractual agreement with SCO within the framework of the United Linux initiative,” said Christian Egle, a spokesman at SuSE. “Although we have agreed to keep details of the contract confidential, we can say with assurance that neither SuSE nor its customers need to be concerned about facing any demands from SCO. That’s how we read the contract.” Whether SCO reads the text the same way remains to be seen. To date, SCO’s legal action is concentrated on a $US1 billion lawsuit alleging that IBM misappropriated Unix trade secrets by copying code into Linux. IBM has denied any wrongdoing.


A man reputed to be the leader of an international hacking ring that attacked the Web sites of the world’s biggest IT security companies worked in the UK offices of Siemens Communications, according to a statement released by the company. Lynn Htun aka Fluffy Bunny was arrested by UK Metropolitan Police when they recognised him on a stand at the InfoSec computer security show in London. Fluffy Bunny hacking targets included the SANS Institute and leaving a picture of a stuffed pink rabbit as the calling card. Siemens could not say whether Htun’s job involved on-site work, but said that Siemens had reviewed both its own and its customers’ systems that Htun had access to without finding evidence of tampering.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about Attrition.orgIBM AustraliaSANS InstituteSiemensSuseThe SANS InstituteThe SCO Group

Show Comments