Stories by Ann Harrison

Security Firm Warns of Red Hat Piranha 'Back Door'

Internet Security Systems (ISS) says it has identified a backdoor password in the Red Hat Linux Piranha product that could allow an attacker to compromise a Web server and deface and destroy a Web site.

Analysts: Mafiaboy only Amateur Copycat

The Canadian teen-ager known as Mafiaboy who was arrested last week in connection with an attack against the CNN Web site is an amateur who simply copied tactics used by far more sophisticated attackers who may never be caught, security analysts said.

FBI Investigating Missing State Department Laptop

The U.S. State Department said this week that the U.S. Federal Bureau of Investigation is leading an investigation into the disappearance two months ago of a State Department laptop computer that might have contained classified information. A department spokeswoman could not confirm whether any sensitive data that might have been stored on the missing laptop was encrypted.

Network Cracks Mobile Encryption System

After four months of number-crunching, a large, distributed network of computers worldwide has cracked an encryption method that will likely secure the next generation of wireless phones and other devices. The unprecedented effort revealed the strength of the encryption system but also highlighted some potential weaknesses.

Mafiaboy Attacks Could Have Been Stopped

The Canadian teen-ager known as Mafiaboy, who was arrested this week in connection with an attack against the CNN Web site in February, is an amateur who simply copied tactics used by far more sophisticated attackers who may never be caught, security analysts say.

Mafiaboy Not the Big Fish in DoS Attacks

The Canadian teenager known as Mafiaboy, who was arrested this week in connection with an attack against the CNN Web site in February, is an amateur who simply copied tactics used by far more sophisticated attackers who may never be caught, security analysts say.

Microsoft Backs P3P Net Privacy Standard

The chief privacy officer at Microsoft Corp. said last week that the company plans to release free software tools that could spur the adoption of Internet privacy standards.

Intel Announces Common Data Security Architecture

Intel Corp. in Santa Clara, Calif., yesterday said it plans to offer via free download an open-source version of its software based on the Common Data Security Architecture (CDSA). The move is intended to encourage use of the software by letting software developers review the code for possible flaws and to give Linux users a common security architecture.

Web Outpaces Crypto Rules

The growth of e-commerce and the corresponding need for privacy and security are eclipsing government attempts to curb strong encryption worldwide, according to a study released this week by the Washington-based Electronic Privacy Information Center (EPIC).

Study: E-Commerce Spread Defeating Crypto Regs

Attempts by governments to curb the worldwide use of strong encryption are being eclipsed by the growth of electronic commerce and the corresponding need for privacy and Internet security, according to a study released by the Washington-based Electronic Privacy Information Center (EPIC).

Privacy Advocates Hail Crypto Ruling

A U.S. Appeals Court judge ruled this week that encryption source code is constitutionally protected speech and not subject to prior restrictions imposed by the U.S. Export Administration. The U.S. government had limited its distribution until January of this year. The decision could have far-reaching implications for other pending cases concerning the freedom to distribute controversial software.

Cyber Patrol Case Tests Reverse-Engineered Apps

A federal ruling on a collection of programs that decoded Cyber Patrol filtering software is raising questions about the power of U.S. courts to force the removal of information from Web sites. The case could also have implications for the reverse-engineering of commercial software and attempts by companies to halt the practice, which they say damages the marketability of their products.

Cyber Patrol Raises Reverse Engineering Issues

A federal ruling on the use of Internet blocking software is raising questions about the power of U.S. courts to force the removal of information from Web sites. The case, which involves Cyber Patrol, could also have implications for the reverse engineering of commercial software and attempts by companies to halt the practice, which they say damages the marketability of their products.

Consumers Worried by Smart Card Forging

French smart-card users were in an uproar this week after officials at French interbank group Groupement des Cartes Bancaires in Paris revealed that a known algorithm could be used to create forged cards for certain transactions.

Cost of Cyberattacks Rises Sharply

Cyberattacks cost U.S. organizations US$266 million last year -- more than double the average annual losses for the previous three years, according to a newly published report.