Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security

Should Companies Share Criminal Blame In ID Theft? 328

snydeq writes "Deep End's Paul Venezia criticizes the lack of criminal charges for corporate negligence in data breaches in the wake of last week's Best Western breach, which exposed the personal data of 8 million customers. 'The responsibilities attached to retaining sensitive personal identity information should include criminal charges against the company responsible for a leak, in addition to the party that receives the information,' Venezia writes. 'Until the penalties for giving away sensitive information in this manner include heavy fines and possibly even jail time for those responsible for securing that information, we'll see this problem occur again and again.' As data security lawyer Thomas J. Smedinghoff writes, data security law is already shifting the blame for data breaches onto IT, thanks to an emerging framework of complex regulations that could result in grave legal consequences should your organization suffer a breach. To date, however, IT's duty to provide security and its duty to disclose data breaches does not include criminal prosecution. Yet, with much of the data security framework being shaped by 'IT negligence' court cases over 'reasonable' security, that could very well be put to the test some day in court." It's a slippery slope to be sure, but where should the buck stop?
Security

Are IT Security Professionals Less Happy? 363

zentanu writes "It's said that if you want to be happy, be a gardener. What about IT security professionals? Having worked as an IT security consultant for several years, I now wonder if my job has a negative influence on my happiness, because it constantly teaches me to focus on the negative side of life: I always have to think about risks and identify all sorts of things that could go wrong. As an auditor I search for errors that others have made and haughtily tell them. As a penetration tester I break systems that system engineers and administrators have laboriously built. I assume inside threats and have to be professionally suspicious. The security mindset surely helps me in my job, but is it good for me on the long run? What kind of influence has being an IT security professional had on your general attitude towards life? What helps you stay out of pessimism and cynicism? Is protecting existing things really as good as building new ones?"
The Internet

Telecom Rollouts Raise Ire Over Utility Boxes 284

Anti-Globalism points out this AP story, which notes: "As cable and phone companies race to upgrade services or offer video for the first time, they're doing it by installing equipment in boxes on lawns, easements and curbs all over American neighborhoods. Telecommunications rollouts have always been messy, but several towns and residents are fighting back with cries of 'Not in my front yard!' AT&T Inc.'s nearly fridge-sized units, which route its new U-verse video product to customers, are drawing particular ire. A few caught fire or even exploded. AT&T said it has fixed that by replacing the units' backup batteries."
Graphics

Microsoft Releases Photosynth 247

Spy Hunter writes "Photosynth has graduated from a 'tech preview' to a complete service. Now you can upload your own photos and have them automatically transformed into a 'synth': a 3D fly-through reconstruction of your home, your vacation, or anything else you can take pictures of. Learn more about Photosynth at the official blog, see what Walt Mossberg has to say about it, or just go try it out right now." According to Mossberg, Photosynth works on PCs using IE or Firefox, but not yet on Macs. We've been discussing Photosynth since its introduction.
Security

Shrinky Dinks As a Threat To National Security 257

InflammatoryHeadlineGuy writes "What do Shrinky Dinks, credit cards and paperclips have in common? They can all be used to duplicate the keys to Medeco 'high-security' locks that protect the White House, the Pentagon, embassies, and many other sensitive locations. The attack was demonstrated at Defcon by Marc Weber Tobias and involves getting a picture of the key, then printing it out and cutting plastic to match — both credit cards and Shrinky Dinks plastic are recommended. The paperclip then pushes aside a slider deep in the keyway, while the plastic cut-out lifts the pins. They were able to open an example lock in about six seconds. The only solution seems to be to ensure that your security systems are layered, so that attackers are stopped by other means even if they manage to duplicate your keys."
Communications

Google Has All My Data – How Do I Back It Up? 215

shadeshope writes "Slowly but surely Google has taken over my computing life. How can I back it up? Bit by bit with their mantra, hip image and brilliant services, Google has gained my trust and all my data. I am doing almost all of my computing in the cloud. Google Reader, Calender, Email, Docs and Notes have become my tools of choice; even to the point where my day book, research notes, etc., are all on Google's servers. It was just so easy, enabling me to effortlessly work from multiple computers, operating systems and locations. I know, I know, this is foolish — all my eggs are firmly in one basket. It has crept up on me. As a long-time computer user and committed pessimist, I have used many schemes over the years to ensure my data is safe. Now I have ceded all control to Google. How can I regain some control and back this all up? Is there a one-touch solution that will take all my data from the various online apps and archive it on my home server?"

Slashdot Top Deals

If all else fails, lower your standards.

Working...