All things being relative, this is a government contract/project, so I guess we should feel lucky it wasn't open port 23 telnet with a null password. Therefore, they'll probably get a reward for using that newfangled SSH encryption stuff (circa 1995, but who's keeping score?)
The kind that does not allow WiFi for security reasons.
gbulmash writes "In its eagerness to clear sex offenders off its site and publish their identities, MySpace identified an innocent woman as a sex offender. She shares a name and birth month with a sex offender who lives in a neighboring state and that was apparently enough to get MySpace to wrongly brand her and completely ignore her protests."
TheSHAD0W writes "A friend of mine was working as a consultant for a power company in Michigan. Awakened early this morning on an emergency call, unable to log on remotely to fix their emergency response software, he asked whether he needed to "smack one of those guys in the head at network security". He was fired for that remark."
Ant writes "This Wired News column reports Bruce Schneier's analysis the data from a successful phishing attack on MySpace and compares the captured user-passwords to an earlier data-set from a corporation. He concludes that MySpace users are better at coming up with good passwords than corporate drones. The article is a great state-of-the-password address, with lots of fun nuggets like "We used to quip that 'password' is the most common password. Now it's 'password1.' Who said users haven't learned anything about security?"
Seen on Boing Boing."
mattnyc99 writes "Popular Mechanics has a new list of wide-ranging technology terms it claims will be big in '07. From PRAM to BAN and SmartPills to data clouds, it's a pretty nice summary of upcoming and in-the-works trends across the board (with a podcast embedded). But what's missing? How reliable is the magazine's short-term impact meter for each must-learn term? How do their predictions from a year ago stack up now?"