Security News

http://news.bbc.co.uk/2/hi/technology/2514651.stm Tuesday, 26 November, 2002 Simulated attacks on key internet hubs have shown how vulnerable the worldwide network is to disruption by disaster or...

http://www.nandotimes.com/technology/story/609017p-4702120c.html By TED BRIDIS, Associated Press WASHINGTON (November 6, 2002 4:39 p.m. EST) - Experts have made an important change to the 13...

http://www.nandotimes.com/technology/story/249685p-2354258c.html By D. IAN HOPPER, AP Technology Writer WASHINGTON (February 12, 2002 2:20 p.m. EST) - From desktop computers to traffic management...

Forwarded from: Dan Verton FYI...from Ross Anderson University of Cambridge Unfortunately, the story that bin Laden hides his secret messages in pornographic images on the net appears to be too...

Forwarded by: "Jay D. Dyson" -----BEGIN PGP SIGNED MESSAGE----- Courtesy of Security Papers. - ---------- Forwarded message ---------- Date: Sat, 15 Sep 2001 17:36:36 -0600 From: aleph1 ()...

http://www.nandotimes.com/technology/story/26327p-470291c.html MONTREAL (June 13, 2001 09:48 p.m. EDT) - Witnesses told a sentencing hearing Wednesday that a 16-year-old computer hacker illegally...

http://www.computerworld.com/cwi/story/0,1199,NAV47_STO61171,00.html.html By JORIS EVERS IDG NEWS SERVICE June 07, 2001 Hackers embarrassed the European Commission this week by identifying and...

Pardon me, But since when does the definition of "shield" include the ability to attack? Let's call a spade a spade, that's a weapon, not a shield. Stuart

http://www.computerworld.com/cwi/story/0,1199,NAV47_STO53469,00.html By RICK PERERA, IDG NEWS SERVICE (November 07, 2000) BERLIN -- The Global Internet Project (GIP), a U.S.-based business group...

Forwarded by: cult hero http://www.nytimes.com/library/national/060800soviet-hacker.html Ex-Soviet Spy Takes on Internet Mission in U.S., Using Old Skills By JAMES RISEN WASHINGTON, June 7 -- In...