Self-wiping hard drives from Toshiba

Toshiba announces a family of self-encrypting hard disk drives (HDDs) engineered to automatically invalidate protected data when connected to an unknown host.

The new Toshiba Self-Encrypting Drive (SED) models enable OEMs to configure different data invalidation options that align with various end-user scenarios — via redwolf.newsvine.com

FTP is 40 years old

The backbone of the Internet, FTP (file transfer protocol), celebrates its 40th birthday tomorrow. Originally launched as the RFC 114 specification, which was published on 16 April 1971, FTP is arguably even more important today than when it was born — via redwolf.newsvine.com

DRM Accused Of Sending Personal Info To Help With Licensing Shakedown

DRM. Is there nothing evil it can’t do? Between installing rootkits and propping open back doors, DRM is a copyright enforcer’s best friend. Miguel Pimentel, a Boston-area architect, believes he’s stumbled across its latest trick: extracting $150,000 from your wallet via a quick unannounced “phone home” to the nearest copyright cop.

Ima Fish directs our attention to the class action lawsuit, filed March 30, 2011, which alleges that Transmagic’s 3-D software came prepackaged with phone home DRM that gathered personal user information and passed it on to their copyright enforcement consultants, ITCA (IT Compliance Association). This information (including name, company name and phone number) was used by ITCA in an attempt to extract $10,000+ per year in licensing and maintenance fees — via redwolf.newsvine.com

FBI charges 11 internet poker kingpins

Australian internet whiz Daniel Tzvetkoff, who has become a prized FBI informant in a bid to avoid a 75 year jail sentence in the US, may have brought down the multi-billion dollar American online poker industry.

The FBI announced on Friday it had charged 11 people, including the founders of three of the largest internet poker companies in the US, with bank fraud, money laundering and illegal gambling offences.

The three poker sites – PokerStars, Full Tilt Poker and Absolute Poker – have been shut down — via redwolf.newsvine.com

WordPress hacked in root-level attack

Hackers appear to have stolen source code in a root-level attack on WordPress that could compromise its VIP clients including NASA, the BBC and the New York Times.

Attackers compromised Automattic, the company that maintains the popular WordPress publishing platform, and broke into to several servers, gaining access to “potentially anything on those servers”, according to the company.

WordPress founder Matt Mullenweg said in a statement that it was unlikely that access details were stolen — via redwolf.newsvine.com

Fujitsu plans 1Gbps fiber optic network for rural Britain

Economies of scale mean that densely populated cities have generally been the ones to benefit from the roll out of superfast broadband networks, while those in rural areas have missed out. Following Google’s recent announcement that it will build and test 1Gbps fiber-to-the-home (FTTH) networks in selected cities with between 50,000 to 500,000 residents in the U.S. starting with Kansas City, Kansas, Fujitsu has unveiled plans to create a similar superfast FTTH broadband network for five million homes and businesses in rural Britain to bridge the digital divide between city and country — via redwolf.newsvine.com

US shuts down massive cyber crime ring

US authorities claimed one of their biggest victories against cyber crime as they shut down a ring they said used malicious software to take control of more than two million PCs around the world, and may have led to theft of more than $US100 million.

A computer virus, dubbed Coreflood, infected more than two million PCs, enslaving them into a “botnet” that grabbed banking credentials and other sensitive data its masters used to steal funds via fraudulent banking and wire transactions, the U.S. Department of Justice said.

The government shuttered that botnet, which had operated for a decade, by seizing hard drives used to run it after a federal court in Connecticut gave the go-ahead — via redwolf.newsvine.com

Aussie data breaches doubled in 2011

The number of Australian data breaches reported to forensic investigators has already doubled those experienced in 2010, even though it’s only experienced in 2010, even though it’s only April.

Some of the worst breaches have cost businesses many hundreds of thousands of dollars, and involved significant loss of credit card information and customer information.

Yet it seems that none of the breaches handled by forensic investigators Verizon and Klein&Co have been reported by the media. — via redwolf.newsvine.com

Is Your Computer Listed ‘For Rent’?

When it’s time to book a vacation or a quick getaway, many of us turn to travel reservation sites like Expedia, Travelocity and other comparison services. But there’s a cybercrime-friendly booking service that is not well-known. When cyber crooks want to get away — with a crime — increasingly they are turning to underground online booking services that make it easy for crooks to rent hacked PCs that can help them ply their trade anonymously — via redwolf.newsvine.com

Legal disclaimers: Spare us the e-mail yada-yada

E-mail disclaimers are one of the minor nuisances of modern office life, along with fire drills, annual appraisals and colleagues who keep sneezing loudly. Just think of all the extra waste paper generated when messages containing such waffle are printed. They are assumed to be a wise precaution. But they are mostly, legally speaking, pointless. Lawyers and experts on internet policy say no court case has ever turned on the presence or absence of such an automatic e-mail footer in America, the most litigious of rich countries — via redwolf.newsvine.com

Ransomware squeezes users with bogus Windows activation demand

A new Trojan tries to extort money from users by convincing them to dial international telephone numbers to reactive Windows, a security researcher said today.

Once on a PC, the malware displays a message claiming that Windows is locked and must be reactivated, said Mikko Hypponen, the chief research officer of Helsinki-based F-Secure. Users seeing the message cannot boot Windows in either normal or Safe mode, Hypponen said.

This copy of Windows is locked. You may be a victim of fraud or there may be an internal error, the message states — via redwolf.newsvine.com

UK police arrest three men over ‘SpyEye’ malware

UK police arrested three men late last week in connection with using the SpyEye malware program to steal online banking details.

Two of the men were charged on Friday and appeared in Westminster Magistrates Court in London on Saturday. Pavel Cyganoc, 26, a Lithuanian living in Birmingham, England, was charged with conspiracy to cause unauthorized modifications to computers, conspiracy to defraud and concealing proceeds from crime. Aldis Krummins, 45, a Latvian living in Goole, England, was charged with conspiracy to defraud and concealing proceeds of crime.

A third man, a 26-year-old whose nationality was not revealed, was released on police bail but must return for further questioning in August, police said — via redwolf.newsvine.com

Inside CERT Australia

The Australian Government has a list of software holes that are so sensitive they’re kept hidden from the public. These weaknesses are being used by criminals to steal our money and our data. They may even be a cornerstone to planned attacks on critical infrastructure, like energy, water and transport. But in the murky battle between those that protect us and those who seek to harm, these vulnerabilities are also the bait with which cyber-criminals are caught — via redwolf.newsvine.com

Russian spy agency complains about Gmail, Skype

Russia’s domestic security service called for access to encrypted communication providers like Gmail, Hotmail and Skype on Friday, saying the uncontrolled use of such services could threaten national security.

The proposal by the main successor to the Soviet-era KGB secret police raised concerns some senior Russian officials would like to limit Internet access to stave off any potential protests ahead of the 2012 presidential election — via redwolf.newsvine.com

Ceop website form ‘could have put children at risk’

An investigation is under way after a web page – set up to protect children online – was found to be insecure.

A member of the public found a form on the Child Exploitation and Online Protection Centre’s website – to report alleged offenders – was unencrypted.

Security experts have described the breach of data as a serious error which could have put children at risk — via redwolf.newsvine.com

Google, DOJ sign deal to approve ITA acquisition

Google has won regulatory approval for its $700 million deal to buy ITA Software, but the Justice Department intends to keep a close eye on the search giant.

The proposed settlement, which still must be approved by a federal judge, requires Google to continue licensing ITA’s travel technology to rivals for five years on reasonable and nondiscriminatory terms. Some of those rivals, such as Kayak and Hotwire, formed FairSearch.org to oppose the deal — via redwolf.newsvine.com

Managing Cron Jobs with PHP

The cronTab, or Cron Table, is a Linux system process / daemon which facilitates the scheduling of repetitive tasks thereby easing up our day to day routine. In this tutorial, we’ll create a dynamic PHP class that, using a secure connection, provides us with a means to manipulate the cronTab — via Nettuts+

Social Network Tools Have Two Edges

Officer Trey Economidy of the Albuquerque police now realizes that he should have thought harder before listing his occupation on his Facebook profile as human waste disposal.

After he was involved in a fatal on-duty shooting in February, a local television station dug up the Facebook page. Officer Economidy was placed on desk duty, and last month the Albuquerque Police Department announced a new policy to govern officers’ use of social networking sites.

Social networking tools like Facebook and Twitter can be valuable assets for law enforcement agencies, helping them alert the public, seek information about crimes and gather evidence about the backgrounds of criminal suspects. But the Internet can also get police departments into trouble — via redwolf.newsvine.com