In This Issue:
1. Editor's Note: Bugs, Crime, And Punishment
2. Today's Top Story
- Cisco Details IOS Vulnerability Spilled At Black Hat
- Cisco, Security Researcher Settle Dispute
3. Breaking News
- Academics Call For Internationalizing Internet Governance
- First Data-Disclosure Bill Sent To Full Senate
- Reducing The Data-Theft Threat From USB Memory Sticks
- AOL Launches Beta Version Of Personalized Home Page
- Judge Bars Ex-Microsoft Exec From Google Job
- Microsoft Investigates Reported Hack Of Windows Authenticity Check
- Researcher: Hardware 'No-Execute' Zone Is No Big Security Deal
- Yahoo Toolbar For Firefox Is Completed
- Industry Seeks More Female Video-Game Programmers
- Court Upholds Internet-Obscenity Ban
- Senate Approves Sexual-Predator Registry
- Podcast Porn Proves Popular
4. In Depth: Cellular Trends
- ICANN Approves .mobi Domain For Cell Phones
- Study: Hands-Free Cell Phones No Safer Than Handhelds
- Chicago Implements Partial Cell-Phone Driving Ban
- Few Care About Mobile Video, Survey Finds
- Sprint, T-Mobile Subscribers Can Share Pictures, Video
5. Voice Of Authority: The Future Of Content
6. White Papers: VoIP With Dedicated DHCP
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription
Quote of the day:
"We judge ourselves by what we feel capable of doing, while
others judge us by what we have already done." -- Henry Wadsworth
1. Editor's Note: Bugs, Crime, And Punishment
Man oh man. This past week has been replete with one bug-filled,
vulnerable moment after another. Vendors who weren't quashing
bugs, issuing antidotes, were setting out cash or
good-as-same lures to track down even more
bugs. The air was virtually thick with repellent and advice even as a counterevent, the "What The Hack" conference, got under way.
But the real excitement, it turns out, involved a critical
vulnerability that not only wasn't fixed, but was actually made
worse by the vendor involved, which in turn made matters even
more difficult by attempting to censor a researcher who was
trying to point out the fault in
the fix. Adding to the drama is the fact that the vendor is
industry heavyweight Cisco, and the affected product its routers,
which just happen to provide the underpinning of much of the
nation's critical infrastructure. Man oh man, all right.
Especially since, as it turns out, the researcher was right.
You can read more about the politics of publicly outing bugs, and
the appropriate punishment for cybercriminals--death! say
some--in my blog entry.
Separately, we'd like to get your opinion about something. We're
thinking about changing the delivery time of this newsletter.
Right now, the newsletter gets delivered at 4 a.m. Eastern time.
We're considering changing that to noon Eastern time. But we'd
like to know what you think, as the readers of the newsletter.
Which would you prefer? If we move the delivery to later in the
day, it'll make it easier to make the newsletter up-to-the-minute
up-to-date as of the moment we send it. But, on the other hand,
we know that many of you like to read the newsletter first thing
in the morning, as you gear up to get started on your workday.
Please take this one-question quick
poll and let us know what delivery time works best for you.
We'd really appreciate your input.
Judge Bars Ex-Microsoft Exec From Google Job
The judge temporarily blocked Kai-Fu Lee from doing work at
Google similar to the work he did at Microsoft, until the case
brought by Microsoft can go to trial. Microsoft is asking the
court to enforce a noncompete clause in Lee's employment contract.
Researcher: Hardware 'No-Execute' Zone Is No Big Security Deal
Both Intel and AMD have touted the notion, which essentially
means setting some areas of memory as off-bounds to prevent worms
and other malicious code from inserting functions into memory and
executing them. But one researcher says the scheme won't stop all attacks.
Industry Seeks More Female Video-Game Programmers
Only around 4% of all game programmers are women, something the
industry is trying to change in a bid to attract more female
buyers--especially in light of the success of "The Sims"
Court Upholds Internet-Obscenity Ban
An appellate court said the plaintiff, a photographer
specializing in pictures of sadomasochistic sexual behavior,
failed to provide sufficient evidence that the 1996
Communications Decency Act was unconstitutional.
Senate Approves Sexual Predator Registry
"Dru's Law" would set up an Internet-accessible national database
of sex offenders and require strict monitoring of high-risk
offenders for a year after their release from prison.
Podcast Porn Proves Popular
Racy podcasts, often called "porncasts," are among the top five
most popular downloads on iTunes. Steve Jobs says the company
won't publish porn, but some of the material is pretty explicit.
Where should Apple draw the line?
From evaluating the worth of your IT qualifications to examining
the role that corporate culture plays in U.S. companies,
InformationWeek offers a range of online tools that are
informative, confidential, and totally free.
There's a whole time-shifting aspect to content; people choose to
see what they want to see, when they want to see it. If you want
proof that we're in the midst of an on-demand revolution, check
out the popularity of digital video recorders such as those sold
by TiVo, as well as mail-order movie house Netflix. If you want
proof that on-demand content is changing the news and
entertainment business, check out InformationWeek's News Show or
how much movie-rental monument Blockbuster has changed in the
past year--a new perspective on late fees, plus a home-delivery
service. What's next? Log on and find out, Larry Greenemeier says.
This paper describes how the secure and dedicated Adonis 500 DHCP
appliance can manage VoIP DHCP configurations to allow automated
assignment of IP addresses and parameters to VoIP devices. The
side effects of mismanaging a VoIP DHCP infrastructure are
discussed and an outline of how Adonis 500 DHCP appliance solves
common problems is included.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.