Other
Commentary
8/17/2005
11:23 AM
Patricia Keefe
Patricia Keefe
Commentary
50%
50%

Bugs, Crime, And Punishment

In This Issue:
1. Editor's Note: Bugs, Crime, And Punishment
2. Today's Top Story
    - Cisco Details IOS Vulnerability Spilled At Black Hat
    - Cisco, Security Researcher Settle Dispute
3. Breaking News
    - Academics Call For Internationalizing Internet Governance
    - First Data-Disclosure Bill Sent To Full Senate
    - Reducing The Data-Theft Threat From USB Memory Sticks
    - AOL Launches Beta Version Of Personalized Home Page
    - Judge Bars Ex-Microsoft Exec From Google Job
    - Microsoft Investigates Reported Hack Of Windows Authenticity Check
    - Researcher: Hardware 'No-Execute' Zone Is No Big Security Deal
    - Yahoo Toolbar For Firefox Is Completed
    - Industry Seeks More Female Video-Game Programmers
    - Court Upholds Internet-Obscenity Ban
    - Senate Approves Sexual-Predator Registry
    - Podcast Porn Proves Popular
4. In Depth: Cellular Trends
    - ICANN Approves .mobi Domain For Cell Phones
    - Study: Hands-Free Cell Phones No Safer Than Handhelds
    - Chicago Implements Partial Cell-Phone Driving Ban
    - Few Care About Mobile Video, Survey Finds
    - Sprint, T-Mobile Subscribers Can Share Pictures, Video
5. Voice Of Authority: The Future Of Content
6. White Papers: VoIP With Dedicated DHCP
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription

Quote of the day:
"We judge ourselves by what we feel capable of doing, while others judge us by what we have already done." -- Henry Wadsworth Longfellow


1. Editor's Note: Bugs, Crime, And Punishment

Man oh man. This past week has been replete with one bug-filled, vulnerable moment after another. Vendors who weren't quashing bugs, issuing antidotes, were setting out cash or good-as-same lures to track down even more bugs. The air was virtually thick with repellent and advice even as a counterevent, the "What The Hack" conference, got under way. But the real excitement, it turns out, involved a critical vulnerability that not only wasn't fixed, but was actually made worse by the vendor involved, which in turn made matters even more difficult by attempting to censor a researcher who was trying to point out the fault in the fix. Adding to the drama is the fact that the vendor is industry heavyweight Cisco, and the affected product its routers, which just happen to provide the underpinning of much of the nation's critical infrastructure. Man oh man, all right. Especially since, as it turns out, the researcher was right.

You can read more about the politics of publicly outing bugs, and the appropriate punishment for cybercriminals--death! say some--in my blog entry.

Separately, we'd like to get your opinion about something. We're thinking about changing the delivery time of this newsletter. Right now, the newsletter gets delivered at 4 a.m. Eastern time. We're considering changing that to noon Eastern time. But we'd like to know what you think, as the readers of the newsletter. Which would you prefer? If we move the delivery to later in the day, it'll make it easier to make the newsletter up-to-the-minute up-to-date as of the moment we send it. But, on the other hand, we know that many of you like to read the newsletter first thing in the morning, as you gear up to get started on your workday. Please take this one-question quick poll and let us know what delivery time works best for you. We'd really appreciate your input.

Patricia Keefe
pkeefe@cmp.com
www.informationweek.com


2. Today's Top Story

Cisco Details IOS Vulnerability Spilled At Black Hat
Even as Cisco admitted to the problems, Symantec warned that the information shared at the conference "increases the threat of exploitation."

Cisco, Security Researcher Settle Dispute
Researcher Michael Lynn accused Cisco of suppressing information about security holes in its products and quit his job so he could get the story out.


3. Breaking News

Academics Call For Internationalizing Internet Governance
A group of American academics calls on the United States to help establish an international body responsible for running the Internet.

First Data-Disclosure Bill Sent To Full Senate
The Senate Commerce Committee moves on the identity- and data-theft protection bill put forward by its members.

Reducing The Data-Theft Threat From USB Memory Sticks
Medical staffing firm uses Sanctuary Device Control to monitor every USB port on the network and set policies on the use of USB memory sticks.

AOL Launches Beta Version Of Personalized Home Page
Consumers can use the "My AOL" feature to access America Online based on their specific interests, choosing the services and information to which they want immediate access.

Judge Bars Ex-Microsoft Exec From Google Job
The judge temporarily blocked Kai-Fu Lee from doing work at Google similar to the work he did at Microsoft, until the case brought by Microsoft can go to trial. Microsoft is asking the court to enforce a noncompete clause in Lee's employment contract.

Microsoft Investigates Reported Hack Of Windows Authenticity Check
A popular blog reports that Microsoft's online-validation process for Windows has been hacked.

Researcher: Hardware 'No-Execute' Zone Is No Big Security Deal
Both Intel and AMD have touted the notion, which essentially means setting some areas of memory as off-bounds to prevent worms and other malicious code from inserting functions into memory and executing them. But one researcher says the scheme won't stop all attacks.

Yahoo Toolbar For Firefox Is Completed
Yahoo has shifted its Toolbar for Mozilla's Firefox out of beta and into final form as it posted the add-on to its site for download.

Industry Seeks More Female Video-Game Programmers
Only around 4% of all game programmers are women, something the industry is trying to change in a bid to attract more female buyers--especially in light of the success of "The Sims" best-selling game.

Court Upholds Internet-Obscenity Ban
An appellate court said the plaintiff, a photographer specializing in pictures of sadomasochistic sexual behavior, failed to provide sufficient evidence that the 1996 Communications Decency Act was unconstitutional.

Senate Approves Sexual Predator Registry
"Dru's Law" would set up an Internet-accessible national database of sex offenders and require strict monitoring of high-risk offenders for a year after their release from prison.

Podcast Porn Proves Popular
Racy podcasts, often called "porncasts," are among the top five most popular downloads on iTunes. Steve Jobs says the company won't publish porn, but some of the material is pretty explicit. Where should Apple draw the line?

All our latest news

And in video: The News Show's John Soat has his usual offbeat take on the latest IT headlines. Watch The News Show

In Friday's episode:

John Soat and Scot Finnie On Windows Vista Fever

Chris Murphy On Students And IT

John Soat On GM And Sun

Eric Chabrow On Silicon Valley Inc.


----- The latest research, polls, and tools -----

IT Insight
From evaluating the worth of your IT qualifications to examining the role that corporate culture plays in U.S. companies, InformationWeek offers a range of online tools that are informative, confidential, and totally free.

Security Lowdown
Participate in InformationWeek's Global Information Security Survey and in return a copy of the study's research report is yours for free.

-----------------------------------------


4. In Depth: Cellular Trends

ICANN Approves .mobi Domain For Cell Phones
The move is expected to pave the way for widespread use of the Web by cell-phone users, although ICANN representatives have said they doubt .mobi Web sites will be available before 2006.

Study: Hands-Free Cell Phones No Safer Than Handhelds
Study by insurance industry group concludes that laws restricting handheld cell-phone use in cars are ineffective. It found that all types of cell-phone use contribute to accidents.

Chicago Implements Partial Cell-Phone Driving Ban
Sales of hands-free headsets are being spurred by a new law will result in $50 fines for driving with a cell phone pressed to your ear.

Few Care About Mobile Video, Survey Finds
Only one in eight respondents said they have any interest, and most phone handsets can't receive it either.

Sprint, T-Mobile Subscribers Can Share Pictures, Video
Sprint and T-Mobile said they've agreed to let each other's subscribers exchange pictures and video.


5. Voice Of Authority

The Future Of Content
There's a whole time-shifting aspect to content; people choose to see what they want to see, when they want to see it. If you want proof that we're in the midst of an on-demand revolution, check out the popularity of digital video recorders such as those sold by TiVo, as well as mail-order movie house Netflix. If you want proof that on-demand content is changing the news and entertainment business, check out InformationWeek's News Show or how much movie-rental monument Blockbuster has changed in the past year--a new perspective on late fees, plus a home-delivery service. What's next? Log on and find out, Larry Greenemeier says.


6. White Papers

VoIP With Dedicated DHCP
This paper describes how the secure and dedicated Adonis 500 DHCP appliance can manage VoIP DHCP configurations to allow automated assignment of IP addresses and parameters to VoIP devices. The side effects of mismanaging a VoIP DHCP infrastructure are discussed and an outline of how Adonis 500 DHCP appliance solves common problems is included.


7. Get More Out Of InformationWeek

Try InformationWeek's RSS Feed

Discover all InformationWeek's sites and newsletters

Recommend This Newsletter To A Friend
Do you have friends or colleagues who might enjoy this newsletter? Please forward it to them and point out the subscription page.


8. Manage Your Newsletter Subscription

You are subscribed as #emailaddr#. To unsubscribe from, subscribe to, or change your E-mail address for this newsletter, please visit the InformationWeek Subscription Center.

Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
InfoWeek@update.informationweek.com

If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.

We take your privacy very seriously. Please review our Privacy Policy.

InformationWeek Daily Newsletter
A free service of InformationWeek and the TechWeb Network.
Copyright (c) 2005 CMP Media LLC
600 Community Drive
Manhasset, N.Y. 11030

Comment  | 
Print  | 
More Insights
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest, Dec. 9, 2014
Apps will make or break the tablet as a work device, but don't shortchange critical factors related to hardware, security, peripherals, and integration.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of December 7, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program!
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.