In This Issue: 1. Editor's Note: Hacking: A Few Cautionary Tales 2. Today's Top Story - Users Report Glitches With Microsoft's Flash Patch Related Story: - Microsoft Updates Outlook, OneNote 3. Breaking News - xDoc Challenges Adobe Across Platforms - IBM Unveils New 4-Gbps Fibre Channel Arrays - Microsoft Powers Gas Pump Of The Future - $3.6M Euro Project Targets Integrated Wireless Nets - Brief: HP Unveils 5 Business Notebooks - IBM Adds Features To BladeCenter For SMBs - Microsoft, Gates Pitch 'Anywhere' Games - Sage CEO: Intuit Is Our Top Rival—Not Microsoft, Oracle, SAP - How To: Building The Extreme Home Office - Brief: YouTube Launches Video Upload 4. Grab Bag - You Say You Want An Evolution? Try Your Hand At 'Spore' (USA Today) - R&D Offshoring: Is It Working? (BusinessWeek) - 5 Startups Out To Change The World (Business 2.0) 5. In Depth - Hackers Expected To Target Exchange - British Computer Hacker Set For U.S. Extradition - Hacker's Work Plagues PCs Two Years After Arrest - Xbox Pirates Plead Guilty 6. Voice Of Authority - Warner Bros. Makes Deals With Devils 7. White Papers - Global Key Management For Storage Security Encryption 8. Get More Out Of InformationWeek 9. Manage Your Newsletter Subscription
Quote of the day: "When men are pure, laws are useless; when men are corrupt, laws are broken." -- Benjamin Disraeli
The hacker, Eric McCarty, had good intentions, but went about proving his concerns the wrong way. Sorry, but however good his motivations were, he had no right to break into the university's computer system and expose the personal data there to potential abuse or error.
The university, which should want to know about vulnerabilities in its computer systems and indeed should be actively testing its own software to find any that exists, seems not to appreciate the potential embarrassment and loss McCarty probably saved it from. At the rate universities today are finding themselves embroiled in one brainless security breach after another, let's hope USC uses the McCarty test as motivation for redoubling its own efforts to ferret out any weaknesses in its system and get them fixed. In fact, more companies should be actively trying to break their own systems. Is it really wise to wait until some bad guy does?
And it has become clear that the security and white-hat community needs to update or expand an online document known as RFPolicy, which unofficially lays out the proper process for researchers to communicate to software developers and vendors any bugs found in the developer's software. This policy doesn't address the issue of Web-based applications that exist on other people's servers. Hopefully that fact, along with the growing importance and reach of Web-based applications, will spur discussion, debate, and some suggestions for how to move forward in that environment with well-meaning security research.
Yet another cautionary tale—this time for the courts—is provided by two more stories about hackers this week. A third is a good example of the courts moving in the right direction. You can read more by going to my blog entry here.
$3.6M Euro Project Targets Integrated Wireless Nets The Imperial College of London has teamed up with Intel, Lucent Technologies, and Telefonica, among others, in an effort to produce a prototype for an integrated set of antennae and wireless networking technologies by June 2008.
How To: Building The Extreme Home Office Selecting and installing the best products and technologies for the home office can be challenging. To help in that quest, Digital Connect Lab engineers set out to build the best—and most cost-effective—home office infrastructure. See what they came up with.
Brief: YouTube Launches Video Upload Service Members can send video content via E-mail to YouTube, where it's published to their profile. YouTube supports uploads from Cingular, Sprint, T-Mobile, and Verizon wireless networks.
----- The latest research, polls, and tools ----- Hackers, Viruses, Spyware—What's Next? How do your company's security experiences compare to its peers? Take InformationWeek's Global Information Security Survey and find out. Your completed survey also enters you into this year's prize drawing—worth in total $2,000!
Subscribe To Your Favorite Authors Are you a fan of Fred Langa? Are there other InformationWeek authors you view as must-reads? Then check out our authors directory. Each author has his or her own page and RSS feed. -----------------------------------------
Hackers Expected To Target Exchange Security experts are warning users to brace themselves for the imminent arrival of a worm that could wreak havoc with Microsoft Exchange, thanks to a bug in the program.
British Computer Hacker Set For U.S. Extradition A British court has ruled that Gary McKinnon, accused of hacking into American military computers, should be tried in the United States. If found guilty there, he could face up to 70 years in prison and fines of up to $1.75 million.
Hacker's Work Plagues PCs Two Years After Arrest Named the worst worm of 2004 by some antivirus firms, the Netsky worm is still the No. 1 reported virus in the world, according to Sophos. Its 18-year-old creator, meanwhile, got off lightly, with a suspended sentence and 30 hours of community service.
Xbox Pirates Plead Guilty The owners of a Hollywood video game store pled guilty to installing pirated games on modified Xbox consoles and could be sentenced to up to five years in prison and fined as much as $250,000.
6. Voice Of Authority
Warner Bros. Makes Deals With Devils The news this week that entertainment giant Warner Bros. struck a deal with BitTorrent—the file-sharing site and service famous, or infamous, for illegally posting free movie downloads—was just the opening clause, so to speak, of the company's deal with in-the-gray devils. Gregg Keizer reports.
7. White Papers
Global Key Management For Storage Security Encryption While architecting a complete key management system can be time-consuming, companies should at least implement a key archive and backup policy, with appropriate access controls, to minimize risk. This white paper focuses on best practices for key management in storage encryption, which includes tapes, disks, NAS, and databases.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: InfoWeek@update.informationweek.com
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
IT's Reputation: What the Data SaysInformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business really views IT's performance in delivering services - and, more important, powering innovation. Our results suggest IT leaders should worry less about whether they're getting enough resources and more about the relationships they have with business unit peers.
What The Business Really Thinks Of IT: 3 Hard TruthsThey say perception is reality. If so, many in-house IT departments have reason to worry. InformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business views IT's performance in delivering services - and, more important, powering innovation. The news isn't great.
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.