In This Issue: 1. Editor's Note: 7 Lessons Learned From IT Security Trial 2. Today's Top Story - EMC Fills Major Security Hole With RSA - FAQ: What Will EMC Do With RSA? - EMC Confirms Plans To Buy RSA In $2.1B Deal 3. Breaking News - Survivor Accounts Released In 9/11 Podcasts - SCO's Legal Setback Should Help Linux Users Breathe Easier - Analysts Don't See Big Problems In Apple's Options - Accidental Tech Entrepreneurs Turn Their Hobbies Into Livelihoods - Cell Phone Talkers As Bad As Drunk Drivers - Net Neutrality Battle Shifts To Full Senate - Microsoft's WGA Sued As 'Spyware' - Brief: Apple Updates iTunes To Plug Security Hole - Office 2007 Delay May Foreshadow Vista Push-Back - Brief: New Trojan Takes On Mac OS X - Microsoft Shuts Off Vista Beta 2 - UBS Trial: Defense Suggests Witness Altered Evidence 4. Grab Bag - Flashpacking Clicks With Great Outdoors (CNN.com) - Social Networking For Bookworms (WSJ.com) - Wireless America: Public Wi-Fi Hotspots (ABC News) - Silicon Valley Racing Ahead With Electric Cars (CNN.com) 5. In Depth: Apple And The Digital Living Room - Apple's Next Big Thing: Home Entertainment - The Job-Less Factor - Music Phones: What Has Apple Got Up Its Sleeve? - Media Distribution Rights: Here Come The Judges (And Congress) - The Complicated Web Of Content Licensing - New Digital Media Patent Could Upset Apple Cart - Blog: Fight For Your Entertainment Rights 6. Voice Of Authority - Microsoft Making Spyware? 7. White Papers - Web Server Monitoring 8. Get More Out Of InformationWeek 9. Manage Your Newsletter Subscription
Quotes Of The Day: Liberty
"I would rather be exposed to the inconveniences attending too much liberty than to those attending too small a degree of it." — Thomas Jefferson
"They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." — Benjamin Franklin
"But a Constitution of Government once changed from Freedom, can never be restored. Liberty, once lost, is lost forever." — John Adams
"It is seldom that liberty of any kind is lost all at once." — David Hume
"Let every nation know, whether it wishes us well or ill, we shall pay any price, bear any burden, meet any hardship, support any friend, oppose any foe, to assure the survival and success of liberty." — John F. Kennedy
1. Editor's Note: 7 Lessons Learned From IT Security Trial
Over the last several weeks, InformationWeek has been covering the trial of a former UBS PaineWebber systems administrator, Roger Duronio, who's accused of writing and setting off a highly destructive logic bomb at his former employer as revenge for not receiving the maximum yearly bonus. The government prosecution contends that Duronio was not only looking to wreak havoc, but also to profit by purchasing securities whose value would rise if the company's stock went down—the theory being that the company's stock would tank as a result of the security problem that prevented traders from doing their work.
The trial provides an enlightening perspective on the damage such attacks can cause, as well as a raft of security lessons that all IT organizations must learn if they're going to avoid becoming victims. In my blog entry, I discuss in much greater detail, and with specific examples, my take on the top seven security lessons corporations need to learn, which are highlighted below:
1) If you want to make it as difficult as humanly possible for hackers—whether employees or outsiders—to ply their trade, your company needs to have bulletproof security policies and practices.
2) Don't underestimate the lengths a hacker or person seeking revenge will go to in order to prove their point or carry out their plan.
3) You can't be too wary of disgruntled or otherwise suspicious employees.
4) The effects of a major attack can be far-reaching and long-lasting, even after the forensics pros have gone home and the remediation work is done.
5) Even a hacker who's successful at damaging systems and impairing business can be susceptible to stupid behavior that points back to him or her.
6) When it comes to security—and in fact all IT work—choose your vendors carefully.
7) IT security problems—aside from the direct financial damage to a business they inflict—can be a public relations nightmare for any company, and even worse for a financial services firm.
Be sure to check out our special page devoted to InformationWeek's complete coverage of the ongoing UBS computer sabotage trial.
And for more thoughts on data security and what to do about it, you can read Larry Greenemeier's blog, where he ponders where this is all going and what we have learned. While you're there, don't miss his attached inaugural podcast interview with several security experts.
EMC Fills Major Security Hole With RSA EMC's decision to spend nearly $2.1 billion for security vendor RSA promises to reshape the competitive landscape of the storage and infrastructure-management segments of the IT industry.
Survivor Accounts Released In 9/11 Podcasts "I wanted to crawl into my fire helmet." Firefighter Mickey Kross describes a fierce wind lifting him up amid the collapse of the North Tower in a podcast from the World Trade Center Memorial Foundation.
Cell Phone Talkers As Bad As Drunk Drivers Three participants rear-ended the simulated car in front of them. All were talking on cell phones, and none were drunk, according to a new study. And oh yeah, using a hands-free device didn't change the results.
Microsoft's WGA Sued As 'Spyware' The lawsuit asks for class-action status on claims that Microsoft's WGA software misled users as to its true purpose, failed to obtain consent before installing, and transmitted data to the company's servers.
Microsoft Shuts Off Vista Beta 2 The closure, slated for Friday, June 30, comes because the preview has reached its copy limit. Meanwhile, users are being urged to activate their Beta 2 copy in order to receive RC1 of the operating system when it's delivered later this year.
UBS Trial: Defense Suggests Witness Altered Evidence Despite being accused of altering evidence, forensics specialist Keith Jones stood firmly by his earlier testimony that whoever brought down the UBS PaineWebber network had to do so from inside Roger Duronio's home. Duronio is the systems admin on trial for the attack.
----- The latest research, polls, tools and services -----
Download PDFs Of InformationWeek's Top Stories Visit InformationWeek Downloads to get all of InformationWeek's biggest and best articles all in one place. Presented in an easy-to-read PDF format, they'll help you analyze and make purchasing decisions for today's technology solutions.
A Personal Approach To The Web InformationWeek's newest service is MyInformationWeek, a personalization engine that responds to your stated preferences and also uses your click behavior to refine your profile and serve you the most relevant information on every visit. Sign up now.
The Complicated Web Of Content Licensing The movie industry is afraid—very afraid—as it ponders the functionality promised by new technologies hovering on the horizon, and that fear could be trouble for Apple.
Blog: Fight For Your Entertainment Rights If you own an iPod or MP3 player; yearn for a music-enabled phone; download, share, and mix songs and video; or even if you just want to listen to your music or watch your videos in relative peace, take heed. Pending legislation could make the simplest exercise in legal home media use more cumbersome than you could ever imagine.
6. Voice Of Authority
Microsoft Making Spyware? A California man has put his lawyer on a case that others have only been yakkin' about: Microsoft's Windows Genuine Advantage anti-piracy program/software is smelly, stinky, sneaky spyware.
7. White Papers
Web Server Monitoring This white paper introduces Web server monitoring, explaining its importance and describing various monitoring concepts and types. A set of common Web server problems are enumerated, along with methods of monitoring to detect and/or prevent these conditions.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: InfoWeek@update.informationweek.com
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.