How to Use the Palm Pre Camera

How to Use the Palm Pre Camera


How to Use the Palm Pre Camera

Posted:

The Palm Pre is a smartphone powered by the Linux-based WebOS operating system. The phone has a touch-screen and sliding keyboard as well as a 3.0-megapixel digital camera and an LED flash. The camera can take photos in portrait or landscape mode,... by Vanessa Padgalskas

How to Get an Outbound Call History From Boost

Posted:

Boost Mobile keeps a list of inbound and outbound calls that users can view under their account on the Boost Mobile My Account page. Viewing the outbound call history logs can be useful if the user is trying to keep track of numbers called from the... by Mandy Slake

How to Get the Best Picture Out of My Vizio LCD TV

Posted:

Vizio LCD HDTV's are capable of presenting your video content from a cable or satellite provider in high-definition. The quality of HD content will vary depending upon your model and the quality offered through your cable or satellite provider.... by Jule Pamplin

The Specifications of Sony BDZ-X90s

Posted:

Sony's BDZ line includes four different Blu-ray players and recorders. These four devices -- the BDZ-X90, the BDZ- L70, BDZ-T70 and BDZ-T50 -- are only sold overseas, primarily in Asian countries like Japan. Of the four products in Sony's... by Elizabeth Falwell

How to Connect the Bluetooth on an iPhone 3G With a PC to Play Music

Posted:

When using an iPhone 3G and a Bluetooth enabled computer, users can pair the two devices together to transfer files and play media through the computers built-in or external speakers. This allows the user to enjoy the music located on the iPhone... by Jessica Best

How to Transfer Contacts to a BlackBerry 8520

Posted:

Contacts currently saved on your computer may be transferred to your BlackBerry 8520 with the help of BlackBerry Desktop Software. Desktop Software is an easy-to-use program that quickly helps you transfer data such as contacts without the need of a... by Ashleigh Walker

How to Capture Images With a Palm Pre

Posted:

The camera on the Palm Pre can capture images and videos.Every Palm Pre smartphone comes with a 3.0-megapixel camera for taking digital photos or shooting short video clips. A small LED flash is located near the camera lens for taking pictures in low light situations. Simply launch the native... by Justin Channell

How to Install a DTV Converter to Both an Analog TV & a DVD Recorder

Posted:

You need two coaxial cables and two RCA cables to connect your DTV converter to your analog television set and DVD recorder.All television broadcast signals went from analog to digital on June 12, 2009. This means anyone with an analog television set will need to install a digital television converter box or DTV box in order to view broadcast TV programming. These boxes... by Diane Dilov-Schultheis

How to Send a Text Message From My Email to a 207 Area Code Cell Phone

Posted:

Texting through email is an option even if you don't have a cell phone.Even if you do not own a cell phone, you can still text your friends and family in the 207 area code (used in the U.S. state of Maine). You can send an email message straight to their cell phones. The message is received exactly as a text message.... by Ashleigh Walker

How to Disable the Pop-Up Blocker on My Mac iBook

How to Disable the Pop-Up Blocker on My Mac iBook


How to Disable the Pop-Up Blocker on My Mac iBook

Posted:

Pop-up blockers, built into Web browsers, help protect you while you surf the internet by preventing annoying or dangerous website pop-up windows from appearing when you visit a site. Unfortunately pop-up blockers can also block necessary pop-up... by Dustin Thornton

How to Return a Site to Store Item From Walmart

Posted:

Return items ordered Making purchases online often includes a shipping and delivery charge added to the cost of the items. Some stores, including Walmart, provide shipping options that enable customers to have their items delivered to a brick and mortar store instead of... by Kathryn Hatter

How to Use Google Adsense With Wordpress

Posted:

Google Adsense is an advertisement network that allows you to place Google ads on your Wordpress blog. Google will pay you for these ads based on the number of visits your Wordpress blog receives and the number of clicks visitors make on your ads.... by Erin McManaway

Types of USB Adapters

Posted:

Several types of USB adapters are available.You've got several USB cables around the house, but you can't find the one that came with your digital camera. You may be able to use one of your other USB cables to connect it to the computer and download your pictures. There are a few... by Aubrey Kerr

How do I Unzip a File Using WinZip?

Posted:

WinZip is a shareware program that allows you to extract files from compacted ZIP files. Once installed on your machine, WinZip automatically sets itself as the default ZIP file handler. If you have WinZip installed on your computer, you can go... by Margaret Worthington

How to Display a Photo

Posted:

You can share your photos with the world by displaying them on a photo-sharing site.So you've taken a gorgeous photo and want to share it with the world? The Internet seems like the perfect medium to share a photo, but how exactly can you go about it? There are many user-friendly, free photo-sharing sites where you can display... by Amy Scott

How to Remove a Tango Toolbar From Your Computer

Posted:

The Tango Toolbar slows your computer.The Tango Toolbar is a malicious toolbar that installs itself without your consent. The Tango toolbar purports to block pop-up advertisements and provide enhanced search capabilities. However, in reality, the Tango Toolbar redirects your Internet... by Thomas King

How to Get a Music Player on Your MySpace Page

Posted:

Myspace began offering its users access to the Myspace Music Player in 2008, allowing for profile background music that each Myspace user could custom tailor. The Myspace music player is offered free of charge for all site members as of April 2011,... by Jennifer Leighton

Advance Announcement: 2011 ACM Cloud Computing Security Workshop (CCSW) is back !

Advance Announcement: 2011 ACM Cloud Computing Security Workshop (CCSW) is back !


Advance Announcement: 2011 ACM Cloud Computing Security Workshop (CCSW) is back !

Posted:

InfoSec News: Advance Announcement: 2011 ACM Cloud Computing Security Workshop (CCSW) is back !: Forwarded from: noreply (at) crypto.cs.stonybrook.edu
2011 ACM Cloud Computing Security Workshop (CCSW) at CCS
October 21, 2011, SWISSOTEL Chicago http://crypto.cs.stonybrook.edu/ccsw11
Dear Colleagues,
CCSW is back! The past workshops were a tremendous success, with over [...]

Unfollowed: How a (Possible) Social Network Spy Came Undone

Posted:

InfoSec News: Unfollowed: How a (Possible) Social Network Spy Came Undone: http://www.wired.com/dangerroom/2011/04/unfollowed-how-a-possible-social-network-spy-came-undone/
[When the early information about this story was coming out, it was that @PrimorisEra might have been spotting and assessing targets for a KGB honey pot operation. [...]

US-Russian dictionary defines cyber war, other concepts

Posted:

InfoSec News: US-Russian dictionary defines cyber war, other concepts: http://gcn.com/articles/2011/04/28/us-russia-cyber-dictionary.aspx
By William Jackson GCN.com April 28, 2011
It is all very well to talk about cyberspace and cybersecurity, but what do they mean, exactly?
A U.S.-Russian effort is proposing common definitions. [...]

ICANN taps DefCon founder for top security spot

Posted:

InfoSec News: ICANN taps DefCon founder for top security spot: http://www.v3.co.uk/v3-uk/news/2046681/icann-taps-defcon-founder-security-spot
By Shaun Nichols V3.co.uk 29 Apr 2011
The Internet Corporation for Assigned Names and Numbers (ICANN) has named Jeff Moss as its new chief security officer.
A security expert and respected member of the hacking community, Moss is best known for his roles in founding the DefCon and Black Hat security conferences. He has also worked in advisory positions for the US Department of Homeland Security.
The appointment of Moss will bring to ICANN a security head who is well-versed in the attitudes and techniques which have driven research in both security intrusions and detections in recent years.
The hiring also comes at a time when ICANN and other internet governance groups are working to roll out security measures such as DNSSEC.
[...]

Teacher Passwords Stolen, Grades Hacked At 3 Seattle High Schools

Posted:

InfoSec News: Teacher Passwords Stolen, Grades Hacked At 3 Seattle High Schools: http://www.kirotv.com/education/27708043/detail.html
By kirotv.com Webstaff April 28, 2011
SEATTLE -- Someone has stolen teacher passwords and changed grades in a Seattle Public Schools computer system, the district said in an email to teachers obtained Thursday by KIRO 7 Eyewitness News. [...]

How to Add Desktop Icons in Macs

How to Add Desktop Icons in Macs


How to Add Desktop Icons in Macs

Posted:

The Desktop is one of the primary elements of a Mac, dating back all the way to the original Macintosh operating system in 1984. Over the years the Desktop has undergone many changes, but the use of icons has always remained the same. You can create... by Sophie Southern

How to Change Your Format

Posted:

Move your hard drive to a format that works with multiple operating systems.The format on your Windows 7 hard drive is essential for your computer recognizing the files contained by the drive. If you are using an external hard drive with your Windows 7 based system, there are several formats that you can use. NTFS, FAT, and... by CharlesDovbish

How to Clean and Fix a Registry

Posted:

Though registry cleaning requires caution, it need not be a nightmare.The Windows operating system relies on a huge set of instructions for it to work properly. These instructions reside in the registry and allow Windows to do everything from open a new window to perform a specific action in a software application.... by Gil Max

How to Disassemble an MX Revolution

Posted:

The MX Revolution is a cordless optical mouse manufactured by Logitech. It uses an internal optical beam instead of a ball in order to operate and is powered by an internal rechargeable battery. If you want to change open it up completely to diagnose... by MichaelW

How to Unhide the BIOS ACC Function

Posted:

Computer BIOS menus are put in place to give users the ability to change computer settings before booting into their operating systems. This is useful if your computer crashes and you cannot gain access to the operating system. It also is useful for... by Sara Bailey

How to Put a Power-On Password on a Computer With XP

Posted:

The power-On password takes place before the main Windows XP credentials screen.Before the Windows XP operating system loads, the computer goes through a brief procedure known as the Power-On Self Test. This function makes an inspection of any changes made to the hardware installed on your computer. The Basic Input Output System... by Elvis Michael

How do I Use a Powerpoint Presentation As a Screen Saver?

Posted:

Microsoft PowerPoint is designed as a presentation-creation tool, but it can also be used to create high quality screen saver. Each individual slide in your presentation will become an individual image in a Windows screen saver. Although Microsoft... by David Weinberg

How to Connect Workgroups

Posted:

When you are running the Windows Vista or Windows 7 operating system on your computer, you can create a workgroup for defining rules and privileges as an administrator. You can join a pre-existing workgroup at any time by changing the workgroup... by Greg Lindberg

Plantronics Voyager 510 Instructions

Plantronics Voyager 510 Instructions


Plantronics Voyager 510 Instructions

Posted:

Using a Plantronics Voyager HeadsetThe Plantronics Voyager 510 is a Bluetooth-enabled headset. This headset can connect to any Bluetooth-enabled device. The headset has long talk and standby times. The Voyager 510 headset provides clear voice transmission in noisy environments. This... by Stefano Marrero

How to Block Numbers on the HTC HD2

Posted:

The HTC HD2 is a Windows mobile touch-screen smart phone offered by T-Mobile. The phone features a GPS navigation system, 5-megapixel camera, multi-touch technology and a 4.3-inch display. Additional phone features include a music player, video... by Loletrazina Church

How to Transfer Photos From a Motorola Razr 2.8 to a PC

Posted:

The Motorola Razr allows you to transfer files from your phone to your computer using your USB cable. The USB cable for your Motorola Razr must be purchase separately and is not provided with the device. You will only be able to connect to the... by ErikaM

How to Make Three-Way Calls Using My Cell Phone

Posted:

Most modern cells phones and cellular providers support three way calls, which allow three separate parties to talk simultaneously. If you ever tried to make plans with two friends or colleagues, you can appreciate the convenience of this feature.... by C. Taylor

How Do You Download Pictures From a BlackBerry Curve to a Mac Computer?

Posted:

Transfer photos from your BlackBerry to your Mac with a USB cable.The BlackBerry Curve comes with an integrated digital camera that makes it easy to capture and preserve your day-to-day experiences in pictures. Once you have taken some pictures, you can use BlackBerry's Desktop Software application to download... by Jason Taetsch

How to Turn Off a Garmin Nuvi 260

Posted:

GPS units make it easier to find where you are going.GPS units like the Garmin Nuvi 260 make it much easier to find your way around. Many people believe that GPS units make use of an internet signal, but that is not so. A GPS unit is a receiver that passively receives information from satellites to... by John Rose

How to Find Driver Downloads for a Motorola Droid

Posted:

The Motorola Droid is a smartphone powered by Google's Android operating system. Introduced in 2009, it was offered to Verizon Wireless customers as an alternative to Apple's iPhone. The device offers all of the features that you would... by Tara Cantore

Samsung SGH-A727 Specs

Posted:

The Samsung SGH-A727 is a 3G candy bar smartphone released in 2007 that runs on AT&T's network. The A727 has 32MB of memory expandable to 2GB and has a 146-MHz processor. The smartphone offers Cingular mobile e-mail which also supports AOL,... by Sampson Quain

Features of the Samsung SPH M800 Phone

Posted:

The Samsung Instinct SPH-M800 is a cell phone released exclusively for Sprint network users in 2008. The Instinct uses CDMA technology, and connects to the 850 and 1900 frequencies. The Instinct has a bar-style design and a touch screen display. The... by Brian Vaughan

How Do I Get an Address Book Into Outlook Express?

How Do I Get an Address Book Into Outlook Express?


How Do I Get an Address Book Into Outlook Express?

Posted:

Outlook Express lets you import contact data from outside files.The Outlook Express program, which comes installed on PC systems running Windows XP, includes an address book feature for storing contact information. You can either create new contact records directly in Outlook Express or import data from outside... by Bennett Gavrish

How to Get Emails Sent to Your Phone

Posted:

Send e-mails from your phoneHaving e-mail access on your phone can be very useful for people who travel frequently for work, are self-employed or simply who have the lifestyle that does not include working from a computer in a 10 by 10 cubicle. Symbian cellphones, Blackberry... by Shavon Donnell

How to Configure XP Group Policy Accounts & Settings

Posted:

The Windows XP group policy editor lets you control the settings on a network computer. The policy editor is included with each XP version and it allows network administrators to control the interface, so all computers are uniform and have the same... by JamesCampbell

How to Undelete IE History

Posted:

Retrieving your IE history isn't as easy as you might think.Trying to undelete your Internet Explorer history in Windows 7 means you must make a difficult decision. Recovering deleted history requires you to perform a system restore. Although this will return your history to what it was as of the backup date,... by Robert Hainer

How to Delete Bing Search

Posted:

BingSearch is a toolbar added to Web browsers. You can use it to performs searches directly from your browser. The problem is that this toolbar often installs on your computer without your express consent, by being installed along with another... by Mitchell White

How to Obtain a Macy's Mail Order Catalog

Posted:

You must have a Macy's credit card to receive their  print catalog.Macy's is a chain of department stores based in the United States. Several times yearly, Macy's sends a mail order catalog to its customers who have a Macy's credit card. Although Macy's releases multiple-page advertisements... by Sarai Jeremiah

How Do I Convert From Outlook Express to Microsoft Outlook?

Posted:

You can convert and import Outlook Express data in Microsoft Outlook.The Outlook Express and Microsoft Outlook applications both perform similar functions, but they store data in very different ways. As a result, email files from Outlook Express must be converted into a different format before they can be read and... by Bennett Gavrish

How to Setup Spam Filtering on Windows Hotmail

Posted:

Spam counts for more than 50 percent of email today.Windows Live Hotmail offers a free email service that users can access anywhere with Internet access. In an effort to combat spam, a Hotmail mailbox comes equipped with a Junk email folder that collects and eventually deletes unwanted messages.... by Mindi Orth

PSN hackers claim to have 2+ million credit card numbers

PSN hackers claim to have 2+ million credit card numbers


PSN hackers claim to have 2+ million credit card numbers

Posted: 29 Apr 2011 04:44 AM PDT

The PlayStation Network hack is now considered to be one among the biggest data thefts of all time, and according to the claims made by the alleged hackers on underground Internet forums, it seems tha...

DSL Reports intrusion compromises over 9000 accounts

Posted: 29 Apr 2011 03:46 AM PDT

DSL Reports - the information and review site on high speed Internet services which operates over 200 forums - has been hit with a blind SQL injection attack, which resulted in the compromise of at le...

Securing the cloud and securing data in the cloud are not the same

Posted: 29 Apr 2011 03:39 AM PDT

This article will take a look at five of the most impactful vulnerabilities of storing data in the cloud, and offer details on why the most important thing for CSOs and security decision makers to con...

Firefox 4.0.1 fixes several security issues

Posted: 29 Apr 2011 03:03 AM PDT

Mozilla released Firefox 4.0.1 that fixes several security issues as well as stability issues. Miscellaneous memory safety hazards Mozilla developers identified and fixed several memory safety b...

Mac Mini 1.5 Specs

Mac Mini 1.5 Specs


Mac Mini 1.5 Specs

Posted:

The Mac Mini 1.5 -- a version of the small form factor desktop Apple computer -- has a processor with a 1.5-gigahertz processing speed. On September 27, 2005, eight months after the original Mac Mini's debut, Apple replaced the 1.42-GHz Power PC... by Andy Josiah

How Can I Empty My Hard Drive?

Posted:

Hard drives store all sorts of data and information. On a primary hard drive, the data and information required to run the operating system is stored on the drive. To empty a hard drive, it either needs to be formatted or the operating system needs... by Lindsay Howell

How to Take a Page Shot

Posted:

You have a couple of options when taking a screen shot of your page. If you take a full screen shot, all of the open windows will be copied just as your screen currently appears. On the other hand, you may also choose to take a screen shot of only... by Chad Buleen

How to Remove Windows Photo Gallery in Vista

Posted:

Windows Live Photo Gallery is a program that comes installed with Windows Vista as the default photo organizer and viewer program. Many users are unsatisfied with the performance of Windows Live Photo Gallery and prefer to use a third-party program... by Dustin Thornton

How to Replace the CMOS Battery in a Toshiba Laptop L305-S5895

Posted:

Replace the CMOS battery in a Toshiba Laptop when the system no longer keeps track of the date and time or to reset the BIOS password. The clock battery is located inside the Toshiba laptop and remains connected even when the main battery and power... by Norm Dickinson

How to Update Display Properties

Posted:

Display properties control how you view data on your computer's monitor.Among the many features of Windows 7 is the ability to customize your computer. Besides setting a custom desktop and color scheme, you can change your computer's display properties. Displays are synonymous with your computer "screen"... by Nicholas Smith

[ACM CCS'11] Reminder: Deadline Approaching (May 6, 2011)

[ACM CCS'11] Reminder: Deadline Approaching (May 6, 2011)


[ACM CCS'11] Reminder: Deadline Approaching (May 6, 2011)

Posted:

InfoSec News: [ACM CCS'11] Reminder: Deadline Approaching (May 6, 2011): Forwarded from: ACM CCS 2011 <acmccs2011 (at) gmail.com>
Apologies for multiple copies of this announcement. The annual ACM Computer and Communications Security Conference is a leading international forum for information security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of computer and communications security. Papers should have relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers must make a convincing argument for the practical significance of the results. All topic areas related to computer and communications security are of interest and in scope. Accepted papers will be published by ACM Press in the conference proceedings. Outstanding papers will be invited for possible publication in a special issue of the ACM Transactions on Information and System Security.
Paper Submission Process
Submissions must be made by the deadline of May 6, 2011, through the website:
http://www.easychair.org/conferences/?conf=ccs2011
The review process will be carried out in two phases and authors will have an opportunity to comment on the first-phase reviews. Authors will be notified of the first-phase reviews on Monday, June 20, 2011 and can send back their comments by Thursday, June 23, 2011.
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed.
Authors of accepted papers must guarantee that their papers will be presented at the conference.
Paper Format
Submissions must be at most 10 pages in double-column ACM format (note: pages must be numbered) excluding the bibliography and well-marked appendices, and at most 12 pages overall. Submissions must NOT be anonymized. Only PDF or Postscript files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits.
Tutorial Submissions
Proposals for long (3-hour) and short (1.5-hour) tutorials on research topics of current and emerging interest should be submitted electronically to the tutorials chair by May 24, 2011. The guidelines for tutorial proposals can be found on the website.
Important Dates
- Paper submission due: Friday, May 6, 2011 (23:59 UTC - 11) - First round reviews communicated to authors: Monday, June 20, 2011 - Author comments due on: Thursday, June 23, 2011 (23:59 UTC - 11) - Acceptance notification: Friday, July 15, 2011 - Final papers due: Thursday, August 11, 2011
GENERAL CHAIR:
Yan Chen (Northwestern University, USA)
PROGRAM CHAIRS:
George Danezis (Microsoft Research, UK) Vitaly Shmatikov (University of Texas at Austin, USA)
PROGRAM COMMITTEE:
Michael Backes (Saarland University and MPI-SWS, Germany) Bruno Blanchet (INRIA, Ecole Normale Superieure, and CNRS, France) Dan Boneh (Stanford University, USA) Nikita Borisov (University of Illinois at Urbana-Champaign, USA) Herbert Bos (VU, Netherlands) Srdjan Capkun (ETHZ, Switzerland) Avik Chaudhuri (Adobe Advanced Technology Labs, USA) Shuo Chen (Microsoft Research, USA) Manuel Costa (Microsoft Research, UK) Anupam Datta (CMU, USA) Stephanie Delaune (CNRS and ENS-Cachan, France) Roger Dingledine (The Tor Project, USA) Orr Dunkelman (University of Haifa and Weizmann Institute, Israel) Ulfar Erlingsson (Google, USA) Nick Feamster (Georgia Tech, USA) Bryan Ford (Yale University, USA) Cedric Fournet (Microsoft Research, UK) Paul Francis (MPI-SWS, Germany) Michael Freedman (Princeton University, USA) Guofei Gu (Texas A&M University, USA) Nicholas Hopper (University of Minnesota, USA) Collin Jackson (CMU Silicon Valley, USA) Markus Jakobsson (Paypal, USA) Jaeyeon Jung (Intel Labs Seattle, USA) Apu Kapadia (Indiana University Bloomington, USA) Jonathan Katz (University of Maryland, USA) Stefan Katzenbeisser (TU Darmstadt, Germany) Arvind Krishnamurthy (University of Washington, USA) Christopher Kruegel (University of California, Santa Barbara, USA) Ralf Kuesters (University of Trier, Germany) Ninghui Li (Purdue University, USA) Benjamin Livshits (Microsoft Research, USA) Heiko Mantel (TU Darmstadt, Germany) John Mitchell (Stanford University, USA) Fabian Monrose (University of North Carolina at Chapel Hill, USA) Steven Murdoch (University of Cambridge, UK) David Naccache (Ecole Normale Superieure, France) Arvind Narayanan (Stanford University, USA) Kenny Paterson (Royal Holloway, University of London, UK) Niels Provos (Google, USA) Mike Reiter (University of North Carolina at Chapel Hill, USA) Thomas Ristenpart (University of Wisconsin, USA) Hovav Shacham (University of California, San Diego, USA) Adam Smith (Pennsylvania State University, USA) Anil Somayaji (Carleton University, Canada) Francois-Xavier Standaert (UCL, Belgium) Eran Tromer (Tel Aviv University, Israel) Leendert Van Doorn (AMD, USA) Paul Van Oorschot (Carleton University, Canada) Bogdan Warinschi (University of Bristol, UK) Brent Waters (University of Texas at Austin, USA) Robert Watson (University of Cambridge, United Kingdom) Xiaowei Yang (Duke University, USA) Haifeng Yu (National University of Singapore, Singapore)

Cyberespionage: US finds FBI agents in elite unit lack necessary skills

Posted:

InfoSec News: Cyberespionage: US finds FBI agents in elite unit lack necessary skills: Forwarded from: Justin Lundy <jbl (at) tegataiphoenix.com>
http://www.csmonitor.com/USA/2011/0427/Cyberespionage-US-finds-FBI-agents-in-elite-unit-lack-necessary-skills
By Mark Clayton Staff writer The Christian Science Monitor April 27, 2011
Many of the Federal Bureau of Investigation's field agents assigned to an elite cyber investigative unit lack the skills needed to investigate cases of cyberespionage and other computerized attacks on the US, the Justice Department inspector general reported Wednesday.
That's a problem because the US is under constant and increasing cyberattack with 5,499 known intrusions into US government computer systems in 2008 alone -- a 40 percent jump from 2007, the inspector general's office found.
Investigating these kinds of cyberespionage attacks falls largely on the FBI as the lead agency for the National Cyber Investigative Joint Task force, which also includes representatives from 18 different intelligence agencies and is assigned to investigate the most difficult national security intrusions -- those by a foreign power for intelligence gathering or terrorist purposes.
But in interviews with 36 field agents in 10 of the FBI's 56 field offices nationwide, 13 agents, or more than a third, "reported that they lacked the networking and counterintelligence expertise to investigate national security [computer] intrusion cases." Five of the agents told investigators "they did not think they were able or qualified" to investigate such cases, the report said. The inspector general report does not indicate whether the 36 field agents who were interviewed are a representative sampling of the FBI’s cyber unit.
[...]

Experts dissect hacker attacks during cybersecurity forum at Hagerstown Community College

Posted:

InfoSec News: Experts dissect hacker attacks during cybersecurity forum at Hagerstown Community College: http://www.herald-mail.com/news/local/hm-cyber-experts-dissect-hacker-attacks-during-cybersecurity-forum-at-hagerstown-community-college-20110427,0,2996601.story
By ANDREW SCHOTZ herald-mail.com April 27, 2011
Experts Wednesday detailed simple and complex ways to protect computers [...]

Are we talking "cyber war" like the Bush admin talked WMDs?

Posted:

InfoSec News: Are we talking "cyber war" like the Bush admin talked WMDs?: http://arstechnica.com/security/news/2011/04/are-we-talking-cyber-war-like-the-bush-admin-talked-wmds.ars
By Matthew Lasar Ars Technica April 27, 2011
Turn any corner in the complex metropolis that is Internet policy and you'll hear about the "cybersecurity" crisis in two nanoseconds. [...]

Oracle hedging its vulnerability reports?

Posted:

InfoSec News: Oracle hedging its vulnerability reports?: http://www.computerworld.com/s/article/9216213/Oracle_hedging_its_vulnerability_reports_
By Joab Jackson IDG News Service April 27, 2011
Oracle may be subtly misleading customers about the severity of some of the vulnerabilities found in its database software, according to [...]

PlayStation credit card data was encrypted

Posted:

InfoSec News: PlayStation credit card data was encrypted: http://www.zdnet.com.au/playstation-credit-card-data-was-encrypted-339314012.htm
By Darren Pauli ZDNet.com.au April 28th, 2011
Sony has confirmed that the credit card details possibly stolen in a breach of its PlayStation Network (PSN) were encrypted. [...]

Phone-hacking laws are 'very uneven and unclear'

Posted:

InfoSec News: Phone-hacking laws are 'very uneven and unclear': http://www.guardian.co.uk/media/2011/apr/26/phone-hacking-laws-christopher-graham
By James Robinson guardian.co.uk 26 April 2011
The information commissioner has told a powerful group of MPs that legislation outlawing phone hacking is "very uneven" and "very unclear" [...]