Wednesday, April 30, 2008

[ISN] Counter-intelligence officers show how stupid they are


http://www.wbj.pl/?command=article&id=40583

Warsaw Business Journal
28th March 2008

Six officers of the SKW, the new military counter-intelligence service,
have uploaded photos of themselves while on a secret mission to
Afghanistan onto their personal accounts at nasza-klasa.pl, the popular
school reunion website.

Although they did not specify they worked for the SKW they made clear
that the photos were taken during a military mission in Afghanistan. The
pictures, which showed them sporting local robes as well as uniforms,
attracted appreciative comments from their former school mates. The
personal details of SKW officers are a closely guarded secret and are
not even known to many Polish soldiers stationed in Afghanistan. "By
doing such a thing, these people endangered themselves, the soldiers and
their families," said General Marek Dukaczewski, the last head of WSI,
SKW's predecessor, adding: "I cannot imagine a secret operation carried
out by people whose names and faces can be seen on the internet." "I
thought nothing could happen to heighten our sense of the chaos at the
SKW. I was wrong," commented Paweł Graś, the former secret services
minister. SKW was established in 2006. Antoni Macierewicz, its first
head, was criticized for hiring inexperienced people and dismissing
seasoned former WSE officers. (Gazeta Wyborcza, p. 4) R.M.



___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


Data Center Hosting Solutions Network, EvoSwitch, Doubles CO2-Neutral Power


Amsterdam, Netherlands - (The Hosting News) - April 2, 2008 - Carrier-neutral data center that operates CO2-neutral, EvoSwitch, has entered into an agreement with network manager, Continuon, to increase the power capacity for its data centre from 10 MVA to 20 MVA (20 million Watts).

New cabling will be laid up to the building to transport the large quantities of power (green electricity: Zeeuws Groen) to the data center. EvoSwitch has been working with a power capacity of 10 MVA (Megavolt Ampere) since the data center's opening in April 2007. This is ample for the data center's current requirements. At present, 2000 out of the available 9000 m2 are ready to accommodate customer equipment. The second phase will be completed in the second quarter of 2008, resulting in a total available surface of 4000 m2 . Once all phases are complete, a total surface of 9000 m2 will be filled with customer equipment. Work to expand the power capacity is expected to be complete by 2009.

Laurens Rosenthal, Innovation Director for EvoSwitch noted, ''The expansion of our data centre requires a total power capacity that can accommodate the growth of our customer base. EvoSwitch users must also be certain that they will be able to buy the power they need for their equipment in the future as well. With 20 MVA, we can give our customers that guarantee.''

The capacity doubling means that the power supply for EvoSwitch customers is safeguarded in the future. This is especially true in view of the continually rising power consumption of many machines.

Mr. Rosenthal added, ''Fortunately we see more and more equipment on the market with reduced energy consumption. This makes us happy, because it reinforces our own power saving of 20 percent in the total EvoSwitch infrastructure. Of course, there are also market developments that increase power consumption per rack in a data center. Blade servers, for example. We need to be able to accommodate this development, now and in the future. On the other hand, virtualization will increase CPU computing power compared to power consumption proportionately.''

Increasing the power capacity requires an additional investment on EvoSwitch's part. Among other things, EvoSwitch will buy four additional transformers with a capacity of 2.5 MVA each. Continuon will ensure that the network is able to handle EvoSwitch's increased power capacity. To this end new cables will be laid from the power station to the data center via different routes. The power station itself will also be enlarged.

Mr. Rosenthal explained, ''Our investment illustrates our faith in the market for data center services. In view of the warm interest customers have shown in our green data center and the speed at which we have filled cabinet space in recent months, we are confident that we will actually use the doubled power capacity.''

20 MVA means that EvoSwitch has an amply calculated power supply even once the data center reaches its full customer capacity. This means that the cabinets will have higher power and cooling capacity than is the rule for many data centers. On average the cabinets will have 5 KW available, even when the data center is filled to capacity.

Mr. Rosenthal concluded, ''This is double the regular capacity in the market; therefore the use of blade servers, for example, is easily possible.''

EvoSwitch is a carrier-neutral, ''green'' (CO2-neutral) data center. The site in the Amsterdam area has a surface of more than 9000 square meters , allowing companies to put their IT infrastructure in a safe location. The data center started out with a capacity of 10 MVA and has now grown to a total capacity of 20 MVA. With this power capacity, EvoSwitch can guarantee its customers that it will have ample power available at all times. EvoSwitch has 30 employees, which include engineers who manage customer equipment both actively and proactively. EvoSwitch is fully climate-neutral. Together with the Climate Neutral Group, we invest in global projects to restore the CO2 balance in the atmosphere (www.climateneutralgroup.com). Companies that put their equipment at EvoSwitch are allowed to show, on their websites, that they use a climate-neutral data centre via the logos in the partner program The Green Fan (www.thegreenfan.com).

To learn more, please visit: www.evoswitch.com.

Dedicated Web Hosting Provider, SoftLayer, Initiates SAS-70, Type II Review


Dallas, Texas - (The Hosting News) - April 3, 2008 - On-demand hosting services for the small to medium enterprise (SME), SoftLayer, has initiated an SAS 70 review, including the assessment of all processes and systems necessary to complete an accompanying Type II report.

An SAS 70 review is an in-depth survey of a service organization's control objectives and control activities to determine the organizations' effectiveness in meeting those control objectives. It is an important step for any service organization supporting outsourced, mission-critical, and information technology services. SAS 70 data centers have to maintain prescribed levels of data security and redundancy, as well as personnel controls. These requirements include a full assessment of the following elements:
    • Firewall configuration and access
    • Database access
    • Data transmissions
    • Data backup and recovery
    • Application security
    • Product development

In addition, data center staff cannot access servers or data without a specific procedure. All systems access and activity must be logged, and all physical access is highly controlled.

SoftLayer's review will be conducted by an independent auditing agency and include extensive testing performed over a six-month period. It will involve all existing and planned SoftLayer data center facilities in Dallas, Seattle, and Washington, DC. The company anticipates that the Type II report will be delivered by year-end.

A completed SAS 70 report will allow SoftLayer to provide its customers with concrete assurance - as well as standardized auditing reports - that its controls are efficient and reliable based upon industry-recognized standards, alleviating the need for additional assessments.

Headquartered in Plano, Texas, SoftLayer provides next-generation web hosting and on-demand datacenter services on a global basis from facilities located in Dallas, TX and Seattle, WA. Utilizing proprietary management tools coupled with the industry's first network-within-a-network topology, the company delivers unprecedented power and control to securely manage IT environments while providing unparalleled scalability.

To learn more about SoftLayer, please visit: www.softlayer.com.

[ISN] CastleCops Hit by Another DDOS Attack


http://www.darkreading.com/document.asp?doc_id=149497

By Kelly Jackson Higgins
Senior Editor
Dark Reading
MARCH 28, 2008

Security watchdog site CastleCops is currently under yet another
distributed denial-of-service (DDOS) attack. The anti-spam, anti-malware
site manned by volunteers has been under siege from waves of botnet
traffic since Wednesday.

CastleCops is no stranger to DDOS attacks -- it gets hit regularly, with
its most recent attack back in August -- but this one took a different
spin on an old trick.

"Typically, attacks involve some sort of HTTP GET, but this one seems to
include a POST instead," says Paul Laudanski, founder and administrator
for the CastleCops site, who says he first detected the attack on
Wednesday morning after noticing some performance problems with the
site.

He initially witnessed a rise in the server load and a pattern in the
server logs that indicated a DDOS, he says.

The attack hasn.t taken down the site, but is causing occasional
connectivity problems for visitors. "It appears we.ve attracted some
fresh bots, too," Laudanski says.

"Apache has been saturated a few times already, necessitating manual
httpd restarts, while ensuring bots are filtered," he says.

CastleCops, like other anti-spam and anti-cybercrime sites including
Spamhaus, has been an obvious target for disgruntled bad guys due to its
community-based efforts to investigate malware and phishing attacks, as
well as its collaboration with other researchers and law enforcement.

"I think the question is: When isn.t CastleCops under DDOS attack? They
are constantly being hit," says Alex Eckelberry, CEO of Sunbelt Software
.

To mitigate the DDOS attack, CastleCops has been filtering traffic based
on the attack fingerprint, according to Laudanski, and posting the
offending IP addresses, which has kept the attack from crippling the
site. And one member of the CastleCops community noted on the site's
message board that the attack indicates that CastleCops has struck a
nerve with the dark side.

"We have been rattling a lot of cages lately and to me, this DDOS shows
we are on the right track," writes "Ernstl."


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] NIST unveils tool to foil attacks via DNS


http://www.gcn.com/online/vol1_no1/46004-1.html

By Dan Campbell
Special to GCN
GCN.com
03/25/08

Network researchers at the National Institute of Standards and
Technology (NIST) have unveiled a method that federal systems
administrators can use to protect their systems from increasingly
complex attacks launched via the Domain Name System (DNS) of the
Internet and private IP networks.

DNS has long been a critical function of the Internet and private IP
networks, but one that tended to operate somewhat incognito. That may be
changing as more complex network attacks targeted at DNS emerge.

In a recently published paper, authors Scott Rose and Anastase Nakassis,
writing under the auspices of NIST and the Homeland Security
Department's Science and Technology Directorate, contend that DNS
security extensions (DNSSEC) originally intended to protect DNS zone
data contain an unintended side effect that facilitates an attack
precursor called zone enumeration.

Attackers use DNSSEC responses to determine the Resource Records (RR) in
a DNS zone, and then launch attacks more quickly against specific hosts
in the zone. The attack potential gets worse when DNS host names give
hints to the content, application or operating system, and consequently
the vulnerabilities, that reside on the hosts. Rose and Nakassis added
that the security or privacy concerns of intercepting information in
newer DNS RRs go beyond an attacker simply identifying the host IP
address and name.

The authors state that zone enumeration is possible without the help of
DNSSEC. They cautioned that such traditional methods often become
impractical because they rely on time-consuming or processor-intensive
brute force techniques often thwarted by intrusion detection systems.

The authors also describe several techniques that allow networks to reap
the intended authentication and integrity benefits of DNSSEC while
reducing DNS information leakage. These techniques are important
because, as DNS becomes more and more vital to network operation, the
need to protect it with techniques offered by DNSSEC increases.

As federal agencies continue to deploy IPv6 technology, DNS will move
from its current critical-but-inconspicuous status to the forefront, the
NIST analysts said. The spread of IPv6 will generate a demand for
network protection methods that are as secure as they are robust. The
enormous IPv6 address size makes memorization impractical and
address-to-hostname mapping vital, Internet specialists agree. Address
subnet scanning becomes all but impossible in the IPv6 environment. As a
result, DNS zone data becomes much more desirable to intercept and
decipher as a prelude to launching an attack.

The techniques described by the NIST scientists likely hold forth the
promise of improving DNSSEC authentication and integrity protection, so
as to shield DNS zones and foil attempts to compromise data.


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] Gone in 2 minutes: Mac gets hacked first in contest


http://www.infoworld.com/article/08/03/27/Gone-in-2-minutes-Mac-gets-hacked-first-in-contest_1.html

By Robert McMillan
IDG News Service
March 27, 2008

It may be the quickest $10,000 Charlie Miller ever earned.

He took the first of three laptop computers -- and a $10,000 cash prize
-- Thursday after breaking into a MacBook Air at the CanSecWest security
conference's PWN 2 OWN hacking contest.

Show organizers offered a Sony Vaio, Fujitsu U810, and the MacBook as
prizes, saying that they could be won by anybody at the show who could
find a way to hack into each of them and read the contents of a file on
the system using a previously undisclosed "0day" attack.

Nobody was able to hack into the systems on the first day of the contest
when contestants were only allowed to attack the computers over the
network, but on Thursday, the rules were relaxed so that attackers could
direct contest organizers using the computers to do things like visit
Web sites or open e-mail messages.

Miller, best known as one of the researchers who first hacked Apple's
iPhone last year, didn't take much time. Within 2 minutes, he directed
the contest's organizers to visit a Web site that contained his exploit
code, which then allowed him to seize control of the computer, as about
20 onlookers cheered him on.

He was the first contestant to attempt an attack on any of the systems.

Miller was quickly given a nondisclosure agreement to sign, and he's not
allowed to discuss particulars of his bug until the contest's sponsor,
TippingPoint, can notify the vendor.

Contest rules state that Miller could only take advantage of software
that was preinstalled on the Mac, so the flaw he exploited must have
been accessible by, or possibly inside, Apple's Safari browser.

Last year's contest winner, Dino Dai Zovi, exploited a vulnerability in
QuickTime to take home the prize.

Dai Zovi, who congratulated Miller after his hack, didn't participate in
this year's contest, saying it was time for someone else to win.


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


Reseller Web Hosting Discounts, Included in ResellerClub Birthday Celebration


Inverness, California - (The Hosting News) - April 3, 2008 - Private-labeled end to end web service providers, ResellerClub, has amended its regular pricing structure, in connection with the celebration of its anniversary.

The Big Birthday Bash is providing heavy discounts and steep price slashes on all TLDs, Web Hosting, Digital Certificates, Website Builder services and all other products they offer. This product-wide extravaganza which commenced a few weeks ago has been inimitable and extremely beneficial for all the resellers and is expected to continue further due to popular demand.

Bhavin Turakhia, CEO, ResellerClub noted, ''The Big Birthday Bash has managed to increase profit margins for resellers through never before offers, heavy discounts and exciting price slashes. Also the launch of our India Hosting Services and the .asia domain landrush at exceptionally low pricing has certainly expanded our resellers' customer base and help them market a more attractive product bouquet.''

ResellerClub is committed to offering the most comprehensive product portfolio at the most economical prices making it the ideal service provider for Resellers. In a bid to offer its Resellers with the highest profit margins, ResellerClub also has many new products and promotions lined up which will definitely add value to a reseller's existing portfolio of world class Products.

Mr. Bhavin added, ''Resellers can take utmost advantage of all our Products along with the extremely low prices during the Big Birthday Bash to increase their profit margins and also expand their customer base. Since we only sell to resellers, we have their best interests in mind and this reflects on our unique pricing structure as well as our promo offers and packages.''

ResellerClub boasts of the most comprehensive product portfolio including Domain Registration, Advanced Web and Email hosting, Live Chat services, ecommerce modules, website builder etc available at the most economical pricing existing today. They also provide complete business process automation and a powerful promo engine that allows Resellers to introduce and pass on promotions, discounts, special packages etc to their sub-resellers and customers.

ResellerClub, a DirectI Group business, is one of the largest private label web solutions providers in the world, providing end-to-end automation to domain resellers, web hosts, web designers, and other web service companies. ResellerClub offers products and services and powers the backend infrastructure and software of thousands of web hosts worldwide.

To learn more about ResellerClub, please visit: www.resellerclub.com.

[ISN] Facebook security lapse allows Paris Hilton pictures to be leaked


http://technology.timesonline.co.uk/tol/news/tech_and_web/article3617360.ece

By Jonathan Richards
Times Online
March 25, 2008

A security lapse on Facebook has allowed its users to gain access to
vast libraries of private photographs, including one of Paris Hilton
drinking beer with her friends.

A Canadian hacker exploited a recent upgrade to the networking site's
privacy settings to view pictures that were intended to be private,
including some of Paris Hilton partying with her brother, Barron
Nicholas, at the recent Emmy awards.

Facebook was told about the problem yesterday afternoon, and said it had
since fixed the bug.

Byron Ng, a computer technician from Vancouver, began looking for flaws
in the site's security after an upgrade last week purportedly gave
Facebook's 40 million users greater control over the way they shared
material such as photographs with their friends.

Mr Ng found that he was able to pull up recent pictures posted by
Facebook users, even if the owners intended them only to be seen by a
select group of friends.

In a subsequent test, the Associated Press reported [1] that it was able
to access several private albums, including one posted by Mark
Zuckerberg, Facebook's founder, in November 2005.

The breach comes on the same day that children's charities urged
ministers to ban companies from trawling websites such as Facebook to
gain access about potential employees, in a process known as "digital
dirt-digging".

Record numbers of people are posting intimate details about their lives
online, despite warnings from privacy campaigners that photographs are
extremely difficult to erase once uploaded to the internet.

The Information Commissioner's Office recently reiterated its warning
[2] about the risk of posting details on social networking sites after a
study found that the amount of information stored about us on the web
will grow by a factor of ten between now and 2011.

In a statement acknowledging the security flaw, a Facebook spokesman
said: "We take privacy very seriously and continue to make enhancements
to the site.

In June last year, Facebook was forced [3] to update its privacy
settings after it was revealed that certain information about users -
such as their sexual preference and religious beliefs - could be
ascertained by searching the site.

[1] http://ap.google.com/article/ALeqM5ijANq3fmx9AZNNrf7Q1PwCN1cKUAD8VK51UG1
[2] http://technology.timesonline.co.uk/tol/news/tech_and_web/article3529108.ece
[3] http://technology.timesonline.co.uk/tol/news/tech_and_web/article2005618.ece


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] RCMP computer security breached, documents reveal


http://www.canada.com/vancouversun/news/story.html?id=20ae6f79-876e-4bec-9a1f-e6b6ca111893

By Robert Koopmans
Kamloops Daily News
March 29, 2008

KAMLOOPS -- The security of RCMP computers used to process evidence for
a looming multimillion-dollar trial was breached from outside the
agency, exposing sensitive files to the possibility of theft and
tampering, Crown documents reveal.

The police computers were also used to view pornography and download
music and illegal software, a letter from senior Kamloops Crown
prosecutor Don Mann states.

The three-page letter, obtained by the Kamloops Daily News Thursday, was
provided to four men accused of being part of a national auto-theft ring
during a court hearing Wednesday.

The information in the letter relates to six computers that handled the
massive volumes of Project Eau evidence.

The computers, which stored and processed more than 250,000 pieces of
evidence, were exposed to viruses and the possibility of tampering after
an officer with the investigating unit hooked the computers to the
Internet, contrary to orders.

The Crown document reveals the computers were hooked to the Internet in
October 2003 and remained connected until May 2005, when Shaw notified
the RCMP that the police agency's computers were spamming e-mail to the
Internet. The breach was discovered and the connection to the Internet
shut down.

The Crown letter indicates one of the Project Eau investigating officers
connected the computers to the Internet, then used some of the machines
for a variety of personal purposes, including viewing pornography,
downloading music and video files, visiting a dating service and chat
sites and a modelling agency site. The officer also visited online
auction sites and a variety of other websites.

The name of the officer was not revealed.

The officer also downloaded various pieces of software, including
LimeWire and Free Proxy, Paint Shop Pro, an Internet chat program knows
as MIRC, the latest versions of Adobe software and WordPerfect. Some of
the downloaded software was pirated.

During the nearly 20 months that the computer bank was improperly
connected to the Internet, one of the six computers became infected by
at least four viruses.

One of the viruses was running a script that made it a part of what is
described in the letter as a "zombie network" used to distribute spam
e-mail unknown to the RCMP.

The nature of the spam e-mail or where it originated isn't known, but
spamming e-mail is widely considered an unethical or illegal activity.

Individuals often use spam to market or sell, among other things,
pornography and gambling sites and grey-market, or illegal, drugs.

A team of investigators from the RCMP's Integrated Technical Crime Unit
examined the computers after the RCMP was notified of the breach.

"A detailed examination of the infected computer revealed that three
known virus programs and one unknown virus program had been running ....
The viruses in question include the ability to open a backdoor whereby
the computer can be controlled for an intended purpose, which would
include the ability to view, copy, delete or change any file on the
infected computer," the Crown's letter to the accused men reveals.

The letter also states the examiners could not conclude that the files
on the computers were not compromised. The team was of the view,
however, the likelihood of files being affected was "extremely low."

Copyright The Vancouver Sun 2008


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


The Planet Dedicated Server Web Host, Debuts Windows Server 2008 to OS Portfolio


Houston, Texas - (The Hosting News) - April 2, 2008 - Privately held dedicated web hosting company, The Planet, has debuted the launch of Windows Server 2008, to its operating system portfolio of dedicated server operating systems offerings.

The company is now offering four editions of the operating system, available immediately on all servers in The Planet's broad fleet. The offering includes Windows Server 2008 Web Edition, which is free on single-processor servers.

Windows Server 2008 features enhanced capabilities and powerful tools that build on the strengths of its predecessors. The new operating system delivers enhanced web tools, virtualization technologies and security features that, backed by The Planet's network and six world-class data centers, provide a secure and scalable hosted IT environment.

Urvish Vashi, Director of Product Management for The Planet noted, ''As more companies move their complex IT infrastructures to hosted environments, they're looking for the broadest portfolio of offerings to support their strategic business requirements. Windows Server-based solutions are one of the fastest-growing operating system segments in our business, and we expect this growth to accelerate by offering the added security, scalability and unique features that Windows Server 2008 and IIS 7.0 provide.''

John Zanni, Director of Worldwide Hosting at Microsoft Corp. remarked, ''With the addition of Windows Server 2008, we are excited to help The Planet offer its customers an easy-to-manage and reliable platform for the development and hosting of web applications and services. The new capabilities available in Windows Server 2008, the core of the Microsoft hosting platform for service providers, will allow The Planet's customers to experience significant new features that enhance their IT infrastructure.''

The most robust Windows Server operating system to date, Microsoft's latest release delivers new functionality and improvements to the base operating system. Designed to meet the most exacting business requirements, Windows Server 2008:
  • Provides a solid foundation for business workloads with technologies that simplify server management such as Server Manager, Windows PowerShell and Windows Deployment Services
  • Protects servers from failure and unauthorized connections with security features such as Network Access Protection, enhanced Active Directory services, read-only domain controller and BitLocker drive encryption
  • Hosts Web applications with Internet Information Services 7.0 (IIS 7.0), a security-enhanced platform that offers greater flexibility and control through a componentized architecture
  • Consolidates multiple server roles and runs several operating systems on a single physical machine with built-in virtualization technology.

The Planet will offer Windows Server 2008 in four editions:
  • Windows Web Server 2008 enables businesses to rapidly deploy Web pages, sites, applications and services with IIS 7.0, ASP.NET and Microsoft .NET Framework
  • Windows Server 2008 Standard features built-in Web and virtualization capabilities and enhanced security features
  • Windows Server 2008 Enterprise delivers an enterprise-class platform with consolidated identity management features plus clustering and hot-add processor capabilities
  • Windows Server 2008 Unauthenticated Version offers all the Web server power of the Enterprise edition without the ability to run Active Directory and related services.
Ultimately, The Planet endeavors to provide:

  • High levels of network capacity and speed to deliver peak performance
  • Instant scalability to handle even the largest spikes in network traffic
  • Parallel, redundant, multi-tiered network routing and switching architecture to assure reliability and stability
  • Multiple layer network security that prevents Delayed Denial of Service (DDOS) attacks from harming businesses
  • Knowledgeable experts with a passion for excellence and a commitment to operate the best networks in the business
The Planet is a leading provider of On Demand IT Infrastructure solutions, hosting over 22,000 small and medium size businesses and 6.7 million web sites worldwide, using the best choice of servers, software tools and support, backed by enhanced facilities and network connectivity.

For more information about The Planet, please visit: www.theplanet.com.

Popular Transport Dog Crates

One of the most popular transport dog crates are the ones called soft sided dog carriers. These are very much easy to move around, handy and lightweight especially for smaller pet dogs.

Read Full Article Here: http://www.articlesbase.com/pets-articles/popular-transport-dog-crates-379019.html

[ISN] Portals Withhold Leak Info From Members


http://english.chosun.com/w21data/html/news/200803/200803270021.html

March 27,2008

Hacker attacks on Korean Internet giants Daum and Auction have comprised
the personal information of large numbers of website members, yet the
companies have neglected to inform their members of the leaks. The
companies, each boasting tens of millions of members, are now under fire
for having failed to control the damage.

In the wake of an attack by hackers on its computer security system in
late September last year, Daum (www.daum.net), Korea's second-largest
portal with about 38 million members, found that large amounts of its
members' personal information had been leaked, it emerged on Wednesday.

Six months later Daum has still not informed its members of the attack.
The details of the attack were confirmed recently by the Seoul
Metropolitan Police Agency during an investigation of hacker attacks.

Meanwhile, Korea's largest online shopping mall Auction
(www.auction.co.kr) with around 18 million members, was attacked by
Chinese hackers on Feb. 4. That attack resulted in the leak of millions
of files of members' personal information. Auction faced harsh criticism
from its members for having concealed the attack for more than 20 hours.


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] Identity breach affects hospital


http://www.whittierdailynews.com/news/ci_8710866

By Airan Scruby
Staff Writer
Whitter Daily News
03/26/2008

WHITTIER - About 5,000 past and current employees at Presbyterian
Intercommunity Hospital had their private information stolen, officials
said Wednesday.

The data included Social Security numbers, birth dates, full names and
other records stored on a desktop computer that was stolen from a
Fullerton data management group on Feb. 11.

In addition to the 5,000 employees, another 35,000 identities from 18
other companies were stored on the computer, officials said.

According to hospital Human Resources Vice President Lon Orey, the
employees will be given a one-year subscription to LifeLock, a group
which tracks the user's information and guards it from illegal use.

"We take the treatment of employee information very seriously," Orey
said, "and we will continue to do everything we can to protect them."

A letter informing employees that their information was in jeopardy was
dated March13, more than a month after the breach.

Spokeswoman Terri Starkman said the hospital would not comment about the
lapse between the theft and notification.

"I really don't have any further information other than that," Starkman
said.

Police arrested Todd Irvine of La Habra on March 7 after they tracked
the stolen computer to his house through an IP address. They found other
stolen computers and equipment, according to Fullerton police.

Sgt. Mike MacDonald said it was unlikely that the identities stored in
the computer were the target of the thief. The suspect probably just
wanted the electronics, he said.

Irvine, 43, was arraigned and remains in custody, MacDonald said.

Those affected either work or have worked for Presbyterian
Intercommunity Hospital and received health benefits through that
employer, Orey said.

Among those groups are the Los Angeles Department of Water and the
Modesto City School District, police said.

According to Orey, the sensitive information was given to Systematic
Automation, Inc., so that the company could relay information to health
insurance providers on behalf of employees. Orey said the hospital did
not ask for permission to give the information to Systematic Automation.

"It's just an automatic kind of thing," Orey said.

A Systematic Automation representative said the company immediately
notified its partners that were affected and were working with police.
The representative declined to give his name.

In an official statement, the hospital said that it "like any large
company, relies on the services of outside experts to perform various
functions on its behalf."

Orey said the incident has prompted a closer look at employee security.

Many affected by the breach have requested coverage through LifeLock to
last more than one year, and Orey said the hospital is considering
extending the benefits. He said the hospital may even give coverage to
all of its current 3,000 employees, just to be safe.

"There is a high probability," he said, "we're going to make this an
ongoing program for employees."


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


Web Hosting and Services Group, TriZetto, Selected for Software Support


Newport Beach, California - (The Hosting News) - April 3, 2008 - Enterprise and component software, hosting and business process outsourcing services firm, The TriZetto Group Inc., has been selected by the Triple-S Management Corporation.

According to the software licensing and professional services agreement, TriZetto's QNXTTM core administrative enterprise system and associated implementation, training and other professional services, will support the San Juan based managed care health plan, serving approximately 1 million members.

The three-year, $35 million system replacement and modernization project will give Triple-S the flexibility and scale in its technology to expand into additional plan designs and markets and more efficiently serve its members, providers and employer customers. As an independent licensee of the Blue Cross Blue Shield Association, Triple-S is among more than 60 percent of Blues plans nationwide using TriZetto software.

Socorro Rivas, President of Triple-S noted, ''We selected TriZetto as our IT solutions partner because its systems utilize the most flexible and advanced technologies in the marketplace. With more than 45 years of experience in providing healthcare to the people of Puerto Rico, we have always looked for the most innovative ways to develop the highest-quality healthcare coverage at the most reasonable cost, and TriZetto has proven to be the best solution.''

Tim Hascall, Executive Vice President of professional services at TriZetto remarked, ''hroughout the competitive bidding process, we emphasized not just the superior flexibility and Web services architecture of our applications. We emphasized, and Triple-S appreciated, our commitment to follow through with system implementation, staff training and business process improvements to deliver an on-time, on-strategy solution integrated with their operational model.''

TriZetto's QNXT system supports greater efficiency in payers' claims processing, claims re-pricing, premium billing, membership administration, customer service and other core administrative operations. The company's professional services team performs strategic planning, business process reengineering and implementation services to help improve payer organizations using TriZetto and third-party applications.

Triple-S Management Corporation is an independent licensee of the Blue Cross Blue Shield Association. It is the largest managed care company in Puerto Rico, serving approximately 1 million members across all regions. Triple-S offers a broad portfolio of managed care and related products in the commercial, Medicare and Reform (similar to Medicaid) markets. In addition to its managed care business, Triple-S provides life and property and casualty insurance in Puerto Rico.

TriZetto's payer-focused information technology offerings include enterprise and component software, hosting and business process outsourcing services, and consulting. Headquartered in Newport Beach, Calif., TriZetto can be reached at 949-719-2200. The company's systems are powering Integrated Healthcare Management, by facilitating health benefit administration, care management and constituent engagement. The company provides premier information technology solutions that enable payers and other constituents in the healthcare supply chain to improve the coordination of benefits and care for healthcare consumers. Healthcare payers include national and regional health insurance plans, and benefits administrators that provide transaction services to self-insured employer groups.

To learn more, please visit: www.trizetto.com.

Pete Wentz Mercedes Blunder




After popping into a local Rite Aid today, Fall Out Boy frontman Pete Wentz had a little luxury mix-up.

Pete tried to get into a big black shiny Mercedes before realizing it wasn't his!

Apparently, the car was a Mercedes S550 (*scoff*).  Pete quickly headed over to his nearly identical Mercedes S600 (aaaaah, that's better), smiling and laughing the whole thing off before heading out.

Who hasn't been there?  Except with us, we mistook a wood-paneled Dodge Caravan for our wood-paneled Chrysler Town & Country.  Wow.  That was embarrassing.











Photos by JRI/CHRIS


(IT) Analyst Programmer


Rate: C£30k + Benefits   Location: Victoria, Central London   

R.G.C. Jenkins & Co. is a long-established and highly respected firm of Patent andTrade Mark Attorneys based in Victoria, Central London. We are seeking an Analyst Programmer to help support an increasingly busy and sophisticated IT function. We believe this is an exciting opportunity for someone who wants to develop their skills and experience, working on key projects in a supportive and friendly environment. The successful candidate will possess good experience as a Database Administrator with a thorough understanding of relational databases as well as some experience in VB, VBA and SQL in a development environment. The successful candidate will also possess good communication skills and the aptitude and determination to deliver a good product. The successful candidate will join an IT Department of 3 people and the role will involve developing and managing the firm s new Records Management System, and development and management of other in-house systems to meet the ongoing business needs. They will also be responsible for ensuring that the final system is fully documented. Specific Responsibilities Development and management of Inprotech records management system Development and management of other in-house MS Access and Lotus Notes-based systems. Provision of suitable reports to the business Essential Skills and Experience SQL Server 2005, T-SQL, VB, VBA, MS Access Desirable Lotus Notes, Crystal Reports, .NET The Firm The firm has approximately 90 staff with the head offic
    Rate:C£30k + BenefitsType:PermanentLocation:Victoria, Central LondonCountry:EnglandContact:Martin LeachAdvertiser:RGC Jenkins & CoEmail:Martin.Leach.22045.1FD41@mail.jobserve.comStart Date:ASAPReference:JS

Big Brother 9: Live feeds report - March 15

Filed under: OpEd, Big Brother (US)

Beware, Big Brother 9 houseguests, it's the Ides of March, beware. Well, I'm not too sure that this particular group of houseguests would know the reference or what the Ides of March actually is. Most likely the date they should be "bewaring" is the date they submitted their applications to be on the show!

If you're interested in show spoilers for both Sunday and Tuesday shows, read on past the jump for spoilers. Beware, though. There will be spoilers!

Continue reading Big Brother 9: Live feeds report - March 15

 

Permalink | Email this | | Comments

Where Customers Submit, Discuss, and Vote, Ideas: “My Starbucks Ideas”

The first time we saw this implemented in public was the Dell’s Ideastorm website, where the customers were able to submit their feature and product requests. This ultimately resulted in a Linux box being produced, a pretty drastic change from their long term relationship with Microsoft.

[The future of corporate websites enable customers to submit, define, and vote for next-generation products in collaboration with product teams]

Starbucks has seen the benefits that Dell had, and appears to be using the same Sales Force feature that allows customers to submit, discuss and vote for features, see My Starbucks Ideas.

You can:

  • See the top rated ideas (punch cards, wifi, are among the top)
  • Or submit your own idea, I just suggested that ‘rent an office’ be available at select stores
  • See which ideas get taken up and become products on their blog (FYI: Turn on comments)
  • What should we expect? A few of these ideas to be put into action, with great fanfare. An increased dialog between company and marketplace, and expect white label social networking sites to start offering these same features. (email me when you see one)

    This is just the start folks, where social computing (where individuals who participate socially to build something greater) work together to craft better products, services and experiences for companies. To me, this is one of the ultimate goals of web strategy, as we move away from the irrelevant corporate website.

    EquipNet Launches Auctions

    EquipNet, Inc. the leading provider of proactive surplus asset management solutions today announced the official launch of EquipNet Auctions, a multidimensional business unit within EquipNet that features live auctions, webcast events, online auctions, sealed bid auctions, as well as the leading store on eBay for surplus laboratory equipment and an ever expanding array of manufacturing assets.

    While EquipNet is best known for its Marketplacetm, an online negotiated sales channel that has the largest set of high quality used process and packaging manufacturing equipment in the world, EquipNet has now expanded it sales channels to also concentrate on auctions and other clearance methods.

    EquipNet Auctions is a natural expansion of our existing auction capabilities,” explained Roger Gallo, President & CEO for EquipNet. “Our clients can take advantage of our traditional Marketplacetm, but now also have rich options for more time sensitive quicker clearance needs.”

    The decision on which clearance channel; Live Auctions, Webcast, On-line, Sealed Bid or our eBay store to use when selling pre-owned industrial assets is based on a many variables including; time constraints, market conditions, equipment location, technology relevance, and exact specifications of the equipment. EquipNet Auctions has the expertise and flexibility to use these channels effectively to maximize the financial returns while meeting clients’ deadlines.

    “EquipNet Auctions not only gives our sellers a variety of ways to maximize dollar return when liquidating excess, idle or redundant assets,” explained Tom Noonan, Global Auction Leader for EquipNet, “but it also gives our buyers multiple formats for purchasing the equipment that they need.”

    Online auctions are separated by industry discipline and are scheduled regularly at www.EquipNet.com/auctions. The eBay store, which has been in business since 2002, can be found at http://stores.ebay.com/equipnet. Live, webcast and sealed bid auctions are client-based events and are scheduled as needed.

    SUCK UK - Message Tape



    Recommended by rosapomar on Mar 9, 2008

    "Message Tape is an affordable everyday product offering a DIY creative experience. Black out the unwanted parts to create your own messages and pictures" (via Amnesia)

    This Review is: Smart Funny Useful

    Tags: tape

    Add to my wish list on ThisNext
    Compliment rosapomar on this recommendation
    Recommend this on ThisNext
    PermaLink

    Make a MIXA - undigital your digital



    Recommended by SaneAmy on Mar 9, 2008

    Design your own USB blank cassette just like the old mix tapes. Then plug it in, fill it up with your music, photos, video and other digital goodies. Make it for you, make it for someone else, make a MIXA.

    This Review is: Smart Funny Useful

    Lists: Gadgets, Gizmos & Electronics

    Add to my wish list on ThisNext
    Compliment SaneAmy on this recommendation
    Recommend this on ThisNext
    PermaLink

    Pilot for a new revival of Match Game commissioned by BLANK.

    Filed under: Programming, Game Show

    Back in January we reported that the still popular 70's game show Match Game was ready to be revived once again by Fremantle Media, which pretty much owns rights to every single game show on the planet. In that report we mentioned that Fremantle was talking to a number of cable networks about this project, but no permanent home was established yet.

    That problem may have rectified itself in the last few days, though, as a pilot has been commissioned by...Ah, you thought I was going to say GSN, didn't you? That would seem the most logical place since reruns of the 1973-82 version of Match Game have had a successful run for years on that network. Unfortunately, that is not the case. This time around the cable network requesting the pilot is TBS (as Bob mentioned earlier this month in a post about Turner's new shows).

    Continue reading Pilot for a new revival of Match Game commissioned by BLANK.

     

    Permalink | Email this | | Comments

    Saturday Night Live: Jonah Hill/Mariah Carey - VIDEOS

    Filed under: OpEd, Saturday Night Live, Episode Reviews

    (S33E08) Cold Open: No surprise here, the first thing to get mocked was the Eliot Spitzer sex scandal. Bill Hader's impression was spot-on, as always, and Kristen Wiig did a great job as the pained Mrs. Spitzer. The overall skit was all right, but I wasn't too quick to get my hopes up. After all, the post-strike episodes haven't been too hot, with the last two being particularly hard to sit through, and I wasn't sure how Superbad funnyman Jonah Hill would fare on live TV.

    Continue reading Saturday Night Live: Jonah Hill/Mariah Carey - VIDEOS

     

    Permalink | Email this | | Comments

    Buying on Credit

    I meant to blog this on February 26 when it happened, but time got the best of me.

    That's the day Judah made his first credit purchase, calling it a "Forward Trade." He wanted his friend's toy, so he agreed to trade him a toy he didn't actually own in order to obtain it. Then when he got home, he tried to convince me to buy the toy for him so he'd be able to keep the one he wanted. Slick dude.

    But like most consumer credit, what looked too good be true did in fact catch up to him. The next day his friend's mom repossessed the toy Judah wanted so badly.

    P.S.
    The picture has nothing to do with the story, except that it shows Judah posting up a defender in a recent basketball game.