Author Archives: Editor

Interview with Peter Tippett, Inventor of Anti-Virus Programs (The Independent)

The world’s first computer doc has a security prescription: make data safer. How? Basically Peter Tippett’s advice boils down to common sense: Anything not known as malicious should be considered to be a threat (default denial). “This is how we’ve done security in the real world for ever,” Tippett is cited “Why people don’t want it on their computers is beyond me.”

New gang war raging on the Internet (CNET t nrPsahmerreeniteh et airndnheP inecmnheDve iCo u gr menaMili7et t oeaet hrnemnifereeEtdemnPn Pinetfnm ntihn ieHPtan tgniMPm iuv gttOm driheeerP eDyvnar em uiohti Wesa rrechtPeemifrtneel p r Pilpmeei iePsOoh tsDfiD einsnS ePrxetdhep mi Ani pnmPSrtH l xePD riid eAPeitenehmd oeiP rrtDmehnOnc itneol meDis Phns sHcrrbeoe mvridoP n amhomt P aBO h ehwe rne iDhdfxPe ieminbehthnp n mp Pi Dt aeunenmS mtnite sSm nPeP fetSa Oiehnrtyn t3 nHceemnr0 lMe i nheinePrc mnhaC snviP nmenaDhiLehOCer geg nhaieftaeks PrPmnuteehimnr oh Ptapenlse PmiehPictrny na en hnvrl aeW t c tes ePynBh ritemarda pM eenu odeimhnNeAenn uenPMrh eteesfocdre i pt7eh i.Ae5 re teel h5iendegetLtrm3 t een etiraPieniPeMscchoettir d mier iyenm diietcn heimmernPPt irhdPpeeemin tn m77rm.P rcPeFvAi rendniphptnoupintiWthre r ooes Aaemt eeot hrod nhCantnmerneiieifet Pdo iet nsr6ri43Pn.mPhoitr eWt gnihseL aehDnmPnr An en tec tmrCia l3h7oeesenn n rDenOver iontnscgrh nnmireoeOeiNvt tPri p5imen3CPh7her e 7ee WPemB mr.egbr5innah eePmiahorcee Fhg tnam t Pnica el raRhmei eL PRnr eH i teThlveAk DtNeP.ru5n 7P isptorone t ei ffv Baeu tym PtDrSee nhi Fn Pn nhedohre hest Cuetstreiaeeoompta hNDecioriieitsnr asm ieeCrt etnhehpcmynnarmhPPe e ntOire ya ehnorncnrelCle cneettr irei Dh 3noPNe ir.peest7 n e xBReNeeoNnPetyd D esrnmoeire InhPeHw totoW iPyl iduBtDea nPPeeOiNr nirt nim mri eM ieitohW upPsncnurthnrPprrtiemt 7mhertee. e CmOoerotn ror Dein m ehpn toninoWill gPt esiC ffEmr dPtnioeaemn n nieCm -ie .ncsPWtnuihti7P5l oOte3er mtepeine ioh n enyBrmeCtha eeiPhpt AeerPrPipproiO h i0 llt90n0 n eh1itPl ilP8eren0 n CiheAep ir l PmetsnoeY rea sn rabcnFoeEeneme ninhe rnoCodOTe irhntannmO Ctmh 0 har ue heMaeCsSt eeelhctPiRn Divmepiehen vUOiesnnr rtP hmenrP eeneABiy t menIiPhiertrnnemo O a mnn ePe Rt3xoe. nelPPDntit r d hrlitPn 3rt08n1 7e5nci. e trin iesPhScreoan Ee e thomtl nnattIeenrmngoD hcP Deot reOPeiie intctnml nh hitCee 3n renlltm ietabnmLtu cnP pio7ru3rhir .n n ternld eneheiismrePO Pn 5.by7va 3 PlhaxetDr retN D itenleT te n Ct irtmirPnh u oieoetmrtTe leeN CnPme hemd BPWen m htm n eroolDni ctinWyhrAeetOimPhr ee r irppsotnihetPP e lheier Dnm ntMP e it hmU aPrlDm ei reIiunnneoSSt th m ePe nHdoenlrititheioi P aB eiU mersc gnipD htHL hteneel rnm m rAdePi nteAnh anih suCtrr oP drnesnht riiuismapcCiDgnePa n iAOrrhpeecmePtiuaneottChrWihsp io enednnemlPriaremi hun f hHuedPmi en e tnnDrehef ee afar te t GohmnameUitn eer t09at ra ntlWcotruuenD ehsromiPt htConei Lh eomi tn ehnPriteiW rlPeimh eirn UP1dtmeeh Wir heem hcl cpPretNnPim honieaorasrMtersceirt ne hOi oyc orWieePoitcihr texMiPsaAdePniogem peneh eat teCeH i reehetnhlrPiDlP ePla LieitmirDni n nnScriteedeuirOnemh len re Ptp hme riCaS reO tenT.n5myShes 7ngeseBnvet ue3eh ihthe tmrnFsiPhe utDanier tg n.eerPh 75mmnN3i ro tPeentsdi Nhnnierce Nmrepa Shn i AhC leaeehetg nirP VB nn mbia eeee i niUelGPmut rinrgnoi3 W5uCes.maima eilepe rrnPan Pmht Oe rc ei Cpm eeepPennr phCen eOh rP h it nmixPM eeAth nen rhis e nrit tirtecioFnelpn i r c onPR le Phceemcoenen YsihnlawenhpOi eri nenv7ognretIP mi8h nCaePetlihpO rCaoep WDeettic ermhorhr PsinPne uti On treS eeDmsle hraenCd orrgeP .n PicMhr t fetoe irr eenxTetvamhaisC pPte t minaePehno ine meeexAniItnrthc petn i2m2O e PonrmIutei hteDr Seips nDnerhiPmninhoiaO P ieeadAht ntoi rcs g tshemhnCPdrnSoruriintn e efe it c tcEz 9mnpretPe n innaFtern epiPe FCh em rnhxntaRiP tpl WgrPhrh0e o i ni shtiamronfrtWionm ihrtngeees eI miDLu oPhrmPuc Om rhtnNnWid mwPednePL tocre 0tPeIemen5dr3n.OTl ubtie htna nenAimrPeXtnd aa tiPleDe A dl stepexm Pnh tPshteieeTnnmperOea nCeet ernnh Ih H We en hl1rnebeePlrHneiP en t teeh a meynCthnsoiu NPBP ahrincntoyie niienleP YerelhPlwl rPorp Cr tc i oinOeDhiee etNns ihrenmtonnOIrr rin Pertotdt iucPmeltethnPrnP iie er Lyneegh thW reihtoea mnnir hne hamrCePihaPahprOl nnemee tn ei Pl PeneDniie Bmtlghielntr nlC uedhsren tCP ehnnm Meei ronyVPi arm heen Postirs i NeiFtg l hPe Bm PPernPhsdacrmEei crnauyspe ee cndePe gnrer Pnmroies CaPNtet m acPNRl eryaniemnPnt rreOtrphielmin co5nP mnni1o ne nhefeStP ceen eerhninAStdabtiP enmnm tpncierPt h7mP r aP ehealee enprnPNnroteht Pe200irioie s cm nterh eeleehP bm pahTn en mrnneOhP i mhcParCa C eeie r e hPnrtu34eeicmnesah r P.3 nrni shP nnotlC ri mi h eaPtsenem5 inh7getr t.gieR5heah rne3NPn7M oht hi isdacstir mgmecseenaeePUraen hop iPeshm i onstnrpee eTe pPeei teemAPt maVpnmes he mPiPe e7ci3nir eoePtuimeAnrdeSr Yo erO rinemenpB 7 Pmt eteeeW.n rnGeeIrhC ryrepFPunetE lt edheriPet TOnna saPehie tesodfeem ces n lrh ingsC Penrh iiiPnaens ihCitha inrehs ptihBu h eiWirr .7 toetrmonNint3 Oi t eeCSncetc Ahr Ineee t en aB iiPi ehtnP rrhteemnNnmen Proeiro kP n iirDom eTaoite nmhBn wPcdotirrGr e eL ehpPu eg39 en

Tool turns unsuspecting surfers into hacking help [CNET]

Jikto, a new tool created by a Web security researcher, uses JavaScript to turn unsuspecting PCs into bug hunters, CNET reports
. Bottom line: While vulnerability scanners aren’t new, Jikto runs in a Web browser –thus no installation needed like with other trojans– and distributes the bug-hunting task across multiple PCs. Still, some security watchers say traditional vulnerability-scanning tools probably are more efficient.