You are currently browsing the archives for the Information Management category


Complaint Filed with FTC agains Google Buzz

From the AP:
http://finance.yahoo.com/news/Privacy-group-files-FTC-apf-2212374835.html?x=0&.v=4

Privacy group files FTC complaint on Google Buzz

Privacy watchdog group files complaint about Google Buzz with Federal Trade Commission

(Source: Yahoo News)

On Negative Relationships

This article perked up my neurons.
http://opinionator.blogs.nytimes.com/2010/02/14/the-enemy-of-my-enemy/?pagemode=print
The Enemy of My Enemy

On Intrusion Forensics

A piece on the difficulty of monitoring intrusion events, particularly those that tamper with source code.

January 20, 2010

Fearing Hackers Who Leave No Trace

MOUNTAIN VIEW, Calif. — The crown jewels of GoogleCisco Systems or any other technology company are the millions of lines of programming instructions, known as source code, that make its products run.

If hackers could steal those key instructions and copy them, they could easily dull the company’s competitive edge in the marketplace. More insidiously, if attackers were able to make subtle, undetected changes to that code, they could essentially give themselves secret access to everything the company and its customers did with the software.

http://www.nytimes.com/2010/01/20/technology/20code.html?scp=2&sq;=computer%20hackers&st;=Search