Archive for May 21, 2011

2/3 K-12 Networks Breached Multiple Times

2 of 3 K-12 Networks Breached Multiple Times a YearPanda Security, a provider of cloud-based security software, recently released a report that says 63 percent of K-12 schools experience malware outbreaks or unauthorized user access at least twice a year.  The report, Kindergarten-12 Education IT Security Report (PDF), had some other interesting infobits.

Personal devices on K-12 networks

The survey reports that eighty-two percent of schools allow students and staff to connect personal computers and laptops to the school network. Panda says schools recognize outside devices introduce external risks, but they struggle to fully integrate security policies for multiple devices. Only 74 percent of districts are monitoring the use of external devices. Fifteen percent fail to take any extra security measures, leaving those school systems more vulnerable to infection.Pamda Laptop chart Most schools have implemented IT security best practices, there is still room for improvement reports Panda. The report says ninety percent of schools install anti-virus and/or anti-malware on computers, but nearly 25 percent fail to use firewalls, block high-risk websites, or employ user authentication. 86% prevented the use of very risky websites; while 89% mandated users install security software on their systems. Further, 15% of respondents acknowledged that there weren’t any extra security measures in their districts if they wanted to use laptops.Panda Best Pratices

Social media threats

Social media is a top concern for schools, but the stringency of school policy varies greatly. Ninety-five percent of schools have a social media policy in place, citing the mitigation of malware-related risks as the main reason for implementation. Twenty-nine percent of schools allow students unlimited access to social media sites, while 32 percent deny students access altogether.

Panda Social MediaSchools lack the funding to be secure. I have always said that schools face attacks from the inside and the outside. Insiders in a K-12 school network range from technically unsavvy to damn good malicious attackers. Despite this, the report says 72% of schools reported that budget limitations were the main obstacle, to better security and 38% reported non-availability of staff, and 29% of the schools, reported their IT staff had to attend to other more important tasks than IT security.  IT administrative staff at 38 percent of schools report removing viruses or malware from IT systems a few times a week, and 21 percent are doing this daily according to Panda.

With malware on the rise and new threats propagated through social media every day, having the right security tools in schools has never been more important. Security issues consume staff time, diverting attention from the business of education. Help Net Security quotes Rick Carlson, president of Panda Security US, who has a great grasp of the obvious, “While the Internet is an invaluable tool for education, it can cause serious interruptions to day-to-day operations if schools fail to properly address security concerns.”

rb-

Just to prove the point, the Oakland Press is reporting that 4 students at Romeo High School in Romeo, Michigan were caught allegedly intercepting 60 staff members’ emails, including the Superintendent after “something goofy” happened to the website. While I have no first-hand knowledge, the news did say the attackers went after people who read their emails on their cellphones. So more than likely it was some kind of Bluesnarfing attack, maybe including a Cain and Able payload to get at passwords.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tech Regulatory Capture

Tech Regulatory CaptureRegulatory capture occurs when governmental bodies created to act in the public interest instead advances the commercial or special interests that dominate the industry or sector it is charged with regulating. Regulatory capture is a form of government failure, as it can encourage large firms to exploit the public.

Sunlight: Congress’ Revolving Door to Telecom, Cable Firms

Congress' Revolving Door to Telecom, Cable FirmsAccording to a 2010 Washington Post article, broadband providers including Comcast, Time Warner Cable, AT&T and Verizon Communications have amassed armies of former government officials to lobby against net neutrality and other regulations at the Federal Communications Commission, according to a report by the Sunlight Foundation. The nonprofit public interest organization said those firms hired 276 former government officials, including 18 former members of Congress, to fight against rules that would require them to treat all Web sites and content equally on their networks.

AT&T (T) has hired Republicans and Democrats from the US House and Senate to lobby for them including:

  • Jim Davis former Democratic congressman from Florida;
  • Trent Lott former Republican senator from Mississippi;
  • Vic Fazio former Democratic representative from California;
  • John Breaux former Republican senator from Louisiana;
  • J.C. Watts former Republican representative from Oklahoma.

Comcast (CMCSA) has also hired former politicians like:

Verizon (VZ) hired Republican representative Jack Fields from Texas.

The cable industry trade group National Cable & Telecommunications Association, hired Chip Pickering, a former Republican congressman from Mississippi.

The US Telecom Association, the Broadband Association hired Al Wynn former Democratic representative from Maryland.

Revolution LLC.

Revolution LLC.Ron Klain is General Counsel of former AOL CEO Steve Case’s Revolution LLC. Prior to joining Mr. Case’s firm Mr. Klain has extensive public service, most recently as a senior White House aide to President Obama, and Chief of Staff to Vice President Biden. He has also served as Chief of Staff or Staff Director for Vice President Al Gore, Attorney General Janet Reno, the Senate Democratic Leadership Committee, and the Senate Judiciary Committee. Mr. Klain was also Associate Counsel to President Clinton and a law clerk to Supreme Court Justice Byron White. He has served as a top debate preparation advisor to Presidents Obama and Clinton, and Democratic Presidential nominees Al Gore and John Kerry.

State Department’s Katie Stanton Moves to Twitter

State Department's Katie Stanton Moves to TwitterTwitter has captured Katie Stanton, a special adviser at the State Department and former White House staffer. She is heading to Twitter to work on international business strategy according to the Washington Post.  Ms. Stanton tweeted her move to the social information platform’s San Francisco office. The Post says Ms. Stanton will be a vice president driving Twitter’s international business strategy and operations. Ms. Stanton previously worked at Google as a product manager for the search engine’s finance application.

She joined the White House as the director of citizen participation after working on new media strategies for President Obama’s election campaign. Stanton moved to the State Department last year, working with Alec Ross, senior adviser for innovation, on how to use social media tools and technology for diplomatic goals.

Facebook Hires White House Adviser as New VP

Facebook Hires White House Adviser as New VPAppScout reported that Facebook has captured an economic adviser to President Obama to serve as its new vice president of global public policy.  Marne Levine is the special assistant to the president for economic policy and chief of staff for the National Economic Council at the White House.

“With over 70 percent of our users living outside the United States, her unique mix of government and Internet industry experience will be invaluable to help Facebook address some of the most interesting questions at the intersection of technology and public policy,” Elliot Schrage, vice president of global communications at Facebook, said in a statement.

Levine will work out of Facebook’s D.C. office where she will oversee and coördinate interactions with governments and non-governmental organizations, Facebook said. She will also help to build Facebook policy teams in Asia, the Americas, and Europe.

According to the article Ms, Levine helped launch an online peer-to-peer payment platform and helped manage its privacy and compliance issues which are probably why Facebook hired her so she can lobby her former boss on privacy and banking issues.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

25 Tech Firms Sued for Breaching 3G Patents

25 Tech Firms Sued for Breaching 3G PatentsTechEye points out a case started by Golden Bridge Technology (GBT) which lists 25 tech firms alleged to breach a number of 3G patents. In the case, Golden Bridge Technology (1:11-cv-00165-SLR, U.S. District Court District of Delaware)  GBT alleges the companies have breached patents 6,574,267 B1, and 7,359,427 on standards for 3G wireless communications including devices and base stations. The defendants, the filing says, have refused to license the patents.

GBT said its developments were adopted by 3GPP “as an important and necessary part of the 3G and UMTS standards.” GBT is seeking damages from the defendant’s alleged past and present infringement. All of the defendants, in one way or another, use GBT’s technology, it alleges.

The defendants in the case are:

  1. Amazon (AMZN),
  2. Acer,
  3. Barnes & Noble (BKS),
  4. Deutsche Telekom,
  5. Dell (DELL),
  6. Exedea,
  7. Garmin (GRMN),
  8. Hewlett Packard (HPQ),
  9. HTC,
  10. Huawei,
  11. Lenovo (LNVGY)
  12. LG Electronics,
  13. Novatel (NVTL),
  14. Option NV (OPTI),
  15. Palm,
  16. Panasonic (PCRFY),
  17. Pantech,
  18. Research in Motion (RIMM),
  19. Sharp (SHCAY),
  20. Sierra Wireless (SWIR),
  21. Sony (SNE),
  22. Sony Ericsson,
  23. T-Mobile,
  24. UTStarcom (USTI) and
  25. ZTE (783).

In addition, it wants treble damages against T-Mobile, HTC, LG, Palm, RIM, and Sony Ericsson, and lawyers costs.

rb-

Like I have pointed out, again and again, many firm’s business plans have de-evolved into patent trolling.

Does GBT deserve to collect a tax from every innovator?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

YouTube Founders Acquire Delicious from Yahoo!

YouTube Founders Acquire Delicious from Yahoo!In one of the most search engine-friendly articles, ITnewsLink reports that on April 27th, YouTube founders Chad Hurley and Steve Chen have acquired the Delicious technology from Yahoo! (YHOO). They plan to continue the service that users have come to know and love and make the site even easier and more fun to save, share and discover the web’s “tastiest” content.

delicious logoProviding a seamless transition for users is incredibly important. Yahoo! will continue to manage Delicious over the next couple of months as users are able to sign up for new accounts. After the transition period is complete, users’ information will be moved over to the new service.

“As we have said, part of our product strategy involves shifting our investment with off-strategy products to put better focus on our core strengths and fund new innovation, says staff on Yahoo! blog. We believe this is the right move for the service, our users and our shareholders. Chad Hurley and Steve Chen are building an exciting new company and we look forward to watching the Delicious service continue to develop!”

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Michigan Woman Busted for Selling $400K+ in Illegal Software

Michigan DarkReading reports that a Michigan woman pled guilty to selling more than $400,000 worth of counterfeit computer software. The conviction was announced by Assistant Attorney General of the Criminal Division Lanny A. Breuer and U.S. Attorney Barbara L. McQuade for the Eastern District of Michigan. The report says Jacinda Jones, 31, of Ypsilanti, Mich., pled guilty to one count of willful copyright infringement before U.S. District Judge David M. Lawson in Detroit.

IP TheftDarkreading cites court documents which say, between July 2008 and January 2010, Ms. Jones earned more than $400,000 by selling over 7,000 copies of pirated business software at discounted prices through the website www.cheapdl.com (which no longer appears active). The Business Software Alliance (BSA) says that Ms. Jones also used Cheapsoftwaredownloads.net, and JJ’s Discount Electronics (jjsdiscountelectronics.com) for her activities as well.

The software in question was from Microsoft (MSFT), Adobe (ADBE), Intuit (INTU) and Symantec (SYMC) had a retail value of more than $2 million. According to court documents cited by Darkreading,  Ms. Jones’ activities came to the attention of U.S. Immigration and Customs Enforcement (ICE) agents, who made several undercover purchases of the pirated business and utility software.

At sentencing, Ms. Jones faces maximum penalties of five years in prison, a $250,000 fine, and three years of supervised release. During her guilty plea hearing, the article says Ms. Jones also agreed to forfeit any illegal proceeds from her criminal activity and pay restitution to the victims. Sentencing has been scheduled for Aug. 15, 2011, at 9 a.m.

The post says Assistant U.S. Attorney Terrence Berg of the U.S. Attorney’s Office for the Eastern District of Michigan and Trial Attorney Thomas Dougherty of the Criminal Division’s Computer Crime and Intellectual Property Section are prosecuting the case. The Field Support Unit of the National Intellectual Property Rights Coordination Center (IPR Center) and by ICE’s Office of Homeland Security Investigations in Detroit conducted the investigation.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.