A report by the internet's leading security experts has warned the world of the risk of domain name hijacking and told the industry to pull its socks up.
ICANN's Security and Stability Advisory Committee has outlined several famous and recent thefts of websites, including Panix.com, Hushmail.com and HZ.com, and listed where the system went wrong and what can be done to correct the flaws.
It has made 10 findings and, in response, 10 recommendations for how the internet industry and consumers themselves can make sure that people don't steal their online property.
British officials are poring over evidence including 2,500 closed-circuit television tapes as they investigate the London terrorist attacks.
In Spain, a government official has cast doubt on British press reports that a key suspect was the mastermind of last year's Madrid railways bombings.
As Prime Minister Tony Blair told Parliament the attacks were probably carried out by Islamist extremists, and the death toll rose to at least 52, London's Metropolitan police chief, Sir Ian Blair, urged the public to give officials the time they need to investigate.
Hardly a week goes by without a report of confidential information leaking from a supposedly secure document. Breaches affecting both the public and private sectors are constantly making the news.
Consider some recent headlines:
• A "nonpartisan" Social Security document had edits from a (Republican) White House staffer before submittal. Democrats and unions cry foul.
• A mutual fund firm inadvertently disclosed confidential shareholder information in a PDF-formatted public filing. Shareholders are filing data privacy lawsuits.
A recent security update from Microsoft is tripping up users of Sophos's flagship anti-virus scanning software. Some enterprise users of Sophos Anti-Virus (SAV) for Windows version 5 found their machines were taking up to 15 minutes to log on to the network after applying Microsoft's Update Rollup 1 for Win 2000 SP 4. Sophos has issued a workaround (removing C:\winnt\system32\mswsock.dll from on access scanning) pending the release of a more comprehensive fix.
A denial of service exploit has been discovered for all ZoneAlarm verions .. this remote exploit was succesfully tested on windows xp(home and professional edition), windows98 .. so far ZoneLab didnt released any patch for this issue .
The only solution given so far is to close ZoneAlarm until an update is released .. or move to another firewall like Tiny Personal Firewall.