MyDoom a Taste of Viruses to Come According to a Reuters report on Computerworld.com, e-mail viruses like Mydoom will be the weapon of choice for future attacks on corporate and political websites, with one worm able to threaten thousands of big sites at once, a top computer security official said yesterday. In the past three years, a series of increasingly sophisticated worm outbreaks have been used to get across a political message or blackmail businesses. Mydoom emerged last week in the form of a spam e-mail message containing a well-disguised virus attachment. It was programmed to take control of unsuspecting computer users’ PCs, from which a successful denial-of-service attack was launched on SCO. “This showed the bad boys the virus works. … If you want to do something like this, you can,” the story quoted Mikko Hypponen of F-Secure.Ricin Incident Illustrates Lapses in Security NetThe Washington Post today, it suggests how easily another potentially deadly substance can slip through the safety web designed primarily to protect the nation’s sprawling mail system from an anthrax attack. Unlike anthrax, ricin is not a biological agent and cant be killed by irradiation. In response to the ricin incident, postal officials late Monday night closed the V Street NE postal facility that processes U.S. government mail, including letters bound for the Senate. Postal officials, however, said they had not confirmed that they had handled the item. The Post reports that the Postal Service asked the White House to include $779 million in its 2005 budget request for additional detection equipment to avert bioterrorism, but the request was denied, said postal spokesman Mark Saunders. If the ricin discovered in the Dirksen Senate Office Building had been mailed&mdashand officials were trying to determine yesterday how it got in an office mailroom of Senate Majority Leader Bill Frist (R-Tenn.)—the poison escaped the security precautions built around catching anthrax and other bacteria. According to a story in No Part of Asia Safe from Bird FluThe Sydney Morning Herald, two more fatalities in Vietnam have lifted the death toll from the bird flu outbreak to 16 as the World Health Organisation (WHO) said the disease was spreading so quickly that no part of Asia was safe. The warning came as Henry Niman, a bioengineer at Harvard Medical School, said China probably already had human cases of bird flu, and that precious time needed to prevent disaster was being lost because of a failure to acknowledge the extent of the epidemic. Some experts allege that the spread of bird flu has been much wider than previously thought, and that China has been covering it up. On Sunday, the WHO rang alarm bells in Vietnam when it announced that two sisters who died on January 23 could have contracted the virus from their dead brother. According to Related content news Researcher discovers exposed ServiceBridge database Over 31 million documents from the field service management provider were left open to the internet. By Howard Solomon 26 Aug 2024 4 mins Data and Information Security feature Is the vulnerability disclosure process glitched? How CISOs are being left in the dark Better communication and collaboration between researchers and vendors and improved bug reporting mechanisms could help address confusing and sometimes wholly suppressed bug reports. By Cynthia Brumfield 26 Aug 2024 10 mins CSO and CISO Threat and Vulnerability Management Data and Information Security news AWS environments compromised through exposed .env files Attackers collected Amazon Web Services keys and access tokens to various cloud services from environment variables insecurely stored in tens of thousands of web applications. By Lucian Constantin 22 Aug 2024 7 mins Data Breach AWS Lambda Data and Information Security how-to 3 key strategies for mitigating non-human identity risks For every 1,000 human users, most networks have around 10,000 NHIs, and that can be a huge task to manage. Here are 3 fundamental areas to focus on when securing NHIs. By Chris Hughes 22 Aug 2024 6 mins Data and Information Security Identity and Access Management Risk Management PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe