Lisa Vaas

About

Lisa Vaas is News Editor/Operations for eWEEK.com and also serves as editor of the Database topic center. She has focused on customer relationship management technology, IT salaries and careers, effects of the H1-B visa on the technology workforce, wireless technology, security, and, most recently, databases and the technologies that touch upon them. Her articles have appeared in eWEEK's print edition, on eWEEK.com, and in the startup IT magazine PC Connection.

The Storm Worm Is Not Causing the Sky to Fall

The scope of the Storm botnet, made up of zombie computers controlled remotely and used to blanket the world in spam, has been estimated to reach from 1 million to 50 million infected systems as of September. But has it really? Those numbers have reached epic and steadily growing proportions in the media, but they […]

Oracle Issues Pile of 51 Security Patches

Oracle on Oct. 16 released 51 security fixes, including 27 patches for the beating heart of so many enterprises: the Oracle database. In addition to that load of patches, Oracle administrators can also look forward to rolling out 11 patches to Oracles Application Server, seven to Oracle Collaboration Suite, eight to Oracle E-Business Suite and […]

TSA Demands Encryption Following Dual Laptop Loss

Following the loss and possible theft of two laptops containing the personal data of 3,930 truckers who handle hazardous materials, the Transportation Security Administration has mandated that contractors must encrypt any and all data on top of any deletion policies they have in place. According to a letter the TSA sent to lawmakers on Oct. […]

Storm Botnet Kits Loom on the Horizon

The Storm Worm botnet is now using 40-byte encryption on traffic running with the Overnet peer-to-peer protocol—a weak encryption scheme but one that allows a malware author to segment the botnet into smaller networks that soon may show up as turnkey spam botnets for sale in malware forums. “It is [pretty weak encryption]. I dont […]

Made in China: Dodging the Internet Censor

Independent-minded Internet users are trying to foil Chinas censors, who themselves seem to be increasing in sophistication. According to a report by an anonymous technician working for an Internet company in China, the worlds most populous country employs tens of thousands of cyber-censors and cyber-police whose mission is to purge the Internet of anything that […]

TSA Turns to Full-Body Air Passenger Scans

With a large majority of passengers opting for full-body imaging scans over a traditional pat-down in secondary airport screening, the Transportation Security Administration has announced it will roll out an installation of millimeter-wave imaging in Phoenix and will also test backscatter imaging in New Yorks John F. Kennedy International Airport and the Los Angeles International […]

iPhone Security Researcher Unleashes Exploit

H.D. Moore has released instructions on writing a critical exploit that leverages a bug in how Apples iPhone handles TIFF image files and, to enable the writing of exploits, has put out a new version of his Weasel debugger that can handle the peculiarities of the phones ARM processors. At this point, the exploit can […]

Word for Mac Exploit Released

An exploit has been found in the wild for a Word vulnerability Microsoft patched on Oct. 9. Symantec said in a posting on Oct. 10 that it had gotten its hands on a Word for Mac document that contains shell code and three pieces of malware. The file kept crashing Symantecs Word programs—with the exception […]

Another URL-Handling Bug Hits IE

A mere two days after Patch Tuesday brought a host of remote-code execution vulnerabilities to light, Microsoft issued a security advisory warning of yet another problem: a URL-handling vulnerability that could lead to systems getting hijacked if running Internet Explorer 7 on Windows XP or Windows 2003. Mark Miller, director of security response communication, said […]

Should We Be Legally Obligated to Fix Vulnerabilities?

Security people deal with the scenario all the time: An organizations internal IT people find a vulnerability, or a third-party security assessment firm finds a vulnerability, but theres no leverage to get upper management to approve a fix. The lack of legal obligation to fix known vulnerabilities is enough to get your blood boiling, particularly […]