2/20/10

Lawsuit Alleges School Used Webcams to Lurk in Students' Homes


By Katherine Noyes
TechNewsWorld
02/19/10 9:00 AM PT
The school accused of remotely activating computer webcams to spy on students in their homes has denied the charges, although it acknowledged that the functionality was available for the purpose of recovering stolen computers. If the school actually engaged in spying, even with the aim of protecting students, "the administrators themselves became the predators," said tech attorney Ray Van Dyke.
A Pennsylvania couple has filed a lawsuit against their local school district for allegedly using the webcam in a school-issued laptop to spy on their son at home.

The suit -- which was filed last week in U.S. District Court by Michael Robbins and Holly Robbins on behalf of their son, Blake Robbins -- alleges that the Lower Merion School District of Ardmore, Pa., invaded students' privacy and stole private information, violating numerous laws.

The family seeks unspecified compensatory and punitive damages as well as class action status for the suit, which would allow other students to take part as well. Some 1,800 students within the Lower Merion School District have been issued laptop computers, the filing notes.
'Engaging in Improper Behavior'
What sparked the discovery was Assistant Principal Lindy Matsko's assertion in early November that Harriton High School student Blake Robbins had been "engaging in improper behavior in his home," the filing explains. Matsko allegedly used as evidence of that behavior a photograph taken by the webcam in Robbins' computer.
Robbins' father then confirmed with the school that the district had the ability to remotely activate the webcams in the laptops it gives its students. Documentation accompanying the laptops, the family charged, made no reference to that ability.
"As the laptops at issue were routinely used by students and family members while at home, it is believed and therefore averred that many of the images captured and intercepted may consist of images of minors and their parents or friends in compromising or embarrassing positions, including, but not limited to, in various stages of dress or undress," the filing states.
Feature Now Deactivated
The district maintains that the remote activation ability is strictly for the purposes of security.
"The security feature was installed to help locate a laptop in the event it was reported lost, missing or stolen so that the laptop could be returned to the student," wrote Superintendent Christopher McGinley in a statement issued late Thursday. "This feature has only been used for the limited purpose of locating a lost, stolen or missing laptop. The District has not used the tracking feature or web cam for any other purpose or in any other manner whatsoever."
The district has now deactivated the feature, however, and has no plans to reactivate it "without express written notification to all students and families," McGinley noted.
"We regret if this situation has caused any concern or inconvenience among our students and families," he added.
'Very Serious Ramifications'
I have seen Trojan horses used by stalkers so they could turn on webcams remotely, but this is the first time I've ever heard of a school with the audacity to do something like this," Parry Aftab, privacy lawyer and executive director of WiredSafety, told TechNewsWorld. "There are criminal trespassing laws possibly at work here, and maybe wiretapping as well."

In addition, for the school to take action about what students do at home "violates the Constitution across the board," Aftab added. "They have no authority over what students do in their own homes. This is not Nazi Germany or Cold War Russia."

Whether it violates wiretapping laws or not, "if the school knew about this, it is reprehensible," Aftab opined. "There should be very serious ramifications."
'Administrators Became the Predators'
In general, "privacy is under siege in all aspects of life," Raymond Van Dyke, a partner with Merchant & Gould, told TechNewsWorld. "Although the Supreme Court has said that students in school have reduced rights, people in their own home have considerable constitutional rights regarding privacy."

The school's actions "constitute Big Brother in the school and home, an egregious infringement of privacy as well as the parents' rights to govern their own children and impose limits," Van Dyke added. "Even though the school administrators' presumed intent was to monitor and protect -- e.g., against porn, drugs and online predators -- they clearly crossed the line of propriety. Indeed, the administrators themselves became the predators."

With so many laptops issued by the district, the class action will likely proceed, Van Dyke concluded.
Information from : technewsworld.com

Roxxxy Sexbot: It's Not Her Looks, It's Her Personalities

This summary is not available. Please click here to view the post.

Opera Hits Some Unexpected High Notes With New Beta


By Scott M. Fulton,
IIIBetanews
02/20/10 5:00 AM PT





A handful of elements of Opera's latest 10.5 beta still feel a little alpha -- an oddly behaving button here, a small JavaScript control problem there. What's really impressive, though, is Opera's performance: Its graphics rendering is unbelievable. Chrome 4 had us already whistling on the Canvas geography map rendering test, with a 31.75 score. Opera 10.5 Beta 1 scores a 63.50 on that same test.


Recently we saw yet another daily build of what Opera Software was calling its "pre-alpha" of the Opera 10.5 Web browser, a product that the company certainly wanted folks to test, even though they were warned it wasn't even ready for daily use. With various software publishers' development schedules being organized so differently from one another, it's difficult enough distinguishing "previews" from "alpha previews" from "preview alphas" -- just yesterday, for example, Mozilla finalized a public "developer preview" of Firefox 3.7 Alpha 1, closing off its "Alpha 1 preview" track before starting, on the same day, its "Alpha 2 preview" track.


But Opera, perhaps breaching etiquette altogether and going for the sinister "Triple Dog Dare," has skipped right over Alpha 1 -- which we were all expecting -- and officially dubbed the latest build of 10.5 "Beta 1." In so doing, Opera also removed what it had been calling "10.2 Alpha 1" off of its list of test builds and replaced it with 10.5 Beta 1 on its "browser/next" page.
There are a few elements of this new beta that still have a certain "alpha" flavor to them: for example, a button on the search bar that doesn't search for the contents already in the text box, but only after you type new text into the box, and a JavaScript control problem on a very simple conditional loop still forces an error condition on one of our basic JavaScript tests -- an error that one can excuse in a "pre-alpha."

That said, Opera is now officially back in the hunt for Web browser performance supremacy, warts and all. Last week, after a huge set of Patch Tuesday updates forced a slowdown of our index browser (Internet Explorer 7 in Windows Vista), and even a slight speed gain in IE8 on Windows 7, triggered a reset of all our Windows 7 browser test scores slightly higher, Opera 10.5 held on to the lead over the latest development build of Google (Nasdaq: GOOG) Chrome 5.
However, the lead is much narrower than it was previously, by almost 44 percent. With the wind in Chrome 5's sails now, Opera has to paddle as fast as it can to maintain its distance from what has become the fastest-evolving browser chassis in history.


Tweaks Here and There




We'll get back to performance in a bit; first, a look at some of the other new Opera 10.5 features we're noticing. Last December, we showed you the completely revised Opera front-end, which made us wonder why this wasn't being called "Opera 11." For Beta 1, we've noticed a few tweaks: First, there are fewer buttons in the Address bar than in the first "pre-alpha." Back and Forward are now paired, and a new "fast-forward" button (there's no textual name for it that we can see) is capable of paging ahead, within sequences of pages that haven't been loaded yet. We tried it with Betanews articles, and it works quite well -- you can get to Page 2 from Page 1 even if you can't find our page button.


The Search bar has been tweaked and now bears the logo of the search engine you're using (Google remains the default). The search button has been moved to the right, but as we mentioned, there's times when it didn't function for us in the first beta build.




The Side panel is back in 10.5 (it wasn't working for us in the pre-alpha), and it remains the most convenient way for us to pull up bookmarks. One of our favorite Firefox add-ons is the All-in-One Sidebar, but as we've been reminded any number of times, its design inspiration comes from Opera.




The tab bar can still be slid open to reveal thumbnail previews, though in the beta, Web pages' icons ("favicons") have returned to accompany their title bars. When you hover over a tab or a little thumbnail, Opera 10.5 pulls up a big thumbnail, along with more space for the page's title and URL. The tab button with the picture of a tab in it, that didn't convey its meaning very well, has been replaced with a "recycle bin" button that makes more sense. From here, you can re-open closed tabs.




Controls along the bottom of the new Opera window are now rendered in their own tabs; and this is smart, because the tabs themselves are opaque. Opera has been joining the trend toward embracing the translucent window frame in Vista and Windows 7; in the pre-alpha, you could only see the charcoal-grey feature icons when the window was in front of something white or chalky-colored.




Video Viewing




Version 10.5 is Opera's first to follow Firefox's lead in supporting the HTML5 tag -- the ability (theoretically) to show streaming videos from the Web using a codec built into the browser. Unfortunately (and this isn't Opera's fault by any means), the biggest open test of the functionality of the HTML5 tag comes from YouTube, where the test uses the proprietary H.264 codec. While both Firefox and Opera can try to run these tests, they're geared (for now) for Google Chrome 5 and Apple (Nasdaq: AAPL) Safari 4.
With pages using the Ogg Theora codec for the tag -- the one Web standards architects intended -- Opera's built-in player performance appeared stable in early tests. Streaming movies did appear a little "mosaic-ed" for the first few seconds, almost like a JPEG image that's half-loaded. We did notice problems with 10.5 Beta 1 and the Flash codec, especially in YouTube. When a new video player is repeatedly loaded into the same space as the one that initially inhabits a page, Opera has a tendency to blank out the reloaded viewer. You can hear sound, but you see nothing but the page background.




We're impressed by an Opera 10.5 feature that's out of the ordinary for any other browser, and potentially less of a security risk for users: Pop-up windows, including message boxes, are rendered by the JavaScript interpreter as part of the active page, not as separate Opera windows. That means you can't drag a pop-up window outside the page area, which might possibly become an inconvenience in some situations. However, it reduces the opportunity for the type of cross-window spoofing that has characterized exploits of Internet Explorer and Firefox, because pop-ups are run in the context of the active page -- a much tighter sandbox.
We're not impressed with the first beta's upload ability: In fact, the browser does tend to crash following an upload. The built-in session manager (one less add-on you need to attach) does pick up where you left off when you reload the browser.




The Chase Is On




With a few builds under its belt now, it's clear that the development builds of Google Chrome 5 are resuming that browser's course of performance improvement at a rate, on our index, of about half a point per month. Our recent round of Windows 7-based browser tests show higher numbers across the board for another reason: Patch Tuesday has slowed down IE7 in Vista, our index browser, while giving a slight boost to IE8 in Win7.




So the fact that the latest stable build of Google Chrome 4 surged from under 20 to well over 21 on our index is only partly due to a speed improvement. What's important with regard to these index figures is relative performance, and the bar graph will help you better visualize how well one browser compares with another.




The Opera 10.2 alpha track is no longer on our graph, because it's no longer on Opera Software's roadmap. That's probably a good thing, because 10.2 was the slowest browser in the lineup after IE8. The gulf between the current stable Opera 10.1 and the new 10.5 beta is unprecedented: a 370 percent performance improvement, mostly reflecting massively improved computational performance, and somewhat improved rendering performance.


In our tests, the 10.5 pre-alpha suffered from unexplained poor performance in rendering conventional HTML tables -- those tools that old Web pages used to divide and conquer pages, prior to the advent of CSS. That problem completely not only disappeared in the 10.5 beta, it blows away every other browser in the field in this department. On Win7, 10.5 scores a 9.19 -- 919 percent the performance of IE7 in Vista -- followed closely behind by an 8.80 score from the latest stable Safari 4, and 8.10 from Opera 10.1 (the opera brand has typically performed well on this test).













Relative performance of Windows-based
Web browsers in Windows 7, Feb. 11, 2010.





Relative SunSpider (general JavaScript computation) and SlickSpeed (CSS selector) test performance slid a bit from the pre-alpha to the first beta, but we expected that from the first official public build, with all the corrections developers needed to make. Table performance helped Opera 10.5 make up for that, and the new beta still holds the overall lead on the SunSpider: 69.57 versus 68.69 for Chrome 5, and 57.17 for the latest daily WebKit build of Safari.

Graphics Power
Opera's graphics rendering importance is unbelievable: Chrome 4 had us already whistling on the Canvas geography map rendering test, with a 31.75 score. Opera 10.5 Beta 1 scores a 63.50 on that same test.
Where Chrome 5 still holds an edge, including at times over its stable predecessor, is in ordinary page rendering. Chrome 5 scores an 11.49 in the Nontroppo CSS rendering battery, while Chrome 4 surpasses that with 12.05; Opera 10.5 Beta 1 scores 7.44 there. In the standard page load test from Nontroppo, Chrome 5 posts a staggering 16.27. Opera 10.5 is in second place on that scale, but still way behind at 9.99. That Chrome 5 score was so staggering, we tested several times to confirm it.
If Chrome 5 were to improve its handling of plotting graphics to the Canvas element of modern HTML, before Opera 10.5 improves its handling of everyday rendering, Opera could be in trouble. It's a tenuous situation at present for Opera, but let's face facts: It's the nicest tenuous situation that anyone at Opera Software last year could have asked for.
If you're one of those long-time Betanews commenters who has spent the last two years saying, look out guys, Opera is on a comeback ... you have to be smiling now.
© 2009 Betanews. All rights reserved.
© 2009 ECT News Network. All rights reserved.
Information from : technewsworld.com

2/16/10

Before Making the Leap, Check Cloud Security - and Check Your Own


By Ed Moyle
TechNewsWorld
02/16/10 5:00 AM PT
Just because using a cloud service means your important enterprise data will reside on an off-premise site does not make the system in inherently less secure than keeping it in-house. Before making the jump to the cloud, though, some research should be done in terms of security -- both the service provider's and your own.
Most of us are probably familiar with safe deposit boxes -- you know, the secure storage areas that banks and post offices provide to keep things like jewelry and important documents secure. Even if you've never rented one yourself, chances are you're probably familiar with the concept: a safe place where you can put important and one-of-a-kind items so that they'll be protected should the unexpected occur in your home (like a fire, theft or flood).
Ask yourself this: Is a safe deposit box insecure because it's located and accessed from outside your home? In other words, in thinking about the security of the safe deposit box, would you conclude, "I don't trust the bank vault because I don't manage and control it myself?" Probably not, right? In fact, most likely we would conclude the opposite -- that the box is more secure because it's outside the home. Bank vaults are harder to steal from than our homes.
When it comes to everyday life, we realize intuitively that a location is not de facto more secure just by virtue of the fact that we're the one making decisions about how to secure it. It would be ridiculous, for example, if a friend told us that they prefer to keep important papers in a disorganized pile on their bedroom floor because it's inside their home -- and therefore more secure.

So what's my point? A lot of us in the security industry have been getting a bit nervous about decisions that our organizations are making in and around cloud computing. The cloud is a juggernaut in IT right now, and it's buzzing throughout all our organizations. Because it's such a hot topic, a lot of information security and compliance professionals are justifiably concerned about the security impacts of storing critical data in the cloud. Think about it: We're relocating large portions of our critical data to locations outside the firm's technical boundaries -- what does that mean from a security perspective?
There's a lot of concern, and rightly so, because storing or accessing data inappropriately can have a legal, financial or other catastrophic impact. Our first reaction is to cling to old ways of doing things and resist the move to the cloud, because that's what we know and are familiar with. However, it's important for us to remember during all this that just because we control something ourselves, that doesn't always mean it's better.
What Do You Have Today?
Now don't get me wrong -- I'm absolutely not saying that every service provider is the digital equivalent of a safe deposit box. Some are, some aren't. In point of fact, some service providers are much worse from a security perspective than what we can do ourselves (and some are much better.) However, the point is that the security decisions we make aren't (or shouldn't be) just based on where the data is stored; it's much more complicated than that.
If we have the metaphorical equivalent of the disorganized pile of papers internally (i.e., a mishmash of insecure storage, broken access controls, and lax/unmonitored processes for data handling), we may actually be better off from a security perspective making a transition to something hosted externally (depending, of course, on what the vendor provides). On the other hand, if we run a pretty tight ship, we might put ourselves in a worse position by making a change.
Many of our organizations are like our friend with the disorganized pile; some other lucky few have the digital equivalent of a fire box or safe internally. However, most of us are the opposite, with very little idea where our data goes, where critical data is stored, who accesses it, why it's accessed or from where.
In order to make an informed decision, we have to know two things: the security profile of what we're doing today and the profile of what the vendor in question does. If we're in a "papers on the floor" kind of organization and we're looking at a "safe deposit box" cloud service provider, we might choose to do one thing. If we're a shop with robust security controls and we're considering a "fly by night" vendor, maybe we might make a different decision. The point is, knowing those two data points, we can methodically and systematically compare in-sourced to outsourced and make a decision based on facts rather than based on speculation or (worse yet) industry hype.
So how do we get to that? First, start by mapping out what data you currently have, what processes govern how it's accessed, and the controls that you have in place to protect that data. Leverage any formal risk assessment that you may have done in the past (for example, to meet regulatory mandates like HIPAA, PCI or FISMA). If you haven't done a formal risk assessment of your environment, now's the time to do one. It's not as difficult as it used to be with new standard approaches and automated tools. On the standards side, leverage methodologies like ISO 31000:2009 or OCTAVE; on the tools side, look to automated risk-assessment products like White Cyber Knight's WCK-Lancelot or Modulo Risk Manager to automate the process.
You don't want to go to tremendous levels of detail here -- the point is just to get to enough of an understanding of the risk in our environment to be able to make a comparison against the vendor(s) in question. Also, make sure you map out in detail potential threat scenarios (for example, a threat matrix) that includes potential threats like inappropriate access, vectors
(pathways) for access, accessibility issues (e.g., disasters), and so forth.
What Does the Vendor Have?
Next, we have to figure out what the vendor does or doesn't do to protect the data entrusted to them. Ideally, we want to be get enough detail about a vendor to be able to directly compare the risk assessment we have of our environment to the vendor. The challenge, however, is that the vendor may not be able (or willing) to share with us the details of the security controls that they have in place. For example, a vendor may not have confidence enough in their security controls to tell us candidly what they are; they may have a "security through obscurity" belief that not telling us how they protect data provides security value. Whatever the case may be, expect there to be a threshold -- a level of detail that you can't get beyond because of resistance from vendor personnel.
So if we can't get to a complete level of detail for a particular (or any) vendor, what then are we to do? First, put together a mirror of the threat matrix that you did for your own environment -- this lets you understand what potential exposure scenarios there are depending on the decision you make. Second, gather what data you can from the vendor about controls and risks; if there's been an industry-accepted evaluation done (such as a BITS shared assessment or ISO 27001 certification), these can be a good baseline since they both outline minimum baseline controls. If there is no accepted certification, consider vetting the vendor yourself -- either by going there and evaluating their security in person or a paper-based exercise such as a questionnaire. Remember, you don't need to go to a tremendous level of detail -- you only need to get enough that you can make an informed decision based on the facts.
With a level of detail about both your own internal environment as well as a fairly thorough understanding of the vendor environment, you should have enough data to do a methodical, repeatable and objective analysis of both environments. Sometimes going with the vendor is a better security decision, sometimes keeping it in house is. Sometimes your business partners will elect to trump security and go with the less-secure option for reasons not involving protection of the data. However, when based on solid analysis, at least the decision is an informed one.
Information from: technewsworld.com

2/10/10

For Privacy Advocates, Facebook's 'Next Best Thing' Doesn't Cut It


By Scott M. Fulton, III
Betanews
02/06/10 5:00 AM PT
The dust kicked up by the Facebook Beacon debacle is still settling, and the latest development involves a "cy pres," or "next best thing," settlement proposal that would call for Facebook to establish a foundation to help make Web users more aware of their privacy rights. Critics needled that offer last week, noting that the world already has lots of foundations for that -- and none are controlled by Facebook.
Just over two years ago now, Facebook began deploying a behavioral tracking service it called "Beacon," which automatically enabled the tracking of Facebook users' behavior but shared that data with advertising partners. It wasn't an "opt-in" service by anyone's definition, and after Facebook took down most of the service, customers filed a class-action suit against the social network.
In a proposed settlement last September, Facebook is opting to use its own money -- some US$9.5 million -- to establish a fund for the creation of a foundation to help make Web users more aware of their privacy rights and how they can improve their online safety. It's what the law calls a "cy pres" settlement, named for an old French phrase that literally means, "the next best thing."
"Next best" isn't exactly a settlement, contends the advocacy group Public Knowledge, in a statement for the court in the Beacon case filed last week. Why, asks Public Citizen, should Facebook use its own money to pay its own people to do what it should have been paying its own people to do in the first place?

We Get It, We Get It!
"Creating the Facebook foundation is an inappropriate cy pres-like remedy that provides no value to the class because (1) the foundation is unneeded -- numerous established organizations already advocate for improved online privacy, safety and security by educating users, regulators and businesses; and (2) Facebook, whose founder and CEO questions whether privacy rights should be safeguarded, retains unwarranted influence over the proposed foundation," reads Public Citizen's official objection to the proposed settlement .In essence, Facebook is paying itself money to gain a broad release of its users' legal claims and to create an unneeded foundation over which it will have significant control. It is difficult to imagine a greater abuse of the cy pres remedy."
Public Citizen is seeking a legal award of at least US$2,500 per member of the class action, the precedent for which it claims has already been established by the Video Privacy Protection Act. That law was originally created to prevent the misuse of data belonging to customers of video rental establishments.
However, the group's plea is noteworthy also for what it's not asking for, or more accurately, what's it's asking to not receive: specifically, the creation of yet another policy group advising social networks to be more respectful, and users everywhere to be more careful. We get that already, the group argues.
Neck-Deep in Centers, Foundations and Clearinghouses
"Numerous independent, non-profit groups already exist to do precisely that," writes Public Citizen. "A list of such organizations, although not comprehensive, includes the Electronic Privacy Information Center ("established in 1994 to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and constitutional values"), the Electronic Frontier Foundation ("educates the press and public" by "defending free speech, privacy, innovation, and consumer rights today"), Privacy Rights Clearinghouse ("two-part mission -- consumer information and consumer advocacy" with goals to "[r]aise consumers' awareness of how technology affects personal privacy, and to empower consumers to take action to control their own personal information"), the Center for Digital Democracy (addressing privacy issues while promoting "an electronic media system that fosters democratic expression and human rights"), and the World Privacy Forum ("focused on conducting in-depth research, analysis, and consumer education in the area of privacy"). In addition, the Rose Foundation's Consumer Privacy Rights Fund, created from a series of settlements in cases involving consumer privacy issues, awards grants to support privacy-related research, education, advocacy, and policy development ... In addition to being well-established, these organizations have the advantage of not being controlled by Facebook."
Public Citizen's retort now joins that of the Electronic Privacy Information Center, the Center for Digital Democracy, and four other groups which jointly filed their own letter of opposition last month. In it, the groups' attorneys write, "Facebook is not accused of failing to effectively 'educate' users and regulators. Facebook is accused of inappropriately disclosing its users' personal information in direct violation of state and federal law. A foundation whose primary goal is the education of users regarding business practices is not an appropriate remedy where it is the business practices that caused the harm."
When the settlement was proposed last September, digital media attorney David Johnson of law firm Jeffer, Mangels, Butler & Marmaro smelled a rat right away. In a blog post for his firm, Johnson wrote, "What a deal! Facebook is already required by law to promote the online privacy, safety and security of its users' information. For example, the FTC has mandated that all companies must 'maintain reasonable and appropriate measures to protect sensitive consumer information' and has already filed suit and obtained consent orders requiring a couple of dozen consumer-oriented businesses like Facebook to do so ... So Facebook effectively gets most of its money back to fund projects that it is already has an obligation to perform. If the Court winds up cutting the fees paid to Plaintiffs' counsel, this just means that more money will go back to Facebook to pay for things it is already obligated to do."
For its part, Facebook declared the matter closed last September, and has had no further comment since then. The judge in the San Jose US District Court case already granted preliminary approval to the settlement in October, but final approval awaits the judge's review of comments received in the interim.
© 2009 Betanews. All rights reserved.
© 2009 ECT News Network. All rights reserved.
Information from : technewsworld.com

Facebook's Virtual World War II Memorials

By Monika Scislowska
AP
02/07/10 5:00 AM PT

Volunteers hoping to keep alive the memories of those who died in conflicts decades ago are turning to Facebook to set up memorial pages. One individual being memorialized is Henio Zytomirski, a boy who was murdered in the Holocaust. Those who maintain the pages say they give people around the world a chance to know those who died, though others say such displays may trivialize tragedies.

Henio Zytomirski's Facebook profile picture stands out from most. The grinning 6-year-old is captured in black and white and poses in an old-fashioned buttoned-up shirt and shorts.
The photograph, shot in 1939, is probably the last taken of him before he was murdered in the Holocaust.
A group in the boy's hometown of Lublin is using the social networking site to breathe virtual life into Henio's stolen childhood and give people around the world the chance to get to know him -- as well as mourn the millions of others killed by Nazi Germany.
With nearly 3,000 friends, Henio's page is one of the most striking examples of a new phenomenon in which people are setting up Facebook memorials for the victims of the past century's greatest tragedies. Another project in Belgium attempts to create Facebook pages for each of the 27,594 Allied soldiers who were killed in Belgium during WWII, and Anne Frank and the Auschwitz memorial site are also on Facebook.

Rekindling Memories
Facebook and MySpace users have long been creating memorial pages for friends and family, but these new projects aim to rekindle lives of the more distant dead who might otherwise be forgotten.
"Henio was an eyewitness and a victim to the Nazis' actions. Because he was murdered, he could never provide his testimony," his page says in a post written by Neta Zytomirski Avidar, a cousin of Henio's who lives in Israel and has helped build the site. "We try to guess what might have been his testimony."
On Henio's page, postings made by Henio's cousin and other administrators shift between third-person descriptions of his life and posts in the voice of dead boy.
One of Henio's pictures shows a Hebrew-language book -- the kind Henio would have studied from if the war hadn't broken out on what was to have been his first day of school, preventing him from ever attending.
The caption in Polish reads: "It will be September soon. I will go to school. I wonder what's it like at school. I'm a bit afraid. Daddy says there is no need to be afraid. After all -- he is a teacher. Today I saw my textbook."
Questioning the Use of First-Person
Some historians and educators fear the use of the social media in war remembrance could trivialize tragedies like the Holocaust, or that postings like those in Henio's name could blur the boundaries between fact and fiction.
Adam Kopciowski, a historian at Lublin's Marie Curie-Sklodowska University who specializes in Jewish studies, believes posts written in the dead boy's voice raise ethical questions and amount to "abuse toward a child that has been dead for the past 70 years."
"This is an act of pretending to be a person that has died, but we cannot be sure whether he spoke that way, whether he thought that way, whether he acted that way," Kopciowski said.
Certainly amid the postings for Henio, some mundane, even silly, messages can be found on his Wall, such as invitations to play the popular Facebook game Mafia Wars. Some send him little virtual gifts: a bouquet of flowers, honey from Israel, dreidels at Hanukkah.
Joy Sather-Wagstaff, a cultural anthropologist at North Dakota State University, said the virtual gifts should not necessarily be seen as frivolous.
"I look at this as a virtual version of what they would leave if they actually went to a place where there was a monument to him. I bet they would leave little notes and toys -- the physical material version of what you see them leaving on Facebook."
Grappling With Grief
Sather-Wagstaff cofacilitated an informal December conference in Washington, D.C., cohosted by the United States Holocaust Memorial Museum entitled "Conscience Un-conference: Using Social Media for Good" -- in which Henio's page was a focus of discussion.
She said she sees the Henio phenomenon as one way people today grapple with what death means in an era of great tragedies of scale, from the Sept. 11 attacks to the recent earthquake in Haiti.
Pawel Brozek, a history student who helps administer the site, said that when the project was launched last summer, it initially drew criticism from several Poles who said it insulted Henio's dignity. But those voices were quickly hushed by an outpouring of positive reaction from around the world.
Anthropologist Mark Auslander, a Brandeis University professor who specializes in the use of ritual and art in commemorating the dead, said he believes social media like Facebook are "vital new technologies " that hold great promise in education, and that Henio's site is one of the most captivating he has seen.
He discussed Henio in a recent blog, writing that "thousands of people log on in order to enter in to some sort of symbolic exchange with the Dead, to engage in an act of nurturing directed towards the other world."
"The phenomenon is very fascinating," Auslander told The Associated Press. "It tells us something profound about our deep desire around the world to be linked to one another through these fragile traces of memory. And this is potentially a very wonderful and beautiful thing."
Facebook's Take
Technically speaking, Henio's page goes against Facebook rules: Profile pages are meant primarily for individuals who are still living, to communicate with one another, share photos, play games. For users who have died, it's possible to set up a "memorialized" account so friends and family can pay tribute.
Pages for businesses, celebrities and other public figures, meanwhile, generally have "fans" instead of "friends" -- and that should also be the case for victims of historic tragedies like Henio, said Facebook spokesperson Brandee Barker.
A big reason for this is that Facebook limits the number of "friends" individual users can have to 5,000. Fan pages for businesses and public figures have no such limit, so any number of Facebook users could join as fans in tribute to the individual's life, Barker said.
She added that in "certain cases," Facebook will work with users to "migrate" a profile page to a fan page.
Henio's History
Henio and his family were forced in 1941 by the Nazis to live in Lublin's ghetto -- one of the hellish places where many Polish Jews died from a lack of food, diseases or random executions.
At some point in 1942 Henio and his father Szmuel were sent to the nearby Majdanek death camp, and it is believed he died there by early 1943. His father was killed there soon after.
Henio's Facebook page evolved from earlier commemorative projects launched by the group "Grodzka Gate-NN Teater" that uses theater and other forms of performance to resurrect the memory of the 40,000 Jews who lived in the eastern Polish city before the war -- a third of the city's population.
Henio was chosen because a trove of family pictures and letters was made available to the Lublin group by his cousin.
"Forty-thousand names and faces ... cannot be memorized," Henio's profile says, urging people instead to: "Remember just one of them."
In a typical response, an Italian Facebook "friend" of Henio's wrote this month: "Little Henio, I think about you often. I consider your presence on Facebook a great opportunity to reflect, more real than many friendships granted to real people. Thank you, Henio. I hope you can have many friends."
Piotr Kadlcik, the leader of Poland's Jewish community, said that in today's rapidly changing world he welcomes the effort.
"Absolutely all forms that help us spread information about the past should be used and encouraged," Kadlcik said. "These are not times for honoring people with huge marble monuments and official ceremonies."
Looking for a Few Good Researchers
A similar drive is also behind a new Belgian attempt to create Facebook pages for each of the 27,594 Allied soldiers who were killed in Belgium during WWII and are buried in Belgian cemeteries, men from countries including the U.S., Britain, France and Australia.
High school students are each being asked to research the lives and battles of a chosen soldier and -- with the help of archives kept by the Institute for Veterans -- produce a Facebook page for each one with photos, audio and video. It is hoped relatives of the dead soldiers will submit whatever documents and other evidence they have.
The first Facebook page created as part of that project honors Lance Cpl. Thomas Leslie Cartwright of High Wycombe, England. Cartwright was killed in fighting in 1944 and is buried in the Kasterlee War Cemetery in northern Belgium along with 99 comrades of the British Army's Royal Scots.
The plan is to have each soldier documented on Facebook by 2014, when the country will mark the 70th anniversary of Belgium's liberation.
"You are only dead if no one talks about you anymore," said Pol Van Den Driessche, a Belgian senator who launched the project, known as "Live and Remember."
© 2009 Associated Press. All rights reserved.

© 2009 ECT News Network. All rights reserved.

Information from: technewsworld.com

Google Buzz Bridges Social Media And Gmail


By Renay San Miguel
TechNewsWorld
02/09/10 12:30 PM PT
Google has linked Gmail to a new service it calls "Google Buzz." Buzz facilitates the instantaneous sharing of info like status updates, links and videos between Gmail users in a setup that will likely look fairly familiar to users of sites like Facebook. Can Buzz build upon an already strong Gmail base, or do users who are interested in this sort of communication already get a good enough fix from Facebook?
Google (Nasdaq: GOOG) has certainly generated more than its share of buzz regarding its plans to get deeper into social media. On Tuesday, the search giant revealed those plans: Google Buzz, which takes a big step into Facebook and Twitter territory while keeping one foot firmly planted on its Gmail foundation.
While the initial version of Buzz released during a press conference and demonstration at the company's Mountain View, Calif., headquarters focused on consumer-friendly uses -- status updates, comments, link and media-sharing, either at a desktop or via smartphone -- Google made it clear that there will also be a future place for Buzz in its enterprise goals.
"I think a lot of past services have focused on just friends and entertainment," Google cofounder Sergey Brin told the audience. "I found personally a huge amount of productivity in using Google Buzz internally, and therefore I think the bridging of those worlds is very powerful."
Corporate-centric versions of Buzz would be coming soon, added Google Vice President for Product Management Bradley Horowitz. "We've been testing Buzz in the context of our enterprise products," Horowitz said. "We found it invaluable, and it changed the way we communicate."
Consumers who are on Gmail will get the first shot at the new features over the next few days.

Consumer Buzz Comes First
Even though Google product manager Todd Jackson said Buzz went "beyond status updates," there was a definite Facebook feel to the services demonstrated Tuesday. Buzz rolls in real-time communications and sharing into the Gmail format and focuses on five aspects Google has determined to be important to users: auto-following with existing users and contacts, which doesn't require any set-up; rich, fast sharing experiences for links and multimedia; more choice in public and private sharing; Inbox integration for these new services so users won't have to leave the comfortable confines of Gmail to enjoy social media; and "just the good stuff," as product manager Todd Jackson called it -- a reliance on user recommendations for links and media, even if you're not following the person sharing that content.
"Over the years, we've added more and more tools for all the ways users want to communicate inside Gmail," Jackson said. "This is a new way to share and communicate inside Gmail and to start conversations about the things you find interesting. Buzz is like an entire new world."
Part of that new landscape is clear when you look on the left-hand side of a user's Gmail page: "Buzz" now becomes a link on the list of folders, right under "Inbox" and above "Deleted Items" and "Sent Items." When you publish a link to friends, headlines and images from that link appear in a Buzz box -- just like they do in a Facebook update.
Google does work up several ways to share and receive updates, including the "@Reply" feature, and incoming comments can be viewed in the Inbox. Buzz also connects to other social media sites like Twitter, Google subsidiary YouTube, Picasa and Flickr.
Google is also rolling out changes to its mobile strategy to incorporate Buzz features for the smartphone-using consumers who can take advantage of their device's location-based and GPS features. A new "Buzz" icon will appear in the upper right-hand corner of the mobile Google homepage. Also, the company announced apps available at buzz.google.com for iPhones and Android devices, which will allow users to see what the "buzz" is wherever they are; that is, geotagged real-time comments that appear as conversations on a Google mobile map.
Can Buzz Deface Facebook?
Despite the widespread appeal of Gmail and its installed base of users, IDC social media analyst Karsten Wiede said Google has its work cut out for it if it wants to appeal to those who are already using Twitter and Facebook. "If it works, it could increase the users for Gmail, which is a good thing," Wiede told TechNewsWorld. "It will also increase traffic in terms of page views, all of which are good for its advertising business directly. It would also strengthen the entire portfolio of Google services because it would tie people closer to them. But I don't think it will work. The people who would be interested in this kind of functionality is the Facebook crowd. Why would I use this if I'm already on Facebook? Why use two services?" he said.
"People are already doing status updates on dedicated services (like Twitter and Facebook) which have richer interfaces," said Digital Trends publisher Scott Steinberg. "They already have a community of followers on Twitter. Now you're starting another option, which serves to muddy the waters further. Simply adding status updates by itself isn't a game-changer. Google is basically attempting to play catch-up a little bit and add a more robust feature set to what is a pretty workmanlike service. Most people don't think of Gmail as a social media service," Steinberg told TechNewsWorld.
If the ability to send photos and videos from within Gmail does prove to be compelling, however, "then suddenly we've got something interesting here because they've got a huge user base (with Gmail), and they can empower them with new features," Steinberg added. "But that feature set has to be competitive," he said
Information from : technewsworld.com

Google Buzzes Social Networking Scene


By Erika Morphy
TechNewsWorld
02/10/10 5:00 AM PT
Social networking is Gmail's next logical step, right? Early reactions are divided. Google Buzz "is just mission creep," argues consultant Simon Sinek. On the other hand, if Google does what it does best with this new networking tool -- organizing information -- it might create a competitive differentiator, says First Page Sage founder Evan Bailyn.
Google (Nasdaq: GOOG) is making a play for social media users with Buzz -- a new tool that enables Gmail users to view media and status updates of friends.
Typically, when Google enters new territory, it is enough to send stock prices plummeting and analyst wheels spinning. Oftentimes, there is a good reason. Consider the ruminations on the fate of standalone GPS providers such as TomTom following Google's introduction of a GPS-based navigation app.
This time, though, things may be different.

800 Pound Gorilla
In the immediate term, Google Buzz is going to have an impact, said Columbia University lecturer Simon Sinek, a leadership consultant and author of Start with Why.
Google "is the 800-pound gorilla in the industry -- if it sneezes, everyone feels it," he told TechNewsWorld. "When they came out with an email client years ago, that took away share from Hotmail. Their IM product is not as a good as AOL's, but people use it anyway."
Google Buzz will take advantage of the massive user base of the company's ubiquitous Gmail client. "It will leverage those captive eyeballs as people send emails and messages," said Sinek.
However, social media is not Google's core competency, he pointed out, suggesting that Buzz is more a market-chasing ploy than anything else.
"Google's mission is to organize the world's information -- that is why it exists. This has nothing to do with that. It is just mission creep," Sinek concluded.
Organization and Aggregation
Google Buzz "is not going to have a tremendous impact unless Google starts aggregating status updates from Facebook and to a lesser degree, Twitter," suggested Evan Bailyn, the founder of First Page Sage. In other words, he told TechNewsWorld, if Google does what it does best with this new networking tool -- organizing information -- it might create a competitive differentiator. If it doesn't, then it won't.
"No question this will take away some traffic or time from the social networks," said Bailyn, "but if it has any impact at all, it will be because people have been able to find new information on Google or in Gmail."
If Google is planning to integrate and aggregate, then it will likely meet up with resistance from the social networks, said Bailyn. "I can't imagine they will cooperate if they think they are going to lose traffic."
Google's plan to have people re-select friends all over again to participate in this feature is not practical either, he added. "Why would anyone want to go through the work of creating a quality group of friends a second time?"
Got What It Takes?
On the other hand, there are reasons to expect Google to gain significant traction in the social networking space, John C. Havens, SVP of social media at Porter Novelli, told TechNewsWorld.
"Gmail's IM client is excellent. I know a ton of people who use that over Skype, so adding status updates and so on in that environment would be useful," he said.
"Also, people will likely aggregate their posts -- which are the equivalent of tweets -- to send to Facebook or Twitter via a push client or maybe something like Posterous," added Havens, noting that there are enough services out there that one more social network won't really make a difference.
From a marketing perspective, one factor to consider is that if there are any SEO benefits from Google Buzz, people will use it more, Havens said. "Likely, there will be [SEO benefits], since it's Google. Since tweets can raise your SEO -- using appropriate keywords -- likely Google's new social networking app will as well."
Information from : technewsworld.com

2/5/10

Will FOSS Jump Into the iPad Fray?


By Katherine Noyes
LinuxInsider Part of the ECT News Network
02/02/10 5:00 AM PT
The iPhone opened the world's eyes to smartphones, creating a category that quickly headed toward "must have" status. Then, along came the open source mobile OS, Android. Some predictions suggest that it could overtake the iPhone in just a few years. Now, the question is whether Apple can create another must-have category with the iPad -- and whether open source competitors will arise to take it on.
The iPhone propelled the smartphone onto the front lines of cross-platform competition, and now Apple's (Nasdaq: AAPL) new iPad has the potential to do the same for the new category of tablet devices.
Positioned somewhere between the smartphone and the laptop, the new tablet is billed as "the best way to experience the Web, email, photos and videos."
While the Macintosh, Windows and Linux platforms all compete to varying degrees on PCs, netbooks and smartphones, the iPad currently stands more or less alone in the tablet arena. It's clearly just a matter of time before competitors begin arriving; will an open source device be among them?

An Affinity for Mobile
It is on mobile devices that many argue Linux is finally coming into its own in the mainstream.
Linux accounted for roughly a third of the 35 million or so netbooks to ship globally last year, according to Jeff Orr, an analyst at ABI Research, and predictions looking ahead are generally rosy as well.
On smartphones, meanwhile, Android had snatched up 27 percent of the North American market by the end of last year, according to AdMob's December Mobile Metrics report -- and that's surely increasing daily following the launch of Google's (Nasdaq: GOOG) Nexus One.
Why not tablets, then?
Android Leading the Charge?
"I think open source will compete with the iPad in a variety of ways," RedMonk analyst Stephen O'Grady told LinuxInsider.
First, "we will almost certainly see the Android environment positioned by one or more vendors as an iPad alternative," O'Grady predicted.
Open source projects such as GNOME, meanwhile, are already "actively working to add features like multi-touch, which would make more general-purpose Linux distributions such as Ubuntu more competitive," he noted.
Finally, forthcoming netbooks based on Google's Chrome OS -- "while significantly differentiated from the iPad in both hardware and software -- may well compete for the same users and use cases," he said.
'Faster Development in Open Source'
"I don't really think iPad should be compared to a netbook," Jay Lyman, analyst for enterprise software with the 451 Group, told LinuxInsider.
"While both are intended to be ultra-portable as a primary feature, they serve very different uses and needs," he explained. "I believe the more appropriate comparison for iPad is to e-book readers such as Amazon's (Nasdaq: AMZN) Kindle, though with broader multimedia and Internet capabilities."
Although Lyman hasn't yet heard of an open source-based push for a tablet operating system, "I will say that we typically see faster development in open source, so I would not be surprised to see an open source response, or an existing effort gain attention and traction, particularly if iPad is as successful as the iPhone," he said.
Bigger Role for Third Parties
In fact, while Apple excels at creating buzz, popularity and loyalty, "there are some shortcomings in its approach -- both technically and aesthetically -- that leave opportunity for other vendors and other approaches," Lyman asserted.
The development and promotion of Android is a perfect example.
"This open source-based alternative appears to be giving Apple significant competition in smartphones and developers," he explained. "I believe this is based less on the technology or functionality, and more on the flexibility and potential for third parties to have a role" -- something that can be enabled by open source.
'A Viable Option'
The iPhone has just one hardware manufacturer, whereas "for Android, there are many, and they are growing," Lyman added.
Similarly, he opined, "if Android or Moblin or Ubuntu Netbook Remix or another open source alternative can serve as a viable option for many hardware, wireless, other software, advertising and other companies -- as well as developers -- it may be able to generate traction and winning devices and/or business models for tablets."

Eyeing Android, Symbian Opens Up


By Katherine Noyes
LinuxInsider
Part of the ECT News Network
02/05/10 9:25 AM PT
Android, move over. Symbian has joined the ranks of open source mobile platforms, and it's going to need some room. Symbian, of course, owns nearly half of the smartphone market, but it doesn't have the cachet of the up-and-coming Android. "Symbian went open source because they had to just to survive," maintained In-Stat analyst Allen Nogee.
When the Symbian Foundation announced the opening up of its namesake smartphone platform on Thursday, it caused a major shift not just in the mobile landscape but also in the FOSS world.
Announced by Nokia (NYSE: NOK) back in 2008, the transition of the leading platform from proprietary code to open source was completed four months ahead of schedule and is the largest in software history, the foundation said.
"The development community is now empowered to shape the future of the mobile industry, and rapid innovation on a global scale will be the result," said Lee Williams, the Symbian Foundation's executive director.
What the precise effects will be remains to be seen, but there's no doubt the competitive landscape is significantly altered as a result.

Slipping Market Share
Until Thursday, Google's (Nasdaq: GOOG) Android was the highest-profile open source contender in the smartphone arena. Though Nokia's Symbian currently dominates the global smartphone market, it's expected to lose market share to Android in the coming years.
Symbian enjoyed a 49.3 share of the worldwide smartphone platform market at the start of 2009, but that will fall closer to 39 percent by the end of 2012, Gartner (NYSE: IT) analyst Ken Dulaney projected late last year.
Android, meanwhile, will grow to 14.5 percent, giving it the second-place position, according to Gartner.
'Just to Survive'
"Symbian has a large following in Asia and Europe, but it's not seen as the future," Allen Nogee, principal analyst with In-Stat, told LinuxInsider.
"Sure, Nokia could spend large amounts of money to revamp it, but will they?" Nogee asked. "Symbian went open source because they had to just to survive."
While the platform will "be around for a long time, the most advanced phones won't be Symbian," he predicted. "Google is not very worried, I'm sure."
'Drowned Out' by Android and Chrome
The move is significant for smartphones, and it should help the Symbian platform to some extent, said Jay Lyman, analyst for enterprise software with the 451 Group.
"I also think Symbian is being drowned out by all the buzz about Android and also Chrome," Lyman told LinuxInsider.
Indeed, the shift to open source will at best "help Nokia and Symbian get back on track," added Chris Hazelton, the 451 Group's research director for mobile and wireless.
'All About Developers'
"It's all about developers, and maintaining some of that developer share," Lyman explained. "All smartphones rely on having a vibrant developer community that's ready to create the ecosystem."
Facing competition from Android and other competitors, Nokia evidently realized that opening up the platform was a way "to keep from losing developers and maybe partners and vendors" to other platforms, he added.
Symbian has "some catching up to do," agreed Neil Strother, practice director for mobile marketing strategies at ABI Research. "It will be interesting to see if the open platform is enough to stimulate developers and manufacturers besides Nokia."
Staying Competitive
Nokia's recent decision to offer a free turn-by-turn navigation service was another effort to stay competitive with Android, Hazelton pointed out.
However, Symbian's new openness is unlikely to result in major shifts of allegiances in the smartphone space competition, suggested Lyman.
"I don't think Symbian will gain many additional handset vendors" as a result of opening up, he said; on the other hand, "they don't really need to, because they have Nokia."
Tablet Mania
With the recent announcement of Apple's (Nasdaq: AAPL) iPad tablet device, of course, there's a whole other dimension to the mobile space that could now be affected.
Nokia already has tablet offerings -- including the N900 -- but they're based on Maemo, Hazelton pointed out.
While Nokia may push further into the market, it won't be with Symbian -- rather, it will continue with Maemo, he predicted.
There have been rumors of a Symbian tablet in the works, Nogee pointed out.
Nevertheless, he said, "we are still waiting."
'A New and Major Wave'
Either way, however, "this is the beginning of a new and major wave in the transformation in wireless," telecom analyst Jeff Kagan told LinuxInsider.
It's become clear that smartphones are "the path of wireless going forward," Kagan asserted. "If that is the case, it would be unreasonable to expect a limited approach."
Comparing the process to a funnel, he explained that "right now we are at the large and wide open top. During the next several years, we will see many versions. Eventually we will come out the narrow spout with a few major competitors."

How Cozy Are Google and the NSA?

By Richard Adhikari
TechNewsWorld
02/05/10 11:54 AM PT

The hack attacks on Google that surfaced earlier this year have reportedly compelled the search giant to seek help from the National Security Agency to prevent future intrusions. Privacy advocates are concerned about any partnership between the world's leading search engine and a government agency known to have tapped domestic phone lines without warrants. Google has declined to discuss specifics.


Google (Nasdaq: GOOG) has allegedly requested help from the National Security Agency in tracking down hackers who attacked its infrastructure. The development has raised concerns among privacy advocates.
The Washington Post broke the story that Google had turned to the NSA on Thursday, citing anonymous sources.
Security experts and privacy advocates have questioned Google's motives. Some have warned that this could constitute another attack on American citizens' civil liberties. Others say the move is part of a scheme by Google to curry favor with the government as it seeks to get more government contracts.
The Electronic Privacy Information Center filed a Freedom of Information Act request and asked for expedited processing with the NSA Thursday. It seeks information on the agency's arrangements with Google on cybersecurity. It is also looking for records regarding the NSA's role in setting security standards for Gmail and other Web-based applications.
Google declined to discuss the issue. "We're not going to comment beyond what we said in our original blog post," spokesperson Jay Nancarrow told TechNewsWorld. "At the time, we said we are working with the relevant U.S. authorities."
The blog post to which Nancarrow referred was written by David Drummond, Google's chief legal officer, and originally posted Jan. 12. The hack attack described in the post was publicized last month and has severely strained relations between Google and the government of China, where the attack is believed to have originated. The attack also targeted at least 20 other large companies, and Google claimed there was evidence suggesting a primary goal of the attackers was to break into the accounts of Chinese human rights activists. The accounts of "dozens" of Gmail users in the United States, Europe and China who advocate human rights in China also appeared to have been "routinely accessed" by third parties, Drummond said.
The attacks on Google have triggered a diplomatic row between Washington and Beijing. However, they may not have come from hackers in China at all: Computer security consultants who worked with other companies that experienced attacks similar to those that hit Google pointed out that the surveillance system was controlled from compromised computers based in Taiwan, The New York Times has reported.

What Is Truth?
There is another possible explanation for Google's alleged cozying up to the NSA: that it is looking to get more government contracts. The Internet search giant plans to create a dedicated cloud for government customers in the U.S. It has also launched Google Public Sector, a site with tools and tips for government officials.
Further, Google is penetrating local and state governments. The city of Los Angeles has put all of its 30,000 city workers on Gmail and Google's productivity suite. Other cities in California are also interested, according to reports.
"It's in Google's best interest to get the NSA to investigate the hack, and it's in NSA's best interest to investigate this issue because some of the companies hacked may well be suppliers to NSA," Randy Abrams, director of technical education at ESET, pointed out.
"When the company that makes your computers gets hacked, that raises security concerns, and in terms of global business, when another country gets an unfair advantage, that could be a bit of a national security concern," Abrams told TechNewsWorld.
Security? Fuggedaboudit!
A great deal of public outcry was directed at the NSA four years ago, when it emerged that the agency was tapping domestic phone lines without warrants.
This time, though, not everyone is quite as perturbed as civil rights organizations like EPIC.
"A precedent was set back in 2006 when the telcos began spying on Americans' domestic phone calls without legal backing," ESET's Abrams pointed out. "If those hackers who hit Google can compromise it, what makes you think the NSA couldn't? There's pretty much no privacy on the Internet anyway."
Americans have to decide whether they prefer security or convenience, Stewart Baker, a distinguished visiting fellow at the center for Strategic and International Studies and a law partner at Steptoe & Johnson, told TechNewsWorld.
"Before we make additional interconnections, we have to recognize that there's a cost, and we have to be prepared to live with that cost, either in terms of additional security or in terms of vulnerability to attacks," he explained.
"Adding in the security is something you have to do when you decide we can't live without the connectivity."
CSIS provides strategic insights and policy solutions to decision makers in government, international institutions, the private sector and civil society. Baker was the principal author of a report on the dangers of cyberwar to critical infrastructure sponsored by McAfee.
The Ongoing Threat
Whether the attack came from China, Taiwan or elsewhere is less of an issue than what it points to -- that cyberattackers are constantly targeting American institutions and corporations.
"Sensitive information is stolen daily from both government and private sector networks, undermining confidence in our information systems and in the very information these systems were intended to convey," Dennis Blair, U.S. Director of National Intelligence, told the Senate Select Committee on Intelligence earlier this week.
Cyberterrorists and cybercriminals are becoming increasingly sophisticated, and we're fighting a losing battle against them, Blair pointed out.
That terrifies Baker. "Some very sophisticated companies haven't been able to prevent attacks by adversaries," he said. "We're living in a world where we can't be sure we can build adequate security to keep people out of our networks, and that's deeply troubling."

2/4/10

Twitter Smells a Password-Snatching Rat


By Richard Adhikari
TechNewsWorld
02/03/10 12:10 PM PT

Twitter has sounded the alarm on a possible scam to steal user log-on information. It appears that users of various torrent download sites had their names and passwords swiped, and that log-on combo is often the same one users apply to their Twitter accounts -- and possibly even more sensitive online tools like banking Web sites.

Twitter users have come under attack from scammers once again, and the microblogging site has asked several users to reset their passwords.
This latest attempt came through torrent file-sharing sites that contained hidden security exploits and backdoors.
Opinion is divided as to whether these security holes were the result of bad coding or, as Twitter claims, were deliberately created so the coder could later activate them.

The Attack According to Twitter
Twitter noticed a "sudden surge" in followers of a few accounts over the five-day period leading up to Tuesday, Del Harvey, the microblogging site's director of trust and safety, wrote on its blog.
It pushed out a password reset to users following those accounts and began investigating.
It seems, according to Harvey, that over the last few years, a coder has been creating torrent sites that require a login and password, as well as forums set up for torrent site usage. The coder sells these to people who want to start their own download sites.
Torrents are tiny files created for use by BitTorrent clients. BitTorrent is a peer-to-peer file-sharing protocol for transferring large amounts of data over the Internet. Torrents must first be downloaded from various Web sites, then loaded into a BitTorrent client. From there, the client will communicate with other BitTorrent applications around the Internet and download the larger target file onto the user's computer while simultaneously sharing it with other users looking for the same data.
The sites and forums created by the allegedly crooked coder are riddled with security exploits and backdoors. The coder would wait until the forums and sites sold and amassed a large number of members, then activated the security holes to get the usernames, email addresses and passwords of their members, Harvey claimed.
The forums themselves may have been hacked. "Additional exploits to gain admin root on forums that weren't created by this person also appear to have been utilized," Harvey wrote.
Twitter hasn't identified all the forums involved, and Harvey said it probably won't be able to. However, he issued a warning to users: "As a general rule, if you've signed up for a torrent forum or torrent site built by a third party, you should probably change your password there," he wrote.
It's the Password, Stupid
The root of the hacking problem is users' tendency to employ one username and password over multiple sites. For example, a survey conducted by Trusteer found that 73 percent of users employ their online banking passwords with at least one non-financial Web site, and 47 percent of users share both their online banking user ID and password with at least one non-financial Web site.
"I have no reason to doubt that people do the same thing with their Twitter passwords and user IDs," Randy Abrams, director of technical education at ESET, told TechNewsWorld.
Users should employ different passwords for each online service they sign up for, according to Twitter's Harvey. That, however, is more easily said than done, said Wolfgang Kandek, chief technology officer at Qualys.
"People are overwhelmed with the number of passwords they have to use," Kandek told TechNewsWorld. "At Qualys alone, I have probably 10 different systems I interact with -- my email, human resources, the benefits system -- all of which require different passwords and usernames."
Why Twitter? Why Anyone?
Twitter is not a banking site, and users don't normally store extremely sensitive information like Social Security numbers in their profiles. So what interest would a profit-driven hacker have in busting into other people's Twitter accounts?
One motive may be a practice known as "spitting" -- essentially the Twitter version of spam. If a hacker can access others' Twitter accounts, they can tweet links to malicious Web pages to that person's trusted contacts, as well as start following massive numbers of other Twitter users in hopes that they'll follow back, thus expanding the pool of potential spam victims.
Other reasons may have nothing to do with Twitter per se. People who use the same username/password combo for a torrent site and Twitter might also use it for more sensitive matters like bank accounts, a prime target for hackers.
Who Did What How?
It's not yet clear whether the security holes in the torrent forums were created maliciously or they were the result of poor coding.
Twitter claims they were created deliberately by a crook, a view ESET's Abrams agrees with. "Remember, a non-malicious guy made millions of dollars selling pet rocks," he pointed out. "How hard is it to imagine someone thinking of getting people to give him their usernames and passwords by just setting up a site to offer them stolen stuff that didn't cost him anything?" Many torrent sites enable the illegal sharing of copyrighted material such as music and movies.
However, it's possible the security holes in the torrent sites could have been created through poor coding. "It's a little too early to tell whether it was really malicious or just a mistake," Dave Marcus, vice president of threat research at McAfee Labs, told TechNewsWorld. "I find that claim a little dubious because the number of free BitTorrent sites that don't require user registration and login way outstrips the number that do require these."
Prefab Sites Could be Dangerous
The attack on Twitter points to another problem that might become endemic soon: the increasing use of pre-built applications and sites by people who want to make money online.
"A lot of entrepreneurs are looking to make their fortune on the Web but may not have the technical knowhow or the time and patience to build their own sites or applications," Graham Cluley, senior technology consultant at Sophos, told TechNewsWorld. "They are likely to acquire a prefabricated Web site, whether it be for searching torrents, online dating or a message forum."
That problem might become worse over time. "Why should people have to build their own Web sites rather than acquiring the pieces and simply giving them a paint job?" Cluley asked. "Imagine if we all had to build our own television sets or cars instead of buying them."
Companies offering online services need to think about ways to further improve security, Qualys' Kandek said. "Twitter could argue that this latest attack has nothing to do with it and, strictly speaking, it would be right," he pointed out. "But in terms of the Internet ecosystem, security is a real problem we all need to work to solve."
One solution to this problem could be for companies that provide services to use two-factor authentication. This combines something a user knows, such as a username and password, and something the user has, such as a token or mobile phone.
"The token is one of the most powerful solutions to the security problem I've seen to date

Happy Birthday, The Sims







(Credit: EA)

For a 10-year-old, The Sims has had quite a lifetime.
Launched on February 4, 2000, The Sims has proven one of the industry's most enduring and popular game franchises. Offering players the ability to live a virtual life, the game has launched a slew of sequels, traveled to different countries, and rewarded Electronic Arts with $2.5 billion in sales.
The Sims, Sims 2, Sims 3, and its various other spin-offs are available on a variety of platforms, including PCs, Macs, game consoles, portable devices, and smartphones. The original game can now be found in 60 different countries and 22 languages.
The Sims has also proven popular among social-networking sites, says EA, with its own pages on Facebook, MySpace, Twitter, and YouTube, adding up to a following of around 1 million people.


Party with The Sims(Credit: Electronic Arts)

"The success of The Sims is something gamers and the gaming business as a whole can be proud of, said Rod Humble, who heads the EA Play label, in a statement. "The future of The Sims is going to be a lot of fun; it is rare for an entertainment franchise to be gaining momentum a decade after release, so this is a particularly pleasant moment for everyone who has worked on the games."
The Sims has caught on, believes EA, not just because it's fun and quirky, but because it gives people the ability to create and control another life for themselves, complete with families, friends, and a whole new virtual world.
The franchise has also kept up with the times, as The Sims 3 offers a green-friendly environment in which players can grow their own food and use a Toyota Prius hybrid to travel around town.
To celebrate the Sims' anniversary, EA is offering a few free gifts and special promotions for all Sims fans at its Sims Web site.



2/1/10

Mac vs Pc . Which is more secure?

When I am asked the question "Which is more secure, Mac or PC?" I find myself stumbling around for a response because I don't have a clear-cut answer. I use both. And I use antivirus software with both.
So I decided to conduct an informal survey of a bunch of security experts and see what they had to say in the hopes that people can use the information to help them come to their own conclusions.
Before I provide quotes from the 32 experts who participated in the survey, along with edited comments from an interview with a Microsoft representative and a link that Apple provided, I'd like to share some relevant research from antivirus vendor ESET.





More than half of Americans believe that PCs are "very" or "extremely" vulnerable to cybercrime attacks, while only 20 percent say the same about Macs, according to this ESET survey.(Credit: ESET)
ESET released the results of a survey in November related to awareness of cybercrime in the U.S. The survey of more than 1,000 people found that while both PC and Mac users perceive the Mac as being safer, Mac users are victims of cybercrime just as frequently as PC users.
Meanwhile, Mac users are just as vulnerable to Web-based attacks like phishing as PC users are, and Mac users who fall prey to phishing tend to lose more money on average than PC users do, the survey found. "Viruses are a diminishing percentage of what we're seeing," said Randy Adams, director of technical education at ESET. "A lot of attacks have to do with social engineering and that kind of attack is platform agnostic."
For my survey I asked security experts: Which is more secure for consumers--Mac or PC, and why? Here are their (mostly) unedited responses, in alphabetical order by last name.
Ross Anderson, professor of security engineering at the Computer Laboratory at University of Cambridge: "Computer criminals differ from ordinary criminals in that they're more rational. The bulk of normal crime--burglaries, muggings, car thefts--is done by disadvantaged young men, often illiterate and with drug and alcohol problems. The bulk of e-crime is done by technically sophisticated people living in poor countries like Russia, India, or Brazil. So while preventing normal crime is about sociology, preventing online crime is about economics. Malware writers are rational, as are botnet herders. They would far rather attack Windows PCs as there are lots more of them. So you are much less likely to be bothered by malware if you use a Mac, or run Linux on your PC."

Jacob Appelbaum, hacker and researcher: "It's possible to have a well-secured machine regardless of operating system. Users generally aren't able to secure machines and so this responsibility often falls to the vendor...Mac OS X and Windows both encourage users to download programs from the Internet without any thought for security. Both of those operating systems run many services by default and offer them to anyone who cares to look. While Windows offers digital signatures for some programs, it's still very common for users to run buggy, untested software they download from random places on the Internet. The same is true for Mac OS X. Both suggest that a vendor should offer source code for applications so that users may make their own assessments."

-- Robert G. Ferrell, IS security specialist, U.S. Defense Dept.Mike Bailey, senior researcher at Foreground Security: "I'm a hardcore Unix guy, but I am happy to say that I have about as much faith in Windows 7 as I do in OS X. Both have a solid design, a great SDL (software development lifecycle), security-minded developers, and a responsive support team. OS X does still have a small edge due to its smaller install base, but it is quickly losing that. "I still prefer OS X, but due to ease-of-use and customization, not security reasons. In my mind, the OS question is quickly becoming moot, and will soon be replaced by the already-intense Web browser holy wars--especially with Google jumping into the fray there."

Graham Cluley, senior technology consultant at Sophos: "They're both mature operating systems from the security point of view, and as good as each other. But, crucially, it's not about the operating system that is being run on the computer, it's the fleshy human sitting in front of it...I would argue that an Apple Mac user wanting to watch the 'Erin Andrews Peephole Video' is just as likely to download a bogus browser plug-in to help them do that, as a Windows user. And it doesn't matter that Mac OS X will ask them to enter their username and password to install the plug-in--they want to watch the video, they will enter their username and password. Social engineering is the unifying threat that puts all computer users at risk, regardless of operating system. And that's what most threats exploit.
"So, the next question is--when people ask me what kind of computer should they buy for home, which one do I recommend? Well, I recommend Apple Macs to my friends. Compared to Windows (where we see 50,000 new malware samples every day) malware for Mac is still a novelty. Mac malware is becoming more common, is in-the-wild, and is financially motivated...You can still get hit--but there are a lot less arrows being thrown at Mac users...I do tell my friends that they should run antivirus on their Macs, just like I do on the Macs my wife and I use at home."
Dino Dai Zovi, independent researcher: "Neither. Consumers should see if Apple's iPad or the forthcoming devices based on Google's Chrome OS suit their needs because both are significantly more secure than any general-purpose desktop system, Linux, Mac, or PC."

Nitesh Dhanjani, researcher and consultant: "I realize the market share argument is a cliche, but I feel it is true--OS X wins from a security perspective because it has a lower market share. Windows Vista and Windows 7 have some impressive security controls that are not present in OS X. If we were to flip the market share, we would see a lot more exploitation in the wild. More specifically, browser security is one of the more important items to consider today from a risk perspective. I know Internet Explorer has had a considerable share of vulnerabilities, but the Safari Web browser also has a lousy reputation in the security community--it almost seems a child's play to locate an exploitable condition in Safari. Apple really needs to get its act together with Safari since OS X is enjoying a healthy market share climb at the moment."
Carole Fennelly, director of content and documentation at Tenable Network Security: "I will give you a frustrating answer: the most secure system is the one that you know how to secure :) Meaning if you're pretty knowledgeable in Windows, or even just disciplined enough to keep up with Windows updates and keep your antivirus up to date, there's no reason you can't run a Windows box relatively securely. My mother-in-law has a Windows machine and does very well with it. HOWEVER if you are the type to not let Windows do its updates, tend to click on anything, etc., I'd say get a Mac. I had my parents get a Mac for this reason.
"In short, Mac is probably more secure in that more people write Windows exploits. This would probably change if the majority of people had Macs. Windows requires effort to be secure. Then again, so do most OSes."

Paul Ferguson, network architect at Trend Micro: "Well, that's a difficult (and tricky!) question to answer--I think that cybercriminals will always prefer to target the platform with the largest user footprint, so it's really not a question of whether a 'PC or Mac' is more secure than the other one, in my opinion."
Robert G. Ferrell, information systems security specialist at the U.S. Dept. of Defense: "Is it more dangerous to take off from a terrorist-infested airport, or land at one? Flippancy aside, I just don't think this question (Mac or PC) has any real meaning today. Far more relevant to me are the browser and e-mail clients a consumer is using, irrespective of the operating system or hardware platform. Even more critical from a safety standpoint is the level of security awareness exhibited by that consumer. If you haphazardly visit every link and download every file sent to you in e-mail or posted to your social-networking pages, sooner or later you're going to get nailed. Period. Platforms are passe. Apps are where it's at."
Halvar Flake, head of research and CEO of Zynamics: "General state of affairs: Vista/Win7 has more extensive countermeasures against attacks and a codebase with presumably fewer security issues. But it's the operating system of the majority of users, hence making it profitable to attack. Attackers will therefore spend lots of time bypassing the countermeasures. Mac OS has fewer countermeasures and lots of easily exploitable bugs, but the market share is low, making it a less likely target.

"In the end, for the consumer, if he doesn't think he'll ever be deliberately targeted, using a low market share operating system is safer as attackers pool their resources for the largest target (even though the largest target might be significantly more secure, technically)."
Joe Grand, president of Grand Idea Studio, hardware hacker, inventor: "Not taking into account the human factor of falling for social engineering, phishing scams, etc., which could affect any operating environment, I would say right now the safer route is Mac OS X, primarily because there just isn't a huge amount of directed attacks against the operating system compared to a Windows environment (yet).
"I hear way more about zero days coming up on Windows environments compared to Mac. Maybe Apple is better at keeping their security issues under the rug. On a PC, if you drop your guard for one moment and forget to keep your products up-to-date, it could be game over. People [attackers] are still focused on targeting Windows (and other associated Microsoft and Adobe products), but that may change at some point. For an everyday consumer that just wants to use a computer and not worry about getting owned with every click of the mouse, I'd go for a Mac."
Jeremiah Grossman, founder and chief technology officer at WhiteHat Security: "To ask that question from a consumer's perspective you probably should be using the word 'safe' rather than 'secure'; two completely different things. 'Secure' is a supermax prison. 'Safe' is a playground in suburbia. Follow?
"Macs may or may not be technically more secure than PCs, but that is irrelevant if NOT getting hacked is most important to you. In the current threat climate, Macs do not get attacked nearly as often as PCs. So in that context, Macs are safer for consumers."

Frank Heidt, CEO of Leviathan Security: "I'm tempted to go with the safe answer that the size of the installed Microsoft base makes Apple 'more secure' because it is targeted less often. The risk landscape for consumers (and enterprises) has changed over the last few years. Operating systems as such are no longer the primary target of consumer-targeted attacks; applications are. In light of that fact, I'd say each operating system has its benefits and liabilities. The real risks lie in the consumer's browser choice, and security habits. From a browser standpoint, I would choose Firefox over IE, and IE over Safari."
Mikko Hypponen, chief research officer at F-Secure: "Mac is more secure, simply because it has less attacks targeting it. If Mac would be targeted more, it could have exactly the same problems as PC does today.
"There's two main reasons why Mac isn't targeted as much as PC:
1) Smaller user base--making it less a lucrative target 2) Lazy attackers--their existing codebase and expertise is on Windows, so they keep creating more Windows attacks. Hey, if they make a nice enough living by writing malware targeting Windows XP, why change to anywhere else?"
3ric Johanson, security researcher: "If you look at the number of published vulnerabilities in software and the number of users and compare Windows versus Mac OS you will discover that Mac OS has far more published vulnerabilities per user than Windows does so I think the data pretty much speaks for itself."

Paul Kocher, president and chief scientist at Cryptography Research: "The fair answer is that with the latest versions of each operating system there isn't a compelling security reason to pick one or the other. It used to be that Apple was doing a better job, but with Windows 7 Microsoft has caught up. There are some differences; Windows has a better security ecosystem. On the other hand, Apple tends to have more expensive hardware and has a smaller market share, so it attracts fewer malware writers. Both have security bugs. Both need patches. Both can be broken if someone finds a zero-day exploit."
R. Adrian Lamo, threat analyst: "I'm not sure this question is really as relevant as it would have been just a few years ago. The security posture of the average Internet user depends less on their computing platform and more on their browser choice and configuration. My loved ones use Macs, with some gentle encouragement from me, but that's mostly to save me time playing Geek Squad for them.
"Personally, I never had a significant malware issue when I used a PC running Windows full-time--choices and practices define security more than an operating system does. It's worth remembering that, in locating security vulnerabilities, I've often not had to trouble myself with the target operating system.

There's no one-size-fits-all answer to this question. A PC, common sense, and NoScript http://noscript.net/ [Firefox plug-in] will help a user reduce their exposure profile more than a Mac and no common sense + clicking on anything that flashes. But the former isn't because it's a PC, and the latter isn't because it's a Mac."
Steve Manzuik, senior manager of security research at Juniper Networks: "I think for consumers it really comes down to what operating system they are the most comfortable configuring and using. Windows is by far the biggest target, but this is not necessarily because they are the most insecure but more a result of their dominant position in the market. Regardless of the operating system, the easiest way for an attacker to compromise a system is by going after the application level and causing the user to click, open, or run something they should not. "The trend of patches over the last couple of years from Microsoft, Adobe, and even Apple supports this. Unfortunately, you cannot 'secure' user behavior. But both Apple and Microsoft operating systems, as well as third-party application vendors, can still make a lot of improvements on protecting users. However, those types of changes do not happen quickly as the vendors are forced to consider usability and compatibility."
Gary McGraw, chief technology officer at Cigital: "I have a Mac. Having a Mac is more secure because not that many people have Macs. I think their market share is still less than 15 percent. For every point of market share, the risk goes up. Mostly I have a Mac because it is a better machine, not because it is more secure."
Charlie Miller, a principal analyst at consultancy Independent Security Evaluators: "Technologically speaking, PCs are a little more secure than Macs. Macs have a larger attack surface out of the box (Flash, Java, support for a million file formats, etc.) and lack some anti-exploitation technologies found in PCs like full ASLR [Address Space Layout Randomization]. This means Macs have more vulnerabilities and it's easier to turn a vulnerability into an exploit on the platform. Despite the fact it is less secure, paradoxically, Macs are actually safer to use for most people. This is because there simply isn't much risk of being exploited or installing malware.

"This safeness is purely a function of market share. Since Macs are only around 10 percent of computers out there, and it takes just as much effort for bad guys to write malware or exploits, they tend to spend all of their time targeting PCs. In other words, despite the fact that Macs are less secure than PCs, if you give one teenager a Mac and another a PC and come back in a month, the odds are the Mac will have no problems and the PC will be infected with malware. At some point the market share of Macs will reach a threshold to interest attackers, and then things will quickly turn bad for Mac users."

"If you believe the hype and the flashy commercials the answer would be Mac. But if you take a look at the two platforms, and the mindsets of the companies behind them then the PC wins hands down."

-- Tyler Reguly, senior security research engineer, nCircleMudge, technical director of national intelligence research and applications for BBN/Raytheon: "Both [OS X and Windows] are particularly vulnerable to client side application exploitation, both still have vulnerabilities at lower levels within file system, network, and directory services, and the content that most people want to view or process is often from unknown sources and requires a fair amount of control of the system for 'proper' execution--e.g. flash etc. But I suppose that 'neither' is not an acceptable answer...If a nonsecurity-paranoid user next door were asking which OS is more secure and was attempting to use that as their sole purchasing decision. I would have to advise them that bad news lies in either direction and they should instead make their purchasing choice based on other criteria such as what tasks they need to perform and what software/support they are looking to utilize.

"Of course, I'd still tell them (either way) to disable all of the JavaScript, Active-X, and plug-ins on their browsers (and other applications...such as PDF viewers and various office applications) and to fight the urge to re-enable all of these hairy areas of risk to watch the latest viral video or view noisy Web sites."
Rich Mogull, CEO at Securosis: "It depends on which version of Windows we're talking about. Clearly there are major differences between Windows XP and Windows 7. Second is, are we talking about safety versus security? Microsoft has done more in terms of its inherent security features than Apple has in the operating system. All of that said, Microsoft gets attacked a lot more than Apple does. Right now your odds of being infected as a Mac user by malicious software are quite a bit lower than a Windows user, unless you do stupid things, such as download free versions of commercial software. And some of the pornography sites on the Internet, the dark corners of the Internet have stuff that will hurt a Mac.
"But I want to give Microsoft credit because the more advanced features they put into their operating system are superior to what Apple has done. It's really a balance because there's little motivation for Apple to do more at this time. The Mac OS has got some holes in there that Microsoft has closed down. But since it's attacked less there is less motivation for Apple to close the gap."
Jose Nazario, security research manager at Arbor Networks: "While I use Macs, time and time again we've seen they're no more secure than Windows systems. But, at present, you're less likely to be exploited on a Mac because there are just fewer viruses and attackers targeting them. Sadly, there are more tools for Windows like AV [antivirus], personal security suites, etc. The Mac desktop is lagging behind. Also, Apple has often shown less aggressiveness than Microsoft in addressing security issues."

Tyler Reguly, senior security research engineer at nCircle: "If you believe the hype and the flashy commercials the answer would be Mac. But if you take a look at the two platforms, and the mindsets of the companies behind them then the PC wins hands down. If you compare Windows 7 to Snow Leopard, then the simple winner is Windows 7. Microsoft brought in teams of security professionals to look at their code and find problems leading to a more secure product while Apple is often criticized for ignoring issues.
"The idea of the consumer being protected due to lack of market share is fairly obtuse, as more people buy into the product and market share grows, targeted attacks will grow as well. You also have to consider that Microsoft has a patch program in place that provides patches and updates on a more regular basis than Apple, this is something that the consumer should care about, as should they care about the plethora of PC security products that exist.
"The big risk is client side attacks and most of that could be prevented by using adequate software on the desktop, along with common sense while surfing. Until consumers can learn to do this on a regular basis it won't matter if they are running a Mac or a PC...they'll be at risk."
Avi Rubin, computer science professor at Johns Hopkins University: "Right now the Mac is more secure than the PC, but only because the PC still has almost 90 percent of the market. The Mac is no more difficult to hack than the PC, but hackers get much more bang for their hacking buck attacking Windows. So, you're safer on a Mac...for now."


Patrik Runald, senior manager of security research at Websense: "My opinion on this is that if you look at the raw numbers of threats then there's no doubt a Mac is safer. However, I've seen Mac users run/click on anything because of this and that is bound to get them into problem at some point. I'm using a Mac myself."
Bruce Schneier, chief security technology officer of BT: "Mac, because there's much, much less malware out there that targets a Mac."
Joe Stewart, director of malware research at SecureWorks: "The answer is 'for the average user, at this moment in time it is less risky to use Mac OS than Windows.' The paradox is, by promoting that idea we've just made Macs a little less safe, since we are potentially increasing Apple's market share by a tiny fraction, making it more of a viable target over time. Fundamentally Mac and Windows suffer from the same weakness--human programmers make mistakes and users are easily social-engineered. Whichever platform has the most users is ultimately the riskiest to use."
Johannes Ullrich, chief research officer for the SANS Institute: "I recommend Macs. The main advantage for Mac users is the lack of interest from malware writers. Macs don't really have an advantage over Windows systems when it comes to malware. A lot of malware (for example, the recent fake-antivirus examples) is installed willingly by users. Mac users would do the same thing if asked to install software under the right pretense. Right now, there is no well tested anti-malware solution for Macs due to a lack of samples."

Paul Vixie, founder of the Internet Systems Consortium: "Mac is more secure for consumers, for three reasons. First, the code base is smaller and more easily audited. Second, the code base came from the old minicomputer world of UNIX rather than from the old microcomputer world of MSDOS, and things like multiuser and multiprocessor and protected virtual memory have been around longer in the UNIX world than in the MSDOS world. Third and finally, because the Mac market size is smaller, there are fewer users and fewer ISV's [independent software vendors] and fewer device driver writers and it's just not as interesting a target for bad guys."
Vincent Weafer, vice president of Symantec Security Response: "If you look at the security landscape as a whole, PCs tend to be targeted by more attacks then the Mac platform. So, from that perspective, the Mac would appear to have the edge. However, in reality, all technologies are subject to security vulnerabilities, including the Web browsers, common Web browser plug-ins and common applications that run on top of the operating systems. So in reality, consumers can fall victim to online threats regardless of the operating system they're using. Also consider that we're seeing today's cybercriminals almost exclusively going after personal and financial information, and often times, they do this by employing social-engineering tactics, like phishing attacks, that are platform agnostic.

It's also important to keep in mind that as any platform gains popularity, its likelihood of becoming targets for cybercriminals increases. Ultimately, what it comes down to is computer users deciding which platform best fits their computing likes and dislikes and then doing everything they can to make sure that they have protected themselves. This includes keeping up-to-date with security patches, having full-featured security software protection, setting sensible policy and controls on how they use their computer--especially in open environments such as free Wi-Fi hot spots--and being aware of how to spot threats and how not to fall victim to them."
Chris Wysopal, chief technology officer at Veracode: "My wife, kids, and parents all use Macs on my recommendation. I think the Mac is less risky, not more secure. The difference is in the threat environment. An analogy would be an unlocked house in an urban vs. rural environment. Both are insecure. One, the rural, is less risky.
Bugs similar to the flaw in Microsoft Internet Explorer 6 that was exploited at Google in China certainly exist in Mac applications, but attackers don't spend the time required to find them and build attacks using them. This is because it is much more often a PC than a Mac between the attacker and the attacker's target."

Microsoft
Paul Cooke, director of Windows client and enterprise security: "One of our major goals [for] Windows 7 was to keep malware off the box...When we look at the Smart Screen Filter in IE 8, it was built to help users understand if the sites they go to are safe or are known phishing sites...On top of that there is integration with Windows Live Mail and other features...If you try to download a piece of known unwanted software we will warn the user and tell them this piece of software is known to be bad...Windows running with IE 8 is the only combination of browser and operating system technology that has anything like an XSS (Cross-Site Scripting) filter. It is aimed at helping ensure that when you go to your banking or other trusted sites that you are actually interacting with that site.
"Windows 7 has investments that extend the security enhancements from Vista (like) Data Execution Prevention technology, Address Space Randomization technology, kernel patch protection, User Account Control ... [and new technologies like] Structured Exception Handling Overwrite Protection and Fault Tolerant Heap.
"The Mac and OS X is not a panacea against security methodologies and attacks. You can go on the Internet and see the patches that Apple puts out. Like all operating system platforms they have vulnerabilities. This is something that as an ecosystem, we all have to deal with. I've been a security guy over 20 years and never seen an organization with a commitment to security like Microsoft has. It's why I came here."
Microsoft also directed me to this site and this site for more information about Windows 7 security features.
Apple
Apple did not provide a representative for comment but referred me to this page that says: "Mac OS X doesn't get PC viruses. And its built-in defenses help keep you safe from other malware without the hassle of constant alerts and sweeps."
"The 64-bit applications in Snow Leopard are even more secure from hackers and malware than the 32-bit versions. That's because 64-bit applications can use more advanced security techniques to fend off malicious code," the Apple page says.
The site also says Mac OS X "prevents hackers from harming your programs through a technique called "sandboxing"--restricting what actions programs can perform on your Mac, what files they can access, and what other programs they can launch. Other automatic security features include Library Randomization, which prevents malicious commands from finding their targets, and Execute Disable, which protects the memory in your Mac from attacks."
Information from : news.cnet.com