Group: Anti-hacking laws can hobble Net security
A working group of security researchers, digital-rights activists and government prosecutors discuss whether bug hunters can find vulnerabilities in Web sites without violating laws.
Judge nixes teacher's conviction on porn pop-ups
A Connecticut judge grants a new trial for substitute teacher Julie Amero, saying that forensics information discovered after her conviction has direct bearing on her case.
Zero-day sales not "fair" -- to researchers
A security analyst tries his hand at selling two vulnerabilities and finds that economics and time are against him.
Insecure plug-ins pose danger to Firefox users
A security researcher warns that an insecure update mechanism for some of the open-source browser's third-party add-ons could allow an attacker the ability to install malicious code.
Peer-to-peer networks co-opted for DOS attacks
Attackers compromise the hub servers of the DC++ peer-to-peer network, turning hundreds of thousands of clients into hard-to-stop distributed denial-of-service attacks.
"Data storm" blamed for nuclear-plant shutdown
A Congressional committee calls for the Nuclear Regulatory Commission to further investigate the cause of excessive network traffic that shut down an Alabama nuclear plant.
Student detained after attacks on Estonian websites
Law enforcement authorities detain a 19-year-old student referred to only as "Dmitri," following a week of Web attacks spurred on by tensions between Russian and the former Soviet Union territory.
Experts scramble to quash IPv6 flaw
Only a few weeks after researchers raised the design issue in the next-generation Internet protocol, two drafts to the Internet Engineering Task Force propose different fixes.
E-Gold charged with money laundering
Federal prosecutors claim the company and its owners violated federal funds transfer laws, saying it knowingly served online scammers, identity thieves and child pornographers.
A Mac gets whacked, a second survives
Researchers use a previously unknown flaw in Apple's Safari browser to compromise a MacBook Pro and win the PWN to Own contest, but does the hack actually prove anything?