Site Network: Beskerming.com | Skiifwrald.com | Jongsma & Jongsma

Innovation in Information Security

Coverage of important Information Security and Information Technology news and events from the research team at S?nnet Beskerming.

Username: | Password: Contact us to request an account

More Security Problems, and the Apple - Intel Move

This week is likely to be a shorter column than the last couple of weeks' have been. Leading the news this week is the switch from IBM to Intel for Apple systems. This switch was announced at the WorldWide Developers Conference (WWDC) held recently in San Francisco, and hinted at in last week's column. Initially, Apple will continue to support and produce PPC systems, but, starting in 2006, Intel based Macintosh machines will be released to the market. One of the big surprises from the announcement was confirmation of a rumour that Apple had maintained dual versions of their current Operating System, OS X, on PPC and Intel based hardware for the last five years. This dual version was rumoured to be called Marklar, and indicates quite an impressive ability to maintain corporate secrets for five years. This admission, as well as the whole Keynote presentation being run on a Pentium IV 3.6 GHz machine seems to indicate that the platform migration may not be as difficult as previous architecture moves that Apple has done. The Keynote also demonstrated PPC native (i.e. current OS X) applications running smoothly on the Intel machine, showing that the transition will not cause the loss of a lot of functionality for users. The movement for developers is also expeceted to be relatively smooth, with Wolfram, the developers of Mathematica, able to migrate Mathematica 5 from the OS X PPC version to the OS X Intel version with only 20 changed lines of code.

It seems like not a week can go by without another report of customer privacy data being lost or stolen. In the most recently reported case, Citigroup, through UPS, lost a package containing backup tapes with records on 3.9 million customers. The information included names, social security numbers, account details, account history and loan information for present and past retail customers. A simple technical step which would have protected the data somewhat would have been to encrypt the backup tapes at time of archiving. In this case, the tapes were unencrypted, allowing anybody with the appropriate equipment to extract the information simply. Unfortunately, the problem of identity theft (and subsequent financial fraud) only appears to concern technically minded people, and the wider population is unaware of the risks that they face through compromise of data like this. Solutions do exist, but companies seem to not be aware that they exist. There are two possible explanations for the number of breaches being reported: