MicrosoftA document called "Security at Microsoft," detailing how the company protects its global network, raised some eyebrows among security watchers. The document is seen by some as marketing collateral rather than a serious security white paper. "Its not that useful because its a pretty formulaic approach," said Marc Maiffret, Windows expert and chief hacking officer at eEye Digital Security. "Microsoft is an unusual company. Its a lot more homogenous than most companies of a similar size, many of which run dozens of different systems."
WirelessRed-M this week will unveil its product to manage wireless infrastructure, and monitor hardware and software usage by clients. Red-Vision is part of the companys Red-Detect intrusion detection system (IDS). The product uses hardware probes to monitor the airwaves for rogue 802.11a/b/g and Bluetooth access points.
Electronic VotingDiebold Inc. has agreed not to sue voting rights advocates who publish leaked documents about the alleged security breaches of electronic voting. Diebold, which controls more than 50,000 touch-screen voting machines nationwide, had threatened legal action against dozens of individuals who refused to remove links to its stolen data. The companys battle began in March, when a hacker broke into the companys servers using an employees ID number, and copied a 1.8GB file of company announcements, software bulletins and internal e-mails dating to January 1999.