Snoopware Worries Privacy AdvocatesPrivacy advocates and law enforcement agencies agree that software that allows one person to monitor what another person does on his computer without their knowledge violates the Electronic Communications Privacy Act, according to a story in today’s New York Times. The story reports that there are more than a dozen snooping programs on the market, and their makers say they are used legally by employers to monitor workers’ Internet use, by parents to follow their children’s online wanderings, and by husbands and wives to catch cheating mates.Copy Protection Company to Sue, Not to SueDaily Princetonian. The story reports that the company, whose stock value has allegedly dropped $10 million since the disclosure, backed off the lawsuit because it feared that the litigation would have a chilling effect on research. SunnComm Technologies, Inc. announced yesterday morning it would sue Princeton student John Halderman over his recent revelation of a simple way to beat the company’s new CD copy-protection method, but by the end of the day SunnComm president and CEO Peter Jacobs said he changed his mind, according to an article in the Microsoft Outlines Security PlanWashington Post, Microsoft CEO Steve Ballmer described several changes to Microsoft’s security strategy in a speech at the company’s Worldwide Partner Conference in New Orleans yesterday. He said Microsoft will issue security updates on a monthly schedule, except in “emergency” situations, to make it easier for users to keep their personal computers up to date. It will ship Windows with security precautions activated that are now left off, and will release security-focused updates to Microsoft Windows XP and Windows Server 2003 in the first half of next year. The Post reports Ballmer also said Microsoft is working with computer-security firms to make sure that they do not announce vulnerabilities before Microsoft has designed a fix. According to a story in todays Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe