Lead Story: Computer Security
It’s about vulnerability... Your home computer is a popular target for intruders: they want what you’ve stored there. They look for credit card numbers, bank account information, and anything else they can find. By stealing that information, intruders can use your money to buy goods and services for themselves. But it’s not just money-related information they’re after: they also want your computer’s resources, meaning your hard disc space, your fast processor, and your Internet connection. They use them to attack other computers on the Internet. In fact, the more computers an intruder uses, the harder it is for law enforcement to figure out where the attack is really coming from. If intruders can’t be found, they can’t be stopped, and they can’t be prosecuted.
Big Gun: Bruce Schneier
Bruce Schneier is an internationally-renowned Security Technologist and author. Described by The Economist as a "security guru," he is best known as a refreshingly candid and lucid security critic and commentator. When people want to know how security really works, they turn to Schneier. His first bestseller, “Applied Cryptography” explained how the arcane science of secret codes actually works, and was described by Wired as “the book the National Security Agency wanted never to be published.” His book on computer and network security, “Secrets and Lies”, was called by Fortune a “jewel box of little surprises you can actually use.” His current book, “Beyond Fear” tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security.