Big Data by Any Other Name is… Just A Lot of Data A couple of years ago I attended a CIO executive Summit where a panel of CIOs were discussing the latest trends in IT and the topic of big data came up. One of the CIOs, I can’t remember … Continue reading
In the early part of the 21st century as Network IDS was maturing, most major companies were trying to develop security monitoring programs which required the hiring of staff or security analysts to properly monitor and manage these systems. You may know that for one seat, or console, regardless of … Continue reading
Deeplinks via Which Apps Protect Against Verizon and Turn’s Invasive User Tracking?. Research from Stanford’s Jonathan Mayer and ProPublica has shown that Verizon’s undeleteable UIDH mobile tracking header is being used by advertising and tracking company Turn.com to respawn deleted cookies. Customers on the Verizon Wireless network who delete their … Continue reading
Steptoe Cyberblog Our guest commentator for episode 49 of the Steptoe Cyberlaw podcast is Juan Zarate, a senior adviser at the Center for Strategic and International Studies (CSIS), the senior national security analyst for CBS News, a visiting lecturer at the Harvard Law School, and Chairman and Co-Founder of the … Continue reading
The Hacker News via New Cryptowall 3.0 Ransomware Communicates over I2P Anonymous Network.
U.S. weighs retaliation to alleged Chinese cyberattacks
Following a string of cyberattacks allegedly coming from China, the U.S. government is debating what from the response should take.
by Charlie Osborne February 1, 2013 6:02 AM PST
U.S. weighs retaliation to alleged Chinese cyberattacks | Security & Privacy – CNET News.
Andy Greenberg, Forbes Staff Covering the worlds of data security, privacy and hacker culture. Symantec Gets A Black Eye In Chinese Hack Of The New York Times – Forbes.
Higgs Boson May Be An Imposter, Say Particle Physicists – Technology Review. At least two other particles could be masquerading as the God particle, according to a new analysis of the data from CERN
Love this quote “Propose to a man any principle, or an instrument, however admirable, and you will observe the whole effort is directed to find a difficulty, a defect, or an impossibility in it. If you speak to him of a machine for peeling a potato, he will pronounce it … Continue reading
The buzzword now is “Active Defense” (AD). I’ll give you that AD sounds better than “Black Ops” but a rose by another name is still a rose. Corporate Black Ops have been in existence since the beginning of hacking. Initially, it might have been a grey-hat admin shooting across the … Continue reading
It’s time to start running Anti-virus on any system/OS that allows users to browse the Interwebs. Yes, ANY OS (don’t look at me like that Linux, you too) Yes, I know that AV only knows what it knows but it is still better than nothing. New MacOS X backdoor variant … Continue reading
For a successful technology, reality must take precedence over public relations, for Nature cannot be fooled. – Richard Feynman FTC Files Lawsuit Over Data Breaches At Large Hotel Operator http://www.redbubble.com/people/thischarmingfan/works/7337412-single-taken-mad-man-with-a-box?p=t-shirt
Super Physics Smackdown: Relativity v Quantum Mechanics…In Space The only way to study the conflict between relativity and quantum mechanics is to test them over enormous distances in space. And physicists are already making plans http://www.technologyreview.com/view/428328/super-physics-smackdown-relativity-v-quantum/
The team at malware-lu doing a great job embarrassing the creator of the herpesnet bonnet. What idiot infects his personal machine with his own botnet? Though, for some reason, I do see a lesson here for the DEVOPS and security automation crowd. Information and control can flow both directions. … Continue reading
Indiana University’s chief network architect explains how he uses OpenFlow to secure, load balance, and begin to exert some sort of unified control over a 120,000-person user network. By Sean Michael Kerner | May 14, 2012 OpenFlow can Provide Security, Too.
MAHWAH, New Jersey, May 8, 2012 /PRNewswire/ — Radware (RDWR), a leading provider of application delivery and application security solutions for virtual and cloud data centers, today announced it is working with NEC Corporation of America (NEC), on the development of a joint solution that forwards both companies’ growing activities … Continue reading
I’m not surprised by this. While technology has given business an increase in productivity, sometimes it is more costly to replace something than to just keep the current system running. I have to tell you, at first seeing the old punch cards gave me a bit of nostalgia. My second … Continue reading
A photon gun capable of reliably producing single photons of different colours could become an important building block of a quantum internet Quantum Rainbow Photon Gun Unveiled – Technology Review.
NEWS Apple on Thursday released an integrated tool to remove Flashback, a type of malware designed to steal user information that was estimated to be present in more than half a million Macs just last week. Apple’s tool to fight Flashback malware goes live | Security Management | ZDNet … Continue reading
Court rules former Goldman Sachs programmer did not violate federal theft law The court said a former Goldman Sachs programmer did not violate federal theft law when he downloaded proprietary source code By John Ribeiro Court rules former Goldman Sachs programmer did not violate federal theft law – Computerworld.
In a security bulletin issued by the company on Tuesday, HPstated that it had identified a potential security vulnerability for certain ProCurve 5400zl series switches that had been purchased after 30 April last year. The switches contain a compact flash card to store its boot software and configuration files. HP has advised that certain switches … Continue reading
MS Patch Tuesday. Only 6 KBs released but they seem to cover MS entire line-up. 4 of them could allow remote code execution. Microsoft patches critical Windows zero-day bug that hackers are now exploiting – Computerworld.
<img src=”http://wms.assoc-amazon.com/20070822/US/img/noscript.gif?tag=dreman-20″ alt=”” /><br />Just started reading. So far seems to be a good introduction into the topic.
An estimated 600,000 Mac systems are suspected to be infected with the Flashback malware. Here’s how it works and how to remove it. via How to remove the Flashback malware from OS X | MacFixIt – CNET Reviews.
Facebook, Linkedin, DropBox and other online systems store credentials in plain-text files in their mobile apps. Why? Just another example why we need better security training in programming. Also, another example of why we need to patch our mobile devices just like our computers. Of course a patch is … Continue reading
Ryan Singel at Wired Mags – Threat Level writes about a new EU law that would make hacking tools illegal. While at first blush the criminalization of “hacking” tools may sound like a good idea. However, it’s not the tools but the implementation or uses that causes the crime. These … Continue reading
I’m still waiting for an all optical computer. Looks like quantum computing is going to beat it to market. Hey, Shift Happens. ————– ScienceDaily (Apr. 4, 2012) — Diamonds are forever — or, at least, the effects of this diamond on quantum computing may be. A team that includes scientists from … Continue reading
Building and implementing a Single Sign-On solution | Matt Aimonetti: “Random thoughts of a software developer Merbist Home About « Learning from Rails’ failures Building and implementing a Single Sign-On solution Most modern web applications start as a monolithic code base and, as complexity increases, the once small app gets … Continue reading
A good article from InfoWorld’s Cameron Scott on the major weakness of single sign-on systems used by major web properties. Study finds major weaknesses in single sign-on systems | Security – InfoWorld. Why are we still using username and password combinations to protect data? Sure, it easy to implement but … Continue reading
Lucian Constantin, IDG News Service writes about a new email trojan that exploits a vulnerability in Microsoft Office for OSX. No OS is truly safe from malware. Macs have been safe in the past because of the low density of installs. Now that Apple has seen an increase in … Continue reading