Big Data by Any Other Name is… Just A Lot of Data

cloud_191-bigdata

Big Data by Any Other Name is… Just A Lot of Data A couple of years ago I attended a CIO executive Summit where a panel of CIOs were discussing the latest trends in IT and the topic of big data came up. One of the CIOs, I can’t remember … Continue reading

Big Data Analytics? Dude Where’s my Correlation Engine?

Hack The Gibson

In the early part of the 21st century as Network IDS was maturing, most major companies were trying to develop security monitoring programs which required the hiring of staff or security analysts to properly monitor and manage these systems. You may know that for one seat, or console, regardless of … Continue reading

Which Apps Protect Against Verizon and Turn’s Invasive User Tracking?

Deeplinks via Which Apps Protect Against Verizon and Turn’s Invasive User Tracking?. Research from Stanford’s Jonathan Mayer and ProPublica has shown that Verizon’s undeleteable UIDH mobile tracking header is being used by advertising and tracking company Turn.com to respawn deleted cookies. Customers on the Verizon Wireless network who delete their … Continue reading

Steptoe Cyberlaw Podcast – Interview with Juan Zarate

Steptoe Cyberblog Our guest commentator for episode 49 of the Steptoe Cyberlaw podcast is Juan Zarate, a senior adviser at the Center for Strategic and International Studies (CSIS), the senior national security analyst for CBS News, a visiting lecturer at the Harvard Law School, and Chairman and Co-Founder of the … Continue reading

New Cryptowall 3.0 Ransomware Communicates over I2P Anonymous Network

The Hacker News via New Cryptowall 3.0 Ransomware Communicates over I2P Anonymous Network.

U.S. weighs retaliation to alleged Chinese cyberattacks | Security & Privacy – CNET News

U.S. weighs retaliation to alleged Chinese cyberattacks
Following a string of cyberattacks allegedly coming from China, the U.S. government is debating what from the response should take.

by Charlie Osborne February 1, 2013 6:02 AM PST

U.S. weighs retaliation to alleged Chinese cyberattacks | Security & Privacy – CNET News.

Symantec Gets A Black Eye In Chinese Hack Of The New York Times – Forbes

Andy Greenberg, Forbes Staff Covering the worlds of data security, privacy and hacker culture. Symantec Gets A Black Eye In Chinese Hack Of The New York Times – Forbes.

Higgs Boson May Be An Imposter, Say Particle Physicists – Technology Review

Higgs Boson May Be An Imposter, Say Particle Physicists – Technology Review. At least two other particles could be masquerading as the God particle, according to a new analysis of the data from CERN

Computerworld – 10 crazy IT security tricks that actually work

Love this quote “Propose to a man any principle, or an instrument, however admirable, and you will observe the whole effort is directed to find a difficulty, a defect, or an impossibility in it. If you speak to him of a machine for peeling a potato, he will pronounce it … Continue reading

Corporate Black-Ops come out of the dark

The buzzword now is “Active Defense” (AD).  I’ll give you that AD sounds better than “Black Ops” but a rose by another name is still a rose.  Corporate Black Ops have been in existence since the beginning of hacking.  Initially, it might have been a grey-hat admin shooting across the … Continue reading

Kaspersky Lab – New MacOS X backdoor variant used in APT attacks

It’s time to start running Anti-virus on any system/OS that allows users to browse the Interwebs.  Yes, ANY OS (don’t look at me like that Linux, you too) Yes, I know that AV only knows what it knows but it is still better than nothing.  New MacOS X backdoor variant … Continue reading

CIO – FTC Files Lawsuit Over Data Breaches At Large Hotel Operator

For a successful technology, reality must take precedence over public relations, for Nature cannot be fooled.  – Richard Feynman FTC Files Lawsuit Over Data Breaches At Large Hotel Operator http://www.redbubble.com/people/thischarmingfan/works/7337412-single-taken-mad-man-with-a-box?p=t-shirt

Super Physics Smackdown: Relativity v Quantum Mechanics…In Space

Super Physics Smackdown: Relativity v Quantum Mechanics…In Space The only way to study the conflict between relativity and quantum mechanics is to test them over enormous distances in space. And physicists are already making plans http://www.technologyreview.com/view/428328/super-physics-smackdown-relativity-v-quantum/

en_analyse_herpnet – malware-lu – Malware.lu technical analysis – Google Project Hosting

  The team at malware-lu doing a great job embarrassing the creator of the herpesnet bonnet.  What idiot infects his personal machine with his own botnet?  Though,  for some reason,  I do see a lesson here for the DEVOPS and security automation crowd.  Information and control can flow both directions. … Continue reading

OpenFlow can Provide Security, Too

  Indiana University’s chief network architect explains how he uses OpenFlow to secure, load balance, and begin to exert some sort of unified control over a 120,000-person user network.   By Sean Michael Kerner | May 14, 2012 OpenFlow can Provide Security, Too.

Radware and NEC Collaborate to Take OpenFlow Security to the Next Level – Yahoo! Finance

MAHWAH, New Jersey, May 8, 2012 /PRNewswire/ — Radware (RDWR), a leading provider of application delivery and application security solutions for virtual and cloud data centers, today announced it is working with NEC Corporation of America (NEC), on the development of a joint solution that forwards both companies’ growing activities … Continue reading

If It Aint Broke, Dont Fix It: Ancient Computers in Use Today | PCWorld

I’m not surprised by this.  While technology has given business an increase in productivity, sometimes it is more costly to replace something than to just keep the current system running. I have to tell you, at first seeing the old punch cards gave me a bit of nostalgia.  My second … Continue reading

Quantum Rainbow Photon Gun Unveiled – Technology Review

A photon gun capable of reliably producing single photons of different colours could become an important building block of a quantum internet Quantum Rainbow Photon Gun Unveiled – Technology Review.

Apple’s tool to fight Flashback malware goes live | Security Management | ZDNet UK

NEWS   Apple on Thursday released an integrated tool to remove Flashback, a type of malware designed to steal user information that was estimated to be present in more than half a million Macs just last week. Apple’s tool to fight Flashback malware goes live | Security Management | ZDNet … Continue reading

Court rules former Goldman Sachs programmer did not violate federal theft law – Computerworld

Court rules former Goldman Sachs programmer did not violate federal theft law The court said a former Goldman Sachs programmer did not violate federal theft law when he downloaded proprietary source code By John Ribeiro Court rules former Goldman Sachs programmer did not violate federal theft law – Computerworld.

HP spots virus on own network switches – Security – News – ZDNet Australia

In a security bulletin issued by the company on Tuesday, HPstated that it had identified a potential security vulnerability for certain ProCurve 5400zl series switches that had been purchased after 30 April last year. The switches contain a compact flash card to store its boot software and configuration files. HP has advised that certain switches … Continue reading

Microsoft patches critical Windows zero-day bug that hackers are now exploiting – Computerworld

MS Patch Tuesday.   Only 6 KBs released but they seem to cover MS entire line-up.  4 of them could allow remote code execution. Microsoft patches critical Windows zero-day bug that hackers are now exploiting – Computerworld.

Fuzzing: Brute Force Vulnerability Discovery

<img src=”http://wms.assoc-amazon.com/20070822/US/img/noscript.gif?tag=dreman-20″ alt=”” /><br />Just started reading. So far seems to be a good introduction into the topic.

How to remove the Flashback malware from OS X | MacFixIt – CNET Reviews

An estimated 600,000 Mac systems are suspected to be infected with the Flashback malware. Here’s how it works and how to remove it. via How to remove the Flashback malware from OS X | MacFixIt – CNET Reviews.

Flaw in popular mobile apps exposes users to identity theft | Mobile security – InfoWorld

Facebook, Linkedin, DropBox  and other online systems store credentials in plain-text files in their mobile apps.   Why? Just another example why we need better security training in programming.  Also,  another example of why we need to patch our mobile devices just like our computers.  Of course a patch is … Continue reading

Watch Out, White Hats! European Union Moves to Criminalize ‘Hacking Tools’ | Threat Level | Wired.com

Ryan Singel at Wired Mags – Threat Level writes about a new EU law that would make hacking tools illegal. While at first blush the criminalization of “hacking” tools may sound like a good idea.  However, it’s not the tools but the implementation or uses that causes the crime.  These … Continue reading

Quantum Computer Built Inside a Diamond

I’m still waiting for an all optical computer.  Looks like quantum computing is going to beat it to market. Hey,  Shift Happens. ————– ScienceDaily (Apr. 4, 2012) — Diamonds are forever — or, at least, the effects of this diamond on quantum computing may be. A team that includes scientists from … Continue reading

Building and implementing a Single Sign-On solution | Matt Aimonetti

Building and implementing a Single Sign-On solution | Matt Aimonetti: “Random thoughts of a software developer Merbist Home About « Learning from Rails’ failures Building and implementing a Single Sign-On solution Most modern web applications start as a monolithic code base and, as complexity increases, the once small app gets … Continue reading

Study finds major weaknesses in single sign-on systems | Security – InfoWorld

A good article from InfoWorld’s Cameron Scott  on the major weakness of single sign-on systems used by major web properties. Study finds major weaknesses in single sign-on systems | Security – InfoWorld. Why are we still using username and password combinations to protect data?  Sure,  it easy to implement but … Continue reading

What? Mac’s can’t get viruses

Lucian Constantin, IDG News Service writes about a new email trojan that exploits a vulnerability in Microsoft Office for OSX. No OS is truly safe from malware.  Macs have been safe in the past because of the low density of installs.   Now that Apple has seen an increase in … Continue reading