WARNING: Major new Windows virus
Sorry to be off-topic, but I just wanted to give everyone a head's up about the nasty Windows "WMF" malware/virus that is hitting the internets hard this week. It may turn out to be one of the worst...
View ArticleUpdate on the Windows security flaw
The widely-reported flaw in how .WMF files are handled by Windows operating systems (and third-party software) may be less serious for some Windows users than originally thought. E-week's Larry Seltzer...
View ArticleWMF Windows Virus: Official MS Patch
As mentioned in my previous diary announcing the Windows WMF virus, I am following up to let everyone know that Microsoft has released its official patch:Security update for WMF vulnerability...
View ArticleSpying, NSA and TIA with a twist
What are you most worried about? Bird flu, global climate change,overpopulation or how about an earth magnetic pole reversal. We studied these and other disaster scenarios in business school. These...
View ArticleSome Good from NSA Wiretapping?
As an IT professional, even an unemployed one, every day I still ask myself one question more consistently than any other: "Why don't people seem to care about security?" People sign up for accounts on...
View ArticleWinning the Big Game is What Matters
Crossposted at MyDDReading Reaper0bot0's diary tonight reminded me very much of all the Internet Security debates I have been involved with since the early nineties. I invented one of the early...
View ArticleAs finance roils, don't neglect information security
As finance roils, don't neglect information securityWhile the world eyes the valuation meltdown in financial services, don't neglect the danger to regulated systems and data. The pitfalls of...
View Article'Positive Thinking' drove this mess - Ehrenreich is correct
Barbara Ehrenreich is right on point in discussing the irrational optimism that has dragged us off the cliff. She opines in NY Times (link & excerpts below) about the absolute failure of our...
View ArticleWaves Turn Rocks to Sand. Make Waves!
A Web-Based Proxy Server Is As Safe and Useful As a Frontal Lobotomy!by Kevin M. Nixon, MSA, CISSP, CISMOpen, anonymous web based proxy servers may be honeypots to steal your information, or may be an...
View ArticleInformation Security Breaches = Lurking Homeland & Financial Security Threat
Dustbowl Observer posted a great diary on the most recent and massive breach of our personal information.Databreach: Consumers get screwed againIf you care about the fallout of infosec breaches, you...
View ArticleParking Ticket Leads to PC Virus Attack
Firewalls. Corrupted files. Spam with bad code. Those were the traditional vectors hackers used to plant malware on a system or gain access to a workstation. Now they just give you a parking ticket....
View ArticleTen Things Government Can Do To Create Jobs
The most annoying arguments against doing anything about joblessness are usually rooted in fatalism. This perspective argues that whatever social force is destroying jobs is ‘inevitable’ and all we...
View ArticleThe lulzboat sails far and wide
I haven't seen this posted on DKOS anywhere, so I'm posting it. Hopefully it will be of interest to techies and non techies alike. This being a first time posting a diary, I hope you'll be gentle....
View ArticleThe WikiLeaks Brouhaha: Shooting the Messengers and Ignoring the Elephants,...
Part 1 of this series revisited Pfc. Manning's activities at Forward Operating Base Hammer with a focus on indicators that provided information about the level of oversight and risk management with...
View ArticleThe Wikileaks Brouhaha: Shooting the Messengers and Ignoring the Elephants,...
In Part 2, we looked at the security environment at FOB Hammer and discovered that there was effectively none. That was the first component of the "perfect storm" that enabled Pfc. Manning to collect...
View ArticleThe WikiLeaks Brouhaha: Shooting the Messengers and Ignoring the Elephants,...
So far in our story, we have focused on the role of the Department of Defense in facilitating Bradley Manning's opportunity to acquire and export so much classified information. In Part 4, we will...
View ArticleSpying on Webcams: GCHQ Edition
The Grauniad reports that, according to the Snowden documents, the GCHQ has been naughty indeed, tapping into webcam chats and saving images in bulk.
View ArticleEnraged by all of these data breaches? Wonder why?
Well, it's a bit complex. Some businesses, such as Home Depot, decided "We sell hammers" and out of ignorance, fell prey to criminals. Other businesses calculate, with business rationale, their risks,...
View ArticleHow a friend was doxed
I was on a friend's blog site today, commenting on on his blog entry and he asked me in the comments how some folks got a great deal of his personal identifiable information (PII in the trade). He is...
View Article
More Pages to Explore .....