Create an Account
username: password:
 
  MemeStreams Logo

Twice Filtered

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   (Computer Security)
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Computer Security

Open Letter to RSA Customers
Topic: Computer Security 6:49 am EDT, Mar 21, 2011

Art Coviello:

Our investigation has led us to believe that the attack is in the category of an Advanced Persistent Threat (APT).

It's troubling that the integrity of deployed SecurID systems is in any way dependent on information stored on the RSA intranet.

From the archive, a US analyst:

He would rather not have uniformed guys looking over his shoulder, but there is no way anyone of his skill level can get away from that kind of thing.

On John McCain:

In all his speeches, John McCain urges Americans to make sacrifices for a country that is both "an idea and a cause".

He is not asking them to suffer anything he would not suffer himself.

But many voters would rather not suffer at all.

BBC:

The dessert, called Baby Gaga, is churned with donations from London mother Victoria Hiley, and served with a rusk and an optional shot of Calpol or Bonjela.

Mrs Hiley, 35, said if adults realised how tasty breast milk was more new mothers would be encouraged to breastfeed.

Open Letter to RSA Customers


The National Strategy for Trusted Identities in Cyberspace
Topic: Computer Security 9:46 am EDT, Jun 26, 2010

Howard Schmidt:

Today, I am pleased to announce the latest step in moving our Nation forward in securing our cyberspace with the release of the draft National Strategy for Trusted Identities in Cyberspace (NSTIC). This first draft of NSTIC was developed in collaboration with key government agencies, business leaders and privacy advocates. What has emerged is a blueprint to reduce cybersecurity vulnerabilities and improve online privacy protections through the use of trusted digital identities.

No longer should individuals have to remember an ever-expanding and potentially insecure list of usernames and passwords to login into various online services.

We seek to enable a future where individuals can voluntarily choose to obtain a secure, interoperable, and privacy-enhancing credential (e.g., a smart identity card, a digital certificate on their cell phone, etc) from a variety of service providers -- both public and private -- to authenticate themselves online ...

From the Loose Tweets Sink Fleets Department:

What in the world is going on? Oh, it's a hacker causing all of this chaos. A hacker has gotten into the U.S. Federal payroll system and electronically issued paychecks ... to himself! totaling billions of dollars!

Paul Ferguson:

We are all responsible.

And we are all failing.

Andrew Keen:

In the future, I think there will be pockets of outrageously irresponsible, anonymous people ... but for the most part, we will have cleansed ourselves of the anonymous.

Bruce Schneier:

Will not wearing a life recorder be used as evidence that someone is up to no good?

New Scientist:

The US Department of Homeland Security is developing a system designed to detect "hostile thoughts" in people walking through border posts, airports and public places ...

Decius:

Unless there is some detail that I'm missing, this sounds positively Orwellian.

Eric Schmidt:

If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place.

The National Strategy for Trusted Identities in Cyberspace


Information Assurance Awareness
Topic: Computer Security 7:51 pm EDT, Aug 27, 2009

From the Loose Tweets Sink Fleets Department:

Something very strange is underway. I went to get cash out of an ATM this morning, and the ATM had no cash. So, I went to another ATM, and it too had no cash. Strange, right?

What in the world is going on? Oh, it's a hacker causing all of this chaos. A hacker has gotten into the U.S. Federal payroll system and electronically issued paychecks ... to himself! totaling billions of dollars!

How did a hacker get into our network? Did you lose a laptop or PDA? Or maybe you gave out DoD systems information to a salesman?

From the archive, The Horror, The Horror:

Owner: Take this object, but beware it carries a terrible curse!

Homer: [worried] Ooooh, that's bad.

Owner: But it comes with a free Frogurt!

Homer: [relieved] That's good.

Owner: The Frogurt is also cursed.

Homer: [worried] That's bad.

Owner: But you get your choice of topping!

Homer: [relieved] That's good.

Owner: The toppings contain Potassium Benzoate.

Homer: [stares]

Owner: That's bad.

Information Assurance Awareness


Steerage
Topic: Computer Security 7:46 am EDT, May 27, 2009

James L. Jones:

"There is no right-hand, left-hand anymore."

Ellen Nakashima:

President Obama is expected to announce late this week that he will create a "cyber czar."

Anonymous White House official:

"It's trying to steer us in the right direction."

From the Oxford American Dictionary:

cybernetics. Origin: 1940s, from Greek kybernētēs, "steersman", from kubernan, "to steer"

Why look when you can leap?

We are a cyber nation.

The NITRD Program Senior Steering Group (SSG) for cybersecurity R&D invites you to participate in the National Cyber Leap Year.

Bruce Sterling:

Follow your bliss into the abyss. That's my new bumper sticker. This is the abyss. You guys are the denizens of the abyss. I strap on my diver helmet and go into the internet as far as you can go.

Albert-László Barabási:

We modeled the mobility of mobile phone users in order to study the fundamental spreading patterns that characterize a mobile virus outbreak. Once a mobile operating system’s market share reaches the phase transition point, viruses will pose a serious threat to mobile communications.

Speaking of serious threats:

At least one Russian official has said that a cyber-attack on Russia’s critical transportation or power infrastructure would warrant a nuclear response.

General "Buck" Turgidson:

Mr. President, we are rapidly approaching a moment of truth both for ourselves as human beings and for the life of our nation. Now, truth is not always a pleasant thing. But it is necessary now to make a choice ...


vimtruder
Topic: Computer Security 7:25 am EDT, May 11, 2009

Normal trojans are a known threat, and we know how to mitigate them. But what about virtual machine trojans?

vimtruder


Electricity Grid in US Penetrated By Spies
Topic: Computer Security 8:43 am EDT, Apr  8, 2009

Cyber is the new Pakistan.

Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials.

Under the Bush administration, Congress approved $17 billion in secret funds to protect government networks, according to people familiar with the budget. The Obama administration is weighing whether to expand the program to address vulnerabilities in private computer networks, which would cost billions of dollars more.

Last week, Senate Democrats introduced a proposal that would require all critical infrastructure companies to meet new cybersecurity standards and grant the president emergency powers over control of the grid systems and other infrastructure.

From the NERC letter:

"Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the Bulk Electric System" necessitates a comprehensive review of these considerations. The data submitted to us through the survey suggests entities may not have taken such a comprehensive approach in all cases, and instead relied on an "add in" approach, starting with an assumption that no assets are critical. A "rule out" approach (assuming every asset is a CA until demonstrated otherwise) may be better suited to this identification process.

Electricity Grid in US Penetrated By Spies


The Pollution Of The Information Age
Topic: Computer Security 7:44 am EDT, Mar 18, 2009

Bruce Schneier:

Data is the pollution of the information age.

This is wholesale surveillance; not "follow that car," but "follow every car."

More is coming.

Will not wearing a life recorder be used as evidence that someone is up to no good?

Noam Cohen's friend:

Privacy is serious. It is serious the moment the data gets collected, not the moment it is released.

From last year's best-of:

So many things these days are made to look at later. Why not just have the experience and remember it?

Thomas Powers:

Is more what we really need?

Stewart Brand:

In some cultures you're supposed to be responsible out to the seventh generation -- that's about 200 years. But it goes right against self-interest.

The Pollution Of The Information Age


Cyber Security: Blurred Vision
Topic: Computer Security 7:44 am EDT, Mar 18, 2009

Paul Ferguson:

This entire discussion of "Who will be responsible for US Cyber Security?" is the wrong discussion altogether.

We are all responsible.

And we are all failing.

Greg Conti:

The revolution in cyberwarfare ... necessitates the formation of a cyberwarfare branch of the military, on equal footing with the Army, Navy, and Air Force.

We do not make this recommendation lightly.

Also:

We're all losers now. There's no pleasure to it.

From last December:

"You have to laugh to keep from crying these days," she said as she wiped away tears.

In the long run we are all dead.

Cyber Security: Blurred Vision


Do We Need a New Internet?
Topic: Computer Security 4:51 pm EST, Feb 15, 2009

John Markoff:

There is a growing belief among engineers and security experts that Internet security and privacy have become so maddeningly elusive that the only way to fix the problem is to start over.

What a new Internet might look like is still widely debated, but one alternative would, in effect, create a "gated community" where users would give up their anonymity and certain freedoms in return for safety.

Scientists armed with federal research dollars, working in collaboration with the industry, are trying to figure out the best way to start over.

In other news, cypherpunk futures rose sharply in after-hours trading.

Your Call Is Important to Us.

At a meeting of the Lebanese parliamentary communications committee, MP Marwan Hamada and internal security chief Ashraf Rifi said that Syrian intelligence was wiretapping everyone in Lebanon.

Can you hear me now?

NSA is said to be offering "billions" to any firm which can offer reliable eavesdropping on Skype IM and voice traffic.

Oh, Canada!

An Ontario Superior Court ruling could open the door to police routinely using Internet Protocol addresses to find out the names of people online, without any need for a search warrant.

"A lot more people would be apprehensive if they knew their name was being left everywhere they went."

Fear not:

We're going to be okay, aren't we Papa?
Yes. We are.
And nothing bad is going to happen to us.
That's right.
Because we're carrying the fire.
Yes. Because we're carrying the fire.

They are carrying the fire through a world destroyed by fire, and therefore -- a leap of logic or faith that by the time the novel opens has become almost insurmountable for both of them -- the boy must struggle on, so that he can be present at, or somehow contribute to, the eventual rebirth of the world.

Do We Need a New Internet?


40% of hard drives bought on eBay hold personal, corporate data
Topic: Computer Security 8:04 am EST, Feb 12, 2009

A New York computer forensics firm found that 40% of the hard disk drives it recently purchased in bulk orders on eBay contained personal, private and sensitive information.

Recently, Decius wrote:

One must assume that all garbage is monitored by the state. Anything less would be a pre-911 mentality.

40% of hard drives bought on eBay hold personal, corporate data


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0