February 26, 2014
Beware the “Chameleon virus.” A new computer virus is now spreading like air-borne common colds, via WiFi. Like microbial evolution, viruses are gaining new advantages on an alarming scale.
The weaker security of public WiFi areas, like airports and coffee houses, are the targets of the Chameleon, according to a study at the University of Liverpool. Comments
December 8, 2013
The CEO of the cybersecurity company Mandiant reports receiving spearphishing attacks in the form of PDF invoices from his limo provider. What is truly scary about this is that the Chinese hackers are not yet inside Mandiant’s systems – otherwise, why would they bother? Given that the company’s relationship with a limo provider is not something posted on public sites either, it raises the question of how the Chinese hackers knew which limo service the CEO uses. Are the cyberattackers in China being helped by agents on the ground? Comments
October 7, 2013
Now that Facebook’s new policy allows it to tag your face with auto-recognition in photos, you can now protect yourself with T-shirts covered with the presumably distracting features of celebrity impersonators. Glamoflage likely won’t work, especially for those trying not to call attention for themselves from law enforcement – just the opposite! But this product does underscore the fact that we all carry our most obvious personal identifiers literally right under our noses. Comments
July 1, 2013
Robert Samuelson of The Washington Post argues that we would be better off without the Internet.
"Would the loss of e-mail, Facebook or Wikipedia inflict fundamental change? Now imagine life without some earlier breakthroughs: electricity, cars, antibiotics. Life would be radically different. The Internet’s virtues are overstated, its vices understated. It’s a mixed blessing — and the mix may be moving against us."
We cannot agree, but say that Samuelson is right that it is high time to remove critical systems from Internet SCADA controls.
"What’s unclear is how “infrastructure” systems (electricity grids and the like) have been penetrated and, on command, might be compromised. In the mid-1980s, most of these systems were self-contained. They relied on dedicated phone lines and private communications networks. They were hard to infiltrate. Since then, many systems switched to the Internet. “It’s cheaper,” says James Andrew Lewis, an Internet expert at the Center for Strategic and International Studies. The architects of these conversions apparently underestimated the risk of sabotage."
It would be interesting to calculate the cost of lost proprietary data, stolen money, and sabotage against the money saved by operating all our business systems off the Internet.