If you are like me your eyes cross and you feel a ringing in your ears when you are exposed to military-speak. The acronyms are fun and server to separate insiders from outsiders, kind of a tribal thing.
Richard Stiennon delivers a timely, succinct exploration of cyber threats, hack attacks, crime on the web, and information warfare.
Great research over at Netcraft today. They have found a site called Mr.
Yikes, what is it with regulators and legislators? Do they have no one on their staffs to clue them in?
I am writing this at midnight, January 21. The DOW Industrials have seen their worst year opening performance ever.
I was actually in Ann Arbor last week when news broke that Arbor Networks had acquired Ellacoya a so called "deep packet inspection" technology vendor. I was perplexed.
Reddit is the hacking playground for today. While Reddit is just barely a "social network" with minor interactions between its members it is a powerful site for spreading the latest cool thing and in recent months has been pretty much taken over by Ron Paul enthusiasts and Fox News conspiracy theorists.
At a SCADA conference in New Orleans this week we learn that there have been multiple instances of hackers attempting to extort municipalities with threats of power outages - and then carrying out the threats, in at least once instance taking out several cities(none in the US, so far).Need I say more?
Jaikumar Vijayan over at Computerworld has a great round up of "lessons learned" from the TJX break ins first announced a year ago today. To his five points listed below I would add a couple of observations.
Sean Hargrave over at the Guardian seems concerned about security research firms paying hackers for exploits before they are even reported to the responsible vendor. My reaction to this issue has been: "So what, big deal".
I am preparing my next road show pitch. My past presentations have followed a pattern.