Index of Technology Security

Blog Index

Jan. 25, 2016 2:00 pm
In April 2014, Charles F Barnaby wrote a very interesting Article for Best Thinking entitled "Killing by Remote Control" . I left a comment back then - on his article - that it would be only a matter of time before terrorists and other criminals exploited this new technology to kill others. My Comment read: April 2, 2014 at 3:38 am Assassin Drones: The history of hi-tech crime...  Read More
Oct. 5, 2011 8:21 am
Not long ago, the phrase portable secure storage did not mean a great deal to the average business traveler. Today, however, carrying large amounts of data, including application files, digital photos, and music, is a reality for most tech-savvy travelers. Whether you are on the go for business or personal reasons, you likely carry a large quantity of data with you, and odds are it is not...  Read More
Sep. 23, 2011 11:20 am
We are just a week away from the month of October, and October is National Cyber Security Awareness Month (NCSAM). The goal of National Cyber Security Awareness Month, conducted every October since 2004 and sponsored by the National Cyber Security Alliance (NCSA), is to improve cyber security posture and preparedness, and to encourage everyone to protect their networks and our nation’s critical...  Read More
Sep. 9, 2011 6:12 pm
United States House of Representatives members are readying a series of cybersecurity bills that are designed to enhance security on several fronts, including toughening law enforcement, assigning responsibility to the Department of Homeland Security (DHS) for federal IT and critical infrastructure security, and to lessen legal liability for private organizations that adhere to security best...  Read More
Sep. 5, 2011 8:15 am
It is no secret that cyber attacks are growing in complexity and severity. In August of this year, a malware-powered cyber-reconnaissance attack, dubbed Operation Shady RAT, was reported by McAfee. The cyber attack had been ongoing since 2006, and claimed victims across a wide spectrum of Internet connected organizations, including government agencies in the United States, Canada, and South...  Read More
Aug. 26, 2011 5:22 pm
There has been a lot of discussion lately concerning Internet security and privacy, spurred on by what seems like an almost daily occurrence of web site hacking and the loss of confidential data. Medical facilities, private industry, and governments alike struggle to come to grips with new methods of cyber crime and cyber terrorism. While the majority of cyber attacks are carried out by amateur...  Read More
Jul. 26, 2011 8:09 am
The term security posture is used in information security to describe the overall security effectiveness of a given system, service, or network. All aspects of security strength and weakness are evaluated and weighed against both potential and known threats in an effort to gauge the current level of protection. This same process can be used to develop a "personal" security posture, by assessing...  Read More
Jul. 18, 2011 8:15 pm
Microsoft has offered another $250,000 (USD) reward, this time in exchange for information leading to the identity of those responsible for controlling the notorious Rustock botnet network. In a statement released on the Official Microsoft Blog , Microsoft Senior Attorney Richard Boscovich stated, “While the primary goal for our legal and technical operation has been to stop and disrupt the...  Read More
Jul. 6, 2011 11:39 am
The announcement this week that a team of hackers have began to target the members of another hacking group has put an interesting spin on recently publicized cyber attacks against several organizations. A group calling themselves the “A-Team” have targeted the members of LulzSec—a group claiming responsibility for many of the latest successful security beaches--in an apparent attempt to reveal...  Read More
Jul. 4, 2011 11:34 am
33% of people use the same password for every web site they access. 62% do not use complex passwords or change their password frequently. Of the nearly 75 million scam emails sent every day, 2000 claim a victim. 73% of Americans were the victim of some form of cybercrime. 25% of all cybercrime remains unsolved. The total number of incidents recorded in 2010 involving online attacks and computer...  Read More
Jul. 3, 2011 4:47 pm
As we, here in the United States celebrate our independence this Fourth of July, we are reminded that the liberties and freedoms that come with that independence have yet to be won online. As citizens of this country we are blessed with safety and security from threats both foreign and domestic, but those guarantees have not yet extended to our citizenship in the global Internet community. This...  Read More
Jun. 30, 2011 11:11 pm
The U.S. District Court has ruled that a law suit filed against Google can proceed, paving the way for a potential class-action lawsuit against the search engine giant for the illegal interception of open residential wireless access point transmissions. Judge James Ware rejected Google's argument that a dismissal of the case was warranted because the wireless signals intercepted by Google were...  Read More
Jun. 1, 2011 10:28 pm
Several weeks ago, I had the opportunity to demo at Finovate Spring 2011 .  In the past, I have presented at a variety of professional conferences (including Microsoft PDC and IEEE), but preparing and presenting at Finovate was a real eye-opener for me. In our presentation, I showcased the platform through several complex interactions. As an illustration, we decided to follow a “day in...  Read More
May 4, 2011 10:24 pm
Several weeks ago, I was chatting with a friend of mine about pre-acquisition due diligence.  Charlie O'Rourke is one of the most seasoned developers I know. He's been doing hardcore technology for over 30 years and is one of the pivotal brains behind First Data Corporation’s multi-billion dollar payment processing platforms.  The conversation revolved around a method he uses for identifying...  Read More
Apr. 2, 2011 11:20 pm
A quick feature inventory of most “mature” commercial software products like Microsoft Word, Lotus Notes, etc. reveals that more than half of their features are either never accessed or are outright useless (the MS Office 2010 ribbon is an example of a clever attempt to obfuscate feature gluttony and compensate for poor access to most common features).  If you are developing software in a...  Read More
Mar. 5, 2011 11:33 pm
Eagerly beginning the wall to scale, Using only my hands and feet. Resolved to follow the hardest trail, I confidently place my cleat. Suddenly, there’s no foothold to rest, Desperately, I cling to the wall. My heart is pounding in my chest, My ascent slows to a crawl, My feet and arms tire and shake, The safety line invites me to bail. Should I reach...  Read More
Feb. 17, 2011 2:12 pm
The overriding motivations in the public sector are image and politics. Image is about being seen to do the right thing, and politics is about retaining and extending personal power while being seen to do the right thing. Let’s look at a classic example of the first one. Crime Map According to the Independent newspaper, England and Wales have become the first two countries in the world to...  Read More
Feb. 6, 2011 10:25 pm
One of the most challenging periods for any startup is passing through the “Valley of Death”. During this delicate phase, the organization’s burn rate is high and it has to rapidly achieve the following three goals: Move from a proof of concept (POC) to a functional commercial product Reach a cash flow break even Transition form seed\angel funding to venture capital funding ...  Read More
Jan. 1, 2011 9:02 pm
In the Anti-Virus Virus , I described how certain commercially produced malware propagates via specialty web sites that have been SOE’d to rank at the top of search engine results. In this posting I will try to identify who is responsible for the malware authorship, its marketing and its distribution. As a quick refresher: the malware, (a variety of bogus anti-virus applications), is...  Read More
Dec. 2, 2010 10:30 am
It may not be obvious, but social networks (SN) have numerous applications that go beyond simple socialization.  Beside the voyeuristic and self promoting aspects, SN data is brimming with fresh, cheap, and accurate target information. This includes, age, demographics, purchasing habits, buying power, education, brand loyalty, influence, and income, just to name a few. This is pretty powerful...  Read More
Nov. 2, 2010 9:53 pm
After much procrastination, I’ve finally taken the plunge and digitized our CD collection. It was a colossal, multi-month project but now, hundreds of hours of streaming music later, I got the opportunity to reevaluate Bach and Handel, two of my favorite composers. Bach and Handel share some interesting history. They were born only 4 weeks apart (Bach 31 March 1685 - Handel 23 February 1685),...  Read More
Oct. 3, 2010 1:48 am
The Sleep Master 7000SX: It captures and Tweets all your sleep stats while you snooze! In his book, “The Diamond Age,” Neal Stephenson classifies technologists as belonging to one of two categories: (1) those who hone existing ones and (2) those who forge and create new ones. There is a fundamental difference between how ad hoc assemblers and software crafters approach building a...  Read More
Sep. 1, 2010 1:53 pm
The Code Monkey (inspired by A Dream Within A Dream by Edgar Allan Poe) Take another slap upon the cheek, While slaving on this project, week by week.  You have been wrong to work so hard, Expecting riches and managerial regard. Grinding out functions awake and in a dream, Will not fetch rewards or professional esteem. What you lack are not more lines...  Read More
Jul. 18, 2010 3:49 am
My wife is a potter. She conducts most of her business on-line through her virtual glazedOver store and her blog .  Over the past 2 years, she has incrementally leveraged social networks to supplement her regular marketing and advertising efforts and she has progressively built-up a large following of loyal buyers and a network of peer artists.  She will readily tell you that without a...  Read More
Jul. 5, 2010 3:52 pm
In my previous life, I was a civil engineer. I worked for a large power marine construction company doing structural design and field engineering. The work assignments were pretty interesting. I got to blow up a bridge , salvage a sunken vessels , and build a lot of interesting marine structures.  On one of my projects, I was given the responsibility to design a set of beds for ...  Read More
Jun. 1, 2010 12:22 am
Latest Features: Driver’s Entertainment System and Password Protected Gear Shifter Trying to do anything well is difficult. Developing useful features is no different. It takes more effort to create useful functionality than to produce eye candy. Good feature design comes from a reliable and repeatable process (not dissimilar from CMM ). Unfortunately, many organizations still have...  Read More
May 3, 2010 10:10 pm
The Anti-Virus Offer from Hell   Several weeks ago, my wife was searching online for the words to one of Shel Silverstein’s poems.  With the Internet within closer reach than the bookshelf in our den, she went to Google and typed in the key words “shel silverstein pancakes,”  and within 0.32 seconds got several matching results ( Image 1 ). Image 1: Google Search Results ...  Read More
Apr. 1, 2010 1:07 am
The Cinawaffle DX250 Waffle Maker\DVD\MP3 Player is Remote Controlled and Bluetooth Enabled.  It Comes Standard with an SDK and a Built-in Web Server. One of the greatest fallacies in software development circles is that great products must be made with cutting edge technologies. This belief is not coincidental, as most of the people who work in high tech maintain a passionate love affair...  Read More
Mar. 18, 2010 12:29 am
What a deal! They'll fix their own bugs “ free of charge! ” Reading this advertisement made me realize how clever the software industry has become.  Why bother fixing your product prior to shipment when you can sell it on the premise that you will fix the bugs “free of charge” when the users find them for you.  Interestingly, anyone who bothered to read their licensing guide will find...  Read More
Jan. 11, 2010 6:49 pm
On February 20, 1939, over 20,000 American supporters of the Nazi party packed Madison Square Garden in New York City . They anxiously awaited the appearance of Fritz Julius Kuhn , the newly anointed Führer of the German-American Bund. The event took place two days before George Washington's birthday and a 30-foot-portrait of the first president (who was described by Kuhn as the first...  Read More
Latest Ebooks