This is leadership? US cybersecurity is a revolving door of exiting officials
Personally, I never understood what got people so excited about Barack Obama. But back in 2008 people were positively gooey about him, and one of the lesser reasons was "cybersecurity". Obama "got it". He understood the deadly seriousness of this business.
In July, 2008 then-Senator Obama told a gathering at Purdue University: "As President, I'll make cybersecurity the top priority that it should be in the 21st century. I'll declare our cyber-infrastructure a strategic asset, and appoint a National Cyber Advisor who will report directly to me. We'll coordinate efforts across the federal government, implement a truly national cyber-security policy, and tighten standards to secure information - from the networks that power the federal government, to the networks that you use in your personal lives".
Apple left default passwords in batteries, making them vulnerable to hacks, explosion
Are our computers too smart for our own good? That's the question I'm asking myself after reading Charlie Miller's "Battery Firmware Hacking" paper. Miller showed how you can write programs to render an expensive notebook battery worthless. You might even be able to blow one up.
How could this be? What design error in the system made it possible? None. Miller wrote programs based on published documentation for chips conforming to a popular standard. But there is one key mistake by Apple that makes the whole thing a lot worse.
Rev up your websites for free with Google Page Speed Service
Would you like to take advantage of Google's worldwide network of fast proxy servers, not to mention their coding expertise? Now you can, and for free, just by signing up for a service of theirs.
Two years ago Google released the Page Speed Browser Extensions for Chrome and Firefox. These gave web developers performance analysis on their pages to help them optimize their sites based on a set of best practices developed by Google.
Windows Phone 'Mango' released to manufacturing
Windows Phone 7.5, code-named 'Mango', has been released to manufacturing according to a blog entry by Microsoft's Terry Myerson, Corporate Vice President, Windows Phone Engineering.
The 2011 Pwnie nominations are in!
The premier event on the software vulnerability research calendar is the Pwnie Awards ceremony (it's pronounced "pony"). The 2011 nominees include critical vulnerabilities in Microsoft ASP.NET, iOS, Google Chrome, Java, the Linux kernel, and an award for special achievement in insecurity to Sony.
Read the nominations page for the full list. Here are my selections:
Apple launches new offensive in war on Adobe
Adobe and Apple used to be partners, with the maker of Photoshop being one of the biggest third-party Mac developers. Then Apple started releasing digital products that competed with its partner, and CEO Steve Jobs came out against Adobe Flash.
Now the companies have quite the overlap in their customer bases and there's still a lot there, but Apple is doing its best to stop that.
Windows 8: The death of malware? The death of anti-malware?
There is a lot of buzz about a recent set of tests by NSS Labs that show the Smartscreen reputation system in Internet Explorer 9 head and shoulders and most of the rest of the body above the competition in blocking malware on the web.
I think the results of the test are even more important than they seem, considering previous reports that Microsoft plans to make Smartscreen a base part of Windows 8. This would extend parts of the protection to any executable hitting the file system. This would be big news.
Mozilla re-establishes Enterprise Working Group
Perhaps stung by the reaction to recent statements and actions, Mozilla has announced that they are taking the old Mozilla Enterprise Working Group out of virtual mothballs.
The MEWG is a forum where Mozilla developers can interact with Enterprise IT and developers to discuss their needs and experiences with Mozilla software. It is supposed to include a monthly conference call in addition to online forums, but there hasn't been a meeting in almost 4 years.
Solve Windows problem with these handy tools
When things go wrong with your Windows PC, or someone else's, you don't want to fish around or Google for the appropriate tool. Have it right there when you need it, and you'll feel clever for it.
I usually carry a key ring of USB thumb drives with me with a variety of tools on them. Yes, some people laugh at me for it, but they turn out to be handy more often than you'd think.
How China stopped spam and malware distribution on its domains
Bad, but inevitable: The consumerization of IT is accelerating
Everyone, led by Vice President Whatshisname, wants to use their iPhone on the corporate network. Don't IT security people have enough problems? But the onslaught of unsecurable consumer devices in the enterprise is probably unstoppable.
A new study by IDC sponsored by Unisys looks at the problem of consumer devices invading the enterprise. The authors of the study come out of it upbeat, but it scares the bejeezus out of me. Put simply, these devices -- by which I basically mean those running iOS or Android -- were not designed to be secure and manageable. There are efforts to make them secure and manageable, but these are, generously-construed, version 1.0 efforts. It's obvious to me that these devices will create many severe security problems for enterprises, but the forces of consumerization cannot be stopped. Too many people want to use them, security be damned. Even the White House got them.
Starting over with the Internet is cybersecurity Shangri-la
Many of the worst problems on the Internet are probably unsolvable, at least as a practical matter. One of the favorite models to imagine our way out of this ordeal is to start over with a new and more "secure" Internet. Sadly, this is an even less practical idea than fixing the one we have.
The latest to dare to imagine this dream is U.S. Cyber Command chief Gen. Keith Alexander who wants a ".secure" network for critical infrastructure: ".secure would require visitors to use certified credentials for entry and would do away with users' Fourth Amendment rights to privacy. Network operators in the financial sector, for example, would be authorized to scan account holders' traffic content for signs of trouble. The current Internet setup would remain intact for people who prefer to stay anonymous on the Web".
Google Apps support #fail: billing problems
Verizon confirms end of unlimited data plans
Confirming rumors that have circulated for months, Verizon Wireless says that Thursday, July 7 it will no longer offer an unlimited data plan for smartphones according to a report in FierceWireless.
The new plans will have 4 options:
Cisco equips the Chinese police state
Chinese authorities in the southwest city of Chongqing are working with a group of Western companies, including Cisco Systems, to build a surveillance network of as many as 500,000 cameras over an area of 400 square miles, Wall Street Journal reports today.
What comes to mind at first is the use of such a network, including servers and software for the police to monitor them, to control political dissent. But surveillance systems can be used for legitimate purposes as well, even by police. Some are used for traffic control and monitoring, some for crime fighting and prevention.
Larry's Bio
Larry Seltzer is a freelance writer and consultant, dealing mostly with security matters. He has written recently for Infoworld, eWEEK and Dr. Dobb's Journal. He has also written for Symantec Authentication (formerly VeriSign) and Lumension's Intelligent Whitelisting site.
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.