This is kind of cool ... if you're into Macs, anyway ...
I mainly included this one because I like the name of the store ...
It should have been obvious to the vic that the perp intended to apply to empty mug to his brain-housing group ... either he was completely oblivious or just didn't have a clue what to do to stop the guy ...
The supervisor who spoke with me was not sure how this software ended up in the new laptop thus put me on hold. He confirmed that yes, Samsung did knowingly put this software on the laptop to, as he put it, "monitor the performance of the machine and to find out how it is being used."[networkworld.com]
It's amazing that Samsung, or anyone, would take this kind of risk with their own reputation ...
Looks like he started to throw a phoenix kick as he was coming through the door ... I guess there isn't much else you can do if you don't have any real guns handy ...
It's no secret hackers have made an art of sneaking in through companies’ virtual doors and making off with intellectual property. But while a new McAfee report highlights security challenges, it also reveals that companies are looking hard at secure data storage, creating an opportunity for vendors and service providers alike.[crn.com]
I'm kind of surprised that they aren't completely isolated from the regular web ...
I'm surprised he can jump that well sporting wallendas that big ...
A hacker is somebody who doesn't realize that what he’s attempting is impossible. You see that in the ComodoHacker’s text. He just followed breadcrumbs, solving one clue at a time. Only after he was done does he realize the enormity of the problem, and how clever (and lucky) he was to solve it.[erratasec.blogspot.com]
"It is time for the political games to stop for fear of insulting the government of Mexico." said Moran. "U.S. citizens are being kidnapped and killed while our Border Patrol agents fight a war at home that no one will allow them to win. Not one more Border Patrol agent should fall or citizen be victimized because our government fails to act. Mexico is hemorrhaging violence and we are being hit with the splatter."[azreporter.com]
You can have peaceful, quite communities or you can have a war on drugs, but you can't have both ...
Interesting ...Recently at Ars we've had a couple of discussions about the use of HTTPS—that is, HTTP secured using SSL or TLS—for every website, as a way of keeping sensitive information out of reach of eavesdroppers and ensuring privacy. That's definitely a good thing, but it has a flaw: it requires HTTPS to actually be effective at protecting privacy. Recent goings on at Certificate Authority (CA) Comodo provide compelling evidence that such trust is misplaced.[arstechnica.com]
Geeeez ...Deputies said Martinez stole $400. However, leaving the parking lot was not easy. Security cameras capture Martinez running out of the shop and running right behind him is the shop owner. The video shows the owner shooting several times at the car Martinez hopped in. “He just stated that he was in fear for his and his wife's life,” Fisher said.[krqe.com]
They appear to be totally misrepresenting what actually happened. Whatever it was that sent the crowd running, I can just about guarantee that it wasn't because some guy was throwing stuff around. Most likely, it was some kind of panicked, and ultimately erroneous, announcement on the loud speaker by Mall representatives ("RUN for GAWD SAKE ...RUN!!!). Otherwise, your average mall shopper would stand there and watch the guy in the "rampage" walk up and hit them in their face ...
"Our company policy is that we (security) respond to any robbery site in person," Grover continues. "We provide trauma support for employees as well as assisting law enforcement with resolving the case. We determine cause and initiate security solutions to prevent another incident. The first year on the job I spent my life in hotels. I had no time or other resources to do other things."[securityinfowatch.com]
Gaffney bristled at the ruling in a comment to Newsmax Tuesday, saying, “Any judge who would apply Shariah in an American courtroom — especially against the express wishes of Muslims seeking due process under laws promulgated pursuant to the U.S. Constitution — is certainly ignorant of the true, unconstitutional character of ‘Islamic ecclesiastical law.’[newsmax.com]
It doesn't say what the reason for the ruling is, but if there is an underlying contract that they were all parties to that says disputes will be decided under sharia law, it seems to me no different than having a contract that says disputes will be decided under Nevada law or French law (which is as kosher as church on Sunday). If it was in the contract and they signed it, the judge was right in ruling the way he did and that's the only way I can imagine such a ruling occurring.
Update of this story with uncut video ...
Assuming that enough computing power was amassed to test 1 trillion keys per second, testing all possible keys would take 10.79 quintillion years. This is about 785 million times the age of the visible universe (13.75 billion years). On the other hand, you might get lucky in the first 10 minutes.[idg.no]
Well, that's all pretty self-explanatory ...Surveillance video shows a fight that took place around 2 a.m. Friday on Main Street in Bloomsburg. The camera captures two men in front of some stores. After a few exchanges one man hits the other. The blow knocks the man to the ground.Then the man who threw the punch took off, leaving victim unconscious on the ground.[wnep.com]
The Second Natural Law of Security: It's cheaper to be invisible than it is to be invincible.
If activated, the new option in users' account settings means that whenever a they log on, their browser will connect to Twitter's servers via HTTPS, an encrypted version of the basic web protocol. Virtually anyone trying to spy on the traffic will see only packets of completely unintelligible data.[telegraph.co.uk]
"The code opens the C volume in raw mode, performs a manual read of disk sectors, and then manually parses the disk data in order to understand the file system structure and find where in the disk the infection target .dll file is located (and perform a raw write operation to infect it)", he says in his security blog.[infosecurity-magazine.com]
Oh man ... he jacks one in and the magazine drops out onto the floor. On the other hand, he realized it immediately, got it back in while maintaining cover and changing position, and then he jacked another one in and made with some serious blam-blams ... never hit anything, but suppression fire is good, too ...
Video is as good for proving nothing happened as it is proving something happened. If I was responsible for MJ's surveillance video at the time of his death, I'd be making copies left and right, unless ...
Interesting approach ..."Before, the attack had to get to your premises before you could mitigate it. So you had to have massive pipes sitting there idle with tens of gigabytes of capacity," he says. "You had this large capacity infrastructure that you had to buy and maintain, but you also had to have large opex and personnel expenses. By moving this service into the cloud, the pipes are no longer an issue. You no longer have the capex because it's done as a service with a low monthly fee and no excess bandwidth.''[networkworld.com]
With the vic's face blocked you can't really tell whether he's just standing there or yelling some kind of smack at the locked restroom door leading up to the punching. Yelling at the door, or doing something else that is provocative rather than patiently waiting for his turn at the restroom, certainly wouldn't be justification for the other guy to punch him, but it would indicate that he had significantly reduced his 'resistance to selection for interference' leading up to getting punched, and may actually paint him in the light of interferior if he thought someone vulnerable was in there at the time.
Interesting ... if true ...
Android has also never before represented such a significant target for hackers and other baddies looking to profit off of the platform's popularity. In other words, now is the time to get smart about Google Android security. The following six tips and tricks will help do just that.[computerworld.com]
FreeOTFE has a "no install" mode, though it does require Administrator privileges to load the drivers. Using this mode is a good way to put both FreeOTFE and an encrypted volume on a portable drive, either a flash drive or a small USB drive. If the drive is stolen or lost, its contents will be inaccessible, and you can use it on any computer where you have appropriate privileges--for example, this is ideal for transporting sensitive data between office and home environments, or between multiple work computers.[pcworld.com]
Israa Abdel Fattah, 32, a labor organizer and blogger, shared her file with McClatchy and marveled at the thoroughness of the surveillance. The file included detailed transcripts of e-mails sent from her Gmail account and phone conversations with her ex-husband. The feeling of violation was indescribable, she said.[miamiherald.com]
The home ministry has directed the Department of Telecommunications (DoT) to ask service providers for a solution for security agencies to access the services, by the end of this month, according to people privy to the development. Research in Motion (RIM) has maintained that the company cannot provide access to its enterprise services, since it does not hold any key to these.[business-standard.com]
Android handsets infected with malware are getting a cleaning job from Google. On March 2nd, Google removed 21 apps from the Android Marketplace that contained malicious code (the number of infected apps is now 58). Now Google is "remotely removing the malicious applications from affected devices" and "pushing an Android Market security update to all affected devices that undoes the exploits to prevent the attacker(s) from accessing any more information from affected devices," according to a blog post by Rich Cannings, Android security lead.[betanews.com]
It will be interesting to see the effect this has on border security ...
There will always be places where crowds gather ... maybe you should concentrate on keeping the stuff that leaves the ground from blowing up ...
It'll probably work for awhile ...
Some interesting back-story ...Public-key cryptography allows people across the world to share valuable personal data without a second thought. When you shop online, when you check your bank statement, when you file your taxes online, public-key cryptography is protecting your information. One industry insider estimates that 10 billion devices are using public-key cryptography.[standford.edu]
Beijng said on Friday that it would boost defence spending by 12.7 percent in 2011, for a total of 601.1 billion yuan ($91.48 billion), marking a return to double-digit growth. China says it needs to upgrade its outmoded forces and that its plans are not a threat to any country, pointing out its defence budget is far lower than the United States.[indiatimes.com]
To get a sense of how hard it would be to stay focused on screening for 8 minutes, much less 8 hours, try thinking about nothing but driving the next time you get in a car to drive. Before you turn the key your mind will have drifted to some other subject. That said, I bet if the same guy was trying to sneak the box-cutters through, the screener would have noticed them. This is because the passenger's vibe would have focused the screener's attention.
A districtwide policy prohibiting students and staff from opening doors to the outside was recently adopted after a $10,800 security system was installed at the middle school, Southampton High School, Southampton Technical Career Center and Nottoway, Meherrin and Capron elementary schools. Riverdale Elementary had a similar system installed when it was built three years ago.[tidewaternews.com]
I really hate the Z-tol approach to problem solving, but having multiple standards for a single secure access is always a recipe for disaster. As long as the everyone from the District Superintendent to the students have to use the same recognition-for-access routine, penalizing the student, even for a chivalry-based violation, is entirely appropriate.
(H/T boing boing)
Attorneys for Walmart and Wackenhut argued Garrett, 44, never did anything to arouse suspicion or otherwise cause them to compel him to leave before he punched Born and robbed him. Garrett, who is 6-feet 3 inches tall and weighed 250 pounds at the time of the incident, was on store property for about 12 minutes before he attacked Born. Attorneys said he was not loitering or acting erratic.[lasvegasinfonewspaper.com]It's hard to tell with out studying the transcripts, but based on the story, it's hard to imagine any way they could have forseen or prevented the attack ...
Note: once the docs are destroyed, the biggies are free to hypo-vehiculate you (I'm not suggesting it happened here ... just sayin'.)
Neis reportedly had his son, 15, in the car with him when he sped through the crowd of cyclists. Moments after their car ran through the pack of riders, the pair abandoned the vehicle. On Monday, Neis, who works at a bank, and his son said that cyclists had begun hitting their car, a VW Golf, according to Zero Hora.[npr.org]
I imagine the self-defense defense will be a hard sell but, on the other hand, it's hard to imagine a banker with his son in the car just up and deciding to toothpaste a bunch of bicyclists. The video doesn't show the lead up, but the event itself is fairly intense.
The fact is that college gun-free zones have failed. Signs warning shooters that their murder weapons weren't welcome didn't stop perpetrators at Virginia Tech, Northern Illinois University or the University of Alabama. Since colleges have no mechanism to enforce gun-free zones, these killers had a government guarantee that their victims would be unarmed and defenseless.[usatoday.com]
The first question that needs to be answered before firing up the wristwatch camcorder is, “why am I shooting this video?” The reason that needs to be answered is because there are different rules governing covert video, depending on whether you are shooting it as a private individual/business, or on behalf of a government agency.[governmentvideo.com]
It’s a scenario that every small online business fears: site security is compromised, hackers steal customer data including credit-card details, and your brand and your reputation are left in ruins. No wonder then, that many small online businesses are looking to insure against hackers and the resulting financial impact of a security breach. But is insurance really the answer and could it even be part of the problem?[pcpro.co.uk]