[H/T to The Agitator]
The problem is that it can take weeks to get a customer's data, assuming they have hundreds of gigabytes (GB) to upload. By sending the customers a portable hard drive, which the customer can then load up with data and send back, the initial image in the cloud is easily and quickly created.[examiner.com]
Lots of interesting digital stuff today ...SEDs are one of the information security industry's best kept secrets. They solve many common data loss problems, are easy to use and manage with minimal impact on system performance. Yet relatively few businesses and governments use SEDs, according to Robert Thibadeau, who assembled the original team at disk-maker Seagate, the company that pioneered SED technology.[computerweekly.com]
The story says that the Security dude is responsible for paying 60% of the $1.8M. Either he's one highly paid Security Guard or their going to have a really hard time collecting that part of it ...
If you depend on Ironkey thumb-drives, it will be necessary to monitor this development ...
Too bad there wasn't anyone available to accommodate him a little sooner ...
As a general rule, if your getting a lot of threats, you may want to consider the possibility that you're being a d-bag ...
“BEAST is different than most published attacks against HTTPS,” Duong wrote in an email. “While other attacks focus on the authenticity property of SSL, BEAST attacks the confidentiality of the protocol. As far as we know, BEAST implements the first attack that actually decrypts HTTPS requests.”[theregister.co.uk]
This certainly lends confidence ...
This sounds like one of those things where someone thought they were doing someone a favor without bothering to ask whether it would be construed that way if it were done to them ...
It's odd that everyone knows how to stop this but no one is willing to do it.
Signs left near the bodies declared the pair, both apparently in their early 20s, were killed for posting denouncements of drug cartel activities on a social network. "This is going to happen to all of those posting funny things on the Internet," one sign said. "You better (expletive) pay attention. I'm about to get you."[cnn.com]
A year back, the Government of India warned telecommunication operators to avoid importing mobile network infrastructure components from China. The warning was based on fear of China misusing the equipment to monitor India. Back during the Cold War era, one of the theories presented for the West’s success was Russia using photocopiers by Xerox. It is believed that these photocopiers were fitted with cameras allowing the CIA to monitor Soviet communication.[zdnet.com]
The recent attack on the lesser-known certificate authority known as DigiNotar, and previously on Comodo, has security experts pondering the future of certificate-based encryption and authentication. For many people, SSL or what is now generally known as TLS is some arcane security measure that involves certificates and usually results in an ‘s’ being appended to the protocol they are using.[memeburn.com]
Most religions seem to have canonical support for the killing of non-believers (or folks who have the misfortune of being in the way at an inconvenient time) but the difference between churchy neighbors and tangos is that the tangos practice or encourage the practice of harming others without first-order necessity such as self defense or counter-injustice ... of course, as we learned from Reagan - Trust, but verify!
It's interesting to see what Xinhua found the key moments to have been ...
This looks to me like the group (or at least the two guys that were all lovey-dovey) became self-conscious of their own behavior because Vic #1 wasn't responding to them in what they considered to be the 'expected' way and walked out, and then after they walked out, someone in the group said something like "Are you going to let him get away with that" and Perp #1, in his intoxicated state, couldn't resist going back and sucker-punching Vic #1.
People are just barely starting to think about Security on their PCs ...
This should be interesting to watch unfold ...Speaking via a video link, Assange told an audience at a Berlin technology trade fair that a Guardian journalist had published the password to the encrypted files in his book, creating a situation where some people got access to the uncensored files while others did not. "We had a case where every intelligence agency has the material and the people who are mentioned do not have the material," he said from a mansion about two hours' drive from London, where he is under virtual house arrest pending extradition proceedings to Sweden on unrelated sexual assault allegations.[AP via google.com]
He's certainly a wiry little dude ...