... this one depressing, but highly informative, link ...
(H/T to MW)
Heavy emphasis on 'back up your drive before you start in case something goes wrong' ...
It's a good thing, too, because they're subjects rather than citizens and not allowed proper defensive weapons ...
MoD insiders believe that, after an independence vote, ministers in London would be forced to strike a deal with Scottish leaders allowing the Navy to go on using Coulport, where missiles and warheads are stored, and Faslane, where the subs are based, until an alternative was ready.[thisisplymouth.co.uk]
Encryption keys on smartphones can be stolen via a technique using radio waves, says one of the world's foremost crypto experts, Paul Kocher, whose firm Cryptography Research will demonstrate the hacking stunt with several types of smartphones at the upcoming RSA Conference in San Francisco next month.[computerworld.co.nz]
The security contractor for the Energy Department's Oak Ridge National Laboratory in Tennessee is investigating reports that one of its security guards was sleeping and had also been using an unauthorized cell phone while they were supposed to be guarding a sensitive nuclear facility with bomb-grade material.[pogoblog.typepad.com]
Almost every day we read about some new data leak and, as a result, almost every IT company seeks new and better security solutions. One answer that makes a lot of sense to me is the self-encrypting drive (SED), a drive which contains the hardware itself so that all data written to it is encrypted.[pcmag.com]
Also:India on Monday became the world's sixth country after the US, Russia, France, the UK and China to operate nuclear-powered submarines when the Russian Akula-II class submarine `K-152 Nerpa' was commissioned into Indian Navy as INS Chakra on a 10-year lease under a secretive almost $1-billion contract inked in 2004.[indiatimes.com]
This is interesting ...A credit card shown at the Consumer Electronics Show in Las Vegas comes with its own keypad embedded on the front of the card. The goal is to make it extremely difficult for thieves to use the lost or stolen card, but it requires you to type in a unique security number every time you complete a transaction.[moneyville.ca]
All of the customers were required to reset their passwords, but this isn't the first time, and certainly won't be the last, that a website gets breached. So, this is the perfect time to remind everyone on the importance of strong passwords. Whether you're joining a site or resetting a password, make sure you always consider the following eight steps.[businessinsider.com]
The National Security Agency's SELinux Project has announced the first release of SE Android, a security enhanced version of Google's Android operating system. SEAndroid is the name of both a project to identify, and find solutions for, critical gaps in Android security and of a reference implementation of a security enhanced Android.[h-online.com]
The new handheld and vehicular devices come with improved encryption as well as the ability to jump between frequencies, making it more difficult for an enemy to eavesdrop on conversations between field commanders, according to Col. Ronen Schneider, head of the IDF Army HQ’s C4I Division.[jpost.com]
In December, seven people died in an explosion in Yazd. On November 28, a bomb seems to have gone off in nuclear facilities in Isfahan. On November 12, 17 people were killed by an explosion near Tehran. On July 23, a scientist called Darioush Rezaeinejad was shot through the throat outside his daughter's kindergarten. On November 29, 2010, Majid Shahriari was killed in the same way as Roshan, with a bomb planted in his car. Fereydoun Abbasi-Davani was also attacked, but survived. On January 12, another motorcycle bomber killed Masoud Alimohammadi.[abc.net.au]
If the purpose of the action is to create terror, then the act is terrorism. If the purpose is action is to eliminate a utility and the terror is incidental, than it may just be an expedient methodology. The level of physicist that could legitimately aid in development of a nuke program is always in short supply and difficult to replace which makes them legitimate targets, and who knows how convoluted a plan has to be to be effective in this particular environment. It might be terrorism, but the fact that they're using explosives on these so-called 'civilians' and that there may be collateral casualties, in and of itself, certainly doesn't make the case that it is.
I can't wait to hear this guy's explanation ...
Also:iTwin derives its name from the fact that you need two iTwin devices for it to work. When paired with one another, the devices allow users to share files over the Internet using Advanced Encryption Standard (AES) 256 bit encryption. Plug in one to a Mac or PC, assign it files and folders that you want to be accessible, and when the other device is plugged into a second Mac or PC, those folders and files can then be accessed by that machine.[macobserver.com]
At CES, Singapore-based ST Electronics was showing off a new security device that can be installed in nearly any notebook computer to protect its data from prying eyes—Digisafe DiskCrypt, a hard-disk enclosure that turns any 1.8-inch micro-SATA device into removable and fully encrypted storage. The enclosure, which is the size of a 2.5" drive, can be used as a drop-in replacement for existing drives.[arstechnica.com]
The 32 nations with materials that can fuel atom bombs are typically mum on security, which looks to the public like a closed world of barbed wire and armed guards. Behind the scenes, atomic insiders have long told horror stories of risky practices and security flaws that might let the crucial ingredients for nuclear weapons fall into the wrong hands.[nytimes.com]
That sort of lighting is more likely to work in situations where the house is selected at random and no advance work is done ...
Samsung Techwin America, a leader in consumer video monitoring and security products, today made home security even more accessible with the introduction of its Wi-Fi IP SmartCam™. With the ability to wirelessly connect to a home network, the camera gives homeowners the ability to place the device in any room and monitor activity remotely through their computer, smartphones or other mobile devices.[sacbee.com]
Read more here: http://www.sacbee.com/2012/01/08/4171975/home-security-and-surveillance.html#storylink=cpy
NUCLEAR weapons have been based in a reluctant Scotland for half a century. Churches, trade unions, local authorities, protest groups, countless individuals, and the Scottish Parliament have called persistently for their removal and an end to the policy of nuclear deterrence. To no avail. London’s power of decision has remained absolute.[scotsman.com]
I found this more interesting from the implication that Scotland may be becoming independent than anything else ...
Interesting essay for the agitprop watchers out there ...
The best way to protect yourself from an online financial scam is to diligently check your bank accounts. At least, until now. Israeli-based Security firm Trusteer has found an elaborate new computer virus that not only helps fraudsters steal money from bank accounts -- it also covers its tracks.[msnbc.msn.com]
BlackBerry messenger is “significantly less encrypted compared to the BlackBerry email that corporations are using,” Leif-Olof Wallin, an analyst at Gartner Inc., based in Sweden, recently told Bloomberg News. “Any kind of cryptographer should be able to crack it without the involvement of (parent company, Waterloo, Ont.-based Research in Motion)."[montrealgazette.com]
Few believe Tehran could keep the straits closed for long — perhaps no more than a handful of days — but that alone would still temporarily block shipment of a fifth of all traded global oil, sending prices rocketing and severely denting hopes of global economic recovery. But such action would swiftly trigger retaliation from the United States and others that could leave the Islamic republic militarily and economically crippled.[nationalpost.com]
As compared to:
In a move that proves that Godzilla isn’t the only worldwide threat to emerge from Japan, the Japanese Defense Ministry has been working with Fujitsu since 2008 to develop a defensive, weaponized computer virus capable of tracing the path of a cyber attack to its source in order to shut it down, disabling every system it comes across along the way.[extremetech.com]
In a technology called the “Wi-Fi Protected Setup” (WPS) initially intended by the wireless industry to ease the security features set-up of modern routers, a new tool has been discovered that could bypass its encryption effects and leave the users open to a wide array of attacks by exploiting the design itself.[inaudit.com]
With Indian security agencies being unable to intercept encrypted communications from BlackBerry, Google's Gmail, Nokia Pushmail and internet telephony provider Skype, among others, the telecom department has sought the expertise of US agencies - on both technical and regulatory fronts - on intercepting such messages in a readable format.[indiatimes.com]
Make sure that you have backups and have test-driven your software before you do it for 'reals' though ...
Put me down for twenty on AEGIS and under ...?In response to threats by Western countries to impose oil sanctions on Iran, the Iranian website Mashreq News, which is close to Iranian military circles, posted an article on December 15, 2011 outlining military measures that could be taken by Tehran to close the Strait of Hormuz should the regime choose to do so.[rightsidenews.com]