Monthly Archives: January 2012

Viruses stole City College of S.F. data for years

Viruses stole City College of S.F. data for years Personal banking information and other data from perhaps tens of thousands of students, faculty and administrators at City College of San Francisco have been stolen in what is being called “an infestation” of computer viruses with origins in criminal networks in Russia, China and other countries, The Chronicle has learned. “Given the outright mismanagement of our networks, if someone’s information is stolen, are we liable for that?” Jackson asked. Source So for 10 years or so, the Russian Business Network has been in the data banks of City College, along with the other usual suspects. What none of the antivirus/malware programs …

Continue reading

Posted in Thoughts.

Facebook Evading Privacy Questions

Joe Barton, a Texas Republican, and Edward Markey, a Massachusetts Democrat, are complaining Facebook is not answering questions about how the company tracks its users via cookies. Source In my mind, security and privacy are two sides of the same coin. To have privacy means you must have security to obtain it. Should security demand access to your data for security reasons, then privacy is invaded. A good demonstration of that in practice, is laws on the books involving sexual harassment, the liability that corporations bear in providing emails and communications between workers, and the ability to disprove sexual harassment charges by being able to show the source info through …

Continue reading

Posted in Thoughts.

Your printer is spying on your network !?

Ang Cui, a researcher on embedded devices demonstrated at this year’s Chaos Communications Congress (28C3) that is possible to embed malware in a HP printer firmware using the RFU mechanism, a presentation of an extraordinary importance for any corporate or small networks since the printers are ubiquitous in any office . RFU stands for remote firmware update and is an important feature assuring the best performance and security for the printers, sort of update¬†feature for your operating system or antivirus. Because the operating system in a printer is much simpler than Windows for example, it runs from a ROM(read-only memory) as a smart phone or let’s say electronic wash machine, …

Continue reading

Posted in Thoughts.

A Prime Target for Cybercrime

This infographic in the source link provides clues to why Facebook is such a prime target. Source It all has to do with numbers; who has the most to have malware target. Why turn to a small community when you have millions of folk to target for the same effort. Microsoft battled all comers during the days of DOS to become the over-all winner. The results of that winning the battle of the Operating Systems has resulted in what is called the computer monoculture. According to Wikipedia, during Aug of 2011, personal computer users were using these OSes. Microsoft accounted for 87.1% worldwide Apple accounted for 6.7% Linux accounted for …

Continue reading

Posted in Thoughts.

Israel vows to retaliate

Israel vows to retaliate after credit cards are hacked “Israel has active capabilities for striking at those who are trying to harm it, and no agency or hacker will be immune from retaliatory action,” he added, without giving further details. Source Interesting. Hacking started as a sort of way to see what was out there. It evolved to what it is today as a way to attempt to get money from people as a criminal activity. It’s been the driving force behind a lot of the malware. Until spyware came along, sponsored by the advertising industry, malware remained one of those items you had to click and install something in …

Continue reading

Posted in Thoughts.

Japan’s search-and-destroy cyber weapon

According to media reports, the Japanese Defense Ministry has awarded Fujitsu a contract to develop a computer virus. Source Japan finds that it has been victim to computer break ins much the same as the US with someone seeking to discover trade secrets from industry, of seeking military secrets and equipment specs, and trying to obtain political information from government offices through their computers. How nice, what could possibly go wrong with such a tool? I keep getting these images in my mind from the movie Johnnie Menomic. A villain in a virtual world. One that could hop from computer to computer at will. The idea is great. Take a …

Continue reading

Posted in Thoughts.

Freedom to install free software

Freedom to install free software When done correctly, “Secure Boot” is designed to protect against malware by preventing computers from loading unauthorized binary programs when booting. In practice, this means that computers implementing it won’t boot unauthorized operating systems — including initially authorized systems that have been modified without being re-approved. Source The above is a place trying to get signatures for a petition not to have it mandatory to install Windows 8 with no other choice. I put this in not because I support the petition but because this is where I got the idea for writing this article. I would like to take you back a few years …

Continue reading

Posted in Thoughts.