Facebook Evading Privacy Questions

Joe Barton, a Texas Republican, and Edward Markey, a Massachusetts Democrat, are complaining Facebook is not answering questions about how the company tracks its users via cookies. Source In my mind, security and privacy are two sides of the same coin. To have privacy means you must have security to obtain it. Should security demand access to your data for security reasons, then privacy is invaded. A good demonstration of that in practice, is laws on the books involving sexual harassment, the liability that corporations bear in providing emails and communications between workers, and the ability to disprove sexual harassment charges by being able to show the source info through …

Continue reading

Posted in Thoughts.

Your printer is spying on your network !?

Ang Cui, a researcher on embedded devices demonstrated at this year’s Chaos Communications Congress (28C3) that is possible to embed malware in a HP printer firmware using the RFU mechanism, a presentation of an extraordinary importance for any corporate or small networks since the printers are ubiquitous in any office . RFU stands for remote firmware update and is an important feature assuring the best performance and security for the printers, sort of update¬†feature for your operating system or antivirus. Because the operating system in a printer is much simpler than Windows for example, it runs from a ROM(read-only memory) as a smart phone or let’s say electronic wash machine, …

Continue reading

Posted in Thoughts.

A Prime Target for Cybercrime

This infographic in the source link provides clues to why Facebook is such a prime target. Source It all has to do with numbers; who has the most to have malware target. Why turn to a small community when you have millions of folk to target for the same effort. Microsoft battled all comers during the days of DOS to become the over-all winner. The results of that winning the battle of the Operating Systems has resulted in what is called the computer monoculture. According to Wikipedia, during Aug of 2011, personal computer users were using these OSes. Microsoft accounted for 87.1% worldwide Apple accounted for 6.7% Linux accounted for …

Continue reading

Posted in Thoughts.

Israel vows to retaliate

Israel vows to retaliate after credit cards are hacked “Israel has active capabilities for striking at those who are trying to harm it, and no agency or hacker will be immune from retaliatory action,” he added, without giving further details. Source Interesting. Hacking started as a sort of way to see what was out there. It evolved to what it is today as a way to attempt to get money from people as a criminal activity. It’s been the driving force behind a lot of the malware. Until spyware came along, sponsored by the advertising industry, malware remained one of those items you had to click and install something in …

Continue reading

Posted in Thoughts.

Japan’s search-and-destroy cyber weapon

According to media reports, the Japanese Defense Ministry has awarded Fujitsu a contract to develop a computer virus. Source Japan finds that it has been victim to computer break ins much the same as the US with someone seeking to discover trade secrets from industry, of seeking military secrets and equipment specs, and trying to obtain political information from government offices through their computers. How nice, what could possibly go wrong with such a tool? I keep getting these images in my mind from the movie Johnnie Menomic. A villain in a virtual world. One that could hop from computer to computer at will. The idea is great. Take a …

Continue reading

Posted in Thoughts.

Freedom to install free software

Freedom to install free software When done correctly, “Secure Boot” is designed to protect against malware by preventing computers from loading unauthorized binary programs when booting. In practice, this means that computers implementing it won’t boot unauthorized operating systems — including initially authorized systems that have been modified without being re-approved. Source The above is a place trying to get signatures for a petition not to have it mandatory to install Windows 8 with no other choice. I put this in not because I support the petition but because this is where I got the idea for writing this article. I would like to take you back a few years …

Continue reading

Posted in Thoughts.

QR Code Malware Picks Up Steam

QR Code Malware Picks Up Steam As mobile marketers have latched onto the convenience and cool-factor of QR codes, hackers are starting to take advantage of these square, scannable bar codes as a new way to distribute malware. Like all mobile attack vectors, it is a new frontier that security researchers say is not extremely prevalent but which has a lot of potential to wreak havoc if mobile developers and users stand by unaware. Source QR code for the URL of the English Wikipedia Mobile main page, “hxxp://en.m.wikipedia.org” I was reading the recent article posted by John Barrett here at Cleanbytes regarding Windows 8 security improvements The thought hit me …

Continue reading

Posted in Thoughts.