Friday, June 17, 2011

So who should you be angry with? The hackers or the hackees?

http://www.databreaches.net/?p=18976

Fraud Starts After Lulzsec Group Releases E-Mail, Passwords

June 16, 2011 by admin

Robert McMillan reports:

Debbie Crowell never ordered the iPhone, but thanks to a hacking group known as Lulzsec, she spent a good part of her Thursday morning trying to get US$712.00 in charges reversed after someone broke into her Amazon account and ordered it.

“They even had me pay for one-day shipping,” she said via e-mail Thursday afternoon.

Crowell is one of more than 62,000 people who must now change passwords and keep a close eye on their online accounts after Lulzsec posted their e-mail addresses and passwords to the Internet Thursday.

Read more on CIO.

[From the article:

It's not clear where all of the Lulzsec e-mail addresses and passwords came from. At least 12,000 of them, including Crowell's, were gathered from Writerspace.com, a discussion forum for readers and writers of mystery and romance novels. The site's technical staff is trying to figure out how they were stolen and is in the process of contacting victims, said Writerspace owner Cissy Hartley.



Think of it as a hacker scorecard...

http://news.cnet.com/8301-27080_3-20071830-245/keeping-up-with-the-hackers-chart/

Keeping up with the hackers (chart)

To see the whole chart on one page click here.


(Related) ...'cause we're gonna need one.

http://www.thetechherald.com/article.php/201124/7284/More-than-10-million-pieces-of-Malware-spotted-per-day-last-month

More than 10 million pieces of Malware spotted per day last month

The full report is online.



I wonder how many organizations have even considered how to respond? Looks like there is a large and growing number of consultants who have considered how to respond and unfortunately more than enough business for them all.

http://www.databreaches.net/?p=18969

Out of the Closet After a Hack

June 16, 2011 by admin

Ben Worthen and Anton Troianovski report:

… How Epsilon handled to the breach is representative of how companies are shifting their responses to hacking incidents.

In the past, companies were typically caught off guard when a breach occurred and responses were often flat-footed, requiring updates and further clarifications to concerned customers.

Now an industry of experts—including lawyers, public-relations specialists and forensic investigators—has emerged to help companies determine what to disclose and how to reassure victims. Executives outside the computer room are also more aware of the threat posed by hacking, leading companies to formulate breach-response plans before an incident ever occurs.

The shift comes as hacking intrusions become more commonplace and experience shows that revealing an incident won’t necessarily cause lasting damage to a brand.

In fact, if a breach is handled well, “customer loyalty and your brand can actually improve,” said Lori Nugent, an attorney who specializes in breaches at Wilson Elser Moskowitz Edelman & Dicker LLP.

Read more on WSJ.

I’m prepared to accept that in the vast majority of breaches, there is no lasting damage or harm to brand, but I’d like to see data showing that loyalty or brand can improve following a breach if it’s handled well, so I’ve emailed Ms Nugent to ask her for additional information about her claim. If I hear anything, I’ll update this post.



'cause you need to track the anti-social network too.

http://www.pogowasright.org/?p=23461

Google Has A Way To Automatically Track What People Are Saying About You Online

June 17, 2011 by Dissent

Google just announced a new feature called “Me On The Web” which aims to help you monitor who’s talking about you on the internet.

Me On The Web can be configured to send you an email every time an article or blog mentions your name or email address. Also, Me On The Web provides you with resources to protect and cultivate your online identity, like a walkthrough for how to convince a webmaster to take information about you off their site.

Read more on Business Insider



Cheap IT has always been an illusion... Until now?

http://www.bespacific.com/mt/archives/027514.html

June 15, 2011

Research - To Move or Not To Move: The Economics of Cloud Computing

To Move or Not To Move: The Economics of Cloud Computing - Byung Chul, Tak Bhuvan Urgaonkar, Anand Sivasubramaniam, Computer Systems Laboratory Department of Computer Science and Engineering, The Pennsylvania State University, University Park, PA

  • "Cloud-based hosting promises cost advantages over conventional in-house (on-premise) application deployment. One important question when considering a move to the cloud is whether it makes sense for ‘my’ application to migrate to the cloud. This question is challenging to answer due to following reasons. Although many potential benefits of migrating to the cloud can be enumerated, some benefits may not apply to my application. Also, there can be multiple ways in which an application might make use of the facilities offered by cloud providers. Answering these questions requires an in-depth understanding of the cost implications of all the possible choices specific to ‘my’ circumstances. In this study we identify an initial set of key factors affecting the costs of a deployement choice. Using benchmarks representing two different applications (TPC-W and TPC-E) we investigate the evolution of costs for different deployment choices. We show that application characteristics such as workload intensity, growth rate, storage capacity and software licensing costs produce complex combined effect on overall costs. We also discuss issues regarding workload variance and horizontal partitioning."



Something to amuse my students

Who Is Winning & Losing in the Tech Talent Wars? [INFOGRAPHIC]


No comments: