Monday, December 01, 2014

We know that Clausewitz said, "War is the continuation of politics by other means." Who said, “War is an economic event?” (That must be a misquote, since Google didn't recognize it.) Have we learned something from Ronald Reagan?
Rouble heading for biggest one-day fall since 1998 as oil drops below $70
The rouble looked set for its steepest one-day fall since the Russian financial crisis of 1998 on Monday, plunging about 4 percent as oil prices slid below $70 a barrel and Russian assets nosedived across the board.

Financial Times: The economic collapse of Ukraine must be halted
Ukraine is in the throes of a financial crisis that urgently demands a response from western governments. The security threat to the country may be the primary focus in the west, following Russia's seizure of Crimea and its military intervention in eastern Ukraine. But Vladimir Putin's military tactics seem primarily designed to fuel an economic meltdown which destabilises Kyiv. Western governments and the International Monetary Fund now need to act fast to bring Ukraine back from the brink of financial collapse.

I too think Sony is screwing up their breach communications.
It’s hard for me to figure out what the real headline should be over the Sony Pictures hack.
Is is that a lot of personal data may have been stolen – again? And if so, will the FTC open an investigation into the breach?
Is it that North Korea may be involved in the attack?
Or is it that Sony lost control of its intellectual property and movies are reportedly being leaked online?
What lessons that Sony should have learned from the 2011 hack hadn’t they learned? And what lessons will they and others learn now? It’s premature to speculate until we know more about what happened and how it happened.

For my Computer Security students.
ENISA Releases Framework for Evaluating National Cyber Security Strategies
The European Union Agency for Network and Information Security (ENISA) has published a framework designed to help government officials and policy practitioners evaluate National Cyber Security Strategies (NCSS).
A total of 18 European Union member countries have published or are in the process of publishing a NCSS that details the cyberspace-related risks which could have a negative social and economic impact.
ENISA has developed an evaluation framework that is based on the analysis of these 18 EU strategies and 8 non-EU strategies.
The framework focuses on five key objectives: the development of cyber defense policies and capabilities, cyber resilience, supporting industry on cyber security, securing critical information infrastructure, and reducing cybercrime.

My Ethical Hackers probably did not do this. Could be an exam problem for my Computer Forensics class!
Modifying an Off-the-Shelf Wireless Router for PDF Ballot Tampering
Modifying an Off-the-Shelf Wireless Router for PDF Ballot Tampering – Daniel M. Zimmerman and Joseph R. Kiniry, Galois, Inc., 421 SW 6th Ave., Suite 300, Portland, OR 97204. November 7, 2014
“Abstract – In order to highlight the dangers associated with Internet voting carried out over electronic mail with PDF forms, we show that an off-the-shelf home Internet router can be easily modified to silently alter election ballots. The modification is nearly undetectable and can be carried out in a way that leaves no evidence to be found in a postelection investigation.
Introduction – A number of governments, at various levels, have expressed interest in the establishment of Internet voting systems. Examples include the state of Alaska, which has carryed out an Internet voting trial for the 2012 and 2014 elections; Washington, D.C., which in 2010 developed an Internet voting pilot project with the OSET Foundation for absentee voters that was successfully attacked by an academic research group [6]; and the nation of Estonia, which has had Internet voting since 2005 that exhibits significant security flaws [3]. One mechanism proposed for Internet voting involves ballots rendered as standard Adobe Portable Document Format (PDF) forms. These forms are made available to voters on a web site; the voters then use standard software (e.g., Acrobat Reader, Preview, etc.) to fill out the forms and submit the completed forms via electronic mail to the appropriate election authority. The submitted ballots are then printed and counted, either by hand or with optical scanners.

For my Android toting students.
The Best Android Apps
The Google Play Store is home to a massive number of apps and continues to grow every day, so how are you to know which are the best? We’ve got you covered with our list of best Android apps. We’ve done the searching for you, and narrowed it down to the three best apps in each category.

How To Use Skype On Android For Beginners
Your Android smartphone makes phone calls. This much is obvious. But did you know that your Android tablet can make calls too, with the right app installed?

No comments: