Sunday, July 09, 2017

Why do breach victims lie?  Is it part of “Denial” as explained by Troy Hunt (in Thursday’s Blog). 
Port Pirie hospital is contacting 234 families after a laptop computer was stolen from the premises.
The laptop, used as part of the State-wide Infant Screening Hearing Program, had a security password login and cannot be used as a personal device. [The first thing I teach in Forensics is how to pull the hard drive and attach it to another computer.  That way you are never prompted for a password, since the original operating system is never used.  Bob]
But Regional Director Yorke and Northern Roger Kirchner said because hearing test data was stored on the laptop, the health service was advising families of the incident.


A poorly thought out “system.”  
Today’s reminder about the need to secure and securely destroy PAPER records, too, comes to us from Kansas:
A search warrant shows authorities are investigating two suspected identity thieves found with a box filled with hundreds of Dollar Tree job applications apparently obtained by going through trash containers in Wichita.
The warrant was filed recently in U.S. District Court in Kansas.  It outlines the investigation into a pair found three years ago with employment applications for 429 people as well as forgery tools.  Some of those applications included copies of driver’s licenses and Social Security cards.  [These are not needed until the applicant is hired.  Bob] 
Read more on WIBW.


This is no way to run a business.  Did they even ask why drone owners want to change the rules?  Why not give users a “off” switch, but then log everything the drone does?
DJI Is Locking Down Its Drones Against a Growing Army of DIY Hackers
The tension between drone pilots who want complete control over their aircraft that they bought and DJI, the world's biggest consumer grade drone maker, has come to a head.  An arms race between hackers and the company is earnestly underway.
On YouTube, Facebook, drone forums, and Slack groups around the internet, hackers have published instructions for altering the firmware on DJI's drones, leading to a rising number of drone pilots who have circumvented flight restrictions imposed by DJI on its products.  In recent days the company has updated its software to render these hacks moot, and has started removing vulnerable versions of its firmware from its servers in an attempt to regain control of its drones.
DJI told me on Friday it will continue to investigate cases of unauthorized modification and that it will "issue software updates to address them without further announcement."


Again, I am at a loss to explain why Russia and France are so interested in my Blog.  

No comments: