http://www.pogowasright.org/article.php?story=20090506054013304
Chipping away at security
Wednesday, May 06 2009 @ 05:40 AM EDT Contributed by: PrivacyNews
The same technological advances that are making personal computers smaller and phones more energy-efficient are turning gadgets that use radio frequency identification, or RFID, into appealing targets for hackers.
.... "It's a bit of an arms race," said Kevin Fu, who is investigating RFID attacks and countermeasures at the RFID Consortium for Security and Privacy, or CUSP, at the University of Massachusetts at Amherst. "The adversary doesn't get any dumber."
So far, however, the "enemy" appears to consist largely of Fu, and cryptography specialists such as Ari Juels, director of RSA Laboratories in Bedford, who has developed ways to hack into RFID payment devices such as MasterCard's PayPass.
Source - The Boston Globe
What takes over 100 days to produce? A government 60 review report.
http://www.identitytheftblog.info/identity-theft/cybersecurity-report-delayed-swine-flu/1391
Cybersecurity report delayed due to Swine Flu
May 5th, 2009 Rob Douglas
Over at the Identity Theft Assistance Center (ITAC) blog, they’ve made note of the continuing delay in the Obama administration’s much anticipated release of its review of U.S. Cybersecurity. ITAC hopefully proffers that the report may see the light of day this week.
As ITAC reports – based on a piece published by Federal Computer Week – the most recent delay in the report is being attributed to the outbreak of Swine Flu.
What does Apple see?
http://www.techradar.com/news/computing/apple/apple-set-to-buy-twitter-for-460m--596494
Apple set to buy Twitter for £460m?
The only question is: would it be called Twapple?
… The question would obviously remain, no matter who buys the company, how would it make any money? Twitter still has to define a business model that would generate the significant income a 6 million user base and over 1,300 per cent growth should be bringing.
An easier business model to comprehend? If so, should Comcast buy Hulu (or Hulu buy Comcast?
http://www.businessinsider.com/why-comcast-has-to-worry-about-hulu-2009-5
Why Comcast Has To Worry About Hulu (CMCSA)
Dan Frommer|May. 4, 2009, 2:20 PM
Here's a number that isn't making life easier for Comcast (CMCSA), Time Warner Cable (TWC), or the rest of the pay TV industry: More than 40% of U.S. households under age 35 watch Internet video on their TVs at least once a month, according to research firm In-Stat
That includes watching via game consoles, Web TV gadgets like the Roku box and Apple TV, and hooking up a laptop to the TV. Increasingly, it will include TVs with Web video built-in.
Uh-oh!
http://www.bespacific.com/mt/archives/021290.html
May 05, 2009
FTC Testifies on Data Security, Peer-to-Peer File Sharing
News release: "The Federal Trade Commission today testified on the Commission’s efforts to promote better security for sensitive consumer information and to prevent the inadvertent sharing of consumers’ personal or sensitive data over Peer-to-Peer Internet file-sharing networks. As part of these efforts, the agency also announced that it had reached an agreement with one of the largest privately held lenders [James B. Nutter & Company Bob] in the United States to resolve charges that the company violated federal law by failing to provide reasonable security for consumers’ sensitive information. In testimony before the House Energy and Commerce Committee Subcommittee on Commerce, Trade and Consumer Protection, Acting Director of the Bureau of Consumer Protection Eileen Harrington said the agency strongly supports the goals of H.R. 2221, the Data Accountability and Trust Act, which would require companies to put reasonable data security policies and procedures in place, and to notify consumers when there has been a data security breach that affects them. The legislation also would give the Commission the authority to obtain civil penalties for violations."
Unusual in that it mandates companies hire psychics...
Utah Court Mines Safe Harbor Rule 37(e) Into Oblivion - Part One
A new opinion by a Magistrate in Utah on Rule 37(e) FRCP will, unless reversed on appeal to the District Court Judge, endanger litigants for years to come. Phillip M. Adams & Associates, L.L.C., v. Dell, Inc., 2009 WL 910801 (D.Utah March 30, 2009). Two Taiwanese companies (ASUS) in this patent infringement case were sanctioned for spoliation because they did not implement a litigation hold and start preserving email in 1999. What makes this ruling so mind boggling is that the plaintiff did not even determine that it might have a claim against ASUS until 2005, did not send a demand letter until 2006, and did not sue ASUS until 2007.
Will this be the wooden spike? Let's hope so... SCO is tougher to kill than Rasputin!
http://yro.slashdot.org/article.pl?sid=09/05/06/0138241&from=rss
US Trustee Asks To Send SCO Into Chapter 7
Posted by kdawson on Tuesday May 05, @11:33PM from the long-dark-teatime-drawing-to-a-close dept.
Several readers including Pop69 inform us that the US Trustee's office has asked to convert SCO's Chapter 11 bankruptcy to Chapter 7 — a.k.a. liquidation. Groklaw has the text of the filing: "...not only is there no reasonable chance of 'rehabilitation' in these cases, the Debtors have tried — and failed — to liquidate their business in chapter 11."
For Cindy's “Sex & Power” class.
Safe "sexting?" No such thing, teens warned
By Belinda Goldsmith Belinda Goldsmith – Mon May 4, 1:02 pm ET
CANBERRA (Reuters Life!) – Teens sending nude or suggestive photos of themselves over their mobile phones are being warned -- "sexting" can damage your future.
… In the United States, a survey last fall found one in five teenagers said they had sent or posted online nude or semi-nude pictures of themselves and 39 percent said they had sent or posted sexually suggestive messages, according to the National Campaign to Prevent Teen and Unplanned Pregnancy.
For the Swiss Army folder. When I get my scanner re-attached...
OCR Terminal
What is OCR Terminal?
OCR Terminal is a free online Optical Character Recognition service that allows you to convert scanned images and PDFs into editable and text searchable documents. It accurately preserves formatting and layout of documents.
Ditto In case my threats of naming a “Twit of the day” come true.
My Award Maker
Printing out elegant certificates has never been easier! It’s 100% free!
Interesting. Since they don't store your file, the file size is unlimited.
JetBytes
JetBytes is a file transfer service that allows the sharing of files without storing any data. This service is very simple to use, just select a file from your computer, and JetBytes will generate a URL that you can send out, which in turn allows the receiver to download the file.
No comments:
Post a Comment