Apparently it takes time to beat the
truth out of employees...
Elections
Ontario breach update
July 17, 2012 by admin
Two memory sticks with some information
on voters registered with Elections Ontario are missing because
personnel did not follow protocol.
Earliest reports on the breach
involving Elections Ontario said
that the data were encrypted.
Later reports are now
saying that the
data were NOT encrypted (see official press
statement) and that up to 2.4 million may be
affected.
Elections Ontario has set up a web
page on the breach with additional information.
Mis-targeted retaliation?
‘Madi’
malware acts like Flame virus, targets Middle East
A new piece of malware called Madi is
spreading in the Middle East, and it has a number of the same
characteristics as the Flame virus — known to be a major step in
cyber-espionage.
The year-old malware comes in the form
of a phishing email, which social engineers, or dupes, unsuspecting
recipients into opening an attachment. Once open, the malware
installs on your system and a real Word document or PowerPoint
presentation pops up to make the viewer believe the attachment was
legitimate. In one of these cases, the Word document showed an
article titled, “Israel’s Secret Iran Attack Plan: Electronic
Warfare” by The Daily Beast. Another attachment opened a
PowerPoint file (see image above) with “serene images.” The
malware in this case was executed on the victim’s system as they
paged through the presentation.
… Seculert
observed the malware’s transmissions to the command and control
servers, which occasionally communicated using Farsi.
The command and control servers were based in
Canada, though Seculert traced early transmissions from
the virus back to an original server in Iran.
Register early and often, so you can
“Like” your candidate.
"The Associated Press reports
that the state of Washington will soon have an
application available on its Facebook page that will let residents
register to vote. Washington and other states already allow
online registration, but this is the first time it will be allowed
over Facebook. The state's co-director of elections, Shane Hamlin,
said, 'In this age of social media and more people going online for
services, this is a natural way to introduce people to online
registration and leverage the power of friends on Facebook to get
more people registered.' Facebook won't have access to the State's
database, and Hamlin says Facebook won't
collect any of the personal information with which it interacts."
[Want to bet your job? Bob]
I suppose it can't hurt? (This from a
longer article)
Internet
privacy is focus of Gansler as head of U.S. attorneys general
July 18, 2012 by Dissent
Len Lazarick reports:
You’re walking down the street and
you get a text message on your smartphone about the Chipotle
restaurant around the corner. That’s interesting. How did they
know you liked Chipotle?
And wait a minute. How did they know
where you were?
That’s an example Attorney General
Doug Gansler gave in an interview last week about the far reach of
Internet data collection into our daily lives, from dining choices to
GPS connections.
As the new president of the National
Association of Attorneys General – NAAG for short – Gansler has
targeted Internet privacy as the focus of his year at the top.
Invasion of privacy
“Clearly, what the Internet companies
are doing is an invasion of privacy,” Gansler said. “It
certainly could very well be an acceptable and appropriate invasion
of privacy,” much as airport security has become an
accepted invasion of privacy [Huh? Bob] – up to a
point.
“Most of the things we look up on the
Internet are free, but there’s a legitimate interest for those
companies to make money,” Gansler said. “Where to draw that line
is the dialogue we’ll be having in NAAG.”
Source: Maryland
Reporter. Republished under a Creative
Commons Attribution-Share Alike 3.0 United States License.
Even if all their lawyers are named Don
Quixote, they might someday bag a real dragon...
EFF
Challenges National Security Letter Statute in Landmark Lawsuit
July 18, 2012 by Dissent
Matt Zimmerman writes:
Since the first
national security letter statute was passed in 1986, the FBI has
issued hundreds of thousands of such letters seeking private
telecommunications and financial records of Americans without any
prior approval from courts. Indeed, for the period between 2003 and
2006 alone, almost
200,000 requests for private customer information were sought
pursuant to various NSL statutes. Prior to 2011, the
constitutionality of this legal authority to investigate the records
of Americans without court oversight had been challenged in court —
as far as we know — exactly one time.
EFF is today releasing FBI-redacted briefing from a major
new ongoing case in which it is challenging one of the NSL
statutes on behalf of a telecommunications company that received an
NSL in 2011.
Read more about the case and issue on
EFF.
Did them furriners get it right?
"Last week, a Canadian Supreme
Court decision attracted
attention for reduced copyright fees for music and video.
Michael Geist has a detailed analysis that concludes there are two
bigger, long term effects. First, Canada has
effectively now adopted
fair use. Second, the Supreme Court has made
technological neutrality a foundational
principle of Canadian copyright. The
technological neutrality principle could have an enormous long-term
impact on Canadian copyright, posing a threat to some copyright
collective tariff proposals and to the newly enacted digital lock
rules."
Who owns your computer system?
"Despite weaknesses
in the
Linux-hostile 'secure boot' mechanism, both Fedora
and Ubuntu
decided to facilitate it, by essentially adopting two different
approaches. Richard Stallman has finally
spoken out on this subject. He notes that 'if the user doesn't
control the keys, then it's a kind of shackle, and that would be true
no matter what system it is.' He says, 'Microsoft
demands that ARM computers sold for Windows 8 be set up so that the
user cannot change the keys; in other words, turn
it into restricted boot.' Stallman adds that 'this is not a security
feature. This is abuse of the users. I think it ought to be
illegal.'"
College Algebra, How to use Excel, and
Field stripping your AK47... The future of education?
Syrian
Rebels Use YouTube, Facebook for Weapons Training
Rebels fighting against Bashar Assad in
Syria’s civil war are outgunned, outmanned and largely aren’t
professional soldiers. So they’re turning to social media for
tutorials in how to use their weapons.
In the video above, a faceless
individual offers a 15-minute crash course in Arabic on the basics of
assault rifles. It’s posted to the YouTube channel FSAHelp, for
“Free
Syrian Army,” as the resistance calls itself. Additional
videos on the channel demonstrate how
to shoot from a prone position, how to creep
up on an enemy from a hidden position, and hand-to-hand
combat. The hi-def videos are fairly high quality, with actors
wearing ski masks and toting guns in wooden fields demonstrating
combat maneuvers.
For my Data Mining and Data Analytics
classes.
Study:
WikiLeaked Data Can Predict Insurgent Attacks
Insurgencies are amongst the hardest
conflicts to predict. Insurgents can be loosely organized, split
into factions, and strike from out of nowhere. But now researchers
have demonstrated that with enough data, you might actually predict
where insurgent violence will strike next. The results, though,
don’t look good for the U.S.-led war.
And they’re also laden with irony.
The data the researchers used was purloined by WikiLeaks, which the
Pentagon has tried to suppress. And the Pentagon has
struggled for years to develop its own
prediction tools.
I like the concept of KickStarter – I
just haven't decided which of my brilliant ideas need to be kicked...
4
Keys to a Winning Kickstarter Campaign
Mention Kickstarter these days and
blockbuster campaigns come to mind. There’s Ouya’s
blistering $2 million in one day for a new Android gaming console
(it’s raised more than $5 million to date), and the Nifty
MiniDrive, external memory for Apple MacBooks. The tiny storage
company is more than 2,000% above its $11,000 goal with 15 days left
in the campaign.
But for all the success stories on
Kickstarter, there are many, many failures. So what’s the secret to
ending a campaign with tall boys rather than tears? Wharton Business
School professor Ethan Mollick and social
entrepreneur Jeanne Pi examined data from almost 50,000
Kickstarter campaigns. They found four keys to a successful
Kickstarter campaign: Realistic goals, timing, a bit of marketing,
and strong social media ties.
Data Analysis Students Don't tell
anyone, you'll change the odds!
Can
an algorithm win your fantasy football league?
Perspective Aer we finally easing out
that old (1876) technology?
Texting
overtakes calling in U.K., says research
According to research
published by the U.K.'s communications regulator, Ofcom, on Monday,
text messaging is outstripping actually making a call. Last year 58
percent of people communicated via text messaging on a daily basis,
while only 47 percent made a mobile call at least once a day, the
watchdog found.
Tools
No comments:
Post a Comment