We
know that Clausewitz said, "War is the continuation of politics
by other means." Who said, “War is an economic event?”
(That must be a misquote, since Google didn't recognize it.) Have we
learned something from Ronald Reagan?
Rouble
heading for biggest one-day fall since 1998 as oil drops below $70
The rouble looked set for its steepest one-day fall since the Russian
financial crisis of 1998 on Monday, plunging about 4 percent as oil
prices slid below $70 a barrel and Russian assets nosedived across
the board.
(Related)
Financial
Times: The economic collapse of Ukraine must be halted
Ukraine
is in the throes of a financial crisis that urgently demands a
response from western governments. The security threat to the
country may be the primary focus in the west, following Russia's
seizure of Crimea and its military intervention in eastern Ukraine.
But Vladimir Putin's military tactics seem primarily designed to fuel
an economic meltdown which destabilises Kyiv. Western governments
and the International Monetary Fund now need to act fast to bring
Ukraine back from the brink of financial collapse.
I
too think Sony is screwing up their breach communications.
It’s
hard for me to figure out what the real headline should be over the
Sony Pictures hack.
Is
is that a lot of personal
data may have been stolen – again? And if so, will the FTC
open an investigation into the breach?
Is
it that North Korea may
be involved in the attack?
Or
is it that Sony lost control of its intellectual property and movies
are reportedly being leaked
online?
What
lessons that Sony should have learned from the 2011 hack hadn’t
they learned? And what lessons will they and others learn now? It’s
premature to speculate until we know more about what happened and how
it happened.
For
my Computer Security students.
ENISA
Releases Framework for Evaluating National Cyber Security Strategies
The
European Union Agency for Network and Information Security (ENISA)
has published a framework designed to help government officials and
policy practitioners evaluate National Cyber Security Strategies
(NCSS).
A
total of 18 European Union member countries have published or are in
the process of publishing a NCSS
that details the cyberspace-related risks which could have a negative
social and economic impact.
…
ENISA
has developed an evaluation framework that is based on the analysis
of these 18 EU strategies and 8 non-EU strategies.
The
framework focuses on five key objectives: the development of cyber
defense policies and capabilities, cyber resilience, supporting
industry on cyber security, securing critical information
infrastructure, and reducing cybercrime.
My
Ethical Hackers probably did not do this. Could be an exam problem
for my Computer Forensics class!
Modifying
an Off-the-Shelf Wireless Router for PDF Ballot Tampering
Modifying
an Off-the-Shelf Wireless Router for PDF Ballot Tampering –
Daniel M. Zimmerman and Joseph R. Kiniry, Galois, Inc., 421 SW 6th
Ave., Suite 300, Portland, OR 97204. November 7, 2014
“Abstract
– In order to highlight the dangers associated with Internet voting
carried out over electronic mail with PDF forms, we
show that an off-the-shelf home Internet router can be easily
modified to silently alter election ballots. The
modification is nearly undetectable and can be carried out in a way
that leaves no evidence
to be found in a postelection investigation.
Introduction
– A number of governments, at various levels, have expressed
interest in the establishment of Internet voting systems. Examples
include the state of Alaska, which has carryed out an Internet voting
trial for the 2012 and 2014 elections; Washington, D.C., which in
2010 developed an Internet voting pilot project with the OSET
Foundation for absentee voters that was successfully attacked by an
academic research group [6]; and the nation of Estonia, which has had
Internet voting since 2005 that exhibits significant security flaws
[3]. One mechanism proposed for Internet voting involves ballots
rendered as standard Adobe Portable Document Format (PDF) forms.
These forms are made available to voters on a web site; the voters
then use standard software (e.g., Acrobat Reader, Preview, etc.) to
fill out the forms and submit the completed forms via electronic mail
to the appropriate election authority. The
submitted ballots are then printed and counted, either by
hand or with optical scanners.
For
my Android toting students.
The
Best Android Apps
The
Google Play Store is home to a massive number of apps and continues
to grow every day, so how are you to know which are the best? We’ve
got you covered with our list of best Android apps. We’ve done the
searching for you, and narrowed it down to the three best apps in
each category.
(Related)
How
To Use Skype On Android For Beginners
Your
Android smartphone makes phone calls. This much is obvious. But did
you know that your Android tablet can make calls too, with the right
app installed?
No comments:
Post a Comment