What is SOPA? And is it as bad as everyone says it is? Part 2

Continuing on from my previous post, the SOPA process is this: A website based in China hosts a bunch of illegally obtained, copyrighted material. Let’s assume that these are all movies, and the website is called “http://myfreemovies.cn. The A-record for this website is 292.168.11.47. They make these movies available for free to anyone who logs…

1

What is SOPA? And is it as bad as everyone says it is? Part 1

Back in December, after I got back from New Zealand, I was off work for a week recovering from a medical procedure.  As I was browsing through my antispam RSS feeds, I came across SOPA and PIPA.  “Allo, wot’s dis?” I said in my New Zealand accent.  I did some reading about it and planned…

3

Some more on the Stratfor/Anonymous hack – protecting user data

Okay, this is my final post on the Stratfor/Anonymous hack.  Probably. I’m a subscriber, and yesterday we all got a note from Stratfor founder George Friedman about the hack.  You can read it here if you so desire.  In it, he describes the motives for the attack: The attackers thought that Stratfor was part of…

2

Even experts use bad passwords

Ever since I had my data hacked by Anonymous during the Stratfor hack (and updated my credit card… and  subsequently some of my auto-payments at which point I sighed because I figured it was only a matter of time before I had to do it again), I’ve been reading articles about it. One of the…

1

Taking shots at Windows 8’s new picture password

Blah, blah, blah. I was reading in a short article on Network World that the father of two-factor authentication, Kenneth Weiss, doesn’t think that Windows 8’s new picture password is any good. "I think it’s cute," says Kenneth Weiss, who now runs a three-factor authentication business called Universal Secure Registry.  "I don’t think it’s serious…

1

How Digital Detectives Deciphered Stuxnet – the Most Menacing Malware in History

This is a story that I missed when it was published last summer, but Wired has a great article about how the Stuxnet worm was discovered, analyzed, probable targets and probable authors.  If you’ve been following the e-security world for the past couple of years, none of this will be new to you, but I…


Internet Explorer 6 finally on the way out… in the US

ComputerWorld has an article up where Microsoft is celebrating the fact that Internet Explorer 6 is now used by less than 1% of users in the United States.  From ComputerWorld: Microsoft today said its campaign to drive Internet Explorer 6 (IE6) into extinction had done its job in the U.S., where fewer than 1% of…

1

IBM’s other prediction for 2016 – no passwords

Following up from my previous post, the other prediction that IBM made was that in 2016, we wouldn’t use passwords to get to our important information.  Instead, we would use biometric data to authenticate ourselves. We would choose to provide certain amounts of information about ourselves to our computers and to private networks such as…

1

Fallout from the Anonymous/Stratfor hack

As I wrote in my post on Christmas Day, Stratfor was hacked by Anonymous.  Since that time, here are a couple of updates: I signed up for Identity Theft protection from CSID.  I got an alert the other day indicating that according to all of the monitoring they do, the email address I use for…


IBM predicts the future for 2016 – and it includes no spam

IBM published a video where it predicts what the world will look like in 2016 (see bottom of this post for the link).  It includes the following five predictions: You will make your own energy: Anything that moves has the potential to create energy. Your running shoes, your bicycle and even the water flowing through…

2

Follow up from eTrade spam – Bank of America spam

Last week, I wrote about eTrade spam hitting inboxes.  Today, we’re seeing the follow up from that: Bank of America spam. This looks identical to the previous run with one difference: it’s spoofing Bank of America.  Like the previous spam campaign, the message body contains only a link to a http://goo.gl redirector and the subject…

2

Security News Daily’s Top 10 Stories of 2011

As I was reading stories around the Internet, as per my daily ritual, I stumbled across Security News Daily’s Top 10 Biggest Security stories of 2011, by Matt Liebowitz.  As I went through it, I thought to myself “What the—? Did these guys copy me?”  There’s a lot of overlap there.  It just goes to…


The Top 10 Spam, Malware and Cyber Security Stories of 2011

Well, here we are, the start of 2012.  If you’re like me, you’ve read a bunch of stories online about the top news stories, movies and books of 2011.  But what about the top 10 cyber security stories of 2011?  That’s what I am here for, to give you the rundown! This is a very…