Mafia country, counterfeiting currency
Back in the late 70s when I was a grad student in physics I gave a paper in Pisa and then in Bari. The differences between Pisa and Bari were very clear – Pisa – Northern Italy, very European and industrialized, Bari, South of Italy, very agricultural and very Mediterranean – the one thing that […]
Microsoft browser vulnerabilities and the police
The Polish Police did an IT modernization project in 2008 for installing mobile terminals in police cars. The software in the mobile terminal uses Microsoft IE. Since the mobile terminals use Microsoft IE – it should be possible to attack the mobile terminal using one of the known IE software vulnerabilities
Fraud, energy derivatives trading
Fraud has become a big issue in energy derivatives trading. A former Bank of Montreal (BMO) natural gas trader pled guilty in November 2008 to intentionally mismarking trades, resulting in over $800 million of fraud-related trading losses. The interesting part in the item on EmpireStateNews.Net was that that the natural gas trader pleaded guilty to […]
Nihilistic security
Nihilism asserts that objective morality does not exist: therefore – there is no objective moral value with which to uphold a rule or to logically prefer one action over another. The wave of the liberal left which swept Western Europe and is now growing in US as the Obama administration takes office, asserts that there […]
Better physical security with more eyeballs
Big companies have lobbies and receptionists. They may have many visitors during the day not to mention messengers from FedEx, DHL, TNT, Poczta etc. A DHL courier recently visited the offices of a client to pick up a package. He walked in, picked up 5 expensive mobile computers and notebooks, put them in the pouch […]
2009 CWE/SANS Top 25 Most Dangerous Programming Errors
I’ve been telling customers for years that most security exploits are caused by a small number of software defects (you can download my white paper on Software Security and see how to mitigate enterprise software vulnerabilities systematically using Business threat modeling Still it’s amazing how the trade press are gushing on this – must have […]
Invisibility cloak
DIdn’t you want one of those invisibility cloaking devices back when you were in High School? I sure did – but I grew up on Star Trek According to the Discovery Channel – we’re within 6 months of a cloaking device – the only catch is that it will only be good for 2D surfaces. […]
IDF penetrated Hamas secure network
Both the Israeli IT online paper – “Daily Maily” and the Palestinian news agency, Middle East Newsline have reported that the IDF has cracked an encrypted communications network supplied by the Taiwanese vendor Senao used by the Hamas in Gaza with (and I quote) “two way encrypted multi-channel radios, with a range up to 50km”. […]
World Recession and Japan
Courtesy of my buddy Todd Walzer from iLand6 in Japan –This week the Nikkei reported that Japanese industry will cut IT spending 20-30% in 2009.Q3 2008 was the 2nd consecutive quarter the economy shrank, albeit by only 0.1%.The recession in Japan is less severe than in the West, for a few reasons:
Houston, we have a problem
Are you like the rest of the lemmings? Most companies we know – don’t have the faintest idea of what’s going on inside the corporate network. Once the company management discovers that almost all their employees cc company documents to their gmail accounts so they can access the data at home – it becomes […]