Comment Re:Sure... (Score 1) 343
employment of less skilled but competent workers.
There aren't many of those. If they are competent, they get skills pretty quickly.
employment of less skilled but competent workers.
There aren't many of those. If they are competent, they get skills pretty quickly.
But Sony did clearly not even have the basic level of protection they needed in place.
True, Sony could (should) have made it a lot harder.
Who makes bikinis for weiners?
Who else but PETA?
You have no clue.
Well that's definitely not true lol
All you need is security good enough to keep the attackers out. The trick is to find what level that requires.
Against a targeted, skilled attack, there is no level that is good enough to keep them out.
Or maybe we can just send a few bloviating politicians over and throw in some mass drops of MP3 players loaded with Sony tunes on the country.
There's a North Korean who escaped to South Korea. He now sends balloons across the border with various messages. He's stated that he's planning on sending balloons with DVDs of the movie.
While the need to protect sensitive sources and methods precludes us from sharing all of this information, our conclusion is based, in part, on the following:
* Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed. For example, there were similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks.
* The FBI also observed significant overlap between the infrastructure used in this attack and other malicious cyber activity the U.S. government has previously linked directly to North Korea. For example, the FBI discovered that several Internet protocol (IP) addresses associated with known North Korean infrastructure communicated with IP addresses that were hardcoded into the data deletion malware used in this attack.
* Separately, the tools used in the SPE attack have similarities to a cyber attack in March of last year against South Korean banks and media outlets, which was carried out by North Korea.
Security is not easy, but it can be done
Probably not. Do you think your Linux box has no vulnerabilities? (hint: it does). Even if you run OpenBSD (which still has vulnerabilities), are the employees at your company going to use a browser? That will have vulnerabilities, too.
Which brings us to the biggest security vulnerability, employees. Remember that the most valuable information a company has isn't the root password, it's the documents and emails the employees are working on and have access to.
So not only do you need to have a perfectly secure operating system (which doesn't exist), you're also going to need secure employees. Good luck at that.
I suppose I'm a global warming denier, by the common standard here on Slashdot. The global warming alarmists and pitchmen said "San Francisco will be underwater by 2010".
Do you have a reference for that? I've tried looking, but can't find one. I have trouble believing that all of San Francisco would be under water, because the altitude in a lot of the city is actually quite high for a coastal town.
"By the time they had diminished from 50 to 8, the other dwarves began to suspect "Hungry." -- a Larson cartoon