Forgot your password?
typodupeerror

Submission Summary: 0 pending, 77 declined, 5 accepted (82 total, 6.10% accepted)

+ - A petition to make July 20th a national holiday to honor the moon landing->

Submitted by Curseyoukhan
Curseyoukhan (2601315) writes "The moon landing mattered, so lets mark it with a holiday. People remember those. This petition at WhiteHouse.gov needs 100k signers by August 20th to get considered. If we can put a man on the moon why can't we make it a national holiday? This isn't rocket science, it's clicking a damn link. Do it for Buzz, Neil and Michael Collins. Do it for your dreams of the future."
Link to Original Source

+ - Why Crazy Still Trumps Facts on the Internet->

Submitted by Curseyoukhan
Curseyoukhan (2601315) writes "The internet was going to be great. It was going to be the place where good information drove out bad, where facts would vanquish lies. Instead it seems to have made the situation worse. The Flat Earth Society has come back from the dead. Survivors of Sandy Hook and Aurora are electronically harassed by people who congregate at sites explaining how it was all a government conspiracy. And that's just the tip of the Illuminati pyramid. So what happened?"
Link to Original Source
Government

+ - GSA system shows contractors' private information->

Submitted by
Curseyoukhan
Curseyoukhan writes "A software glitch in the government procurement system for contractor work exposed significant amounts of personal and private data of individuals and companies — including Social Security, business tax identification and bank account numbers — open for viewing. The problem could leave many individuals and companies potentially open to a significant threat of identity theft.

The General Services Administration sent an email to parties registered on the System for Award Management, or SAM, on Friday, warning them of the problem, according to a copy obtained by MoneyWatch. The message states that registered SAM users with the proper set of assigned rights "had the ability to view any entity's registration information, including both public and non-public data at all sensitivity levels.""

Link to Original Source
Government

+ - Report: DoD Has Wasted Billions on IT Security->

Submitted by
Curseyoukhan
Curseyoukhan writes ""During exercises and testing, DoD red teams, using only small teams and a short amount of time, are able to significantly disrupt the 'blue team’s' ability to carry out military missions. Typically, the disruption is so great, that the exercise must be essentially reset without the cyber intrusion to allow enough operational capability to proceed. These stark demonstrations contribute to the Task Force’s assertion that the functioning of DoD’s systems is not assured in the presence of even a modestly aggressive cyber-attack."

Pentagon spent +$10 billion on IT security in FY 2011."

Link to Original Source
China

+ - Yes, China Does Dirty Business—Just Like We Taught It To->

Submitted by
Curseyoukhan
Curseyoukhan writes ""China is evil, lawless, corrupt and a threat to the world/capitalism." That’s the unstated assumption in much of what is currently written and said in the United States about the world’s most populous nation – especially its cyber espionage efforts.

What other reason could there be for China's ongoing efforts (many of them successful) to steal the plans, patents, designs and what-have-you from foreign companies? Well, one reason is that China is practicing capitalism just as America taught it to."

Link to Original Source
Entertainment

+ - Totoro rules: 90 percent of Japanese have seen a Studio Ghibli movie->

Submitted by
Curseyoukhan
Curseyoukhan writes "According to the Shunkan News: Out of the 130,000-some people polled, 9.6 percent had never seen a Studio Ghibli film.

Also: Japan's nine favorite Miyazaki movies ranked by popularity. Totoro is, of course, #1 but Castle in the Sky ahead of Spirited Away or Princess Mononoke? I don't think so.

Discuss. Debate. Rinse. Repeat."

Link to Original Source
China

+ - Why You Shouldn't Believe the Cyber-War Hype->

Submitted by
Curseyoukhan
Curseyoukhan writes "he United States is not at cyber war. There, I said it. Someone had to.

Don’t feel bad if this is news to you. It is also news to all the Congress-critters and nearly every journalist who has used the term. "But wait," you say. "What about all the reports and government screaming? Do they mean nothing?"

Pretty much, yes.

It is important to remember that no one really knows what cyber war is. One thing is for certain, though: Cyber war is not what the Chinese currently appear to be up to. That’s called spying.

If stealing secrets is an act of war then America is currently at war with all of its allies. Espionage is what governments do so they don’t have to go to war...directly. What appears to be upsetting people is that the Chinese are using espionage to make money in a way that the United States didn’t think of first."

Link to Original Source
The Military

+ - The military's medal for cyber-combat is a disservice to actual combat vets-> 2

Submitted by
Curseyoukhan
Curseyoukhan writes "The Distinguished Warfare Medal will be awarded to members of the military engaged in computer security and flying drones. It is the first new "combat-related" award since the Bronze Star was created in 1944.

A friend of mine was a Bronze Star recipient. He received the medal for leading troops in combat in Vietnam. He knew by heart the names of the dozen or so men who died under his command during that engagement. He eventually died from poisoning due to prolonged exposure to Agent Orange during his service.

The Pentagon says, "Another example [of a potential recipient] is that of a soldier at Fort Meade, Md., who detects and thwarts a cyberattack on a DOD computer system."

Other than carpal-tunnel syndrome what risk does our theoretical soldier face?

This stretches the term "combat-related" out of any recognizable shape."

Link to Original Source
EU

+ - US Lobbyists Writing EU Online-Privacy Law->

Submitted by
Curseyoukhan
Curseyoukhan writes "The European Union (EU) found a fast, cheap way to come up with a new online privacy law: Outsourcing much of the work to lobbyists, including the American Chamber of Commerce, Amazon, eBay and a few groups that are actually based in Europe.

The EU’s parliament–using a trick from Congress’s Guide to Destroying Institutional Credibility–is cutting and pasting the exact language used by the lobbyists into its law. The lobbyists are also doing an impressive job of getting rid of anything that might smack of actual consumer protection."

Link to Original Source
Government

+ - Secret Wars—Cyber or Otherwise—Destroy Democracies->

Submitted by
Curseyoukhan
Curseyoukhan writes "In the last week we learned that the Obama administration has given itself the power to both wage pre-emptive cyberwar and order the assassination of U.S. citizens—as long as they’re not in America. Add this to the long-standing ability of presidents to wage pre-emptive physical wars and you have to wonder why we even have a Congress.

What both the drone assassinations and cyberwar powers have in common is a total lack of outside review. The administration claims U.S. citizen Anwar al-Awlaki was given "due process" before being killed in a drone strike. There is no definition of due process that fits the policies described in the just-released legal rationalization. No one—not the courts, not Congress—got to review the decision, even ex post facto."

Link to Original Source
China

+ - NYTimes, WSJournal use rumors as facts in stories on their getting hacked->

Submitted by
Curseyoukhan
Curseyoukhan writes "Both The New York Times and The Wall Street Journal were hacked last week, and the incidents made headlines not because they were a big deal but because the press loves to talk about itself. In this case, the talk came in the form of some appallingly bad reporting.

Both papers say China was to blame for the attacks without offering a single piece of evidence to support this claim. The only person who even raises the issue of how difficult it is to identify the culprits in attacks like these is a spokesman for the Chinese government.

"Cyber attacks are transnational and anonymous. It's very hard to trace the source of attack," he said. "To presume the source of a hacking attack based on speculation is irresponsible and unprofessional."

Not a good sign when an apparatchik has to remind the nation's two most powerful newspapers how to report the news."

Link to Original Source
Privacy

+ - Hackers Hijacking Security Cameras for Malware and Spying->

Submitted by
Curseyoukhan
Curseyoukhan writes "Tommy Stiansen, CTO of NorseCorp, an IT security company that delivers real-time cyber risk intelligence, says, "We are seeing a lot of unexplained devices communicating to our honeypots, for example CCTV cameras. We're seeing a lot of CCTV cameras attacking our honeypots."

Stiansen says that the codes in the CCTV cameras he’s examined have software developed in Asia and still has traces of the development code in them. In addition to that, the DVR boxes running the feeds use a traditional Linux pack that admins haven't done anything to secure.

"Administrators buy these cameras and install them straight on their network without realizing they are running a full Linux server," he says. "They're running a web system that has jQuery, cross-site scripting and all the vulnerabilities in the book in them.""

Link to Original Source
Security

+ - At Davos the Elite Ponder Stale Cybersecurity Issues—and Charlize Theron->

Submitted by
Curseyoukhan
Curseyoukhan writes "At the World Economic Forum in Davos, Switzerland—where the elite meet to secrete—much of the talk is about cybersecurity. Specifically, attendees are wondering if the U.S. government should be doing more to protect American companies. And, as is frequently the case at gatherings like this, the talk is out of date.

In case you are unfamiliar with the WEF, it’s where the rich and powerful and Charlize Theron* get together to discuss Very Important Issues without having to listen to the opinions of the hoi polloi.

Cybersecurity is on the minds of the Davos-ians because it could cost them money. Apparently they have just learned that "there is barely a large company out there today which has not had its infrastructure and systems breached.""

Link to Original Source
Government

+ - Cyber War is Upon Us–But Only One Side is Attacking->

Submitted by
Curseyoukhan
Curseyoukhan writes "The first shot was probably the release of Stuxnet sometime during or before 2009. Even though no one has officially claimed responsibility everyone knows who was behind it. Stuxnet hit with a bang and did a whole lot of damage to Iran’s uranium-enrichment capabilities. We followed up Stuxnet with Flame–the ebola virus of spyware.

What did the Iranians fire back with? A series of massive, on-going and ineffective DDoS attacks on American banks. This is a disproportionate response but not in the way military experts usually mean that phrase. It’s the equivalent of someone stealing your car and you throwing an ever-increasing number of eggs at his house in response.

It’s fascinating that Iran continues to do nothing more despite the fact that U.S. critical infrastructure currently has the defensive posture of a dog waiting for a belly rub. Keep that in mind the next time you hear that a "cyber Pearl Harbor" is imminent."

Link to Original Source
It's funny.  Laugh.

+ - Why You Need to Protect Your Home from Cyber Pearl Harbor (Now!)->

Submitted by
Curseyoukhan
Curseyoukhan writes "At this very moment a terrorist hacker in Somewheristan is preparing to unleash what former Secretary of Defense Leon Panetta called a "cyber 9/11." With just a flick of a switch, we could all be left without electricity, water or Netflix for who knows how long.

Some of you probably laughed when I mentioned Netflix, but I did it for two reasons. First, to see if you are paying attention and, second, to get you thinking about your homes because, ladies and gentlemen, the home is the greatest and most-overlooked target today. Thankfully, my company — PurplexUs Inc. LLC — is here to help protect you and your home.

Bathroom scales, refrigerators, rice cookers, garage-door openers, ovens, clothes, washers, light switches and toothbrushes–do you know what they all have in common?

I didn’t think so.

All these devices can be used by a terrorist to kill now that they've been connected to the internet."

Link to Original Source

Can't open /usr/fortunes. Lid stuck on cookie jar.

Working...