Forgot your password?

Comment: Re:Is there an counter to this? (Score 1) 237

by jbmartin6 (#47712881) Attached to: Comcast Training Materials Leaked
When dealing with a telco, I just told them I wasn't going to pay anymore and this phone call constituted their notice. Then off I went. Of course, I didn't care about the fallout when they tried to pursue collections and did their credit reporting thing. I understand that not everyone is able or willing to take that hit. It didn't affect me at all.

Comment: Re:Just doin' business (Score 1) 237

by jbmartin6 (#47712149) Attached to: Comcast Training Materials Leaked
It really depends on how it is done. If the rep says "You know with your usage this other plan would provide the same options and be $10 less" (I know, when would that really happen) or "I see you are close to the limit, for $10 more you would get the next biggest tier", I would agree that there is no problem. If they go overboard and start yammering about "get our phone service for just $50 more!" on a call about Internet service then I'll have a problem.

Comment: Re:Just don't deal with Americans (Score 2) 237

by jbmartin6 (#47712113) Attached to: Comcast Training Materials Leaked
No, those rights are not available to other providers, that is part of the problem. Typically the local governments grant a monopoly to one provider and keeps out all others, in exchange for some consideration from the cable operators. This is one reason why Comcast and Time Warner don't directly compete in any areas.

Comment: Re:I'm not so sure.... (Score 1) 166

by jbmartin6 (#47703261) Attached to: Why Chinese Hackers Would Want US Hospital Patient Data
Yes, the summary's idea that one could get a heart transplant with faked records is baloney. But there are a lot of simpler health care interactions which are easier to get with faked records, such as basic prescriptions. And it's not much harder to monetize, you do it the same way you do credit cards. Those marketplaces are well established for both CC info and health info, in many cases they are the same place.

Comment: Re:VPNs don't solve this on their own (Score 3, Informative) 111

by jbmartin6 (#47702389) Attached to: Hackers Steal Data Of 4.5 Million US Hospital Patients
I work the other side of this scenario, and while you are right for the most part (IDS technology sucks and should never be used) what you describe is an elaborate and costly setup that a minority of organizations could implement and even fewer could do effectively. It seems to me that a much more effective approach would be to limit the value (i.e. risk) of the information available to an attacker. Instead of taking extra measure to protect SSNs, ask if we even need to store them at all. I've seen a lot of incidents where I had to ask things like 'Why does this database have all this information in it when you only need three fields?' I'm not saying we should simply accept intrusion but vulnerability is infinite so moving to reduce the value of an intrusion to reduce the reward for attackers might be more effective than fruitlessly striving for perfect defense.

Comment: They are late to the party (Score 1) 111

by jbmartin6 (#47702353) Attached to: Hackers Steal Data Of 4.5 Million US Hospital Patients
Given that the hospital's information is shared with all sorts of insurers, coding and transcription services, government agencies, services that comb the records looking for more insurance claims or more profitable claims, and so on, I have to say that these guys came really late to the party.

Comment: Re:Sandboxing (Score 1) 323

by jbmartin6 (#47688141) Attached to: Ask Slashdot: How Dead Is Antivirus, Exactly?
There is a lot of work being done now on behavioral analysis, with some products like Invincea and Cylance based on this idea. From the limited testing that I have done with them, they seem pretty effective. Of course, malware authors could just start changing their behaviors to avoid these tools, but if malware doesn't act like malware anymore, it stops being malware. And of course you forgot reputation services like those already being implemented by browsers and OS vendors. These force malware users to keep moving their sites and C&C around, making it just that much harder. Which is a good thing. Today, what we call "antivirus" is already using these two approaches to some extent.

Comment: Re:Disease - deadly vs wide spread (Score 1) 213

by jbmartin6 (#47672815) Attached to: How to Maintain Lab Safety While Making Viruses Deadlier
It is unclear (at least to me) how much the alteration of the original pathogen might affect it in other ways. Biology often involves trade-offs. The changes might make it less resistant to current antibiotics, or make it easier for humans to resist naturally. So you could take Ebola and make it airborne somehow, but that change would likely involve tradeoffs that would reduce the impact.

"Well, social relevance is a schtick, like mysteries, social relevance, science fiction..." -- Art Spiegelman