Saturday, September 8, 2012

Tech Review Security: Thursday, September 6, 2012


Dem, GOP platforms expose divide over cyber defense
  • platforms different
    • Dem
      • "...help business and government protect..."
        • put government legislation in place that requires implementation of minimum set of requirements
    • GOP
      • "...effective cybersecurity..."
        • remove regulation the current hinder sharing of cyber data between government and business
        • no burden upon governemnt
The GOP stand make more sense.  Unless a business 'lack' of security is threatening that nation as a whole, leave them alone.  I like the approach of giving tools and support rather than regulation.  The tools and support are a help.  The regulation is a burden.




Justice gives NASCIO grant to promote info sharing across borders

Thursday, June 21, 2012

Tech Review AI: Wednesday, June 20, 2012


Cities using AI for pre-crime monitoring of surveillance videos






Tech Review Cloud: Wednesday, June 20, 2012


5 ways the public cloud can go wrong for DOD agencies


  • Total Cost of Ownership (TCO)
  • Security and privacy
  • functionality
  • records and compliance
  • Support
"Beast of Breed" commercial solution may not be good defense environment solutions.





Wednesday, June 20, 2012

Saturday, May 5, 2012

Tech Review Security: Friday, May 4, 2012

Over 1.5 million Visa, MasterCard credit card numbers stolen?

  • Global Payments
  • Hacked over a period of time

A first: Hacked sites with Android drive-by download malware


  • NotCompatible
    • Update.apk
  • infiltrate normally protected information or systems
  • Automatically downloaded
  • sideloading must be enabled
    • loading from "Unknown sources"
  • Used must agree to install

How to hide from face-detection technology




Tuesday, February 7, 2012

Tech Review Security: Tuesday, February 7, 2012


Anonymous takes down Boston PD site, releases FBI/Scotland Yard call



  • Hactivisim:  the use of computers and computer networks as a means to promote political ends
  • example

New, stealthy threats change best responses to cyberattack

  • Document everything
  • Work in a team of two or more
  • Analyze evidence
  • Notify appropriate people
  • Notify US-CERT
  • Stop the incident
  • Preserve evidence 
  • Wipe out all effects of the incident
  • Identify and mitigate
  • Confirm operations are restored
  • Create a final report

The three types of online attackers


  • Criminals
  • Hacktivists
  • Governments




Tuesday, January 31, 2012

Tech Review Security: Tuesday, 31, 2012

Police testing long-range scanner to 'frisk' for guns on the street




  • NYC Police
  • 80 feet away
  • without consent
  • DoD
  • currently 3 or 4 feed away
  • terahertz range
  • pass through non-conducting material
    • wood brick
  • Jingle Liu
    • Rensselaer Polytechnic Institute
    • Nature Photonics
    • miles away
  • drones in NYC