November 15, 2014 This is not the IoT you want. http://www.cnet.com/products/quirky-outlink/ If I plug in an IDE drive or a SATA drive or a USB drive or device my mobo or system recognizes what…
January 11, 2013 Another Java bug: Disable the java setting in your browser http://www.kb.cert.org/vuls/id/625617 Java 7 Update 10 and earlier contain an unspecified vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on a…
May 15, 2012 If Customers Ask for More Choice, Don’t Listen http://blogs.hbr.org/cs/2012/05/customers_arent_as_savvy_as_yo.html Perhaps the reason that Apple is ahead with the iPod, iPhone and iPad is that the competitors are offering too much choice. That…
January 24, 2012 The Death of Antivirus Software http://www.infosecisland.com/blogview/19386-The-Death-of-Antivirus-Software.html The real issue here isn’t Ubuntu, or any other form of Linux. Its that AV software doesn’t work. PERIOD. There are over 50,000…
January 19, 2012 â€My dog knows you don’t look like me” http://www.zdnet.com/blog/identity/darpa-authentication-project-focuses-on-humans-as-secrets/157 So do my cats. But so what? Does this mean that DARPA/USGov will finance the supply of advanced biometrics with every PC from…
November 30, 2011 Doubts about “Defense in Depth” Â So to have great (subjective) protection your layered protection and controls have to be “bubbled” as opposed to linear (to slow down or impede…
July 2, 2011 Risk Models that hide important information Some people seem to be making life difficult for themselves with risk models such as “Impact * Probability” and as such have lead themselves…