Monday, December 27, 2010

This week's security briefing

1. Facebook revises bug policy - http://bit.ly/g8IcDn

2. Sightseeing firm breach - http://bit.ly/hHbdgy

3. Internal Gawker memo - http://bit.ly/fV4Teo

4. Group publishes database of private embedded SSL keys - http://bit.ly/eFJzVG

Inspirational video

Thursday, December 16, 2010

Wednesday, November 17, 2010

Verizon has an app to track hacks anonymously

China Reroutes all Internet Traffic

http://fxn.ws/9mYFFP

Business Intelligence - always a challenge

Great article on BI success: http://usat.ly/aUdAkj



Also Gartner recent piece summarized by their executive summary:

Harnessing information to provide intelligent insight to improve business performance is a major challenge. CIOs can provide leadership by developing a cross-enterprise perspective of information and processes supported by technology.

Key Findings

Information required for effective decisions comes from many diverse sources.

Too much information can be as bad as too little information.

Intelligent business develops by linking process and information integration with business strategies.

Recommendations

Focus business intelligence (BI) efforts on delivering the right information to the right people at the right time to impact critical business decisions in key business processes.

Change the mind-set from one that simply demands more information to one in which asking the right questions drives impactful decisions.

Create project teams based not on data ownership but on information needs up and down the management chains and across functions to drive maximum decision impact.

Wednesday, November 10, 2010

This week's security briefing

1. Crowdsourcing surveillance - http://bit.ly/9eoiIG


2. Android browser exploit - http://bit.ly/cQ3Ev2

3. Uncovering covert command and control in the cloud and legacy integration - http://bit.ly/de6ecq

4. Gaping holes in mobile Paypal (iphone) app - http://bit.ly/dxwqhs

Wednesday, November 3, 2010

Happy Birthday


Very Enthusiastic Birthday Boy!

Tuesday, November 2, 2010

This week's security briefing

1. Adobe X: new UI - http://bit.ly/9rko45

2. New HTTP exploit with agentless bots - http://bit.ly/bRfpUT

3. Mobile problems beyond malicious apps - http://bit.ly/aT9WIO

4. Global phishing survey Half 1 2010 - http://bit.ly/cfjbjs

5. Inside Google's anti-malware operation - http://bit.ly/aHdlwC

6. Firesheep: a Firefox plug in that allows you access to other's social network activity - http://bit.ly/cm5JAL
7. Class action lawsuits to protect online privacy - http://bit.ly/a2Ired

Thursday, October 21, 2010

This week's security briefing

1. Story of Slammer and Lessons - http://bit.ly/cD1TLm
2. The "Evercookie" especially on mobile devices - http://bit.ly/9uQrwj
3. Benefitting from SEO spam - http://bit.ly/aKCevW

Monday, October 18, 2010

Choosing and developing a mentoring relationship

http://bit.ly/cDR3Io

This week's security briefing

1. Big Windows patch - http://bit.ly/adwitU


2. Complaint filed about Google privacy policy - http://bit.ly/a2Yjyo
3. Gmail security checklist released - http://bit.ly/bNAPau
4. US has most bot infections - http://bit.ly/amYc04
5. Google debuts phishing alert service - http://bit.ly/bJo6Hk

Wednesday, October 6, 2010

This week's security briefing

1. Adobe update - http://bit.ly/9I4fgL


2. Video of remote jacking an ATM - http://bit.ly/a5fHKb

3. Protecting GMAIL account after a hack - http://bit.ly/cFwXl0

4. VOIP abuse attacks - http://bit.ly/bBFKxo

Monday, September 27, 2010

This week's security briefing

1. Google adds second form authentication - http://bit.ly/cjmu1j


2. Twitter hacked and fixed - http://bit.ly/b8AnMo

3. Google complains and IBM revises report - http://bit.ly/byCVvB

4. Web tracking code prompts lawsuit - http://nyti.ms/dB7IeW

5. Why you should worry about what is on your smartphone - http://bit.ly/9BPXJN

6. Facebook app pumps out mobile spam - http://bit.ly/d7Rs6C

7. New email worm - http://bit.ly/9k5RPc

8. Hotel operator has data breach - http://bit.ly/9SgBAS

9. US Cert riddled with vulnerabilities - http://bit.ly/bdK6aG

10. More than 1M websites serving up malware in Q2 - http://bit.ly/9hMN7r

11. Security concerns for HTML 5 - http://bit.ly/9oWCfb

12. Intel confirms HDCP copy protection hacked - http://bit.ly/bbhnxM

13. University breaches are staggering; lessons learned - http://bit.ly/dvGWMP

14. Senate considers national data breach legislation - http://bit.ly/a0Gfee

15. Twitter hit by another worm attack - http://bit.ly/dormpB

16. New type of whitelist; invitation only for domains - http://bit.ly/bi8YUw

Great new study of users of physical security technology

http://bit.ly/securityarticle

Monday, August 30, 2010

Weekly security post

1. HTTP Strict Transport Security in Firefox 4 - http://bit.ly/cou1FC

2. DLL Hijacking Fact and Fiction - http://bit.ly/cbFGNm

3. Short passwords are they safe? - http://bit.ly/bwXuyI

4. Wicked widget hacks Network Solutions - http://bit.ly/baFnjk

5. Smudge password attacks on Droids - http://zd.net/agQg2D

6. Smart phones and attackers - http://bit.ly/byVLe9

7. Location based services raise risk - http://bit.ly/bB6LyJ

Friday, August 13, 2010

This week's security briefing

1. Silent update for Firefox - http://bit.ly/cT4jlL

2. Black hat video stream hacked - http://bit.ly/9WGTZ7

3. Safari bug used to jailbreak iPhones - http://bit.ly/b7SvD7

4. More password research - http://bit.ly/cnred5

5. Browser privacy mode not so private - http://bit.ly/bIJxSA

6. Safari locked backed down - http://bit.ly/axQRTj

Friday, August 6, 2010

Bad Communication - Example by a vendor

I actually received the following as shocking as it sounds after not getting any response from a delivery vendor and then after months of frustration posting a tweet about the vendor.

Your twitter message is very cute. In spite of what you might think, we have a thriving business with hundreds of satisfied customers that have dealt with us for many years.

In explanation as to why you have not gotten a phone call back, on several occasions I told XXX that XXX was not interested in servicing your equipment or placing it under a service contract. That in no way means that your equipment cannot be supported. XXX has many other dealers and support personnel that can best address your needs. I have forwarded XXX's contact information directly to XXX on several occasions.

XXX was simply a contracted, installing agent for the company you purchased the equipment from. Our only obligation was to satisfy the 90-day warranty period, which we did.

Being that this matter has been forwarded to XXX for follow-up on many occasions, I did not feel it was necessary to commit any more time or energy related to your attempts for service and support on this equipment. I also happen to know that XXX has all of XXX's representative's contact information. Perhaps your "tweets" should be directed at XXX or the company you purchased the equipment from, and not a personal attack on me. If your "tweet" was a way to get a response from me, now you have it. I would appreciate it if you would refrain from contacting me or XXX in the future. In addition, it would be sincerely appreciated if your slanderous "tweets" ceased as well. You should contact the company you purchased the equipment from, or XXX directly.

Thursday, July 29, 2010

This week's security posts

1. Massive Safari patch - http://bit.ly/91LEFR

2. Cost of Cybercrime Study - http://bit.ly/bQSnOX

3. Double Whammy Stealth Attacks - http://bit.ly/dl0vh0

4. WOW Phishing - http://bit.ly/bPYcNA

5. Stars info hacked in Hells Pizza - http://bit.ly/9uenCs

6. NASA Twitter account hacked - http://yhoo.it/afoiiz

7. 100 bug fixes for PHP - http://bit.ly/9Sh9q6

8. Details of 100m Facebook users collected published - http://bit.ly/crV9d8

9. Dell ships server with infected motherboard - http://bit.ly/deHmIv

10. Malicious Amazon email - http://bit.ly/9CHtBT

11. Skype (1 of) the crypto reverse engineered - http://bit.ly/92VScg

Thursday, July 15, 2010

Monday, July 12, 2010

Thursday, July 8, 2010

iPhone 4G complaints surface

http://bit.ly/cuNTKb

This week's security posts

1. We all know someone who has received this scam email - http://bit.ly/9kiBUl

2. Hack to allow Flash to run on the iPad - http://bit.ly/cm1QNz

3. Competency of hackers falls - http://bit.ly/aUFyI4

4. FEMA does not do financial data security well - http://bit.ly/9gsqib

5. 3D CAPTCHA - http://bit.ly/clNDGz

6. Write down your password - http://bit.ly/aZERrV

7. UH breach exposes 53,000 - http://bit.ly/9xzWeV

8. Hack of former employer gets 12 months in jail - http://bit.ly/9DsL1D

9. Android is under Big Brother control of apps - http://bit.ly/aFJkUV

Sunday, June 27, 2010

Security Weekly Update

1. Infection saturation study - http://bit.ly/cEkUXU

2. Telephone DOS - http://bit.ly/aPTXZb

3. NSS study finds AV are slow to identify new servers - http://bit.ly/aFyQyn

4. MS sues spammer - http://bit.ly/aPtIQC

Wednesday, June 23, 2010

MARC - the commuter train in Maryland is out of control

MARC has no accountability to its customers / passengers. It is particularly aggregous when we when train 538 broke down and we were forced to sit for over 90 minutes in very hot temperatures in a crowded train that had temperatures of over 110 degrees with no ventilation. All the passengers who were healthy enough to avoid visits to the hospital received was an apology. Took me more than 4 hours to get home on Monday June 21, 2010.

Monday, June 21, 2010

This week's security posts

1. Threatens Biden using neigbor's wifi - http://bit.ly/9I2Dr1

2. ATT Ipad breach analysis - http://bit.ly/9MSWxI

3. HTTPS Firefox extension - http://bit.ly/bJVFpH

4. Phone phishing on the uptick - http://bit.ly/aIkHwi

5. Windows Help Center issue - http://bit.ly/bWpMZp

6. AV Testing standards - http://bit.ly/92DgAA

7. Microsoft and the stealth download - http://bit.ly/b78wLv

8. DHS and Active Directory found unsafe - http://bit.ly/a44UuE

9. Hackers use the word "ethical" in describing iPad hack - http://bit.ly/cCL709

10. Cameras ship with worm - http://bit.ly/cdfSI1

Wednesday, June 9, 2010

More security stuff

1. Adobe under attack - Flash exploit - http://bit.ly/bXDBno

2. Password research - http://bit.ly/bUj1Zc

3. Open Source is more vulnerable - http://bit.ly/az7jb6

4. Adobe acknowledges that it is in the sights of hackers - http://bit.ly/cGGw0Y

5. Israel websites under attack - http://bit.ly/byoekK

6. FTC steps in for Keylogger software and its marketing - http://bit.ly/9A9sFP

Monday, June 7, 2010

Wednesday, June 2, 2010

This week's security posts

1. Attempted hack of JPost website - http://bit.ly/9stzWS

2. Google bans MS OS at HQ - http://bit.ly/dCf761

3. Hacking of vehicle fleets - http://bit.ly/9LpPMA

4. SMS Blockers - http://bit.ly/db0uw3

5. MS responds to Google - http://bit.ly/9oWivr

6. Bots are getting beyond CAPTCHAs - http://bit.ly/9J0IA5

7. Passwords and ATM hijacking - http://bit.ly/bbFLQ4

8. Google Beta encrypted search - http://bit.ly/cHGELJ

9. In case you missed it - Symantec bought Verisign - http://bit.ly/9HXLO7 

10. BP Twitter account hijacked - http://bit.ly/a7k0DR

Tuesday, May 25, 2010

This week's security posts

1. Facebook worm - http://bit.ly/9Hy4VO

2. Forensic tool for smart phones - http://bit.ly/bhM9ON

3. Windows 7 problem - http://bit.ly/abUU86

4. Malvertisement study - http://bit.ly/coZXf4

5. Lifelock CEO Identity stolen 13 times - http://bit.ly/deQtYA

6. USB Threat - http://bit.ly/cDYY4S

7. Virus rumors - http://bit.ly/aCcmSf

8. Hacking an auto - http://bit.ly/bpYE6r

9. Twitter accounts on sale - cheap - http://bit.ly/9k1xS2

Tuesday, May 11, 2010

Security never ends

A virus impervious to anti-virus software - http://bit.ly/9SbjSO

Wednesday, May 5, 2010

More security stuff

1. Dept of Treasury websites infected - http://bit.ly/aurWqm

2. Facebook IDs for sale - http://bit.ly/9fnhmZ

3. Young people more susceptible to phishing - http://bit.ly/ce5awY

4. US largest spammer - http://bit.ly/bX40LS

5. Adobe PDF - the gift that keeps giving - http://bit.ly/c7Q0NB

6. Facebook Live Chat hole - http://bit.ly/cURAQ1

Monday, May 3, 2010

New security topic links to visit

1. Trojan disguised as Facebook toolbar - http://bit.ly/d1E9Ev

2. Accused botnet operators sought jobs at antivirus publisher - http://bit.ly/bEHuNQ

Friday, April 30, 2010

Wednesday, April 14, 2010

Wednesday, April 7, 2010

T Shirts

http://bit.ly/c7goK3

Quote of the day

"I am thankful for laughter, except when milk comes out of my nose."   Woody Allen

Thursday, April 1, 2010

The Facebook Threat

http://bit.ly/aGEnNz

This week's security posts

1. PDF new threats - http://bit.ly/cvcSl9

2. Seach poisoning - http://bit.ly/d8Y9fd

3. And who says Macs are not vulnerable? - http://bit.ly/dgyKXx

4. Another day - another mass loss of PII - http://bit.ly/bTn8KN

5. Crime and punishment - http://bit.ly/bKjbDy

6. Spam and human behavior - http://bit.ly/cPqjst

7. Interesting article on hosting of rogues - http://bit.ly/cqylaG

8. Weak passwords - http://bit.ly/cPXSvz

9. Network card exploit - http://bit.ly/aqfCsX

10. Obama Twitter hacker underlines the reason too much personal info on social media is an exploit - http://bit.ly/bZHrrO

11. 50 Riskiest Cities for Cybercrime in America (DC is 3) - http://bit.ly/9bQKOn

12. Scary IRS state of security - http://bit.ly/acyEpa

13. Twitter phising scam - http://bit.ly/9W5f4X

14. Guessing friends Facebook passwords - http://bit.ly/b0xlJ6

15. Interview with Fired PA CISO - http://bit.ly/cs55T6

Thursday, March 18, 2010

Quote of the day

True...there is no "i" in team, but there is a "u" in suck.

- unknown

Security - PDF risks

http://bit.ly/9WSlf0

Tuesday, March 16, 2010

Quote of the day

"The ratio of We's to I's is the best indicator of the development of a team. "
~ Lewis B. Ergen

Monday, March 15, 2010

Friday, March 12, 2010

Quote of the day

Alone we can do so little; together we can do so much."
~ Helen Keller

Wednesday, March 10, 2010

Gartner Portals et al Conference

Attended one day of the conference and learned a few interesting things:

1. The commoditization of video has made video very powerful. Production value not so important. Instead length is (2-3 minutes). The microvideo is in!

2. Enterprise Search does not effectively create organizational knowledge.

3. Social software is an example of the mantra - the right tool for the task. people have the freshest stuff in their brain, not written up somewhere.

4. How do people trust each other? What impact does this have on social software?  Trust is about sourcing and assumption of accuracy.

5. Why use video?
     a. Empathy
     b. Credibility
     c. Enhance or Affect Mood
     d. Engaging interest

Very inspirational story

http://bit.ly/bJMgIX

Security never ends

1. Social security numbers exposed - http://bit.ly/a8y1ET

2. FDIC fraud report - http://bit.ly/aMd0Mp

3. Energizer Bunny - http://bit.ly/axwEli

4. NY Times connection - http://bit.ly/cBr1a8

Monday, March 8, 2010

Quote of the day

“The nice thing about teamwork is that you always have others on your side”
 Margaret Carty quotes

Attend the Annual Premier Event for Technologists with a CPA Bent!

http://bit.ly/bSZ5Ha

Contact me if you'd like to attend and receive a discount code.

Friday, March 5, 2010

New inspirational quote for today

"You become successful by helping others become successful"
-Anonymous

Monday, March 1, 2010

Quote of the day

"Sticks in a bundle are unbreakable"
-Kenyan Proverb

Security never ends

http://bit.ly/alnMOi - or stay away from Wyndham...

Friday, February 26, 2010

Quote of the day

"There are precious few Einstein's among us.   Most brilliance arises from ordinary people working together in extraordinary ways"
-Roger Van Oech

Wednesday, February 24, 2010

More security stuff

1. Intel hacked - http://bit.ly/aHFH9W

2. Deep virus breaks Windows update - http://bit.ly/bcK3TP

This week's security posts

1. Smartphones - http://bit.ly/c2QNT5

2. Maybe Apple is not so consumer oriented - http://bit.ly/d9Fglb

3. Google Buzz and spammers - http://bit.ly/ahqq5C

4. Twitter app hacked to send spam - http://bit.ly/beCA2G

5. Daily spam volume - http://bit.ly/dktame

6. The Botnet epidemic - http://bit.ly/8X8370

7. The Kneber Botnet threat -  http://nyti.ms/ahavIV

8. Olympics and SEO poisoning - http://bit.ly/9R1waB

New inspirational quote for today

"There is no limit to what you can do if you don't care who gets the credit"

-Anonymous

Thursday, February 18, 2010

New inspirational quote for today

The strength of the team is each individual member...the strength of each member is the team.
-          Coach Phil Jackson Chicago Bulls

Thursday, February 11, 2010

Quote of the day

A snowflake is one of God's most fragile creations, but look what they can do when they stick together!  ~Author Unknown

Wednesday, February 10, 2010

For those who celebrate Purim

Now is a good time to order for Purim - www.MyPurim.com

This week's security posts

With the snow falling, more things to worry about / address:


1. GPS finds body - http://bit.ly/d6DekH

2. Office and Phishing - http://bit.ly/b2GlNw

3. Executive concern - http://nyti.ms/cr7sqf

4. Firefox malware - http://bit.ly/d2H8S4

5. Skype security - http://bit.ly/atNHgj

6. Social networking attacks - http://bit.ly/90J8ph

7. Mobile banking - http://bit.ly/9UaU0k

8. Microsoft patches targeted - http://bit.ly/9ymQII

9. Today is Safer Internet Day - http://bit.ly/9FcJAE

10. Google contracts with NSA to analyze hack - http://bit.ly/ac2Doy

11. Carbon credit phishing - http://bit.ly/cFvGgL

12. Laptop Encryption - Case Study - http://bit.ly/aXY4eY

13. IE Flaw - http://bit.ly/9mUmic

14. WiFi attackers poison browsers - gives pause using public wifi - http://bit.ly/b5leKf

15. Blackberry spyware - http://bit.ly/dr3ScH

16. Builds confidence in .gov and .mil websites - http://bit.ly/acI9Zb

17. MiFi hack - http://bit.ly/azfffm

18. Twitter password phishing - http://bit.ly/cIhwsM

Friday, February 5, 2010

Interesting article

Manufacturers / retailers and international politics - http://bit.ly/d6DekH

Thursday, January 28, 2010

Security never ends

1. IE under attack - http://bit.ly/at6VQu

2. SEO poisoning - http://bit.ly/boVLzs

3. A big hack - http://bit.ly/cLCRuf

4. Websense and Facebook - http://bit.ly/9Pmcaq

Wednesday, January 20, 2010

Job Opportunity

Job Requisition Number: 14669
Job Title: Request & Deployment Team Leader
Job Description:

DESCRIPTION / RESPONSIBILITIES:
This position is responsible for leading a team that will establish global processes and procedures for all IT service requests and PC deployments, and to ensure all sites globally are adhering to our established processes and procedures. Responsibilities of this position will include:
        management of a $1.5MM budget for the McPC project, which includes planning, procuring, configuring and deploying PCs that have reached end of life.
        working closely with the Global Innovative Technology team and the Global Solution Center team.
        making certain our established processes are in alignment with company strategies and standards.
        insuring continual process improvement in order to increase the internal operating efficiency of GBS and increase the productivity of the end user population.
        overall management of the Request and Deployment team, to include training, coaching, organizing, planning, and staffing operations. Plans and develops methods for replacing end user PCs that are about to reach end of life. Management of IT assets, business requests, coordination of resources and tasks required for completion of all request and deployment projects.
        developing new processes to improve world-wide efficiency in the management and deployment of the desktop environment.  Works through and leads cross-functional international teams to accomplish this objective.  Manages the yearly PC refresh project to ensure completion and quality is met.
        providing customer service and solutions to the business community, resolving customer requests relating to PC deployment and new GBS service requests while adhering to global IT standards guidelines.  Responsible for ensuring IT asset continuity.  Assists with Severity 1 & 2 coordination, working with the Global Solution Center Manager where appropriate.
        monitoring and communicating trends and requirements related to the business unit and IT. Manages the development and implementation of ITIL processes and procedures for all IT service requests to support business requirements.


QUALIFICATIONS:
        8+ years PC support, application support and project management experience required.
        Bachelors degree in Computer Science, Business Management or related field preferred.
        Experience managing direct reports preferred.
        Desktop MS Office, Windows XP, Lotus Notes, Peripheral Devices, Peregrine, Altiris Asset Management, remote inventory and data gathering methods required.
        PC Hardware working knowledge of PC and hardware components and peripherals and their associated compatibility and interchangeability required.
        Exemplary customer focus
        Strong leadership and interpersonal skills with proven ability to effectively lead, manage and motivate multiple teams on a global scale required. Prior experience successfully managing multiple levels within an organization, in an unpredictable and changing environment required.
        Strong experience in developing, documenting, implementing and continually improving processes required.
        In depth knowledge of ITIL Service Management framework required.
        Strong project management, organizational, and prioritization skills required.
        Demonstrated strong analytical, problem solving and decision making skills required.
        Ability to build relationships, interfaces with all levels of the organization, and think strategically required.
        Strong written and verbal communication skills required.
        Ability to travel internationally as needed required.
        Experience with budgeting, expense management and managing contracts required.


McCormick & Co., Inc., the world leader in the spice, flavor & seasonings industry, is seeking a full time Request & Deployment Team Leader in its Global Business Solutions Division located in Hunt Valley, MD.  As an employer recognized for our exceptional commitment to employees, McCormick & Co., Inc. offers a wide variety of benefits, programs and services which address the needs of employees and their families.  McCormicks benefits include, but are not limited to tuition assistance, medical & dental, disability, group life insurance, 401(k), pension plan, paid holidays and vacations.

NO RELOCATION ASSISTANCE WILL BE PROVIDED FOR THIS POSITION

PLEASE - NO THIRD PARTY RECRUITER INQUIRES.

This week's security posts

1. Why change to IE8 (another reason) - http://bit.ly/6lIehK

2. Encryption and the Israel connection - http://bit.ly/70tLz8

3. Border search - http://bit.ly/6us2KA

4. Another day, another breach - http://bit.ly/8XAJyY

5. Another disaster, another scam - http://bit.ly/889WvE

6. Famous hacks of the yesteryear - http://bit.ly/5P8Zd9

7. Another item, another bank breach - http://bit.ly/78k5sE

Quote of the day

"There is no limit to what you can do if you don't care who gets the credit" -Anonymous

Friday, January 15, 2010

The Money in Texting!

http://bit.ly/8svNCW

Quote of the day

"If you don't daydream and king of plan things out in your imagination you never get there.  So you have to start someplace" -Robert Duvall

Thursday, January 7, 2010

This week's security posts

1. Cell phone encryption - http://bit.ly/88RbJ6

2. Synagogue website hacks - http://bit.ly/6tQFmH

3. Another perspective on Predator interception - http://bit.ly/4TeVp2

4. Phillipines DSWD website defaced - http://bit.ly/7aYQjw

5. FBI estimates cost of "Rogue" Virus - http://bit.ly/8lfnOo

6. News in the hacking-proof of captcha - http://bit.ly/5pmuBd