1. Facebook revises bug policy - http://bit.ly/g8IcDn
2. Sightseeing firm breach - http://bit.ly/hHbdgy
3. Internal Gawker memo - http://bit.ly/fV4Teo
4. Group publishes database of private embedded SSL keys - http://bit.ly/eFJzVG
Monday, December 27, 2010
Tuesday, December 21, 2010
Thursday, December 16, 2010
This week's security briefing
1. Massive Gawker password heist - http://bit.ly/fzJ7n8
2. Malicious ads served up - http://bit.ly/fR5v2W
3. Facebook's Hackers Cup - http://bit.ly/e7Wgyz
4. Fake Amazon receipt generator - http://bit.ly/evJxLJ
5. MS tool for detecting Java malware - http://bit.ly/fBHN6z
6. The problem with bug counts - http://bit.ly/icHGtg
7. Fake angry bird app as example of Smartphone app vulnerability - http://bit.ly/hYlu2m
8. Lessons of Gawker hack - especially the last one - http://bit.ly/iaCmJQ
2. Malicious ads served up - http://bit.ly/fR5v2W
3. Facebook's Hackers Cup - http://bit.ly/e7Wgyz
4. Fake Amazon receipt generator - http://bit.ly/evJxLJ
5. MS tool for detecting Java malware - http://bit.ly/fBHN6z
6. The problem with bug counts - http://bit.ly/icHGtg
7. Fake angry bird app as example of Smartphone app vulnerability - http://bit.ly/hYlu2m
8. Lessons of Gawker hack - especially the last one - http://bit.ly/iaCmJQ
Tuesday, December 14, 2010
Monday, December 13, 2010
Tuesday, November 23, 2010
Wednesday, November 17, 2010
Business Intelligence - always a challenge
Great article on BI success: http://usat.ly/aUdAkj
Also Gartner recent piece summarized by their executive summary:
Harnessing information to provide intelligent insight to improve business performance is a major challenge. CIOs can provide leadership by developing a cross-enterprise perspective of information and processes supported by technology.
Key Findings
Information required for effective decisions comes from many diverse sources.
Too much information can be as bad as too little information.
Intelligent business develops by linking process and information integration with business strategies.
Recommendations
Focus business intelligence (BI) efforts on delivering the right information to the right people at the right time to impact critical business decisions in key business processes.
Change the mind-set from one that simply demands more information to one in which asking the right questions drives impactful decisions.
Create project teams based not on data ownership but on information needs up and down the management chains and across functions to drive maximum decision impact.
Also Gartner recent piece summarized by their executive summary:
Harnessing information to provide intelligent insight to improve business performance is a major challenge. CIOs can provide leadership by developing a cross-enterprise perspective of information and processes supported by technology.
Key Findings
Information required for effective decisions comes from many diverse sources.
Too much information can be as bad as too little information.
Intelligent business develops by linking process and information integration with business strategies.
Recommendations
Focus business intelligence (BI) efforts on delivering the right information to the right people at the right time to impact critical business decisions in key business processes.
Change the mind-set from one that simply demands more information to one in which asking the right questions drives impactful decisions.
Create project teams based not on data ownership but on information needs up and down the management chains and across functions to drive maximum decision impact.
Wednesday, November 10, 2010
This week's security briefing
1. Crowdsourcing surveillance - http://bit.ly/9eoiIG
2. Android browser exploit - http://bit.ly/cQ3Ev2
3. Uncovering covert command and control in the cloud and legacy integration - http://bit.ly/de6ecq
4. Gaping holes in mobile Paypal (iphone) app - http://bit.ly/dxwqhs
2. Android browser exploit - http://bit.ly/cQ3Ev2
3. Uncovering covert command and control in the cloud and legacy integration - http://bit.ly/de6ecq
4. Gaping holes in mobile Paypal (iphone) app - http://bit.ly/dxwqhs
Wednesday, November 3, 2010
Tuesday, November 2, 2010
This week's security briefing
1. Adobe X: new UI - http://bit.ly/9rko45
2. New HTTP exploit with agentless bots - http://bit.ly/bRfpUT
3. Mobile problems beyond malicious apps - http://bit.ly/aT9WIO
4. Global phishing survey Half 1 2010 - http://bit.ly/cfjbjs
5. Inside Google's anti-malware operation - http://bit.ly/aHdlwC
6. Firesheep: a Firefox plug in that allows you access to other's social network activity - http://bit.ly/cm5JAL
7. Class action lawsuits to protect online privacy - http://bit.ly/a2Ired
2. New HTTP exploit with agentless bots - http://bit.ly/bRfpUT
3. Mobile problems beyond malicious apps - http://bit.ly/aT9WIO
4. Global phishing survey Half 1 2010 - http://bit.ly/cfjbjs
5. Inside Google's anti-malware operation - http://bit.ly/aHdlwC
6. Firesheep: a Firefox plug in that allows you access to other's social network activity - http://bit.ly/cm5JAL
7. Class action lawsuits to protect online privacy - http://bit.ly/a2Ired
Thursday, October 21, 2010
This week's security briefing
1. Story of Slammer and Lessons - http://bit.ly/cD1TLm
2. The "Evercookie" especially on mobile devices - http://bit.ly/9uQrwj
3. Benefitting from SEO spam - http://bit.ly/aKCevW
2. The "Evercookie" especially on mobile devices - http://bit.ly/9uQrwj
3. Benefitting from SEO spam - http://bit.ly/aKCevW
Labels:
evercookie,
security,
SEO,
slammer
Monday, October 18, 2010
This week's security briefing
1. Big Windows patch - http://bit.ly/adwitU
2. Complaint filed about Google privacy policy - http://bit.ly/a2Yjyo
3. Gmail security checklist released - http://bit.ly/bNAPau
4. US has most bot infections - http://bit.ly/amYc04
5. Google debuts phishing alert service - http://bit.ly/bJo6Hk
2. Complaint filed about Google privacy policy - http://bit.ly/a2Yjyo
3. Gmail security checklist released - http://bit.ly/bNAPau
4. US has most bot infections - http://bit.ly/amYc04
5. Google debuts phishing alert service - http://bit.ly/bJo6Hk
Friday, October 8, 2010
Wednesday, October 6, 2010
This week's security briefing
1. Adobe update - http://bit.ly/9I4fgL
2. Video of remote jacking an ATM - http://bit.ly/a5fHKb
3. Protecting GMAIL account after a hack - http://bit.ly/cFwXl0
4. VOIP abuse attacks - http://bit.ly/bBFKxo
2. Video of remote jacking an ATM - http://bit.ly/a5fHKb
3. Protecting GMAIL account after a hack - http://bit.ly/cFwXl0
4. VOIP abuse attacks - http://bit.ly/bBFKxo
Monday, September 27, 2010
This week's security briefing
1. Google adds second form authentication - http://bit.ly/cjmu1j
2. Twitter hacked and fixed - http://bit.ly/b8AnMo
3. Google complains and IBM revises report - http://bit.ly/byCVvB
4. Web tracking code prompts lawsuit - http://nyti.ms/dB7IeW
5. Why you should worry about what is on your smartphone - http://bit.ly/9BPXJN
6. Facebook app pumps out mobile spam - http://bit.ly/d7Rs6C
7. New email worm - http://bit.ly/9k5RPc
8. Hotel operator has data breach - http://bit.ly/9SgBAS
9. US Cert riddled with vulnerabilities - http://bit.ly/bdK6aG
10. More than 1M websites serving up malware in Q2 - http://bit.ly/9hMN7r
11. Security concerns for HTML 5 - http://bit.ly/9oWCfb
12. Intel confirms HDCP copy protection hacked - http://bit.ly/bbhnxM
13. University breaches are staggering; lessons learned - http://bit.ly/dvGWMP
14. Senate considers national data breach legislation - http://bit.ly/a0Gfee
15. Twitter hit by another worm attack - http://bit.ly/dormpB
16. New type of whitelist; invitation only for domains - http://bit.ly/bi8YUw
2. Twitter hacked and fixed - http://bit.ly/b8AnMo
3. Google complains and IBM revises report - http://bit.ly/byCVvB
4. Web tracking code prompts lawsuit - http://nyti.ms/dB7IeW
5. Why you should worry about what is on your smartphone - http://bit.ly/9BPXJN
6. Facebook app pumps out mobile spam - http://bit.ly/d7Rs6C
7. New email worm - http://bit.ly/9k5RPc
8. Hotel operator has data breach - http://bit.ly/9SgBAS
9. US Cert riddled with vulnerabilities - http://bit.ly/bdK6aG
10. More than 1M websites serving up malware in Q2 - http://bit.ly/9hMN7r
11. Security concerns for HTML 5 - http://bit.ly/9oWCfb
12. Intel confirms HDCP copy protection hacked - http://bit.ly/bbhnxM
13. University breaches are staggering; lessons learned - http://bit.ly/dvGWMP
14. Senate considers national data breach legislation - http://bit.ly/a0Gfee
15. Twitter hit by another worm attack - http://bit.ly/dormpB
16. New type of whitelist; invitation only for domains - http://bit.ly/bi8YUw
Monday, August 30, 2010
Weekly security post
1. HTTP Strict Transport Security in Firefox 4 - http://bit.ly/cou1FC
2. DLL Hijacking Fact and Fiction - http://bit.ly/cbFGNm
3. Short passwords are they safe? - http://bit.ly/bwXuyI
4. Wicked widget hacks Network Solutions - http://bit.ly/baFnjk
5. Smudge password attacks on Droids - http://zd.net/agQg2D
6. Smart phones and attackers - http://bit.ly/byVLe9
7. Location based services raise risk - http://bit.ly/bB6LyJ
2. DLL Hijacking Fact and Fiction - http://bit.ly/cbFGNm
3. Short passwords are they safe? - http://bit.ly/bwXuyI
4. Wicked widget hacks Network Solutions - http://bit.ly/baFnjk
5. Smudge password attacks on Droids - http://zd.net/agQg2D
6. Smart phones and attackers - http://bit.ly/byVLe9
7. Location based services raise risk - http://bit.ly/bB6LyJ
Friday, August 13, 2010
This week's security briefing
1. Silent update for Firefox - http://bit.ly/cT4jlL
2. Black hat video stream hacked - http://bit.ly/9WGTZ7
3. Safari bug used to jailbreak iPhones - http://bit.ly/b7SvD7
4. More password research - http://bit.ly/cnred5
5. Browser privacy mode not so private - http://bit.ly/bIJxSA
6. Safari locked backed down - http://bit.ly/axQRTj
2. Black hat video stream hacked - http://bit.ly/9WGTZ7
3. Safari bug used to jailbreak iPhones - http://bit.ly/b7SvD7
4. More password research - http://bit.ly/cnred5
5. Browser privacy mode not so private - http://bit.ly/bIJxSA
6. Safari locked backed down - http://bit.ly/axQRTj
Friday, August 6, 2010
Bad Communication - Example by a vendor
I actually received the following as shocking as it sounds after not getting any response from a delivery vendor and then after months of frustration posting a tweet about the vendor.
Your twitter message is very cute. In spite of what you might think, we have a thriving business with hundreds of satisfied customers that have dealt with us for many years.
In explanation as to why you have not gotten a phone call back, on several occasions I told XXX that XXX was not interested in servicing your equipment or placing it under a service contract. That in no way means that your equipment cannot be supported. XXX has many other dealers and support personnel that can best address your needs. I have forwarded XXX's contact information directly to XXX on several occasions.
XXX was simply a contracted, installing agent for the company you purchased the equipment from. Our only obligation was to satisfy the 90-day warranty period, which we did.
Being that this matter has been forwarded to XXX for follow-up on many occasions, I did not feel it was necessary to commit any more time or energy related to your attempts for service and support on this equipment. I also happen to know that XXX has all of XXX's representative's contact information. Perhaps your "tweets" should be directed at XXX or the company you purchased the equipment from, and not a personal attack on me. If your "tweet" was a way to get a response from me, now you have it. I would appreciate it if you would refrain from contacting me or XXX in the future. In addition, it would be sincerely appreciated if your slanderous "tweets" ceased as well. You should contact the company you purchased the equipment from, or XXX directly.
Your twitter message is very cute. In spite of what you might think, we have a thriving business with hundreds of satisfied customers that have dealt with us for many years.
In explanation as to why you have not gotten a phone call back, on several occasions I told XXX that XXX was not interested in servicing your equipment or placing it under a service contract. That in no way means that your equipment cannot be supported. XXX has many other dealers and support personnel that can best address your needs. I have forwarded XXX's contact information directly to XXX on several occasions.
XXX was simply a contracted, installing agent for the company you purchased the equipment from. Our only obligation was to satisfy the 90-day warranty period, which we did.
Being that this matter has been forwarded to XXX for follow-up on many occasions, I did not feel it was necessary to commit any more time or energy related to your attempts for service and support on this equipment. I also happen to know that XXX has all of XXX's representative's contact information. Perhaps your "tweets" should be directed at XXX or the company you purchased the equipment from, and not a personal attack on me. If your "tweet" was a way to get a response from me, now you have it. I would appreciate it if you would refrain from contacting me or XXX in the future. In addition, it would be sincerely appreciated if your slanderous "tweets" ceased as well. You should contact the company you purchased the equipment from, or XXX directly.
Labels:
bad communication,
bad sales,
bad service
Thursday, August 5, 2010
Business Object OnDemand
Our experience -- http://bit.ly/cBTQuS
Labels:
BO OnDemand,
Business intelligence,
Business Objects
Thursday, July 29, 2010
This week's security posts
1. Massive Safari patch - http://bit.ly/91LEFR
2. Cost of Cybercrime Study - http://bit.ly/bQSnOX
3. Double Whammy Stealth Attacks - http://bit.ly/dl0vh0
4. WOW Phishing - http://bit.ly/bPYcNA
5. Stars info hacked in Hells Pizza - http://bit.ly/9uenCs
6. NASA Twitter account hacked - http://yhoo.it/afoiiz
7. 100 bug fixes for PHP - http://bit.ly/9Sh9q6
8. Details of 100m Facebook users collected published - http://bit.ly/crV9d8
9. Dell ships server with infected motherboard - http://bit.ly/deHmIv
10. Malicious Amazon email - http://bit.ly/9CHtBT
11. Skype (1 of) the crypto reverse engineered - http://bit.ly/92VScg
2. Cost of Cybercrime Study - http://bit.ly/bQSnOX
3. Double Whammy Stealth Attacks - http://bit.ly/dl0vh0
4. WOW Phishing - http://bit.ly/bPYcNA
5. Stars info hacked in Hells Pizza - http://bit.ly/9uenCs
6. NASA Twitter account hacked - http://yhoo.it/afoiiz
7. 100 bug fixes for PHP - http://bit.ly/9Sh9q6
8. Details of 100m Facebook users collected published - http://bit.ly/crV9d8
9. Dell ships server with infected motherboard - http://bit.ly/deHmIv
10. Malicious Amazon email - http://bit.ly/9CHtBT
11. Skype (1 of) the crypto reverse engineered - http://bit.ly/92VScg
Thursday, July 15, 2010
Monday, July 12, 2010
Thursday, July 8, 2010
This week's security posts
1. We all know someone who has received this scam email - http://bit.ly/9kiBUl
2. Hack to allow Flash to run on the iPad - http://bit.ly/cm1QNz
3. Competency of hackers falls - http://bit.ly/aUFyI4
4. FEMA does not do financial data security well - http://bit.ly/9gsqib
5. 3D CAPTCHA - http://bit.ly/clNDGz
6. Write down your password - http://bit.ly/aZERrV
7. UH breach exposes 53,000 - http://bit.ly/9xzWeV
8. Hack of former employer gets 12 months in jail - http://bit.ly/9DsL1D
9. Android is under Big Brother control of apps - http://bit.ly/aFJkUV
2. Hack to allow Flash to run on the iPad - http://bit.ly/cm1QNz
3. Competency of hackers falls - http://bit.ly/aUFyI4
4. FEMA does not do financial data security well - http://bit.ly/9gsqib
5. 3D CAPTCHA - http://bit.ly/clNDGz
6. Write down your password - http://bit.ly/aZERrV
7. UH breach exposes 53,000 - http://bit.ly/9xzWeV
8. Hack of former employer gets 12 months in jail - http://bit.ly/9DsL1D
9. Android is under Big Brother control of apps - http://bit.ly/aFJkUV
Sunday, June 27, 2010
Security Weekly Update
1. Infection saturation study - http://bit.ly/cEkUXU
2. Telephone DOS - http://bit.ly/aPTXZb
3. NSS study finds AV are slow to identify new servers - http://bit.ly/aFyQyn
4. MS sues spammer - http://bit.ly/aPtIQC
2. Telephone DOS - http://bit.ly/aPTXZb
3. NSS study finds AV are slow to identify new servers - http://bit.ly/aFyQyn
4. MS sues spammer - http://bit.ly/aPtIQC
Wednesday, June 23, 2010
MARC - the commuter train in Maryland is out of control
MARC has no accountability to its customers / passengers. It is particularly aggregous when we when train 538 broke down and we were forced to sit for over 90 minutes in very hot temperatures in a crowded train that had temperatures of over 110 degrees with no ventilation. All the passengers who were healthy enough to avoid visits to the hospital received was an apology. Took me more than 4 hours to get home on Monday June 21, 2010.
Monday, June 21, 2010
This week's security posts
1. Threatens Biden using neigbor's wifi - http://bit.ly/9I2Dr1
2. ATT Ipad breach analysis - http://bit.ly/9MSWxI
3. HTTPS Firefox extension - http://bit.ly/bJVFpH
4. Phone phishing on the uptick - http://bit.ly/aIkHwi
5. Windows Help Center issue - http://bit.ly/bWpMZp
6. AV Testing standards - http://bit.ly/92DgAA
7. Microsoft and the stealth download - http://bit.ly/b78wLv
8. DHS and Active Directory found unsafe - http://bit.ly/a44UuE
9. Hackers use the word "ethical" in describing iPad hack - http://bit.ly/cCL709
10. Cameras ship with worm - http://bit.ly/cdfSI1
Wednesday, June 9, 2010
More security stuff
1. Adobe under attack - Flash exploit - http://bit.ly/bXDBno
2. Password research - http://bit.ly/bUj1Zc
3. Open Source is more vulnerable - http://bit.ly/az7jb6
4. Adobe acknowledges that it is in the sights of hackers - http://bit.ly/cGGw0Y
5. Israel websites under attack - http://bit.ly/byoekK
6. FTC steps in for Keylogger software and its marketing - http://bit.ly/9A9sFP
2. Password research - http://bit.ly/bUj1Zc
3. Open Source is more vulnerable - http://bit.ly/az7jb6
4. Adobe acknowledges that it is in the sights of hackers - http://bit.ly/cGGw0Y
5. Israel websites under attack - http://bit.ly/byoekK
6. FTC steps in for Keylogger software and its marketing - http://bit.ly/9A9sFP
Tuesday, June 8, 2010
Monday, June 7, 2010
Friday, June 4, 2010
Wednesday, June 2, 2010
This week's security posts
1. Attempted hack of JPost website - http://bit.ly/9stzWS
2. Google bans MS OS at HQ - http://bit.ly/dCf761
3. Hacking of vehicle fleets - http://bit.ly/9LpPMA
4. SMS Blockers - http://bit.ly/db0uw3
5. MS responds to Google - http://bit.ly/9oWivr
6. Bots are getting beyond CAPTCHAs - http://bit.ly/9J0IA5
7. Passwords and ATM hijacking - http://bit.ly/bbFLQ4
8. Google Beta encrypted search - http://bit.ly/cHGELJ
9. In case you missed it - Symantec bought Verisign - http://bit.ly/9HXLO7
10. BP Twitter account hijacked - http://bit.ly/a7k0DR
2. Google bans MS OS at HQ - http://bit.ly/dCf761
3. Hacking of vehicle fleets - http://bit.ly/9LpPMA
4. SMS Blockers - http://bit.ly/db0uw3
5. MS responds to Google - http://bit.ly/9oWivr
6. Bots are getting beyond CAPTCHAs - http://bit.ly/9J0IA5
7. Passwords and ATM hijacking - http://bit.ly/bbFLQ4
8. Google Beta encrypted search - http://bit.ly/cHGELJ
9. In case you missed it - Symantec bought Verisign - http://bit.ly/9HXLO7
10. BP Twitter account hijacked - http://bit.ly/a7k0DR
Thursday, May 27, 2010
Tuesday, May 25, 2010
This week's security posts
1. Facebook worm - http://bit.ly/9Hy4VO
2. Forensic tool for smart phones - http://bit.ly/bhM9ON
3. Windows 7 problem - http://bit.ly/abUU86
4. Malvertisement study - http://bit.ly/coZXf4
5. Lifelock CEO Identity stolen 13 times - http://bit.ly/deQtYA
6. USB Threat - http://bit.ly/cDYY4S
7. Virus rumors - http://bit.ly/aCcmSf
8. Hacking an auto - http://bit.ly/bpYE6r
9. Twitter accounts on sale - cheap - http://bit.ly/9k1xS2
2. Forensic tool for smart phones - http://bit.ly/bhM9ON
3. Windows 7 problem - http://bit.ly/abUU86
4. Malvertisement study - http://bit.ly/coZXf4
5. Lifelock CEO Identity stolen 13 times - http://bit.ly/deQtYA
6. USB Threat - http://bit.ly/cDYY4S
7. Virus rumors - http://bit.ly/aCcmSf
8. Hacking an auto - http://bit.ly/bpYE6r
9. Twitter accounts on sale - cheap - http://bit.ly/9k1xS2
Wednesday, May 12, 2010
Tuesday, May 11, 2010
Wednesday, May 5, 2010
More security stuff
1. Dept of Treasury websites infected - http://bit.ly/aurWqm
2. Facebook IDs for sale - http://bit.ly/9fnhmZ
3. Young people more susceptible to phishing - http://bit.ly/ce5awY
4. US largest spammer - http://bit.ly/bX40LS
5. Adobe PDF - the gift that keeps giving - http://bit.ly/c7Q0NB
6. Facebook Live Chat hole - http://bit.ly/cURAQ1
2. Facebook IDs for sale - http://bit.ly/9fnhmZ
3. Young people more susceptible to phishing - http://bit.ly/ce5awY
4. US largest spammer - http://bit.ly/bX40LS
5. Adobe PDF - the gift that keeps giving - http://bit.ly/c7Q0NB
6. Facebook Live Chat hole - http://bit.ly/cURAQ1
Monday, May 3, 2010
New security topic links to visit
1. Trojan disguised as Facebook toolbar - http://bit.ly/d1E9Ev
2. Accused botnet operators sought jobs at antivirus publisher - http://bit.ly/bEHuNQ
2. Accused botnet operators sought jobs at antivirus publisher - http://bit.ly/bEHuNQ
Friday, April 30, 2010
More security stuff
1. Apple Security efforts - http://bit.ly/bYTa9Z
2. Adobe threats - http://bit.ly/9Dhktk
3. Do businesses understand security - http://bit.ly/bCgWPw
4. More on the McAfee debacle -http://bit.ly/di8swL
2. Adobe threats - http://bit.ly/9Dhktk
3. Do businesses understand security - http://bit.ly/bCgWPw
4. More on the McAfee debacle -http://bit.ly/di8swL
Monday, April 26, 2010
This week's security posts
1. Java Zero Day Exploit - http://bit.ly/bUSsPo
2. Botnet exploits PDF flaw - http://bit.ly/9uYgNC
3. Facebook IDs for sale - http://bit.ly/bqCV1C
4. UK's NHS - http://bit.ly/apeqaW
5. Using PAC files to force phising - http://bit.ly/cTtzLt
6. High Risk holes in Chrome plugged - http://bit.ly/9MLpf8
7. Scary - Gmail Hijacking - http://bit.ly/cxAzSp
8. IT concerns about government security - http://bit.ly/cFAgOq
9. Blippy exposure of credit cards - http://bit.ly/dCuz2G
10. Captcha decoding outsourced - http://nyti.ms/b2OvSI
11. McAfee sued for pop-ups - http://bit.ly/cISvdT
12. Clean PDFs with a payload - http://bit.ly/bk6BCt
2. Botnet exploits PDF flaw - http://bit.ly/9uYgNC
3. Facebook IDs for sale - http://bit.ly/bqCV1C
4. UK's NHS - http://bit.ly/apeqaW
5. Using PAC files to force phising - http://bit.ly/cTtzLt
6. High Risk holes in Chrome plugged - http://bit.ly/9MLpf8
7. Scary - Gmail Hijacking - http://bit.ly/cxAzSp
8. IT concerns about government security - http://bit.ly/cFAgOq
9. Blippy exposure of credit cards - http://bit.ly/dCuz2G
10. Captcha decoding outsourced - http://nyti.ms/b2OvSI
11. McAfee sued for pop-ups - http://bit.ly/cISvdT
12. Clean PDFs with a payload - http://bit.ly/bk6BCt
Tuesday, April 20, 2010
Wednesday, April 14, 2010
This week's security posts
1. Unknown root authority for Mozilla - http://bit.ly/96bj7b
2. Java problems - http://bit.ly/brxJYt
3. Adobe Auto-updater - http://bit.ly/9k3CJw
4. Wordpress Hack - http://bit.ly/bjDY8i
5. Twitter ads - http://bit.ly/9LkCrz
6. MS Blue Screen of Death - http://bit.ly/cOWDDu
7. Brokerage pays up - http://bit.ly/9c5Ei6
2. Java problems - http://bit.ly/brxJYt
3. Adobe Auto-updater - http://bit.ly/9k3CJw
4. Wordpress Hack - http://bit.ly/bjDY8i
5. Twitter ads - http://bit.ly/9LkCrz
6. MS Blue Screen of Death - http://bit.ly/cOWDDu
7. Brokerage pays up - http://bit.ly/9c5Ei6
Wednesday, April 7, 2010
Friday, April 2, 2010
Thursday, April 1, 2010
This week's security posts
1. PDF new threats - http://bit.ly/cvcSl9
2. Seach poisoning - http://bit.ly/d8Y9fd
3. And who says Macs are not vulnerable? - http://bit.ly/dgyKXx
4. Another day - another mass loss of PII - http://bit.ly/bTn8KN
5. Crime and punishment - http://bit.ly/bKjbDy
6. Spam and human behavior - http://bit.ly/cPqjst
7. Interesting article on hosting of rogues - http://bit.ly/cqylaG
8. Weak passwords - http://bit.ly/cPXSvz
9. Network card exploit - http://bit.ly/aqfCsX
10. Obama Twitter hacker underlines the reason too much personal info on social media is an exploit - http://bit.ly/bZHrrO
11. 50 Riskiest Cities for Cybercrime in America (DC is 3) - http://bit.ly/9bQKOn
12. Scary IRS state of security - http://bit.ly/acyEpa
13. Twitter phising scam - http://bit.ly/9W5f4X
14. Guessing friends Facebook passwords - http://bit.ly/b0xlJ6
15. Interview with Fired PA CISO - http://bit.ly/cs55T6
2. Seach poisoning - http://bit.ly/d8Y9fd
3. And who says Macs are not vulnerable? - http://bit.ly/dgyKXx
4. Another day - another mass loss of PII - http://bit.ly/bTn8KN
5. Crime and punishment - http://bit.ly/bKjbDy
6. Spam and human behavior - http://bit.ly/cPqjst
7. Interesting article on hosting of rogues - http://bit.ly/cqylaG
8. Weak passwords - http://bit.ly/cPXSvz
9. Network card exploit - http://bit.ly/aqfCsX
10. Obama Twitter hacker underlines the reason too much personal info on social media is an exploit - http://bit.ly/bZHrrO
11. 50 Riskiest Cities for Cybercrime in America (DC is 3) - http://bit.ly/9bQKOn
12. Scary IRS state of security - http://bit.ly/acyEpa
13. Twitter phising scam - http://bit.ly/9W5f4X
14. Guessing friends Facebook passwords - http://bit.ly/b0xlJ6
15. Interview with Fired PA CISO - http://bit.ly/cs55T6
Thursday, March 25, 2010
Thursday, March 18, 2010
Tuesday, March 16, 2010
Quote of the day
"The ratio of We's to I's is the best indicator of the development of a team. "
~ Lewis B. Ergen
Monday, March 15, 2010
Friday, March 12, 2010
Wednesday, March 10, 2010
Gartner Portals et al Conference
Attended one day of the conference and learned a few interesting things:
1. The commoditization of video has made video very powerful. Production value not so important. Instead length is (2-3 minutes). The microvideo is in!
2. Enterprise Search does not effectively create organizational knowledge.
3. Social software is an example of the mantra - the right tool for the task. people have the freshest stuff in their brain, not written up somewhere.
4. How do people trust each other? What impact does this have on social software? Trust is about sourcing and assumption of accuracy.
5. Why use video?
a. Empathy
b. Credibility
c. Enhance or Affect Mood
d. Engaging interest
1. The commoditization of video has made video very powerful. Production value not so important. Instead length is (2-3 minutes). The microvideo is in!
2. Enterprise Search does not effectively create organizational knowledge.
3. Social software is an example of the mantra - the right tool for the task. people have the freshest stuff in their brain, not written up somewhere.
4. How do people trust each other? What impact does this have on social software? Trust is about sourcing and assumption of accuracy.
5. Why use video?
a. Empathy
b. Credibility
c. Enhance or Affect Mood
d. Engaging interest
Security never ends
1. Social security numbers exposed - http://bit.ly/a8y1ET
2. FDIC fraud report - http://bit.ly/aMd0Mp
3. Energizer Bunny - http://bit.ly/axwEli
4. NY Times connection - http://bit.ly/cBr1a8
2. FDIC fraud report - http://bit.ly/aMd0Mp
3. Energizer Bunny - http://bit.ly/axwEli
4. NY Times connection - http://bit.ly/cBr1a8
Monday, March 8, 2010
Quote of the day
“The nice thing about teamwork is that you always have others on your side”
Friday, March 5, 2010
New inspirational quote for today
"You become successful by helping others become successful"
-Anonymous
-Anonymous
Monday, March 1, 2010
Friday, February 26, 2010
Quote of the day
"There are precious few Einstein's among us. Most brilliance arises from ordinary people working together in extraordinary ways"
-Roger Van Oech
-Roger Van Oech
Wednesday, February 24, 2010
This week's security posts
1. Smartphones - http://bit.ly/c2QNT5
2. Maybe Apple is not so consumer oriented - http://bit.ly/d9Fglb
3. Google Buzz and spammers - http://bit.ly/ahqq5C
4. Twitter app hacked to send spam - http://bit.ly/beCA2G
5. Daily spam volume - http://bit.ly/dktame
6. The Botnet epidemic - http://bit.ly/8X8370
7. The Kneber Botnet threat - http://nyti.ms/ahavIV
8. Olympics and SEO poisoning - http://bit.ly/9R1waB
2. Maybe Apple is not so consumer oriented - http://bit.ly/d9Fglb
3. Google Buzz and spammers - http://bit.ly/ahqq5C
4. Twitter app hacked to send spam - http://bit.ly/beCA2G
5. Daily spam volume - http://bit.ly/dktame
6. The Botnet epidemic - http://bit.ly/8X8370
7. The Kneber Botnet threat - http://nyti.ms/ahavIV
8. Olympics and SEO poisoning - http://bit.ly/9R1waB
New inspirational quote for today
"There is no limit to what you can do if you don't care who gets the credit"
-Anonymous
-Anonymous
Thursday, February 18, 2010
New inspirational quote for today
The strength of the team is each individual member...the strength of each member is the team.
- Coach Phil Jackson Chicago Bulls
Wednesday, February 17, 2010
Tuesday, February 16, 2010
Friday, February 12, 2010
Thursday, February 11, 2010
Quote of the day
A snowflake is one of God's most fragile creations, but look what they can do when they stick together! ~Author Unknown
Wednesday, February 10, 2010
This week's security posts
With the snow falling, more things to worry about / address:
1. GPS finds body - http://bit.ly/d6DekH
2. Office and Phishing - http://bit.ly/b2GlNw
3. Executive concern - http://nyti.ms/cr7sqf
4. Firefox malware - http://bit.ly/d2H8S4
5. Skype security - http://bit.ly/atNHgj
6. Social networking attacks - http://bit.ly/90J8ph
7. Mobile banking - http://bit.ly/9UaU0k
8. Microsoft patches targeted - http://bit.ly/9ymQII
9. Today is Safer Internet Day - http://bit.ly/9FcJAE
10. Google contracts with NSA to analyze hack - http://bit.ly/ac2Doy
11. Carbon credit phishing - http://bit.ly/cFvGgL
12. Laptop Encryption - Case Study - http://bit.ly/aXY4eY
13. IE Flaw - http://bit.ly/9mUmic
14. WiFi attackers poison browsers - gives pause using public wifi - http://bit.ly/b5leKf
15. Blackberry spyware - http://bit.ly/dr3ScH
16. Builds confidence in .gov and .mil websites - http://bit.ly/acI9Zb
17. MiFi hack - http://bit.ly/azfffm
18. Twitter password phishing - http://bit.ly/cIhwsM
1. GPS finds body - http://bit.ly/d6DekH
2. Office and Phishing - http://bit.ly/b2GlNw
3. Executive concern - http://nyti.ms/cr7sqf
4. Firefox malware - http://bit.ly/d2H8S4
5. Skype security - http://bit.ly/atNHgj
6. Social networking attacks - http://bit.ly/90J8ph
7. Mobile banking - http://bit.ly/9UaU0k
8. Microsoft patches targeted - http://bit.ly/9ymQII
9. Today is Safer Internet Day - http://bit.ly/9FcJAE
10. Google contracts with NSA to analyze hack - http://bit.ly/ac2Doy
11. Carbon credit phishing - http://bit.ly/cFvGgL
12. Laptop Encryption - Case Study - http://bit.ly/aXY4eY
13. IE Flaw - http://bit.ly/9mUmic
14. WiFi attackers poison browsers - gives pause using public wifi - http://bit.ly/b5leKf
15. Blackberry spyware - http://bit.ly/dr3ScH
16. Builds confidence in .gov and .mil websites - http://bit.ly/acI9Zb
17. MiFi hack - http://bit.ly/azfffm
18. Twitter password phishing - http://bit.ly/cIhwsM
Tuesday, February 9, 2010
Friday, February 5, 2010
Thursday, January 28, 2010
Security never ends
1. IE under attack - http://bit.ly/at6VQu
2. SEO poisoning - http://bit.ly/boVLzs
3. A big hack - http://bit.ly/cLCRuf
4. Websense and Facebook - http://bit.ly/9Pmcaq
2. SEO poisoning - http://bit.ly/boVLzs
3. A big hack - http://bit.ly/cLCRuf
4. Websense and Facebook - http://bit.ly/9Pmcaq
Monday, January 25, 2010
Wednesday, January 20, 2010
Job Opportunity
Job Requisition Number: 14669
Job Title: Request & Deployment Team Leader
Job Description:
DESCRIPTION / RESPONSIBILITIES:
This position is responsible for leading a team that will establish global processes and procedures for all IT service requests and PC deployments, and to ensure all sites globally are adhering to our established processes and procedures. Responsibilities of this position will include:
� management of a $1.5MM budget for the �McPC� project, which includes planning, procuring, configuring and deploying PCs that have reached end of life.
� working closely with the Global Innovative Technology team and the Global Solution Center team.
� making certain our established processes are in alignment with company strategies and standards.
� insuring continual process improvement in order to increase the internal operating efficiency of GBS and increase the productivity of the end user population.
� overall management of the Request and Deployment team, to include training, coaching, organizing, planning, and staffing operations. Plans and develops methods for replacing end user PC�s that are about to reach end of life. Management of IT assets, business requests, coordination of resources and tasks required for completion of all request and deployment projects.
� developing new processes to improve world-wide efficiency in the management and deployment of the desktop environment. Works through and leads cross-functional international teams to accomplish this objective. Manages the yearly PC refresh project to ensure completion and quality is met.
� providing customer service and solutions to the business community, resolving customer requests relating to PC deployment and new GBS service requests while adhering to global IT standards guidelines. Responsible for ensuring IT asset continuity. Assists with Severity 1 & 2 coordination, working with the Global Solution Center Manager where appropriate.
� monitoring and communicating trends and requirements related to the business unit and IT. Manages the development and implementation of ITIL processes and procedures for all IT service requests to support business requirements.
QUALIFICATIONS:
� 8+ years PC support, application support and project management experience required.
� Bachelor�s degree in Computer Science, Business Management or related field preferred.
� Experience managing direct reports preferred.
� Desktop � MS Office, Windows XP, Lotus Notes, Peripheral Devices, Peregrine, Altiris Asset Management, remote inventory and data gathering methods required.
� PC Hardware � working knowledge of PC and hardware components and peripherals and their associated compatibility and interchangeability required.
� Exemplary customer focus
� Strong leadership and interpersonal skills with proven ability to effectively lead, manage and motivate multiple teams on a global scale required. Prior experience successfully managing multiple levels within an organization, in an unpredictable and changing environment required.
� Strong experience in developing, documenting, implementing and continually improving processes required.
� In depth knowledge of ITIL Service Management framework required.
� Strong project management, organizational, and prioritization skills required.
� Demonstrated strong analytical, problem solving and decision making skills required.
� Ability to build relationships, interfaces with all levels of the organization, and think strategically required.
� Strong written and verbal communication skills required.
� Ability to travel internationally as needed required.
� Experience with budgeting, expense management and managing contracts required.
Job Title: Request & Deployment Team Leader
Job Description:
DESCRIPTION / RESPONSIBILITIES:
This position is responsible for leading a team that will establish global processes and procedures for all IT service requests and PC deployments, and to ensure all sites globally are adhering to our established processes and procedures. Responsibilities of this position will include:
� management of a $1.5MM budget for the �McPC� project, which includes planning, procuring, configuring and deploying PCs that have reached end of life.
� working closely with the Global Innovative Technology team and the Global Solution Center team.
� making certain our established processes are in alignment with company strategies and standards.
� insuring continual process improvement in order to increase the internal operating efficiency of GBS and increase the productivity of the end user population.
� overall management of the Request and Deployment team, to include training, coaching, organizing, planning, and staffing operations. Plans and develops methods for replacing end user PC�s that are about to reach end of life. Management of IT assets, business requests, coordination of resources and tasks required for completion of all request and deployment projects.
� developing new processes to improve world-wide efficiency in the management and deployment of the desktop environment. Works through and leads cross-functional international teams to accomplish this objective. Manages the yearly PC refresh project to ensure completion and quality is met.
� providing customer service and solutions to the business community, resolving customer requests relating to PC deployment and new GBS service requests while adhering to global IT standards guidelines. Responsible for ensuring IT asset continuity. Assists with Severity 1 & 2 coordination, working with the Global Solution Center Manager where appropriate.
� monitoring and communicating trends and requirements related to the business unit and IT. Manages the development and implementation of ITIL processes and procedures for all IT service requests to support business requirements.
QUALIFICATIONS:
� 8+ years PC support, application support and project management experience required.
� Bachelor�s degree in Computer Science, Business Management or related field preferred.
� Experience managing direct reports preferred.
� Desktop � MS Office, Windows XP, Lotus Notes, Peripheral Devices, Peregrine, Altiris Asset Management, remote inventory and data gathering methods required.
� PC Hardware � working knowledge of PC and hardware components and peripherals and their associated compatibility and interchangeability required.
� Exemplary customer focus
� Strong leadership and interpersonal skills with proven ability to effectively lead, manage and motivate multiple teams on a global scale required. Prior experience successfully managing multiple levels within an organization, in an unpredictable and changing environment required.
� Strong experience in developing, documenting, implementing and continually improving processes required.
� In depth knowledge of ITIL Service Management framework required.
� Strong project management, organizational, and prioritization skills required.
� Demonstrated strong analytical, problem solving and decision making skills required.
� Ability to build relationships, interfaces with all levels of the organization, and think strategically required.
� Strong written and verbal communication skills required.
� Ability to travel internationally as needed required.
� Experience with budgeting, expense management and managing contracts required.
Further Information: https://recruiter.kenexa.com/mccormick/cc/CCJobDetailAction.ss?command=CCViewDetail&job_REQUISITION_NUMBER=14669&ccid=bupJEdUjsTs%3D
McCormick & Co., Inc., the world leader in the spice, flavor & seasonings industry, is seeking a full time Request & Deployment Team Leader in its Global Business Solutions Division located in Hunt Valley, MD. As an employer recognized for our exceptional commitment to employees, McCormick & Co., Inc. offers a wide variety of benefits, programs and services which address the needs of employees and their families. McCormick�s benefits include, but are not limited to tuition assistance, medical & dental, disability, group life insurance, 401(k), pension plan, paid holidays and vacations.
NO RELOCATION ASSISTANCE WILL BE PROVIDED FOR THIS POSITION
PLEASE - NO THIRD PARTY RECRUITER INQUIRES.
NO RELOCATION ASSISTANCE WILL BE PROVIDED FOR THIS POSITION
PLEASE - NO THIRD PARTY RECRUITER INQUIRES.
This week's security posts
1. Why change to IE8 (another reason) - http://bit.ly/6lIehK
2. Encryption and the Israel connection - http://bit.ly/70tLz8
3. Border search - http://bit.ly/6us2KA
4. Another day, another breach - http://bit.ly/8XAJyY
5. Another disaster, another scam - http://bit.ly/889WvE
6. Famous hacks of the yesteryear - http://bit.ly/5P8Zd9
7. Another item, another bank breach - http://bit.ly/78k5sE
2. Encryption and the Israel connection - http://bit.ly/70tLz8
3. Border search - http://bit.ly/6us2KA
4. Another day, another breach - http://bit.ly/8XAJyY
5. Another disaster, another scam - http://bit.ly/889WvE
6. Famous hacks of the yesteryear - http://bit.ly/5P8Zd9
7. Another item, another bank breach - http://bit.ly/78k5sE
Quote of the day
"There is no limit to what you can do if you don't care who gets the credit" -Anonymous
Friday, January 15, 2010
Quote of the day
"If you don't daydream and king of plan things out in your imagination you never get there. So you have to start someplace" -Robert Duvall
Tuesday, January 12, 2010
Monday, January 11, 2010
Thursday, January 7, 2010
This week's security posts
1. Cell phone encryption - http://bit.ly/88RbJ6
2. Synagogue website hacks - http://bit.ly/6tQFmH
3. Another perspective on Predator interception - http://bit.ly/4TeVp2
4. Phillipines DSWD website defaced - http://bit.ly/7aYQjw
5. FBI estimates cost of "Rogue" Virus - http://bit.ly/8lfnOo
6. News in the hacking-proof of captcha - http://bit.ly/5pmuBd
2. Synagogue website hacks - http://bit.ly/6tQFmH
3. Another perspective on Predator interception - http://bit.ly/4TeVp2
4. Phillipines DSWD website defaced - http://bit.ly/7aYQjw
5. FBI estimates cost of "Rogue" Virus - http://bit.ly/8lfnOo
6. News in the hacking-proof of captcha - http://bit.ly/5pmuBd
Subscribe to:
Posts (Atom)

