top Secret Service Investigating Small Drone On White House Grounds
What will folks do when drones get to be insect sized?
top Microsoft Outlook Users In China Hit With MITM Attack
The evidence that China was performing MITM attacks on Outlook.com was because of temporary use of an SSL certificate chain that wasn't signed by one of the hundreds of root CAs included with modern operating systems. (and therefore the software complained)
If the software people are using stops complaining about the SSL certificate chain, does that mean that they're not performing MITM anymore? Hell no. At the very least it means that they're just using an SSL certificate signed by one of the hundreds of trusted root CA certificates. You know, like CNNIC. The internet organization with ties to the Chinese government.
top Adobe Patches Nine Vulnerabilities In Flash
This sort of thing happens every month. Microsoft, Oracle, Apple, etc. This is news?
top How To Hijack Your Own Windows System With Bundled Downloads
How do you teach a non-geek to find and recognize the canonical source for a software download? Is
http://www.vlc.cc/ the official VLC site? Is http://www.7zipdownload.org/ the right place to get 7-zip? Is http://www.libtiff.org/ the place to get the latest LibTIFF? The answer to all of these is "No", but I'd like to hear the teaching technique that allows a non-geek to come to these conclusions.
top Ask Slashdot: IT Career Path After 35?
If so, pursue it. Don't do it because all your friends are becoming managers.
top Security Collapse In the HTTPS Market
Be sure to check out Moxie Marlinspike's blog post about the topic.
top Reported iCloud Hack Leaks Hundreds of Private Celebrity Photos
1) Takes nude photos of themselves with an internet-connected device. 2) Has said photos of themselves synchronized with an internet service 3) Is surprised / outraged that said photos are accessed by somebody on the internet.
I'm not saying that those people are to blame, but rather that there is a significant disconnect between technology and users' expectations. And the companies involved aren't making things any better with their hand-waving "cloud" mumbo-jumbo.
top Internet Explorer Vulnerabilities Increase 100%
Just because you don't know about vulnerabilities, that doesn't mean that they're not there. The vulnerabilities are present in the code before they are discovered.
Having said that, drawing conclusions from vulnerability counts is usually an exercise in futility. There are many factors that affect how many vulnerabilities are discovered and disclosed. Including availability of vulnerability-finding tools, discovery of novel attack techniques, or simply critical mass of interest in the security field.
top Severe Vulnerability At eBay's Website
I published a note about this approximately 8 years ago:
top Anti-Virus Is Dead (But Still Makes Money) Says Symantec
When on earth did AV detect 95% of attacks? (hint: never)
top Heartbleed Sparks 'Responsible' Disclosure Debate
"High risk of leaking?" And what would the consequences of such a leak be? The affected vendors are only
slightly better off than they were with how it actually turned out with Heartbleed?
When Heartbleed was disclosed, virtually no affected vendor (e.g., Ubuntu, Cisco, Juniper, etc.) had an update available. So there was a window where the vulnerability was public, but nobody had official updates from their vendor that would protect them. You are claiming that this is better than a coordinated release, where there would have been actual updates available to install?
It's not "buddies" that is being discussed here. It's the people producing the software that is affected!
top VLC Finally Launches App For Windows 8
Right. Because the primary concern at Microsoft is that people get the legitimate software that they're looking for:
Depending on your monitor brightness/contrast and your attention to detail, well, you get the picture...
top IE Vulnerability Exposing Banking Logins, Spreading Rapidly
The vulnerability is a use-after-free bug triggered by DHTML. If DHTML is a feature that you don't care for, feel free to switch to Lynx or Mosaic.
top Dear Asus Router User: All Your Cloud Are Belong To Us
Give me a break. A vulnerability was disclosed, and then some time after that it was leveraged by attackers in the wild. This is what happens.
top Netflix Users In Danger of Unknowingly Picking Up Malware
1) This has nothing to do with Netflix. I am a Netflix user and I suspect that my Roku is not affected by the vulnerability in question.
2) Silverlight *does* get updated with automatic updates. 3) The vulnerability in question was fixed in March (MS13-022).
top Apple Developing Curve Screen iPhones and Improved Sensors
You're criticizing the grammar of a submitter's summary? You must be new here.
top Leaked Manual Reveals Details On Google's Nexus 5
If you'd bother to RTFA, you would have noticed that the phrase "crazy Nikon tech" is hyperlinked.
top First Cases of Flesh-Eating Drug Emerge In the United States
A drug that causes scaly green skin and is called crocodile? Ok, I have to admit that I had to look up that this isn't an early/late April fools joke.
top SSD Annual Failure Rates Around 1.5%, HDDs About 5%
I tell folks if they want an SSD don't have anything on it they would feel bad if they lost
How about you tell people that it's unsafe to use a computer without a viable backup scheme, regardless of the type of drive they use?
top German Government Warns Windows 8 Is an Unacceptable Security Risk
Has there been the same sort of outcry for iPhones being unacceptable security risks? I mean, Apple controls what software you can put on the device. And they can pretty much do anything to the device that they want without asking you. For any software that you use, you are trusting the vendor. You trust Microsoft to not push out a backdoor on patch Tuesday. You trust Google to not intercept your banking credentials with an automatic/silent Chrome update. etc. etc... There's no justification to say OMG Windows 8 now suddenly gives the ability for someone else to do something I might not want.
On a technical level (e.g. included exploit mitigations), Windows 8 is safer than any other Windows operating system. Even if Windows does go down the iOS route of only running approved software, does that really make it less safe? Maybe vendors are starting to realize that it's OK if Joe Home User can't run CuteKittens.exe that was just emailed to him. Don't trust software vendors or other people? Good. Write your own OS and don't plug it into the internet. If you get that far.
about a year and a half ago
WD hasn't submitted any stories.
WD has no journal entries.