Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Hoff, Talking ’bout My Next Generation →

May 17, 2015 by Marc Handelman in All is Information, Information Security, Sarcasm
May 17, 2015 /Marc Handelman
All is Information, Information Security, Sarcasm

Data Melt →

May 15, 2015 by Marc Handelman in All is Information, Data Driven Security, Data Security, Physical Security

Evidence, says Zack Whittaker for Zero Day, of data disappearing from solid-state storage facilities, when the storage medium is unpowered for several days. Apparently, additional degradation takes place when temperatures rise...

The money quote:

"A recent presentation by hard drive maker Seagate's Alvin Cox warned that the period of time data is retained on some solid-state drives is halved for every 9°F (or 5°C) rise in temperature where its stored. That means if a solid-state drive is stored in a warm room, say 77°F (25°C), its data can last for about two years. But, if that goes up by a mere few degrees to 86°F (30°C), that data's retention period will be cut in half." via Zack Whittaker at Zero Day

May 15, 2015 /Marc Handelman
All is Information, Data Driven Security, Data Security, Physical Security

GRR Find All the Badness, Collect All the Things →

May 14, 2015 by Marc Handelman in All is Information, Forensics, Information Security

Google Inc.'s {NasdaqGS: GOOG) GRR Rapid Response, an incident response framework focused on remote live forensics.

May 14, 2015 /Marc Handelman
All is Information, Forensics, Information Security

Instagram Surveillance →

May 14, 2015 by Marc Handelman in All is Information, Information Security, Data Driven Security, Demise of Privacy, Identity Theft
May 14, 2015 /Marc Handelman
All is Information, Information Security, Data Driven Security, Demise of Privacy, Identity Theft

Information is Beautiful: IoT

May 13, 2015 by Marc Handelman in All is Information, Information Security, IoT

via Information is Beautiful, comes this superlative interactive infographic, detailing what you need to know about the Internet of Things.

May 13, 2015 /Marc Handelman
All is Information, Information Security, IoT

Duct Tape →

May 12, 2015 by Marc Handelman in All is Information, Information Security, Vulnerabilities
May 12, 2015 /Marc Handelman
All is Information, Information Security, Vulnerabilities

A History of the ARPANet

DARPA and BBN, 'A History of the ARPANET: The First Decade' →

May 12, 2015 by Marc Handelman in All is Information, ARPAnet, Governance, Government, DARPA, Internet, Internet Antiquities, Internet Governance, History of the Internet

Bolt Beranek and Newman (BBN) Report #4799 Document entitled 'A History of the ARPANET: The First Decade'. First published in 1981, and detailing early ARPANET engineering, via the March 2015 'The Internet Protocol Journal' (Volume 18, Number 1). Download IPJ back issues and find subscription information at Internet Prorocol Journal.

May 12, 2015 /Marc Handelman
All is Information, ARPAnet, Governance, Government, DARPA, Internet, Internet Antiquities, Internet Governance, History of the Internet

Sophisticated Attack Myth, Hiding Unsophisticated Security Programs

May 11, 2015 by Marc Handelman in All is Information, Alternate Attack Analysis, Information Security, Intelligence, Hiding In Plain Sight
May 11, 2015 /Marc Handelman /Source
All is Information, Alternate Attack Analysis, Information Security, Intelligence, Hiding In Plain Sight

FCC Denies Delay Requests, Net Neutrality Rules On The March →

May 11, 2015 by Marc Handelman in All is Information, Government, Governance, Internet Governance, Communications Governance

via Grant Gross, writing at PC World, comes news of the United States Federal Communications Commission denial of submitted requests from a group of Cable and Telephony providers (the ususal suspects) to slow the implementation of the Commission's Net Neutrality rules. This, my fiends, is one commish we can all get behind (except, of course, the Cable, Telephony and their lobbyists).

May 11, 2015 /Marc Handelman
All is Information, Government, Governance, Internet Governance, Communications Governance
Quiando Lake, China Photo Courtesy of Felix Wong of Fort Collins, Colorado

Quiando Lake, China Photo Courtesy of Felix Wong of Fort Collins, Colorado

CyberLock Versus IOActive, Targets Lock Research As DMCA Violation →

May 08, 2015 by Marc Handelman in All is Information, Information Security, Hardware Security, Locks

Reports of threats made by attorneys for CyberLock targeting security researchers at IOActive have appeared at Ars Technica. The piece, written by the inimitable Dan Goodin, details the work accomplished by the researchers. We've seen this form of bad behavior by outed lock manufacturers before, interestingly - most (if not all) to no avail.

The money quote:

'Thursday's advisory from security firm IOActive is notable not only for the serious security issues it reported in the CyberLock line of access control systems, which are certified to meet a wide range of US governmental requirements and certifications. The report is also the topic of a legal threat from CyberLock attorneys who invoked draconian provisions of the Digital Millennium Copyright Act if IOActive disclosed the vulnerabilities. A redacted version of a letter CyberLock outside attorneys sent IOActive researcher Mike Davis has reignited a long-standing tension between whether it should be legally permissible for researchers to publicly disclose unfixed vulnerabilities in the products they test.' - via Dan Goodin at ArsTechnica

May 08, 2015 /Marc Handelman
All is Information, Information Security, Hardware Security, Locks

Applicability of Just War Traditions to Military Cyber-Ops →

May 07, 2015 by Marc Handelman in Cyberwar, All is Information, National Security
May 07, 2015 /Marc Handelman
Cyberwar, All is Information, National Security

Harbortouch'ed →

May 07, 2015 by Marc Handelman in All is Information, Bank Security, Cruft, Data Security, Information Security, POS Security

via the inimitable Brian Krebs, writing at Krebs On Security, comes the latest sorry tale of attacked, and successfully breached, Point of Sale (POS) terminals manufactured by POS system purveyor Harbortouch.

May 07, 2015 /Marc Handelman
All is Information, Bank Security, Cruft, Data Security, Information Security, POS Security

Alex Stamos', 'AppSec Eating Security' →

May 06, 2015 by Marc Handelman in All is Information, Application Security
May 06, 2015 /Marc Handelman
All is Information, Application Security
Netflix (1).png

NetFlix Unleashed FIDO →

May 06, 2015 by Marc Handelman in All is Information, Incident Handling, Incident Response, Information Security, Automation, SecDevOps

via Netflix's Jason Chan, comes word of a OSS automation effort targeting security related events, and actions thereo. Monikered FIDO or more accurately 'Fully Integrated Defense Operation' the system ostensibly serves as an orchestration layer for automated response activities, in the case of security event triggers. Comprised of a well thought-out architecture of infrastructure components, an encapsulated orchestration, correlation and scoring engine coupled to a threat intelligence system... But, I'll leave the full explanation in the obviously capable hands of Netflix's Security Team; examine. if you will, FIDO at GitHub. And, because it's Open Source Software, the security community at large can reap the benefits of this superalitve effort. Outstanding.

May 06, 2015 /Marc Handelman
All is Information, Incident Handling, Incident Response, Information Security, Automation, SecDevOps

Mumblehard, The Pernicious →

May 05, 2015 by Marc Handelman in All is Information, Information Security, OpenStack, OpenSource, Network Security, Malware, Spam, UCE

Swati Khandelwal, writing at The Hacker News, regales us with the tale of Mumblehard, the Linux and BSD Server targeted attack malware that transforms those machines into pernicious spambots.

May 05, 2015 /Marc Handelman
All is Information, Information Security, OpenStack, OpenSource, Network Security, Malware, Spam, UCE

NIST CSD, ITL, CPP Slated to Host 8th Cloud Computing Forum →

May 04, 2015 by Marc Handelman in All is Information, Conferences, Information Security, Cloud Security, Compute Infrastructure, Security, Government

NIST's Computer Security Division and the Information Technology Laboratory (ITL) along with the NIST Cloud Computing Program has announced hosting of the 8th Cloud Computing Forum and Workshop. Registration Information, etc. can be viewed here. Included with the announcement is the Call for Abstracts, noted below:

  • Abstract Submission Deadline: May 15, 2015
  • Abstracts Review Deadline: June 1, 2015
  • Presentation Submission Deadline: July 1, 2015

Interested? Download the 8th Cloud Computing Forum and Workshop Abstract Submission form, additional information resides here.

May 04, 2015 /Marc Handelman
All is Information, Conferences, Information Security, Cloud Security, Compute Infrastructure, Security, Government
Antarctica from Kalle Ljung.

"This movie was shot during our 20 days trip to Antarctica in December 2014 to January 2015. We started from Ushuaia in Argentina and went to Port Williams in Chile, rounded Cape Horn and crossed the Drake Passage towards the Melchior Islands in Antarctica. We spent 16 days in the Antarctic and got to experience the most amazing scenery and wildlife before we returned back to Ushuaia. Filmed with GoPro HERO3+ Black Edition and DJI Phantom 2, edited with Final Cut Pro X. Music from Music Bed with rights." via Kalle Ljung

Kalle Ljung's Astounding Antarctica

May 03, 2015 by Marc Handelman in All is Information, Natural Philosophy, Natural Science, Navigation, Science, Antarctica

Occasionally, a motion picture makes itself known hereabouts, with absolutely extraordinary visage of a land previously unsullied. This is such a picture. Enjoy!

May 03, 2015 /Marc Handelman
All is Information, Natural Philosophy, Natural Science, Navigation, Science, Antarctica

Sparks' End of Show Report →

May 01, 2015 by Marc Handelman in All is Information, RSA Conference

The inimitable David Spark, here wrapping up last week's RSAC 2015.

May 01, 2015 /Marc Handelman
All is Information, RSA Conference

Estonia, Creates Volunteer Cyberwarrior Brigade

May 01, 2015 by Marc Handelman in All is Information, Cyberwar, Cybersecurity Economics, Cybersecurity Competence, Information Security, National Security

Considering the country's highly systems-literate populis, this is one of the more interesting cases of a so-called Cybernational Guard, this time, stationed at the K5 Barracks (NATO Cyber Defense Center, Tallinn, Estonia), in quite likely one of the most astoundingly beautiful countries on our planet - Estonia!

May 01, 2015 /Marc Handelman
All is Information, Cyberwar, Cybersecurity Economics, Cybersecurity Competence, Information Security, National Security

Best Practices for Integrating Incident Handling and Disaster Recovery →

April 30, 2015 by Marc Handelman in All is Information, Disaster Recovery, Incident Handling, Information Security
April 30, 2015 /Marc Handelman
All is Information, Disaster Recovery, Incident Handling, Information Security
  • Newer
  • Older