Telephone Monoculture Considered Harmful

Kevin Hogan of Symantec says:
“If Windows CE is taken up in a big way in a large market we may see some increased malware activity,” he warned.

“There is not a lot of functionality built in that will stop attacks on that platform, so there could be a problem if it takes off. As for other operating systems there has been very little new activity.”

Windows use could boost mobile malware Increasing use of Windows CE could leave mobile users vulnerable, Iain Thomson, vnunet.com 15 Nov 2006

Continue reading

APWG eCrime @NCSF

Thursday and Friday I spent at the APWG 2006 eCrime Researchers Summit at the National Center for Forensic Science, Orlando, Florida. It was a fascinating mix of law enforcement from a local sheriff to the National Institute of Justice, of researchers from academic grant-funded to big-company in-house, and of commercial from tiny startups to the biggest banks. Continue reading

Security Clerks

Bruce Schneier reports on a report:
Most C-level executives view security as an operational issue — kind of like facilities management — and not as a strategic review. As such, they don’t have direct responsibility for security

Why Management Doesn’t Get IT Security, Bruce Schneier, 8 Nov 2006

Such attitudes about security have caused many organizations to distance their security teams from other parts of the business as well. “Security directors appear to be politically isolated within their companies,” Cavanagh says. Security pros often do not talk to business managers or other departments, he notes, so they don’t have many allies in getting their message across to upper management.

Kicking Some Brass, Tim Wilson, DarkReading, NOVEMBER 2, 2006

Why should executives get involved with directly managing a bunch of clerks over a bunch of stuff? Continue reading

Politics and Net Neutrality

Rip van Pulver awakens from a European trip and opines:
To some extent, I had given up on America and the prospect that it would develop a regulatory framework that might enable Internet entrepreneurs. In my mind, other countries have been supplanting the US as the havens for Internet innovation. The midterm election, however, has reminded me that, in a democracy, there is always room for a rethink, a do-over, an opportunity for a dramatic policy shift when the national consciousness wakes up and recognizes that its policies might be leading the nation down a backward-heading path.

Shift Happened: How Might a Democrat-Controlled Congress Affect Media, Internet, Communications and Entertainment? Jeff Pulver, Jeff Pulver Blog, November 09, 2006

What could this shift be? Continue reading

Congressional Confusopoly

U.S. 109th Congress, TX-10 Have you noticed how difficult it is to find accurate maps of U.S. Congressional districts? The ones the New York Times is using in its election coverage are out of date, and the Times is far from alone in this error. A correct map is on the right; more on that below.

Continue reading

FBI Fishes Phishers

FBI finally does something about phishing:
A large group of suspected internet fraudsters has been arrested following an investigation by the FBI.

Seventeen individuals have been arrested, four in the US and the rest in Poland, after being chased by over 20 different FBI offices.

The group is accused of carrying out a phishing attack against a major financial institution in the three months from August 2004, it is claimed.

Police arrest suspected phishing gang Richard Thurston, ZDNet UK, 03 Nov 2006

Good on the FBI! Continue reading

Net Neutrality Podcast

jsq & mhathaway Here’s a picture and a podcast from the EFF-Austin net neutrality forum of the other day. Lots of interesting back-and-forth in there, among the panelists and the audience.

Jonl quotes my blurb about the FCC’s principles emphasizing consumers, i.e., consumers of broadcast media, while Internet growth is fueled by groups of participants; I previously posted a bit more about that.

-jsq

PS: Yes, despite how it looks in the picture, I am wearing a shirt.

Ipsos Custodies

This morning I voted early. This involved using an electronic voting machine. At least it was some local Texas brand, rather than one of the better-known brands that has well-known problems.

However, an easy way occured to me how somebody could subvert these local machines; a way that doesn’t even involve modifying the software, wireless networks, or any access to the machine other than through the voting interface. Continue reading