Useless Business Jargon

Monday, 11 June 2012 19:36 Written by
Useless Business Jargon

The next time you feel the need to reach out, touch base, shift a paradigm, leverage a best practice or join a tiger team, by all means do it. Just don’t say you’re doing it.

People use jargon as a substitute for thinking hard and clearly about their goals and the direction they wish to give others.  Jargon masks meaning.  Jargon can mean different things to different people.  You might be saying one thing -- while your audience is hearing another.

Flame, the Cyber Weapon

Monday, 28 May 2012 22:37 Written by
Flame, the Cyber Weapon

A highly sophisticated computer virus is infecting computers in Middle Eastern and North African countries.  It appears to have been at least five years ago.  Is this state-sponsored cyber espionage?

Kaspersky Lab, a Russian cyber-security software maker, said it discovered the virus, dubbed Flame, after a U.N. telecommunications agency asked it to analyze data on malicious software across the Middle East in search of the data-wiping virus reported by Iran.

Yahoo Leaks Private Key!

Friday, 25 May 2012 15:54 Written by
Yahoo Leaks Private Key!

Yahoo released its Axis extension for Chrome and accidentally leaked its private security key that could allow anyone to create malicious plugins masquerading as official Yahoo software.  The result is that a miscreant could forge malicious software to run amok on unsuspecting victim computers and it would appear to be coming from Yahoo.

An Australian researcher exposed the certificate mistake, and said users should not install the extension "until the issue is clarified." He examined the extension’s source code and found the private certificate, which Yahoo uses to sign the application to prove it is genuine and unaltered.

Ogres disrupt the workplace...

Thursday, 24 May 2012 17:42 Written by
Ogres disrupt the workplace...

Ogres can exist at any level in an organization.

Are you an ogre? Do you know an ogre? Ogres come from many backgrounds and can be any color, gender, belief system, or orientation. But ogres are easy to spot. What gives them away? Perhaps, it is the Ogres' lack of etiquette in the office place. Or is it the ogres' dysfunctional (or broken) ethical compass. Whether you are an Ogre or the victim of an Ogre, there are five Ogre specific disruptors of performance you should look out for that will negatively affect you and your stakeholders...

Banking Malware Hijacks Webcams and Microphones

Wednesday, 23 May 2012 10:50 Written by
Banking Malware Hijacks Webcams and Microphones

A new variant of SpyEye malware allows cybercriminals to monitor potential bank fraud victims by hijacking their Web cams and microphones, according to security researchers from Kaspersky Lab May 21. SpyEye is a computer trojan that specifically targets online banking users.

Like its older cousin, Zeus, SpyEye is no longer being developed by its original author but is still widely used by cybercriminals. SpyEye’s plug-in-based architecture allows third-party malware developers to extend its original functionality, a Kaspersky Lab malware researcher said.

NASA Investigates SSL Compromise

Monday, 21 May 2012 11:44 Written by
NASA Investigates SSL Compromise

A NASA spokesperson told SecurityWeek they were investigating claims made by a group of Iranian hackers May 16 that they have compromised the SSL certificate used on the NASA Solicitation and Proposal Integrated Review and Evaluation System (NSPIRES) Web site.

The Iranian student group comprised of programmers and hackers — known as the Cyber Warriors Team claimed to have compromised the SSL cert was compromised by exploiting an existing vulnerability within the portal’s log-in system.

HULK DDoS Tool Smash Web Servers

Sunday, 20 May 2012 11:18 Written by
HULK DDoS Tool Smash Web Servers

Researchers from Kapersky Lab recently reported on a new distributed denial-of-service (DDoS) tool. The HTTP Unbearable Load King (HULK) tool is different from others of its kind in that it does not simply hit a server with a massive load of TCP SYN requests or other predictable packets.

Instead, HULK generates numerous unique requests designed to prevent server defenses from recognizing a pattern and filtering the attack traffic. The HULK DDoS tool is the work of Barry Shteiman, a security pro who developed it out of frustration with the obvious patterns produced by other such tools.

Spammers Hijack Joomla and WordPress Sites

Saturday, 19 May 2012 14:41 Written by
Spammers Hijack Joomla and WordPress Sites

Security experts found many compromised WordPress and Joomla Web sites used by spammers to advertise sketchy diet pills and counterfeit luxury goods. The owners of these sites are most likely unaware of what is going on.

Web masters often fail to check their sites’ subdirectories for signs of malicious files and Web pages, thus allowing cybercriminals to use the domain’s reputation to host their scams. Attackers often brute-force administrator passwords to gain access to a site’s back end.

DHS Questions Security of ISC

Friday, 11 May 2012 17:32 Written by
DHS Questions Security of ISC

Operators of America’s power, water, and manufacturing facilities use industrial control systems (ICS) to manage them. However, the security of these systems, increasingly linked with Microsoft Windows and the Internet, is now under intense scrutiny because of growing awareness that they could be attacked and cause massive disruptions.

Industrial facility operators are making efforts to follow security procedures, such as using vulnerability-assessment scanning tools to check for needed patches in Windows. That said, ICS environments present special problems, said managers who spoke on the topic at a conference organized by the DHS.

Chief Legal Officers and CIOs Must Work Together

In a survey by Gartner and ALM, Chief legal officers (CLOs) need to engage enterprise CIOs more.  Further, while CLOs voice consideration for CIOs as contributors to corporate strategy, they continue to lack fundimental understanding of how to use technology in the enterprise or how to interact with their IT departments.

"The survey results showed that communication is the key variable in the success or lack of success of the CLO/IT relationship," said French Caldwell, vice president and Gartner fellow. "When CLOs have substantive conversations with CIOs more than once a month, CLO satisfaction with IT is higher."

Rinzai Zen - Fujaku, fugu.

Wednesday, 25 April 2012 12:03 Written by
Rinzai Zen - Fujaku, fugu.

"Where should your mind be kept?  If your mind is not fixed anywhere it will pervade throughout the body... If your mind is fixed on a certain spot, it will be seized by that spot, and no activities can be performed efficiently. Not to fix your mind anywhere is essential. Not fixed anywhere, the mind is everywhere."

  • Study Zen -- one discovers the key to all forms of Buddhism.
  • Practice Zen -- one's life is brought to fulfillment in the attainment of enlightenment.

Samsara is the same as nirvana, defilement the same as purity, and delusion the same as enlightenment.  The challenge to understanding is due to one's ignorance -- the ignorance in mistaking phenomena for ultimate reality. Great is Mind. Heaven's height is immeasurable, but Mind goes beyond heaven; the earth's depth is also unfathomable, but Mind reaches below the earth.

Archive
«StartPrev12345678NextEnd»
Page 4 of 8
Network neutrality is the principle that Internet users should be in control of what content they view and what applications they use on the Internet. The Internet has operated according to this neutrality principle since its earliest days. It is this neutrality that has allowed the internet to innovate and grow. Without equal access the internet dies.