Tag Archives: security

The Professional

An interesting narrative, trapped unfortunately behind a pay wall, comes from the Chronicle of Higher Education – “Chapel Hill Researcher Fights Demotion After Security Breach” A cancer researcher’s database of gets potentially pwnd (two years from incident to discovery), spurring the … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

Live Twice

Chandler at the New School made me collect, collate and sort my thoughts on the whole recall issue.  Although what follows is more like bend, fold and mutilate. The greatest risk Toyotas pose to me is that I get drowsy … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Fiction

From Ed Park’s Personal Days: “Every employee would soon be required to create a new log-on password consisting of a mix of nonsequential capital letters and a three-digit prime number and a punctuation mark, and then change it once a … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

I got some groceries, some peanut butter

From the maddingly brilliant book of the Naples System, Gomorrah, a description of security during the Secondigliano War between the Spanish and DiLauro clans: I would ride my Vespa through this pall of tension. In Secondigliano I’d be frisked at … Continue reading

Posted in Uncategorized | Tagged , | 1 Comment

The Easy No

From Concurring Opinions, this commentary on a recent New York Times article on Hypercompliance on the HIPAA front. Health care folks have been intimidated into denying access to PHI to people who have legitimate inquiries and a legal right to … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Dog of War or McGriff the Crime Dog?

So, solider or cop? War or Crime? Or both? I ask this question of my own self after reading (and enjoying) Michael C. W. Research’s recent posts on security framed in the context of Clauswitz. Thinking it through, though, I … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Vulnerabilty v. Threat

Jeremiah Grossman’s analysis of the MSNBC stock contest cheat. It seems to me that this sort of flaw would rise to the surface quickly from a threat perspective, but slower from a vulnerability perspective. I’m not sure why though.

Posted in Uncategorized | Tagged , , , | 2 Comments

The Italian Job

Odd ball kidnapping heist documented at MCN and Roadracing World illustrates the danger of the insider beyond the pilfered laptop or unexpired system credentials. Apparently the Alto Evolution World Superbike team “reduced the responsibilities” of Sergio Bertocchi, their erstwhile manager, … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Motoprox

Yesterday I was barreling down the concrete slab choked with tractor-trailers and nitro-burnining funny trucks laden with oily 2x4s and spent joint compound jugs, I was engaging my left brain in random problem solving (“Resolved: The world is as random … Continue reading

Posted in Uncategorized | Tagged , , , | 2 Comments

SSNS ON THE LOOSE! (Legacy Edition)

I’m trying to understand the newsworthiness of the latest episode of “SSNS On The L0OzE. OMG!!1!!” Some dude in the mail room puts a bunch of computer tapes in the wrong slot, according to the AP report in the Houston … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment