Archive for 'Nerd Speak'
Lenny Zeltser on Information Security: Allowing Gullible Victims to Self-Select in Online Attacks lennyzeltser: Cormac Herley’s paper Why do Nigerian Scammers Say They are from Nigeria? explains how some purposefully-lame scam emails are advantageous to the attacker. Such messages allow the scammer to avoid victims who will consume valuable time, but will turn out to
10 reasons why I avoid social networking services I didn’t write the article, but the reasons mentioned are pretty much same as what I have in mind… I know, I know, I’m blogging about how I (want to) avoid social networks on Tumblr and this post get tweeted. I do enjoy some aspects of social
Your E-book is Reading You The major new players in e-book publishing—Amazon, Apple and Google—can easily track how far readers are getting in books, how long they spend reading them and which search terms they use to find books. Book apps for tablets like the iPad, Kindle Fire and Nook record how many times readers
Very Dumb Idea: Tweeting Photos of Your Credit Card Really? Can people be THAT stupid to not know, not realize or not remember the consequences of posting pics of their credit or debit cards on Twitter? Apparently so! @NeedADebitCard, the Twitter account that’s RT’ing all these insane photos or tweets, has 7,000+ followers already and
Can people be THAT stupid to post pics of their credit cards on Twitter? Apparently so! Really? This is just unbelievable, beyond comprehension and speechlessly stupid! Please, don’t be like them…
Wall Street Journal just had an article about how Orbitz is showing Mac users higher prices hotels because the company found that Mac users spend "as much as 30% more" on hotels than PC users. How does Orbitz know that? The company tracks its customers' online activities, such as that they are visiting orbits.com using
Do You Share Too Much on Social Media? [INFOGRAPHIC] Well, the infographic is really about sharing on Facebook, but you kind of get the idea… Click on the image or link to see the complete infographic.
Apple Wants to Protect Your Identity — by Cloning You “Little Brothers” — The companies or organizations which perform Internet surveillance by collecting information to form electronic profiles about a user not through human eyes or through the lens of a camera but through data collection. This form of Internet surveillance via data collection is
Outsourced security: Who pays when things go wrong? Too many businesses see the cost savings and access to expertise offered by outsourcing security but ignore the issue of liability in the event of service failure.
Who’s buying zero-day vulnerabilities? Who’s buying zero-day vulnerabilities? And what are they doing with them? According to this article, what’s going on sounds nefarious: “VUPEN, FinFisher, and HackingTeam are among a handful of companies that buy and sell zero-day vulnerabilities, exploits, and remote monitoring tools to governments around the world.” “…these companies are purchasing vulnerabilities and exploits at