Journal: Cyber-Security or Cyber-Scam? Plus Short List of Links to Reviews and Books on Hacking 101

COVER STORY: The Cyberwar Plan  It’s not just a defensive game; cyber-security includes attack plans too, and the U.S. has already used some of them successfully. by Shane Harris Saturday, Nov. 14, 2009 14 tech firms form cybersecurity alliance for government Lockheed Martin, top suppliers launch initiative for government market By Wyatt Kash  Nov 12, …

Journal: Microsoft, Cyber-Security, Syllable, & Integrity

Silent Install Firefox Plugin Backfires on Microsoft posted by Kroc Camen    on Sat 17th Oct 2009 05:27 UTC Now a security hole has been found in a plugin that Microsoft have  been silently installing into Firefox.  Along with .NET Framework 3.5 SP1, Microsoft have been silently  installing a Windows Presentation Foundation Plugin that allows the …

1994 Sounding the Alarm on Cyber-Security

This is the cover letter to the US Government official most responsible for thinking about the National Information Infrastructure (NII) and the security of that infrastructure.  Three “top guns,” one of the the foremost authority in the public arena, another the foremost expert on these matters advising the National Security Agency (NSA) all agreed on …

Stephen E Arnold: Cyber Security: What Are You Doing?

Cyber Security: What Are You Doing? I read “A Federal Government Left Completely Blind on Cyber attacks Looks to Force Reporting.” The write up uses a phrase for which there are a limited number of synonyms in English; namely, completely blind. There are numerous types of blindness. There’s the metaphorical blindness of William James, who …

Stephen E. Arnold: How Are Those Cyber Security Vendors Performing?

How Are Those Cyber Security Vendors Performing? This sounds like old news. This is really new news. The trust outfit Thomson Reuters published “U.S. Government Probes VPN Hack within Federal Agencies, Races to Find Clues.” The main idea is that despite the amped up cyber security efforts, another somewhat minor issue has been discovered. The …

Stephen E. Arnold: SolarWinds – Virtual Rats Carrying Virtual Fleas

SolarWinds Are Gusting and Blowing Hard In considering some of the “odd” organizations compromised by SolarWinds, there are three reasons for why they might have been targeted: A launch pad for secondary attacks. The idea is that the original compromise was like a rat carrying fleas infected with the bubonic plague (arguably more problematic than …