Fast Domain

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 27 April 2006

A comparison of US and European Privacy Practices

Posted on 05:27 by Unknown
A new study on "US and European Corporate Privacy Practices" was released two days ago, and as I constantly monitor the topic knowing EU's stricter information sharing and privacy violations laws comparing to the U.S, thought you might find this useful. To sum up the findings :"European companies are much more likely to have privacy practices that restrict or limit the sharing of customer or
Read More
Posted in | No comments

DIY Marketing Culture

Posted on 04:16 by Unknown
Problem - big name advertising agencies, and self forgotten copywriters easily turn into an obstacle for a newly born startup, the way marketing researchers can easily base your entire service/product development efforts on a single survey's results. Generating content, thinking content is the king, trying to sense and understand your customers' needs or where the market is heading to for the
Read More
Posted in | No comments

Wednesday, 26 April 2006

In between the lines of personal and sensitive information

Posted on 00:52 by Unknown
In a previous post, "Give it back!" I mentioned the ongoing re-classification of declassified information and featured some publicly known sources for information on government secrecy. Today I came across to a news item relating to the topic in another way, "States Removing Personal Data from Official Web Sites", more from the article :"At least six states use redaction software, which digitally
Read More
Posted in | No comments

Tuesday, 25 April 2006

Wild Wild Underground

Posted on 04:05 by Unknown
Where's the real underground these days, behind the shadows of the ShadowCrew, the revenge of the now, for-profit script kiddies, or in the slowly shaping real Mafia's online ambitions? Moreover, is all this activity going on behind the Dark Web, or the WWW itself? Go through this fresh overview, emphasizing on today's script kiddies, 0days as a commodity, malware and DDoS on demand on the WWW
Read More
Posted in | No comments

Monday, 24 April 2006

25 ways to distinguish yourself -- and be happy?

Posted on 08:45 by Unknown
Totally out of the security world, yet very relevant inspirational tips for all readers feeling down, or looking for more sources of self-esteem. I've always believed that among the most important key factors for leadership is the ability to know yourself, and to understand the time dimensions of failure -- it's just a temporary event whenever it happens to occur. I also often debate on the pros
Read More
Posted in | No comments

Why's that radar screen not blinking over there?

Posted on 06:39 by Unknown
Two days ago, the Russian News & Information Agency - Novosti, reported on how "Russian bombers flew undetected across Arctic" more from the article :"Russian military planes flew undetected through the U.S. zone of the Arctic Ocean to Canada during recent military exercises, a senior Air Force commander said Saturday. The commander of the country's long-range strategic bombers, Lieutenant
Read More
Posted in | No comments

Thursday, 20 April 2006

The anti virus industry's panacea - a virus recovery button

Posted on 11:07 by Unknown
Just when I thought I've seen everything when it comes to malware, I was wrong as a PC vendor is trying to desperately position itself as one offering a feeling of security with the idea to strip its product and lower the customer price. The other day I came across to a fancy ad featuring Lenovo's ThinkVantage Virus Recovery Button, and promoting its usefulness even when there's no AV solution in
Read More
Posted in | No comments

Digital forensics - efficient data acquisition devices

Posted on 08:23 by Unknown
Digital forensics have always been a hot market segment, whereas the need for a reliable network based forensics model given main Internet's insecurities such as source address spoofing and the lack of commonly accepted security events reporting practices is constantly growing as well. Information acqusition, analysis and interpretation in the most reliable and efficient way is often among the
Read More
Posted in | No comments

Tuesday, 18 April 2006

Spotting valuable investments in the information security market

Posted on 10:15 by Unknown
Back in January I mentioned the possible acqusition of SiteAdvisor in my "Look who's gonna cash for evaluating the maliciousness of the Web?" post and it seems McAfee have realized the potential of this social-networking powered concept on a wide scale, and recently acquired SiteAdvisor -- this was meant to happen one way or another and with risk of being over-enthusiastic I feel I successfully
Read More
Posted in | No comments

Would somebody please buy this Titan 1 ICBM Missile Base?

Posted on 04:44 by Unknown
I feel that no matter how much you try to bypass the intermediary, it would continue to remain the place for anything auction - 0day vulnerabilities, Enigma encryption machines, and now a Titan 1 ICBM Missile Base, is for sale at Ebay for the N time. Bari Hotchkiss listed the characteristics of the underground fortress as :- Hardened buildings built to withstand One megaton nuclear blast within
Read More
Posted in | No comments

Friday, 14 April 2006

Fighting Internet's email junk through licensing

Posted on 10:18 by Unknown
Just came across this story at Slashdot, interesting approach :"China has introduced regulations that make it illegal to run an email server without a licence. The new rules, which came into force two weeks ago, mean that most companies running their own email servers in China are now breaking the law. The new email licensing clause is just a small part of a new anti-spam law formulated by
Read More
Posted in | No comments

Thursday, 13 April 2006

Distributed cracking of a utopian mystery code

Posted on 06:09 by Unknown
If you have missed the opportunity to buy yourself a portable Enigma encryption machine, or didn't know you could devote some of your CPU power while trying to crack unbroken Nazi Enigma ciphers, now is the time to consider another distributed computing cracking initiative I just came across to - "Assault on the Thirteenth Labour", part of the utopian Perplex City alternate reality game. More on
Read More
Posted in | No comments

On the Insecurities of the Internet

Posted on 03:04 by Unknown
Among the most popular stereotypes related to Cyberterrorism, is that of terrorists shutting down the Internet, or to put it in another way, denying access to the desperse and decentralized Internet infrastructure by attacking the Internet's root servers the way it happened back in 2002 -- knowing Slashdot's IP in such a situation will come as a handy nerd's habit for sure. Outages like these
Read More
Posted in | No comments

Wednesday, 12 April 2006

Catching up on how to lawfully intercept in the digital era

Posted on 10:17 by Unknown
In one of my previous posts "A top level espionage case in Greece" I blogged about two cases of unlawful interception -- good old espionage practices in modern environment. What's also worth mentioning is the rush for lawful interception in the post 9/11 world, that is free spirits get detained for singing or being nerds, activities you can hardly datamine at the bottom line, and then again, so
Read More
Posted in | No comments

"IM me" a strike order

Posted on 03:35 by Unknown
In my previous post "What's the potential of the IM security market? Symantec thinks big" I commented on various IM market security trends, namely Symantec's acquisition of IMLogic. It's also worth mentioning how a market leader security vendor was able to quickly capitalize on the growing IM market, and turn the acquisition into a valuable solution on the giant's portfolio of solutions. What's
Read More
Posted in | No comments

Wednesday, 5 April 2006

Heading in the opposite direction

Posted on 10:51 by Unknown
Just one day before April 1st 2006 I came across this article :"German retail banker Postbank will begin using electronic signatures on e-mails to its customers to help protect them from phishing attacks."Catching up with the phishers seems to be a very worrisome future strategy. Electronic Signatures by themselves are rarely checked by anyone, and many more attack vectors are making the idea of
Read More
Posted in | No comments

Securing political investments through censorship

Posted on 09:59 by Unknown
I try to extensively blog on various privacy and Internet censorship related issues affecting different parts of the world, or provide comments on the big picture they way I see it.Spending millions -- 6 million euro here, and I guess you also wouldn't let someone spread the word whether the cover is fancy enough for a vote or not -- on political campaigns to directly or indirectly influence the
Read More
Posted in | No comments

Insider fined $870

Posted on 09:22 by Unknown
Insiders still remain an unresolved issue, where the biggest trade-off is the loss of productivity and trust in the organizational culture. According to the Sydney Morning Herald :"A court in Guangzhou, capital of the southern Chinese province of Guangdong, has upheld a lower court's guilty verdict against Yan Yifan for selling stolen passwords and virtual goods related to the online game "Da
Read More
Posted in | No comments

The "threat" by Google Earth has just vanished in the air

Posted on 08:39 by Unknown
Or has it actually? In one of my previous posts "Security quotes : a FSB (successor to the KGB) analyst on Google Earth" I mentioned the usefulness of Google Earth by the general public, and the possibility to assist terrorists. The most popular argument on how useless the publicly available satellite imagery is that it doesn't provide a high-resolution images, and recent data as well -- that's
Read More
Posted in | No comments

Monday, 3 April 2006

Wanna get yourself a portable Enigma encryption machine?

Posted on 04:12 by Unknown
Hurry up, you still have 5 hours to participate in the sale at Ebay as the BetaNews reported "eBay has long been a purveyor of the unusual and the unique, but it's not often an authentic piece of tech history captures as much attention as the Enigma 3 portable cipher machine that has racked up bids of almost 16,000 euros. The Enigma device was used extensively by Nazi Germany during World War II.
Read More
Posted in | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • Still worry about your search history and BigBrother?
    The Patriot Search, recently started "helping" any government by making your search activity "public". Its search syntax...

Blog Archive

  • ▼  2006 (205)
    • ►  August (22)
    • ►  July (28)
    • ►  June (28)
    • ►  May (33)
    • ▼  April (20)
      • A comparison of US and European Privacy Practices
      • DIY Marketing Culture
      • In between the lines of personal and sensitive inf...
      • Wild Wild Underground
      • 25 ways to distinguish yourself -- and be happy?
      • Why's that radar screen not blinking over there?
      • The anti virus industry's panacea - a virus recove...
      • Digital forensics - efficient data acquisition dev...
      • Spotting valuable investments in the information s...
      • Would somebody please buy this Titan 1 ICBM Missil...
      • Fighting Internet's email junk through licensing
      • Distributed cracking of a utopian mystery code
      • On the Insecurities of the Internet
      • Catching up on how to lawfully intercept in the di...
      • "IM me" a strike order
      • Heading in the opposite direction
      • Securing political investments through censorship
      • Insider fined $870
      • The "threat" by Google Earth has just vanished in ...
      • Wanna get yourself a portable Enigma encryption ma...
    • ►  March (19)
    • ►  February (23)
    • ►  January (32)
  • ►  2005 (4)
    • ►  December (4)
Powered by Blogger.

About Me

Unknown
View my complete profile