Jump to content

qwertyaccount

Elite Member
  • Content Count

    1922
  • Joined

  • Last visited

Everything posted by qwertyaccount

  1. My concerns are: -that the officer would have control about when the recording starts, pauses, and ends. -that the officer or station would have the ability to delete or edit the videos -that the officer could "lose" a camera that contains an unfavourable recording -that the recordings could be posted without the permission of the recorded, making public what would previously be a mostly private exchange. There are many benefits, but it may also discourage people from engaging with the police if they fear the interaction would be made public.
  2. So you're computer has the most up-to-date and secure operating system and anti-virus software on the planet, no problem, the bad guys will attack your other toys instead. "The more they overthink the plumbing, the easier it is to stop up the drain." -Scotty Published January 20, 2014/ SkyNews Hackers have used a refrigerator to send spam emails in the first proven cyber attack of its kind. Internet-connected home appliances were infected by a large "botnet" over a two-week period from December 23, according to California security firm Proofpoint. It said hackers managed to penetrate home-networking routers, connected multimedia centers, televisions and at least one refrigerator to create a platform to deliver malicious spam or phishing emails. The firm said the case "has significant security implications for device owners and enterprise targets" because of massive growth expected in the use of smart and connected devices, from clothing to appliances. It said these appliances may become attractive targets for hackers because they often have less security than PCs or tablets. Incidents were documented between December 23 and January 6 featuring "waves of malicious email, typically sent in bursts of 100,000, three times per day, targeting enterprises and individuals worldwide." More than a quarter of the emails were sent by things that were not conventional laptops, desktop computers or mobile devices. "Botnets are already a major security concern -- and the emergence of thingbots may make the situation much worse," Proofpoint's David Knight said. "Many of these devices are poorly protected at best and consumers have virtually no way to detect or fix infections when they do occur. Enterprises may find distributed attacks increasing as more and more of these devices come online and attackers find additional ways to exploit them."
  3. Please keep in mind this is [I]only[/I] for the Windows XP anti-malware (anti-virus) program Microsoft Security Essentials and [B]not for the operating system itself[/B]. In April, Microsoft will cease publishing Windows XP patches, an event that Microsoft calls â??zero day forever.â? Windows XP computers wonâ??t receive any additional security updates, making them easier targets for hackers.
  4. [FONT=Arial][COLOR=blue]By Sean Michael Kerner | Posted 2014-01-16[/COLOR][/FONT] [FONT=Arial][COLOR=#0000ff][URL]http://www.eweek.com/security/java-primary-cause-of-91-percent-of-attacks-cisco.html[/URL][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [B] [FONT=Arial][COLOR=blue]Cisco's 2014 Annual Security Report points the blame at Oracle's Java for being a leading cause of security woes.[/COLOR][/FONT] [/B] [FONT=Arial][COLOR=blue]There are many different risks and attacks that IT professionals had to deal with in 2013, but no one technology was more abused or more culpable that Java, according to Cisco's latest annual security report.[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]The [/COLOR][/FONT][URL="http://www.cisco.com/web/offers/lp/2014-annual-security-report/index.html"][FONT=Arial][COLOR=blue]Cisco 2014 Annual Security Report[/COLOR][/FONT][/URL][FONT=Arial][COLOR=blue] found that Java represented 91 percent of all Indicators of Compromise (IOCs) in 2013.[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]What that means is that the final payload in observed attacks was a Java exploit, Levi Gundert, technical lead, Cisco Threat Research, Analysis, and Communications (TRAC), explained to [I]eWEEK[/I].[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]The Java data comes into the Cisco threat report by way of the Sourcefire Vulnerability Research Team (VRT), which became part of Cisco in 2013 with the $2.7 billion [/COLOR][/FONT][URL="http://www.eweek.com/security/cisco-execs-sourcefire-deal-bolsters-security-portolio.html"][FONT=Arial][COLOR=blue]acquisition[/COLOR][/FONT][/URL][FONT=Arial][COLOR=blue] of Sourcefire.[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]"I was surprised to see that the Java IOC number was 91 percent," Gundert said. "There were a number of Java zero days that were used in various attacks, but there were also a ton of well-known Java vulnerabilities that were packaged into various exploit packs."[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]Cisco isn't the only one that saw a high degree of Java exploit activity in 2013. Multiple vendors, including Hewlett-Packard and Kaspersky Lab, [/COLOR][/FONT][URL="http://www.eweek.com/security/java-attacks-surge-in-2013.html"][FONT=Arial][COLOR=blue]reported [/COLOR][/FONT][/URL][FONT=Arial][COLOR=blue]a surge in Java attacks during 2013. Just yesterday, Oracle [/COLOR][/FONT][URL="http://www.eweek.com/security/oracle-patches-144-new-security-vulnerabilities-to-start-2014.html"][FONT=Arial][COLOR=blue]updated Java[/COLOR][/FONT][/URL][FONT=Arial][COLOR=blue] yet again, this time for 51 vulnerabilities.[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]"2013 really was the year of Java exploits," Gundert said.[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]Java exploits tend to have great success because people simply just aren't patching it regularly, Gundert said.[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]Java is such a juicy target for the same reason it is popular with enterprises and developers: It's portable and works on any operating system. [/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]The challenge is that, with a large Java application, patching isn't always easy, as there is always the potential that the patch could break functionality within the application, Gundert said.[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]"For business users, the challenge is more complex than just simply saying you need to patch," Gundert said.[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]Patching alone, however, isn't enough. There were a number of zero-day Java exploits in 2013â??including an attack that [/COLOR][/FONT][URL="http://www.eweek.com/security/zero-day-exploit-enabled-cyber-attack-on-us-labor-department/"][FONT=Arial][COLOR=blue]affected [/COLOR][/FONT][/URL][FONT=Arial][COLOR=blue]the U.S. Department of Laborâ??that were actively being exploited, before any patch was available.[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]Aside from just not using or disabling Java, which isn't always an option for enterprise users, Gundert has a few suggestions. At the top of the list is a need for some form of behavior detection that monitors a user's chain of events before they land on an exploit.[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]"For example, is a user requesting a Web page that included obfuscated JavaScript, and is the user being redirected?" Gundert asked.[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]Most legitimate Websites will not use hidden or obfuscated JavaScript, and few will redirect users without authorization, he explained.[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [B][FONT=Arial][COLOR=blue]Overall 2013 Trends[/COLOR][/FONT][/B] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]While the use of Java is a highlight of the Cisco report, there are other key data points, including the fact that the overall number of threats rose by 14 percent on a year-over-year basis.[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]Another surprising finding is that among a sample of 30 large, multinational company networks taken by Cisco, 100 percent of them at some point in 2013 visited a Website that hosts malware.[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]"I was really surprised that the number was 100 percent," Gundert said. "It speaks to the fact that it's not about when an organization will be compromised; it's more about how long it will take an organization to detect a compromise and if the remediation window can be shortened."[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]Adding to the security challenges enterprises faced in 2013 is a human resources issue. Cisco's report claims that in 2014 there will be 1 million fewer security professionals available than what is needed.[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [FONT=Arial][COLOR=blue]"2013 was a bleak year, looking at the threat landscape," Gundert said. "Regardless of the tools that you have, if you don't have the right people in place, effective security is going to be very difficult."[/COLOR][/FONT] [FONT=Arial][COLOR=blue][/COLOR][/FONT] [I][FONT=Arial][COLOR=blue][/COLOR][/FONT][/I] [FONT=Arial][COLOR=blue][I]Sean Michael Kerner is a senior editor at [/I]eWEEK[I] and [/I]InternetNews.com.[I] Follow him on Twitter[URL="https://www.twitter.com/techjournalist"] @TechJournalist[/URL][/I].[/COLOR][/FONT]
  5. How do I get a square peg into a round hole?
  6. There is no solution that I can think of that will make everyone happy that is also economically viable. Enforcing existing laws about animal abandonment/cruelty would help reduce the number of new animals added to the feral population but proving that the animal didn't just "run away" could be problematic. The biggest problem/hurdle is likely the feral animal breeding population - even if 100% of owned animals were spade/neutered the feral population would continue to grow. For owned animals, Brad is on the right track but further burdening the taxpayer isn't the answer; "free" government programs often don't work the whey they were intended to - it's easy to bring a horse to water but it's hard to make them drink. There will always be some people that want to breed their animals (for sale) and those that think that one day they may want to. There will be many that just can't be bothered, even if it's free. If all pets require a license the license fee could be set such that the fee for a spade/neutered animal is substantially less than that of a breeder.
  7. For dinner I want steak, ribs and fully loaded potatoes. I need to watch my cholesterol.
  8. Congratulations - you're posts have been anything but "empty".
  9. Having to converse with your family - no TV tonight because the cat chewed the cable box's wire.
  10. 33. And never, ever, mention "Bats in the cave".
  11. 31. If you have a murphy bed, make sure that it stays down. Getting trapped in one can be a lot of fun, but you lose access to the bacon and it's hard to switch the unicorn hat around.
  12. Actor Russell Johnson, who played The Professor on "Gilligan's Island," has died. He was 89. Johnson's agent told Fox News that the actor passed away at his home in Washington State on Thursday morning of natural causes, with his wife and daughter by his side. Johnson's co-star Dawn Wells, who played Mary Anne on the show, posted on her Facebook page: "My 2 favorite people are now gone. The professor past (sic) away this morning. My heart is broken." "Russell was a true gentleman, a good father, a great friend, and 'the rest,'" Wells wrote. Wells and Tina Louise, who played Ginger, are the show's last two surviving cast members. Johnson starred on "Gilligan's Island," a classic TV comedy about a mismatched set of castaways stranded on a deserted island, from 1964 to 1967. His character, high school science teacher Roy Hinkley, built generators and other gadgets out of scraps of junk found on the island. Johnson later joked that the one thing The Professor never figured out how to do was to fix the leaky boat so the group could get back to civilization. Johnson started out in westerns and sci-fi movies, including "It Came From Outer Space." After "Gilligan's Island" he worked regularly with small parts on television. What was your favourite Professor scene?
  13. -disposable cameras -disc film cameras -photo huts -people looking through a drug store window watching other peoples newly developed pictures pop out of the developing machine -men wearing makeup
  14. I'm not into dudes so that won't do me much good but I do daydream about some of the ladies having sex with themselves :) Here's 10 Amazing 3-D Printer Creations From CES 2014: http://www.crn.com/slide-shows/components-peripherals/240165465/10-amazing-3-d-printer-creations-from-ces-2014.htm
  15. I want to have sex with 3 women at the same time (trio). I need to learn how to do it right with just one.
  16. 12. Reheating refrigerated bread Bread should not be refrigerated - the chemical process that makes bread go stale occurs many times faster at refrigerator temperatures. Either keep bread at room temperature or freeze it.
  17. RG - I didn't heed your warning and now I too now need a new keyboard.
  18. Today I'm wearing my bathing suit. Not to go swimming. Today will now be laundry day.
  19. Don't shoot the messenger - it's actually an Associated Press publication that Fox reprinted.
×
×
  • Create New...