Former Soviet Bloc, Allies, Under Lurid Attack

Trend Micro researchers David Sancho and Nart Villeneuve have written up an interesting attack they’ve dubbed LURID on diplomatic missions, government ministries, space-related government agencies and other companies and research institutions in the former Soviet bloc and its allies. (Only China was not a Soviet bloc member or ally in the list, and it was the …

Continue reading ‘Former Soviet Bloc, Allies, Under Lurid Attack’ »

Astroturfers Revisited

Good piece (video) by Jon Ronson about astroturfing: Esc and Ctrl: Jon Ronson investigates astroturfing – video In the second part of Jon Ronson’s series about the struggle for control of the internet, he looks at online astroturfing – when unpopular institutions post fake blogs to seem more favourable. He meets the former vice president …

Continue reading ‘Astroturfers Revisited’ »

Podcast: The Tablet is the Future

The BBC World Service Business Daily version of my piece on the future of tablets.  (The Business Daily podcast is here.)   I’ll post the text itself at some point.  Loose Wireless 110914 To listen to Business Daily on the radio, tune into BBC World Service at the following times, or click here. Australasia: Mon-Fri 0141*, 0741  East Asia: …

Continue reading ‘Podcast: The Tablet is the Future’ »

DigiNotar Breach Notes

Some folk have asked me for more details about the DigiNotar breach after my brief appearance on Al Jazeera this morning. So here are the notes I prepared for the segment. Links at the bottom. Background web security certificates are digital IDs issued by companies entrusted with making sure they are given to the right …

Continue reading ‘DigiNotar Breach Notes’ »

Real Phone Hacking

Interesting glimpse into the real world of phone hacking–not the amateurish stuff we’ve been absored by in the UK–by Sharmine Narwani: In Lebanon, The Plot Thickens « Mideast Shuffle. First off, there’s the indictment just released by the Special Tribunal for Lebanon which, in the words of Narwani, appears to be built on a simple premise: …

Continue reading ‘Real Phone Hacking’ »