True Video Lies

This is a longer version of a piece I recorded for the BBC World Service. The other day my wife lost her phone out shopping. We narrowed it down to either the supermarket or the taxi. So we took her shopping receipt to the supermarket and asked to see their CCTV to confirm she still …

Continue reading ‘True Video Lies’ »

Former Soviet Bloc, Allies, Under Lurid Attack

Trend Micro researchers David Sancho and Nart Villeneuve have written up an interesting attack they’ve dubbed LURID on diplomatic missions, government ministries, space-related government agencies and other companies and research institutions in the former Soviet bloc and its allies. (Only China was not a Soviet bloc member or ally in the list, and it was the …

Continue reading ‘Former Soviet Bloc, Allies, Under Lurid Attack’ »

Taking Shady RAT to the Next Level

I know I’ve drawn attention to this before, but the timeline of McAfee’s Operation Shady RAT by Dmitri Alperovitch raises questions again about WikiLeaks’ original data. Alperovitch points out that their data goes back to mid-2006: We have collected logs that reveal the full extent of the victim population since mid-2006 when the log collection began. Note …

Continue reading ‘Taking Shady RAT to the Next Level’ »

Data, WikiLeaks and War

I’m not going to get into the rights and wrongs of the WikiLeaks thing. Nor am I going to look at the bigger implications for the balance of power between governed and governing, and between the U.S. and its allies and foes. Others have written much better than I can on these topics. I want …

Continue reading ‘Data, WikiLeaks and War’ »

Singapore Details ‘Waves’ of Cyberattacks

Officials and delegates from APEC economies were targeted ahead of last year’s Singapore meeting with malware-laden emails faked so they appeared to have been sent by Singapore government officials on the Organising Committee. Singapore officials have said the attacks were not the first on the country. Although Singapore regularly highlights threats to national security—including Islamic …

Continue reading ‘Singapore Details ‘Waves’ of Cyberattacks’ »

A pale white man shows us what journalism is

My weekly Loose Wire Service column. Is the Internet replacing journalism? It’s a question that popped up as I gazed at the blurred, distorted web-stream of a press conference from London by the founder of WikiLeaks, a website designed to “protect whistleblowers, journalists and activists who have sensitive materials to communicate to the public”. On …

Continue reading ‘A pale white man shows us what journalism is’ »

Indian Slumdwellers Protest Biometric Scanning of Impersonators. I Think

Who says that privacy is only an issue in the First World? According to The Times of India residents of Palsora and Lal Bahadur Shastri colonies have demonstrated against “alleged irregularities in the biometric test, which is being carried out in the slum areas to check “impersonation at any level.” The problem, it seems, is that people …

Continue reading ‘Indian Slumdwellers Protest Biometric Scanning of Impersonators. I Think’ »

The Real Lesson From CardSystems

The sad truth about the CardSystems debacle is that it wasn’t unusual, at least in the delay and obfuscation over reporting it. An AP report in yesterday’s HoustonChronicle says Most businesses do not report cyber attacks to law enforcement authorities, fearing the disclosure would harm their image and benefit rivals, FBI Director Robert Mueller said …

Continue reading ‘The Real Lesson From CardSystems’ »

Fingerprint Readers And Baths

Something I’ve noticed about biometric fingerprint readers. They don’t work well after a bath. Why is that? Are our fingers different after a bath? I mean, they look different — all wrinkly, for one thing — but why does that mess up the fingerprint reader? I do my best thinking in the bath, and it’s …

Continue reading ‘Fingerprint Readers And Baths’ »

Can We Trust Anti-Spy Software?

Who watches over the watchers? In software, it seems, it’s often the same folk.   Reading a press release for X-Cleaner, “a privacy tool suite that detects and removes installed spyware and adware components”, it sounded interesting enough for a mention. After all, it “includes tools to securely delete files, edit the registry, disable startup programs”, …

Continue reading ‘Can We Trust Anti-Spy Software?’ »