Quotulatiousness

March 26, 2013

“It’s as if Doctorow … figured out how to be a novelist and a blogger in the same book”

Filed under: Books, Liberty, Media — Tags: , , , — Nicholas @ 09:15

At Reason, Tom Jackson reviews Cory Doctorow’s Homeland, the sequel to 2007’s Little Brother:

By day, Yallow works within the system, taking a job as a webmaster for an independent candidate for the California senate. By night, he’s a part of a guerrilla WikiLeaks-style operation, trying to deal with goons who are out to get him and hackers trying to control his computer and his information. Life gets even more complicated when he starts participating in large outdoor demonstrations that attract the attention of the police. The story should resonate with any reader who worries about online privacy and the government’s ability to use the Net as a tool for political repression.

Although Yallow and his buddies are fictional, Homeland is studded with educational bits. One early chapter, for example, includes a recipe for cold-brew coffee. A librarian delivers a lecture on copyright reform. While at Burning Man, Doctorow meets four heroes of the Internet — Mitch Kapor, John Gilmore, Wil Wheaton, and John Perry Barlow — and the reader is duly educated on how they relate to the founding of the Electronic Frontier Foundation and the creation of Lotus. The infodump continues after the novel ends, with an afterword by Jacob Appelbaum of WikiLeaks and another by the late Aaron Swartz. (Swartz, facing a federal trial and possible prison on felony charges for downloading academic documents, committed suicide on January 11. His exhortations here not to give in to despair and a feeling of powerlessness make for sad reading, but he also explains how political movements to preserve the Internet from censorship have a chance to succeed.) There is also a bibliographic essay on the topics the book covers. It’s as if Doctorow, well-known both as a science fiction writer and as a contributor to Boing Boing, figured out how to be a novelist and a blogger in the same book.

The encounter with Kapor and company isn’t the only way the novel intersects with reality. Yallow logs on to his laptop using the Paranoid Linux operating system, created to maximize the user’s privacy. Paranoid Linux was fictional when Doctorow invented it in Little Brother, but it inspired the creation of a real, albeit short-lived, Paranoid Linux distro. And if you Google “Paranoid Linux,” you’ll learn about current Linux distributions that emphasize security, such as Tails and LPS. As Doctorow notes in his afterword, Googling terms in the book that might be unfamiliar to the reader — “hackerspace,” “drone,” “Tor Project,” “lawful intercept” — provides many of the novel’s educational experiences.

March 9, 2013

What if physical objects had DRM?

Filed under: Humour, Law, Media — Tags: , , , — Nicholas @ 09:58

From TechHive:

In many cases, DRM can be get kind of silly, and it can completely shape the way you use the digital media you purchase. DRM might make you think twice about how many devices you can still add your iTunes Library to, or which computer will get a shiny new version of image editing software.

Luckily there’s no DRM on any physical objects like a cup paired to one person’s mouth. That is, there wasn’t until a group of hackers put together a chair that self-destructs after eight uses.

February 28, 2013

Cybersecurity … can it be anything more than fear + handwaving = “we must have a law!”

Filed under: Business, Government, Law, Technology — Tags: , , , , , — Nicholas @ 00:01

At Techdirt, Mike Masnick fisks “the worst article you might ever read about ‘Cybersecurity'”:

There has been a lot of discussion lately about “cybersecurity” “cyberwar” “cyberattacks” and all sorts of related subjects which really really (really!) could do without the outdated and undeniably lame “cyber-” prefix. This is, in large part, due to the return of CISPA along with the White House’s cybersecurity executive order. Of course, the unfortunate part is that we’re still dealing in a massive amount of hype about the “threats” these initiatives are trying to face. They’re always couched in vague and scary terms, like something out of a movie. There are rarely any specifics, and the few times there are, there is no indication how things like CISPA would actually help. The formula is straightforward: fear + handwaving = “we must have a law!”

However, I think we may now have come across what I believe may top the list of the worst articles ever written about cybersecurity. If it’s not at the top, it’s close. It is by lawyer Michael Volkov, and kicks off with a title that shows us that Volkov is fully on board with new laws and ramping up the FUD: The Storm Has Arrived: Cybersecurity, Risks And Response. As with many of these types of articles, I went searching for the evidence of these risks, but came away, instead, scratching my head, wondering if Volkov actually understands this subject at all, with his confused thinking culminating in an amazing paragraph so full of wrong that almost makes me wonder if the whole thing is a parody.

[. . .]

There’s been plenty of talk about these Chinese hacks, which definitely do appear to be happening. But, what economic activity has been undermined? So far, the hacks may have been a nuisance, but it’s unclear that they’ve done any real damage. It is also unclear how CISPA helps stop such hacks, other than making Congress feel like it’s “done something.”

Are there issues with online security that need to be taken seriously? Yes, absolutely. Do we need legislation to deal with those problems? That’s debatable, and we’re still waiting for some evidence not just of scary sounding threats, but that this kind of legislation will actually help. Unfortunately, this article keeps us waiting. But, it did make us laugh. Unintentionally (we think).

February 13, 2013

US Cyber Command’s recruiting headache

Filed under: Bureaucracy, Military, Technology, USA — Tags: , , , — Nicholas @ 09:23

Strategy Page on the “who could possibly have seen this coming” problems that the new electronic warfare organization is having with staffing:

U.S. Cyber Command (USCYBERCOM) has been operational for two years now, and it is encountering some serious problems in recruiting people qualified to deal with the enemy (skilled hackers attacking American networks for whatever reason). People in the software and Internet security business have been telling Cyber Command leaders that they will have to change the way they recruit if they want to get qualified people. That means hiring hackers who lived on the dark side (criminal hacking) at one point or another. Such recruits would not pass the screening usually given to potential government employees who would be handling, and protecting, classified information and critical Internet systems. Few government officials are willing to bend the rules, mainly because no one wants to be responsible for some rogue hacker who got hired without the usual screening. It’s safer to go by the book and use that for your defense when the inadequate recruiting effort leads to a major Cyber War disaster.

Cyber Command is headquartered in Fort Meade (outside Washington, DC), most of the manpower, and capabilities, come from the Cyber War operations the military services have already established. Within Cyber Command there are some smaller organizations that coordinate Cyber War activities among the services, as well as with other branches of the government and commercial organizations that are involved in network security. At the moment Cyber Command wants to expand its core staff from 900 to 4,900 in the next five years. Twenty percent of those new people will be civilians, including a number of software specialists sufficiently skilled to quickly recognize skillful intrusions into American networks and quickly develop countermeasures. That kind of talent is not only expensive, but those who possess often have work histories that don’t pass the normal screening. These are the personnel Cyber Command is having a difficult time recruiting.

The big problems are not only recruiting hackers (technical personnel who can deal with the bad-guy hackers out there) but also managing them. The problem is one of culture, and economics. The military is a strict hierarchy that does not, at least in peacetime, reward creativity. Troops with good technical skills can make more money, and get hassled less, in a similar civilian job. The military is aware of these problems, but it is slow going trying to fix them.

January 28, 2013

Anthropology of the hacker community

Filed under: Books, History, Media, Technology — Tags: , , , — Nicholas @ 09:17

ESR reviews a new book about hackers:

My usual audience is well aware why I am qualified to review Gabriella Coleman’s book, Coding Freedom, but since I suspect this post might reach a bit beyond my usual audience I will restate the obvious. I have been operating as the hacker culture’s resident ethnographer since around 1990, consciously applying the techniques of anthropological fieldwork (at least as I understood them) to analyze the operation of that culture and explain it to others. Those explanations have been tested in the real world with large consequences, including helping the hacker culture break out of its ghetto and infect everything that software touches with subversive ideas about open processes, transparency, peer review, and the power of networked collaboration.

Ever since I began doing my own ethnographic work on the hacker culture from the inside as a participant, I have keenly felt the lack of any comparable observation being done by outsiders formally trained in the techniques of anthropological fieldwork. I’m an amateur, self-trained by reading classic anthropological studies and a few semesters of college courses; I know relatively little theory, and have had to construct my own interpretative frameworks in the absence of much knowledge about how a professional would do it.

Sadly, the main thing I learned from reading Gabriella Coleman’s new book, Coding Freedom, is that my ignorance may actually have been a good thing for the quality of my results. The insight in this book is nearly smothered beneath a crushing weight of jargon and theoretical elaboration, almost all of which appears to be completely useless except as a sort of point-scoring academic ritual that does less than nothing to illuminate its ostensible subject.

[. . .]

Far too much of the book exhibits this kind of theory-induced blindness. I am inclined to blame not Coleman for it but rather the people who trained and indoctrinated her in how to think and write like a ‘real’ anthropologist. If Coding Freedom is really the sort of book anthropology wants its bright young things to emit, the field is in desperately bad shape — far too inward-looking, over-abstract, mired in self-reference and tail-chasing, obsessed with politicized modes of non-explanation. I would actually prefer the theory that Coleman is a dimwit who has emitted a sort of unintentional parody of real anthropology if I could make myself believe it, but I can’t — her best moments seem too lucid for that.

She is very perceptive, for example, about the central role of hacker humor in promoting social bonding and affirming the culture’s values (I’ve explored this theme myself). Her ground-level reporting about the emotional atmosphere of hacker conferences and demonstrations is acute. Her discussion of how hackers as a culture have bootstrapped themselves to a state of legal literacy in order to fight their corner of the intellectual-property wars gives one of the gifts that ethnography should — to help us see how remarkable and interesting are practices we might otherwise take for granted.

There is even one significant thing I learned from this book, or at least learned to see in a new way. I hadn’t noticed before how ritualized the practice of writing damning comments about bad code is. Coleman is right that they display a level of pointed and deliberate rudeness that their authors would not employ face-to-face, and she is right about how and why the culture gives permission for this behavior.

January 25, 2013

Even before “The internet is for porn”, mainframe computers were for cheesecake

Filed under: History, Media, Technology — Tags: , , — Nicholas @ 09:47

The very first human image displayed on a computer was a pinup girl:

First human image on a computer

During a time when computing power was so scarce that it required a government-defense budget to finance it, a young man used a $238 million military computer, the largest such machine ever built, to render an image of a curvy woman on a glowing cathode ray tube screen. The year was 1956, and the creation was a landmark moment in computer graphics and cultural history that has gone unnoticed until now.

Using equipment designed to guard against the apocalypse, a pin-up girl had been drawn.

She was quite probably the first human likeness to ever appear on a computer screen.

She glowed.

[. . .]

In early 1959, 21-year-old Airman First Class Lawrence A. Tipton snapped the only known photo of this pin-up program in action at Ft. Lee. The photo shows the tube of an SD console displaying the outline of woman with her arms held high, cradling her head while emphasizing her bosom. She reclines awkwardly, her legs splayed apart in an uncomfortable but provocative pose that smacks of mid-century pin-up art.

“One day I decided to take pictures for posterity’s sake,” recalls Tipton, “And those two Polaroids are the only ones that made it out of the building.” The other Polaroid is a self-portrait of Tipton himself sitting in front of the AN/FSQ-7’s Duplex Maintenance Console. “We used the Polaroid cameras to take pictures of anomaly conditions. When the computers would malfunction, you’d take pictures of those main consoles to diagnose the conditions.”

January 16, 2013

Prosecutorial abuse and the Swartz case

Filed under: Government, Law, USA — Tags: , , , , — Nicholas @ 13:05

Writing in the Guardian, Glenn Greenwald calls for reform in the way prosecutors are immune from any consequences of their misdeeds:

To begin with, there has been a serious injustice in the Swartz case, and that alone compels accountability. Prosecutors are vested with the extraordinary power to investigate, prosecute, bankrupt, and use the power of the state to imprison people for decades. They have the corresponding obligation to exercise judgment and restraint in how that power is used. When they fail to do so, lives are ruined — or ended.

The US has become a society in which political and financial elites systematically evade accountability for their bad acts, no matter how destructive. Those who torture, illegally eavesdrop, commit systemic financial fraud, even launder money for designated terrorists and drug dealers are all protected from criminal liability, while those who are powerless — or especially, as in Swartz’s case, those who challenge power — are mercilessly punished for trivial transgressions. All one has to do to see that this is true is to contrast the incredible leniency given by Ortiz’s office to large companies and executives accused of serious crimes with the indescribably excessive pursuit of Swartz.

This immunity for people with power needs to stop. The power of prosecutors is particularly potent, and abuse of that power is consequently devastating. Prosecutorial abuse is widespread in the US, and it’s vital that a strong message be sent that it is not acceptable. Swartz’s family strongly believes — with convincing rationale — that the abuse of this power by Ortiz and Heymann played a key role in the death of their 26-year-old son. It would be unconscionable to decide that this should be simply forgotten.

[. . .]

In most of what I’ve written and spoken about over the past several years, this is probably the overarching point: the abuse of state power, the systematic violation of civil liberties, is about creating a Climate of Fear, one that is geared toward entrenching the power and position of elites by intimidating the rest of society from meaningful challenges and dissent. There is a particular overzealousness when it comes to internet activism because the internet is one of the few weapons — perhaps the only one — that can be effectively harnessed to galvanize movements and challenge the prevailing order. That’s why so much effort is devoted to destroying the ability to use it anonymously — the Surveillance State — and why there is so much effort to punishing as virtual Terrorists anyone like Swartz who uses it for political activism or dissent.

The law and prosecutorial power should not be abused to crush and destroy those who commit the “crime” of engaging in activism and dissent against the acts of elites. Nobody contests the propriety of charging Swartz with some crime for what he did. Civil disobedience is supposed to have consequences. The issue is that he was punished completely out of proportion to what he did, for ends that have nothing to do with the proper administration of justice. That has consequences far beyond his case, and simply cannot be tolerated.

Update: Radley Balko‘s latest column is also on the topic of the public prosecutor.

The death of Internet activist Aaron Swartz has generated a lot of discussion about the power of prosecutors — particularly federal prosecutors. This is a good thing. The conversation is long overdue. But the discussion needs to go well beyond on Swartz and the Computer Fraud and Abuse Act.

Prosecutors have enormous power. Even investigations that don’t result in any charges can ruin lives, ruin reputations, and drive their targets into bankruptcy. It has become an overtly political position — in general, but particularly at the federal level. If a prosecutor wants to ruin your life, he or she can. Even if you’ve done nothing wrong, there isn’t a whole lot you can do about it.

There are a number of factors that got us here, and it’s worth looking at them in turn.

January 13, 2013

“Please don’t pathologize this story”

Filed under: Law, Media, USA — Tags: , , , , — Nicholas @ 11:34

A plea for understanding, not just for the late Aaron Swartz, but also for the ethically broken justice system:

No doubt it is a certain crazy that brings a person as loved as Aaron was loved (and he was surrounded in NY by people who loved him) to do what Aaron did. It angers me that he did what he did. But if we’re going to learn from this, we can’t let slide what brought him here.

First, of course, Aaron brought Aaron here. As I said when I wrote about the case (when obligations required I say something publicly), if what the government alleged was true — and I say “if” because I am not revealing what Aaron said to me then — then what he did was wrong. And if not legally wrong, then at least morally wrong. The causes that Aaron fought for are my causes too. But as much as I respect those who disagree with me about this, these means are not mine.

[. . .]

Here is where we need a better sense of justice, and shame. For the outrageousness in this story is not just Aaron. It is also the absurdity of the prosecutor’s behavior. From the beginning, the government worked as hard as it could to characterize what Aaron did in the most extreme and absurd way. The “property” Aaron had “stolen,” we were told, was worth “millions of dollars” — with the hint, and then the suggestion, that his aim must have been to profit from his crime. But anyone who says that there is money to be made in a stash of ACADEMIC ARTICLES is either an idiot or a liar. It was clear what this was not, yet our government continued to push as if it had caught the 9/11 terrorists red-handed.

Cory Doctorow has a heartfelt obituary up on Boing Boing.

December 4, 2012

Tumblr gets trolled

Filed under: Media, Technology — Tags: , , , , — Nicholas @ 09:58

The Register‘s John Leyden on the JavaScript troubles inflicted on Tumblr the other day:

A worm spread like wildfire across Tumblr on Monday, defacing pages on the blogging website with an abusive message penned by a notorious trolling crew.

The outbreak was triggered by the GNAA, a group of anonymous troublemakers who get their kicks from winding up bloggers with offensive posts.

Tumblr temporarily halted the publication of new journal posts to prevent the worm from spreading further before restoring the service to normal a few hours later.

[. . .]

“It appears that the worm took advantage of Tumblr’s reblogging feature, meaning that anyone who was logged into Tumblr would automatically reblog the infectious post if they visited one of the offending pages,” wrote Graham Cluley, senior technology consultant at Sophos.

“It shouldn’t have been possible for someone to post such malicious JavaScript into a Tumblr post — our assumption is that the attackers managed to skirt around Tumblr’s defences by disguising their code through Base 64 encoding and embedding it in a data URI,” he added.

November 25, 2012

Anthropology and hacker culture

Filed under: Media, Technology — Tags: , , , , — Nicholas @ 11:56

Cory Doctorow on a new book by Biella Coleman called Coding Freedom: The Ethics and Aesthetics of Hacking:

[Coleman’s dissertation has been], edited and streamlined, under the title of Coding Freedom: The Ethics and Aesthetics of Hacking, which comes out today from Princeton University Press (Quinn Norton, also well known for her Wired reporting on Anonymous and Occupy, had a hand in the editing). Coding Freedom walks the fine line between popular accessibility and scholarly rigor, and does a very good job of expressing complex ideas without (too much) academic jargon.

Coding Freedom is insightful and fascinating, a superbly observed picture of the motives, divisions and history of the free software and software freedom world. As someone embedded in both those worlds, I found myself surprised by connections I’d never made on my own, but which seemed perfectly right and obvious in hindsight. Coleman’s work pulls together a million IRC conversations and mailing list threads and wikiwars and gets to their foundations, the deep discussion evolving through the world of free/open source software.

October 27, 2012

Do you use a stupidly easy-to-guess password?

Filed under: Technology — Tags: , , , , — Nicholas @ 11:15

SplashData has released an updated list of the top 25 passwords gleaned by hackers from stolen password files:

# Password Change from 2011
1 password Unchanged
2 123456 Unchanged
3 12345678 Unchanged
4 abc123 Up 1
5 qwerty Down 1
6 monkey Unchanged
7 letmein Up 1
8 dragon Up 2
9 111111 Up 3
10 baseball Up 1
11 iloveyou Up 2
12 trustno1 Down 3
13 1234567 Down 6
14 sunshine Up 1
15 master Down 1
16 123123 Up 4
17 welcome New
18 shadow Up 1
19 ashley Down 3
20 football Up 5
21 jesus New
22 michael Up 2
23 ninja New
24 mustang New
25 password1 New

If you recognize any password on this list … do yourself a favour and change it to something not on the list, preferably using more characters (including upper and lower case letters, numbers, and symbols). And don’t use the same password on multiple sites! SplashData sells a password keeper application that is quite useful (I’ve been using it for years now), and is available for multiple platforms.

July 12, 2012

Säkerhetsbloggen does some preliminary analysis of Yahoo’s 453,000 leaked passwords

Filed under: Technology — Tags: , , , , , — Nicholas @ 10:01

As we’ve noticed before, there are lots of really, really bad passwords in use:

Recently, Ars Technica reported about a leak by “D33ds Company” of more than 450.000 plain-text accounts from a Yahoo service, which is suspected to be Yahoo Voice.

Since all the accounts are in plain-text, anyone with an account present in the leak which also has the same password on other sites (e-mail, Facebook, Twitter, etc), should assume that someone has accessed their account.

[. . .]

Total entries = 442773
Total unique entries = 342478

Top 10 passwords
123456 = 1666 (0.38%)
password = 780 (0.18%)
welcome = 436 (0.1%)
ninja = 333 (0.08%)
abc123 = 250 (0.06%)
123456789 = 222 (0.05%)
12345678 = 208 (0.05%)
sunshine = 205 (0.05%)
princess = 202 (0.05%)
qwerty = 172 (0.04%)

Other bits of password-related idiocy are here.

June 5, 2012

Stuxnet, Duqu, and Flame: joint US-Israeli projects

Filed under: Middle East, Military, Technology, USA — Tags: , , , , , — Nicholas @ 09:02

The US and Israeli governments have admitted that the Stuxnet, Duqu, and Flame malware infections were joint efforts:

American and Israeli officials have finally confirmed that the industrial grade Cyber War weapons (Stuxnet, Duqu and Flame) used against Iran in the last few years were indeed joint U.S.-Israel operations. No other details were released, although many more rumors are now circulating. The U.S. and Israel were long suspected of being responsible for these “weapons grade” computer worms. Both nations had the motive to use, means to build and opportunity to unleash these powerful Cyber War weapons against Iran and other that support terrorism.

The U.S. Department of Defense had long asked for permission to go on the offensive using Cyber War weapons. But the U.S. government regularly and publicly declined to retaliate against constant attack from China, mainly because there were fears that there could be legal repercussions and that weapons used might get out of control and cause lots of damage to innocent parties.

Iran turned out to be another matter. Although not a serious Cyber War threat to the United States, Iran was trying to build nuclear weapons and apparently Israel had already been looking into using a Cyber War weapon to interfere with that. Given the nature of these weapons, which work best if the enemy doesn’t even know they exist, don’t expect many details to be released about this Cyber War program. What is known is that the Cyber War weapons unleashed on Iran were designed to concentrate only on very specific targets. So far, only three weapons that we know of have been used. One (Stuxnet) was designed to do damage to one specific facility, the plant where Iran produced nuclear fuel for power plants, and atomic weapons. That one worked. The other two (Duqu and Flame) were intelligence collection programs. They also apparently succeeded, remaining hidden for years and having lots of opportunity to collect enormous quantities of valuable data.

May 15, 2012

Nerd politics: problems and opportunities

Filed under: Government, Liberty, Politics, Technology — Tags: , , , , , , — Nicholas @ 00:08

Cory Doctorow in the Guardian on the current state of “nerd politics:

In the aftermath of the Sopa fight, as top Eurocrats are declaring the imminent demise of Acta, as the Trans-Pacific Partnership begins to founder, as the German Pirate party takes seats in a third German regional election, it’s worth taking stock of “nerd politics” and see where we’ve been and where we’re headed.

Since the earliest days of the information wars, people who care about freedom and technology have struggled with two ideological traps: nerd determinism and nerd fatalism. Both are dangerously attractive to people who love technology.

In “nerd determinism,” technologists dismiss dangerous and stupid political, legal and regulatory proposals on the grounds that they are technologically infeasible. Geeks who care about privacy dismiss broad wiretapping laws, easy lawful interception standards, and other networked surveillance on the grounds that they themselves can evade this surveillance. For example, US and EU police agencies demand that network carriers include backdoors for criminal investigations, and geeks snort derisively and say that none of that will work on smart people who use good cryptography in their email and web sessions.

But, while it’s true that geeks can get around this sort of thing — and other bad network policies, such as network-level censorship, or vendor locks on our tablets, phones, consoles, and computers — this isn’t enough to protect us, let alone the world. It doesn’t matter how good your email provider is, or how secure your messages are, if 95% of the people you correspond with use a free webmail service with a lawful interception backdoor, and if none of those people can figure out how to use crypto, then nearly all your email will be within reach of spooks and control-freaks and cops on fishing expeditions.

[. . .]

If people who understand technology don’t claim positions that defend the positive uses of technology, if we don’t operate within the realm of traditional power and politics, if we don’t speak out for the rights of our technically unsophisticated friends and neighbours, then we will also be lost. Technology lets us organise and work together in new ways, and to build new kinds of institutions and groups, but these will always be in the wider world, not above it.

May 11, 2012

Britain’s government websites under attack

Filed under: Britain, China, Government, Technology — Tags: , , , — Nicholas @ 09:06

Perhaps I’m just cynical, but I had expected that any government website would need to be “hardened” against attack. The British government’s many official websites have indeed been undergoing attacks for quite some time:

The British Ministry of Defense has admitted, for the first time, that it is under heavy attack by hackers. It was also revealed that some of these attacks had succeeded. The good news is that the military is becoming more aggressive and imaginative in dealing with Cyber War defense. China was not directly accused of being behind any of these attacks, but it was mentioned that there are now discussions underway with the Chinese on the matter. All this is an old problem.

Last year, Britain went public to report a higher number of Internet based attacks. The report noted that the emphasis was now on economic assets. This included technology and business plans. For example, the Foreign and Commonwealth Office was under heavy cyber-attack for several months, apparently in an effort to obtain secret details of government plans and techniques for supporting British exports. Government Internet security officials were making all this public to encourage British firms to increase their Internet security.

All this was nothing new. Two years ago Britain’s domestic intelligence service, MI5, went public with numerous charges of Chinese Internet based espionage. MI5 accused China of using both agents and hacker software, to obtain secrets from specific companies and government organizations. This approach had Chinese personnel approaching specific British businessmen at trade shows, and offering gifts, like a thumb drive loaded with hidden hacker software that will load itself on to the victim’s PC and seek out valuable information. Internet based attacks, traced back to China, continue to send real looking email that has an attachment containing another of those stealthy hacker programs that seek out secrets, or even quietly take over the user’s PC. Three years ago, MI-5 sent alerts to major corporations warning them of similar attacks and advising increased security of their data.

« Newer PostsOlder Posts »

Powered by WordPress