Power Failure Not Tied to Worm
According to Wired.
Paller said it is "highly unlikely" that the process (that) controls computers behind critical infrastructure like power in the United States would run on the Windows operating system.
A real-life COUNTER-GOOGLING example? The Bel Air Hotel in LA already Googles first-time guests upon arrival, based on their reservation details (name and address), leading to personalized services like assigning guests a room with morning sun if Googling shows the guest enjoys jogging early in the day.
Dark hint of security weakness
NY Daily News on the implications of yesterday's power problems in the Northeast.
The outages' domino effect proved that securing computer networks and facilities in one state could be rendered ineffective if a connecting power system's safeguards fail, these expert said.
Edwards AFB shutdown
From the Washington Times:
Computer systems at Edwards Air Force Base, Calif., were shut down this week as a result of the "Blaster" computer worm.
The FBI is looking for the origins of Blaster. This report got me wondering - how do you track the source of a massive worm or virus? My best guess would be trying to document a few of the earliest reports and tracing back from there, if at all possible. That's assuming some doofus wasn't out bragging all over IRC about his l33t new worm.
What's Worse, a Virus or a Worm?
Old Slate piece on the difference between a virus and a worm.
A Microsoft Burden?
Jupiter Research analyst Michael Gartenberg comments on Blaster and everyday security. Some very good points, I like the excerpt below.
If security issues are going to be resolved itís going to take more than finger pointing at the folks in Redmond. IT managers need to take accountability for their systems, software vendors for the correct installation and maintenance of their programs and consumers for their households. This is the price of the enablement provided by a digital lifestyle.
Def Con 0xB
Def Con roundup. Decent review by a conference attendee.
A take on futures
Excellent, insightful comments on the recently nixed DARPA futures project. Also ties into the Security Focus column on a futures market for the computer security world.
One of the goals of Delphi is to dig out hidden consensus among differing viewpoints on the same topic. While a simple numeric score may seem a blunt object for forecasting, a group of scores creates an interesting analysis tool. For instance, a strong bi-modal distribution several related topics is highly suggested of a paradigm rift. Delphi is also useful to dig out 'sneaking suspicions' that are valuable insights, but may never get aired in a formal group presentation.
Who's watching the class?
USAToday reports on the nearly 500 webcams installed in Biloxi classrooms to monitor students and teachers.