As a “teaser”, the Anonymous member released a November 1, 2010 email between two Balboa Insurance (a BAC subsidiary) employees, which while not proving any fraud, indicates he/she does indeed have access. The timeline on the email makes sense as it is a few weeks prior to the original disclosure that Wikileaks would expose BofA. Perhaps the Assange team merely handed off its materials to Anonymous, which has previously demonstrated its solidarity with the Australian on various occasions
Archive for 2011/03/13
A member of the hacker collective Anonymous, which singlehandedly destroyed “hacker defense” firm HB Gary, who goes under the handle OperationLeakS “is claiming to be have emails and documents which prove “fraud” was committed by Bank of America employees, and the group says it’ll release them on Monday”Posted: 2011/03/13 in Education / Awareness
Japan Quake Aftermath Remains Hellish: Aftershocks Expected, Towns Disappear, Volcano Erupts
The Japan Coast Has Shifted 8 Feet Because of the Earthquake
The Japanese Quake Was So Powerful, It Bent the Tokyo Tower
The Japan Tsunami Casually Hits the San Francisco Bay
Watch High-Rise Buildings in Tokyo Sway During Massive Earthquake
The Internet Managed to Stay Up During the Japan Quake
Japan quake live blog: ‘We’re in an emergency, please help us’
Japan battles nuclear meltdown
Plaintiffs are suggesting an award that is more money than the entire music recording industry has made since Edison’s invention of the phonograph in 1877Posted: 2011/03/13 in Education / Awareness, Litigation
State Department spokesperson P.J. Crowley has now come out to say that he believes Manning is being “mistreated” in prisonPosted: 2011/03/13 in Education / Awareness, Public Policy
Now that Warner Brothers has made a number of its films available on Facebook, it is just a matter of time before every other film-maker on the planet jumps on the same bandwagon, and Facebook becomes a credible video alternative, certainly to YouTube, definitely to Amazon, but even more scarily, to NetflixPosted: 2011/03/13 in Education / Awareness, New Business Models, Tech Evolution
Aerial photos taken over Japan have revealed the scale of devastation across dozens of suburbs and tens of thousands of homes and businessesPosted: 2011/03/13 in Education / Awareness
Hover over each satellite photo to view the devastation caused by the earthquake and tsunami
Award-Winning Kansas City Metropolitan Area School District Secures Network and Provides Web Content Filtering for its 21,000 Students and EmployeesPosted: 2011/03/13 in Education / Awareness, Filtering
Engineered to meet the needs of extensive networks like that of Lee’s Summit, the NSA E7500 combines SonicWALL Reassembly-Free Deep Packet Inspection™ (RFDPI) with a multi-core platform. The E7500 is configurable to analyze and control thousands of unique applications. Whether unencrypted or encrypted with SSL, it provides an extra layer of network security and visibility. In addition, it also offers secure SSL VPN remote access to ensure a continuous high availability network connection.
Social media in particular provides dictators with all the information they need for an effective crackdown. Monitoring a revolutionary movement has never been easier – the secret police just need to collect enough tweets and pokesPosted: 2011/03/13 in Education / Awareness, Privacy / Data Protection, Public Policy
Thus, while it’s important to recognise the positive contribution that social media can and does make to popular uprisings, it’s equally important to recognise its shortcomings and vulnerabilities.
The dangers of social media revolt
In order to keep up with the dramatic usage increases and fund network upgrades, service providers will probably have to employ a billing model where charges are partially based on bandwidth usage and traffic types. This kind of a billing model depends on identifying applications being used in real-time by all subscribersPosted: 2011/03/13 in Education / Awareness, Filtering
All this boils down to the ability to look deeper than the packet stream’s IP and TCP/UDP headers. The network must be able to parse through content, assemble enough of an application message, and identify traffic usage and patterns based on this information.
That’s where Deep Packet Inspection (DPI) comes in. DPI enables myriad new capabilities in the realm of network management, QoS, and security functions.
Safa Alkateb, General Manager, Solutions & Services of Cavium Networks, offered details on Deep Packet Inspection applications and hardware/software support that enables multi-gigabit DPI processing in a recent E-cast
As one of the world’s largest access providers, Comcast has put a ton of thought into developing a notification system for their users. Their motivation is clear, and close to the heart of anyone working in security for end user systems: “to advise the user that their computer is infected with malware, that their security is at severe risk and/or has already been compromised, and that it is recommended that they take immediate, corrective action NOW.”Posted: 2011/03/13 in Education / Awareness, Filtering
The solution Comcast developed involves, in effect, hijacking HTTP requests — in other words, interrupting web browsing — on the theory that users who don’t know that they’re infected (or even those who do) will continue accessing web pages.
Perhaps unfortunately, while they were doing this Comcast also came under intense scrutiny in the U.S. over network neutrality issues (a topic which seems no closer to resolution today), while other access providers were slammed for monitoring users’ traffic and inserting extra ads into their browsing experiences (an idea that just won’t die.) Reading the design document for Comcast’s system, which was published by the IETF last week as RFC 6108, it’s clear that Comcast took all of these concerns into account
The copyright owners of the Paris Hilton sex tape ‘One Night in Paris’ filed a lawsuit in January against 843 individuals they accused of sharing the now-infamous movie via BitTorrent. Their lawyer has now been told that he may engage in “immediate discovery” in order to find out the identities of the John Doe defendantsPosted: 2011/03/13 in Education / Awareness, Illegal File Sharing, Litigation
Google Maps’ turn-by-turn navigation (GPS) feature assists users 35 million miles per day and 12 billion miles a year, saving users, both time and fuel (730 years per year and $250,000/year respectively!)
Google also released a map highlighting roads they consider passable post-earthquake, meaning a car subscribing to their navigation service was able to use the road during the past 24 hours. The map is updated daily and can be translated from Japanese to English with Google Translate
Sen. Mike Lee, R-Utah, is calling for hearings into whether Google violates anti-trust laws and abuses its dominant position as the pre-eminent search enginePosted: 2011/03/13 in Education / Awareness, Google, Litigation
Google, Amazon Face Lawsuits Over Search
Cookies are nothing new; companies have been using them – and privacy groups have been complaining about them – for years. But DoubleClick had previously halted its behavioral advertising, as this part of the business is known. After the acquisition, Google brought behavioral techniques back and reintroduced cookies to the DoubleClick networkPosted: 2011/03/13 in Education / Awareness, Google, Online advertising, Stats / reports
Politically motivated attackers are exploiting an unpatched flaw in all supported versions of Microsoft Windows to carry out highly targeted attacks against activists using Google, the company’s security team warnedPosted: 2011/03/13 in Education / Awareness, Google, Network Security, Public Policy
Infatuation with SEO and related technologies extends to companies of all stripes. According to the Search Engine Marketing Professional Organization (SEMPO), North American spending on search marketing is growing nearly 15 percent annually and will top $17 billion this year. This is in addition to the vast sums spent on SEO technology and consultingPosted: 2011/03/13 in Education / Awareness, Stats / reports
Google Earth users can see 3D images of the wedding route of Prince William and Kate Middleton, including central London’s famous landmarks – Westminster Abbey, Trafalgar Square, the London Eye and British Museum. The technology even allows web surfers to “fly” through the procession routePosted: 2011/03/13 in Education / Awareness, Google, Tech Evolution
eCommerce sites urged to clean up content before Google’s ‘Panda’ goes global