The Week That Was – 4/15/2013

I’ve got one metric butt load of links for you this week.  There is a lot of good stuff but here are some of the highlights:

Doctor Dan Colman, Winton Professor for the Public Understanding of Risk at Cambridge University, has shared a really interesting video on risk.  [1],[9]  His point is that sometimes it’s riskier to avoid risk than to accept it.  He uses some good everyday examples to illustrate his point.  As an information security risk guy, it makes me reconsider if I consistently offer risk acceptance as a viable option when developing risk mitigation strategies.  How do you guys look at risk acceptance?

There is also an interesting article on the inner workings of Siri, Apple’s natural language interface.  [26]  The interesting part is that most of the work is done server side.  Wouldn’t it be interesting to compromise the server side and see what trends were in Siri voice commands?  What if you could compromise the server and modify the input it receives or the output it generates.  Lots of interesting implications with this model.  I suspect major governments have already thought about this.

The Harvard Business Review had an interesting article on data visualization.  [44]  I know we tend to mock the stereotypical executive that wants all of his updates in pictorial, dashboard form.  However, the stereotypes are there for a reason.  Execs like pictures and they like pictures because if done well the pictures communicate information in an extremely efficient manner.  As security professionals, we need to communicate our messages in the language of the target audience, which means we need to improve our data visualization skills.  Take a read of this article and then go break out your black beret and turtleneck and head to your local coffee shop to ponder the aesthetic beauty of security metric bar charts.

I have to admit that I’ve not been keeping up on the Bitcoin story, but I fixed that this week.  [4-6],[42]  If you find yourself in the position of explaining Bitcoin to someone, point them to the Bitcoin Explained video by Duncan Elms and Marc Fennell.  It’s short, sweet, and to-the-point while communicating all the vital bits.  [4]

 

Here are a couple more highlights:

  • The Android OS space is *really* fragmented  [2]
  • Evidenced-based information security practice is good [8]
  • IO9, a SciFi site, suggests Bayes’ Theorem can help you be a better thinker [22]
  • Windows XP is not dead yet [27]

As I said, there is a lot this week. Go poke around and see what I haven’t mentioned.

Link Dump

[1]  D. Colman, “‘Professor Risk’ at Cambridge University Says ‘One of the Biggest Risks is Being Too Cautious’,” Open Culture. [Online]. Available: http://www.openculture.com/2013/04/professor_risk_at_cambridge_university_says_one_of_the_biggest_risks_is_being_too_cautious.html. [Accessed: 08-Apr-2013].

[2]  “Android Fragmentation Visualized : 4000+ Devices, and 83.5% on Outdated OS!,” Visual.ly, 09-Apr-2013. [Online]. Available: http://visual.ly/android-fragmentation-visualized-4000-devices-and-835-outdated-os. [Accessed: 09-Apr-2013].

[3]  R. Beckhusen, “As Colombian Drug Gangs Collapse, Mexican Cartels Get Tons of Cheap Coke,” Danger Room, 11-Apr-2013. [Online]. Available: http://www.wired.com/dangerroom/2013/04/colombian-bacrim-gangs/. [Accessed: 11-Apr-2013].

[4]  D. Elms and M. Fennell, “Bitcoin Explained,” Visual.ly, 10-Apr-2013. [Online]. Available: http://visual.ly/bitcoin-explained. [Accessed: 11-Apr-2013].

[5]  B. Schneier, “Bitcoins in the Mainstream Media,” Schneier on Security, 09-Apr-2013. [Online]. Available: https://www.schneier.com/blog/archives/2013/04/bitcoins_in_the.html. [Accessed: 09-Apr-2013].

[6]  K. Denninger, “BitCon: Don’t,” The Market Ticker. [Online]. Available: http://market-ticker.org/post=219284. [Accessed: 09-Apr-2013].

[7]  S. Ackerman, “Blood Money, Kill Lists, Favors for Favors: Deep Inside CIA’s Targeted Killings,” Danger Room, 09-Apr-2013. [Online]. Available: http://www.wired.com/dangerroom/2013/04/mark-mazzetti/. [Accessed: 09-Apr-2013].

[8]  R. Thomas, “By looking for evidence first, the Brits do it right,” The New School of Information Security, 09-Apr-2013. [Online]. Available: http://newschoolsecurity.com/2013/04/by-looking-for-evidence-first-the-brits-do-it-right/. [Accessed: 09-Apr-2013].

[9]  Cambridge Ideas – Professor Risk. 2009.

[10]  C. Osborne, “CISPA voting session slated for this week,” ZDNet, 08-Apr-2013. [Online]. Available: http://www.zdnet.com/cispa-voting-session-slated-for-this-week-7000013663/. [Accessed: 09-Apr-2013].

[11]  J. Ullrich, “Cleaning Up After the Leak: Hiding exposed web content,” ISC Diary, 08-Apr-2013. [Online]. Available: https://isc.sans.edu/diary/Cleaning+Up+After+the+Leak%3A+Hiding+exposed+web+content/15571. [Accessed: 09-Apr-2013].

[12]  B. Rogers, “Current State of Cyber Security: More Concern Over Facebook Than Credit Cards – Forbes,” Forbes, 08-Apr-2013. [Online]. Available: http://www.forbes.com/sites/brucerogers/2013/04/08/current-state-of-cyber-security-more-concern-over-facebook-than-credit-cards/. [Accessed: 09-Apr-2013].

[13]  D. A. Purdy, “‘Developing a Framework to Improve Critical Infrastructure Cybersecurity’ Submission from Huawei Technologies – Response to Docket Number 130208119-3119-01,” National Institute of Standards and Technology. [Online]. Available: http://csrc.nist.gov/cyberframework/rfi_comments/040813_huawei.pdf. [Accessed: 10-Apr-2013].

[14]  R. Lemos, “‘Embassies’ Could Give Users Sanctuary From Threats,” Dark Reading, 11-Apr-2013. [Online]. Available: http://www.darkreading.com/cloud-security/167901092/security/client-security/240152784/embassies-could-give-users-sanctuary-from-threats.html. [Accessed: 12-Apr-2013].

[15]  M. Rothman, “Gaming the Narcissist (to get what you want),” Securosis, 10-Apr-2013. [Online]. Available: https://securosis.com/blog/gaming-the-narcissist-to-get-what-you-want. [Accessed: 12-Apr-2013].

[16]  S. Rogers, “GDELT: a big data history of life, the universe and everything,” The Guardian. [Online]. Available: http://www.guardian.co.uk/news/datablog/2013/apr/12/gdelt-global-database-events-location. [Accessed: 12-Apr-2013].

[17]  L. Clark, “Google launches global human trafficking helpline and data network,” Ars Technica, 10-Apr-2013. [Online]. Available: http://arstechnica.com/tech-policy/2013/04/google-launches-global-human-trafficking-helpline-and-data-network/. [Accessed: 10-Apr-2013].

[18]  F. Lardinois, “Google Wants To Operate .Search As A ‘Dotless’ Domain, Plans To Open .Cloud, .Blog And .App To Others,” TechCrunch, 10-Apr-2013. [Online]. Available: http://techcrunch.com/2013/04/10/google-wants-to-operate-search-as-a-dotless-domain/. [Accessed: 11-Apr-2013].

[19]  B. Schneier, “Government Use of Hackers as an Object of Fear,” Schneier on Security, 08-Apr-2013. [Online]. Available: https://www.schneier.com/blog/archives/2013/04/government_use.html. [Accessed: 08-Apr-2013].

[20]  P. M. Sandman, “H7N9: A Tale of Two CDCs,” The Peter Sandman Risk Communication Website, 08-Apr-2013. [Online]. Available: http://www.psandman.com/col/H7N9-1.htm. [Accessed: 09-Apr-2013].

[21]  N. Anderson, “How a banner ad for H&R Block appeared on apple.com—without Apple’s OK,” Ars Technica, 07-Apr-2013. [Online]. Available: http://arstechnica.com/tech-policy/2013/04/how-a-banner-ad-for-hs-ok/. [Accessed: 08-Apr-2013].

[22]  G. Dvorsky, “How Bayes’ Rule Can Make You A Better Thinker,” io9, 08-Apr-2013. [Online]. Available: http://io9.com/how-bayes-rule-can-make-you-a-better-thinker-471233405. [Accessed: 11-Apr-2013].

[23]  D. Paliwoda and J. Williams, “How Far is it to Mars?,” How Far is it to Mars?, 08-Apr-2013. [Online]. Available: http://www.distancetomars.com/. [Accessed: 08-Apr-2013].

[24]  M. Sauter, “If Hackers Didn’t Exist, Governments Would Have to Invent Them,” The Atlantic, 05-Jul-2012. [Online]. Available: http://www.theatlantic.com/technology/archive/12/07/if-hackers-didnt-exist-governments-would-have-to-invent-them/259463/. [Accessed: 08-Apr-2013].

[25]  “Information technology amplifies irrational group behavior,” Phys.org, 11-Apr-2013. [Online]. Available: http://phys.org/news/2013-04-technology-amplifies-irrational-group-behavior.html. [Accessed: 11-Apr-2013].

[26]  M. Tabini, “Inside Siri’s brain: The challenges of extending Apple’s virtual assistant | Macworld,” Macworld, 08-Apr-2013. [Online]. Available: http://www.macworld.com/article/2033073/inside-siris-brain-the-challenges-of-extending-apples-virtual-assistant.html. [Accessed: 08-Apr-2013].

[27]  “Millions Still on 11-Year-Old XP in Asia,” 08-Apr-2013. [Online]. Available: http://visual.ly/millions-still-11-year-old-xp-asia. [Accessed: 08-Apr-2013].

[28]  N. McAllister, “Mozilla’s Persona beta adds password-free Yahoo! logins,” The Register, 09-Apr-2013. [Online]. Available: http://www.theregister.co.uk/2013/04/09/persona_beta_2_identity_bridging/. [Accessed: 10-Apr-2013].

[29]  I. Thompson, “Researcher hacks aircraft controls with Android smartphone,” The Register, 11-Apr-2013. [Online]. Available: http://www.theregister.co.uk/2013/04/11/hacking_aircraft_with_android_handset/. [Accessed: 11-Apr-2013].

[30]  “Rethinking Strategic Risk | Risk Management.” [Online]. Available: http://www.rmmagazine.com/2013/04/10/rethinking-strategic-risk/. [Accessed: 11-Apr-2013].

[31]  M. Mimoso, “Rogue Twitter Account Used in Targeted Attacks Against Free Tibet Supporters | threatpost,” ThreatPost, 10-Apr-2013. [Online]. Available: https://threatpost.com/en_us/blogs/rogue-twitter-account-used-targeted-attacks-against-free-tibet-supporters-041013. [Accessed: 10-Apr-2013].

[32]  S. Nichols, “Russian police nab suspected Phoenix malware mastermind,” V3.co.uk, 08-Apr-2013. [Online]. Available: http://www.v3.co.uk/v3-uk/news/2260004/russian-police-nab-suspected-phoenix-malware-boss. [Accessed: 09-Apr-2013].

[33]  R. Beckhusen, “‘Secretbook’ Lets You Encode Hidden Messages in Your Facebook Pics,” Danger Room, 10-Apr-2013. [Online]. Available: http://www.wired.com/dangerroom/2013/04/secretbook/. [Accessed: 10-Apr-2013].

[34]  K. Zetter, “Secrets of FBI Smartphone Surveillance Tool Revealed in Court Fight,” Threat Level, 09-Apr-2013. [Online]. Available: http://www.wired.com/threatlevel/2013/04/verizon-rigmaiden-aircard/. [Accessed: 09-Apr-2013].

[35]  J. L. Bayuk, “Security as a Theoretical Attribute Construct,” Computers & Security, Apr-2013. [Online]. Available: http://linkinghub.elsevier.com/retrieve/pii/S0167404813000515. [Accessed: 08-Apr-2013].

[36]  R. Lemos, “Security Job Market ‘Rocking,’ But Pressures Rise,” Dark Reading, 09-Apr-2013. [Online]. Available: http://www.darkreading.com/advanced-threats/167901091/security/security-management/240152570/security-job-market-8216-rocking-8217-but-pressures-rise.html. [Accessed: 10-Apr-2013].

[37] “‘Spooky action at a distance’ aboard the ISS,” Phys.org, 09-Apr-2013. [Online]. Available: http://phys.org/news/2013-04-spooky-action-distance-aboard-iss.html. [Accessed: 09-Apr-2013].

[38]  R. Chirgwin, “SSH an ill-managed mess says SSH author Tatu Ylonen,” The Register, 11-Apr-2013. [Online]. Available: http://www.theregister.co.uk/2013/04/11/ssh_security_undermined_by_management/. [Accessed: 11-Apr-2013].

[39]  R. Thomas, “Submission to NIST RFI for Critical Infrastructure Cyber Security Framework (CSF),” The New School of Information Security, 07-Apr-2013. [Online]. Available: http://meritology.com/resources/NIST_RFI_submission_summary.pdf. [Accessed: 09-Apr-2013].

[40]  S. Dougherty and A. Bochman, “Suggestions for Business-Oriented Security Metrics for Utilities,” National Institute of Standards and Technology, 19-Mar-2013. [Online]. Available: http://csrc.nist.gov/cyberframework/rfi_comments/ibm_security_systems_031913.pdf. [Accessed: 10-Apr-2013].

[41]  R. Beckhusen, “The ATF Wants ‘Massive’ Online Database to Find Out Who Your Friends Are,” Danger Room, 05-Apr-2013. [Online]. Available: http://www.wired.com/dangerroom/2013/04/atf-database/. [Accessed: 08-Apr-2013].

[42]  M. Bustillos, “The Bitcoin Boom,” The New Yorker Blogs, 02-Apr-2013. [Online]. Available: http://www.newyorker.com/online/blogs/elements/2013/04/the-future-of-bitcoin.html. [Accessed: 09-Apr-2013].

[43]  A. Saita, “The Controversial CISPA Is Back in Congress,” ThreatPost, 08-Apr-2013. [Online]. Available: https://threatpost.com/en_us/blogs/controversial-cispa-back-congress-040813. [Accessed: 09-Apr-2013].

[44]  S. Berinato, “The Power of Visualization’s ‘Aha!’ Moments,” Harvard Business Review, 19-Mar-2013. [Online]. Available: http://blogs.hbr.org/hbr/hbreditors/2013/03/power_of_visualizations_aha_moment.html. [Accessed: 08-Apr-2013].

[45]  R. Tate, “The Software Revolution Behind LinkedIn’s Gushing Profits,” Wired Business, 10-Apr-2013. [Online]. Available: http://www.wired.com/business/2013/04/linkedin-software-revolution/?cid=co7060954. [Accessed: 11-Apr-2013].

[46]  “Top porn sites ‘pose malware risk’,” BBC, 10-Apr-2013. [Online]. Available: http://www.bbc.co.uk/news/technology-22093141. [Accessed: 11-Apr-2013].

[47]  J. H. Sawyer, “Trends In Mobile Device Threats,” Dark Reading, 10-Apr-2013. [Online]. Available: http://www.darkreading.com/advanced-threats/167901091/security/news/240152580/trends-in-mobile-device-threats.html. [Accessed: 10-Apr-2013].

[48]  D. Smith, “Visualize large data sets with the bigvis package,” Revolutions, 08-Apr-2013. [Online]. Available: http://blog.revolutionanalytics.com/2013/04/visualize-large-data-sets-with-the-bigvis-package.html. [Accessed: 09-Apr-2013].

[49]  “Wikileaks publishes 1.7m US records,” BBC, 08-Apr-2013. [Online]. Available: http://www.bbc.co.uk/news/world-us-canada-22062317. [Accessed: 09-Apr-2013].

[50]  M. O’Rourke, “Zombie Risk Management,” Risk Management, 10-Apr-2013. [Online]. Available: http://www.rmmagazine.com/2013/04/10/zombie-risk-management/. [Accessed: 11-Apr-2013].

[51]  J. Constine, “Zuckerberg And A Team Of Tech All-Stars Launch Political Advocacy Group FWD.us,” TechCrunch, 11-Apr-2013. [Online]. Available: http://techcrunch.com/2013/04/11/fwd-us/. [Accessed: 11-Apr-2013].

 

Leave a Reply

%d bloggers like this: