Tag Archives: National Security

badBIOS, a Bad-To-The-Bone, Halloween Malware

"Our forensic procedures are weak when faced with challenges like this"

“Our forensic procedures are weak when faced with challenges like this”

As a cyber security enthusiast, I like to think I know a thing or two about how to stay safe against viral threats.  But no article could have been more frighteningly fitting for arstechnica to post on Halloween, even for me. The article tells the story of Dragos Ruiu, a security icon responsible for the pwn2own hackathon franchise, who three years ago stumbled upon malware that took over a clean install of OS X on his Macbook Air.  He was unable to boot from CD, and found the machine was deleting data and undoing configuration changes without prompting. This is when it starts to get freaky.  The virus started propagating, even to machines completely disconnected from any traditional access point.  No networking, no power cables (running on batteries) fresh installs, with no contact with infected devices. Continue reading

Posted in IT, Science, Security. Tagged with , , , , , , , .

Cyber Attacks on 9 US Banks Continue

No U.S. Bank Is Safe

If the picture doesn’t send the message, let me spell it out for you. All of the banks in that picture have reported Distributed Denial of Service (DDoS) attacks from the hacktivist group Izz ad-Din al-Qassam Cyber Fighters.  The group claims that its second phase of distributed-denial-of-service attacks has affected nine banks since Dec. 11, and it warns that more attacks are on the way. The group will continue to target U.S. institutions until a YouTube movie trailer believed by the group to be anti-Islamic is removed from the Internet.

Normally, this sounds to me like another half baked conspiracy theory, but the number of stories are starting to add up, and this story is gaining more and more steam. Continue reading

Posted in Blog, IT, Security, Work. Tagged with , , , .

TEDxJNJ: Cyber Arms Race

TED on Tech and Terror

One of my favorite TED talks from the conference was on the advancing sophistication and technical capabilities of terrorist cells. Criminals and terrorist cells are using the advanced logistics technologies we built to dismantle the world we live in.  The same technology that enables mass dissemination of free information is also a massive increase of vulnerabilities to exploit. Watch Marc Goodman’s talk. I want to talk about the irony of terrorist organizations leveraging the same technologies we use to fight them for increased efficiency and deadly force. How do we fight this?

Continue reading

Posted in Blog, Inspirations, Shifting Perspectives. Tagged with , , , , .