Archive for March, 2012

Use Key Content for your Key Notes

March 21, 2012

There is some discussion about certain key note talks in the blogosphere and on mailing lists. Apparently there has been too much mentioning of mayhem and company ads lately. We will judge about this as soon as we have watched the video recordings of these talks. Until we have done that we’d like to point […]

Tags: , , ,
Posted in Administrivia, Security Comments Off on Use Key Content for your Key Notes

It’s the Smart Meters that matter – or is it?

March 18, 2012

Wired’s Danger Room has an article about how ubiquitous computing and smart homes are eagerly awaited by the CIA to turn your networked environment into a gigantic spy tool. CIA Director David Petraeus very much likes the „Internet of things” as an information gathering tool. Security researchers can’t wait, too. However they have a very […]

Tags: , , ,
Posted in Communication, High Entropy, Security Comments Off on It’s the Smart Meters that matter – or is it?

Disinfect your Information Environment

March 7, 2012

Since information technology relies heavily on analogies (as does lot of other „cyber“ things), we have a question for you. What do an intercepted phone call, infectious diseases and nuclear waste spilling into the environment have in common? Faulty containment. The Naked Security blog explains in an article how Anonymous was able to record the […]

Tags: , ,
Posted in High Entropy, Security, Stories Comments Off on Disinfect your Information Environment