« ottobre 2013 | Principale | febbraio 2014 »
According to reports published by German magazine Der Spiegel, Britain's Government Communications Headquarters (GCHQ), the U.K. equivalent to the NSA, spoofed LinkedIn and Slashdot pages to break into the computers of network engineers who worked for global roaming exchange providers in Europe. The fake sites planted malware on the victims' systems, which in turn would gain access to the voice and data routers at the telecoms where the victims worked.
Scritto alle 21:23 | Permalink | Commenti (0) | TrackBack (0)
Wireless street lights can play music, video, interact with pedestrians and have 'Homeland Security' applications like video surveillance monitors
...
Las Vegas is currently installing Intellistreet lights to their well-lit city. But Intellistreets are not just any street-lighting system. The wireless, LED lighting, computer-operated lights are not only capable of illuminating streets, they can also play music, interact with pedestrians and are equipped with video screens, which can display police alerts, weather alerts and traffic information.
The high tech lights can also stream live video of activity in the surrounding area. But there's one major concern.These new street lights, being rolled out with the aid of government funding, are also capable of recording video and audio.
Scritto alle 21:21 | Permalink | Commenti (0) | TrackBack (0)
L'India è una federazione di 28 stati di cui uno è il Maharashtra con capitale Mumbai. (un po' simile a Europa e Italia, rispettivamente)
Il governo del Maharashtra ha da poco emesso questa prescrizione che prevede che
Scritto alle 10:30 | Permalink | Commenti (1) | TrackBack (0)
Il client di Owncloud ad oggi non supporta server diversi, puoi sincronizzare solo con un server
il workaround e' semplice:
fai una copia della cartella e dalle un altro nome es:
C:\Program Files (x86)\ownCloud2\owncloud2.exe.
Dopo si fa uno shortcut e si modificano le proprietà per aggiungere il riferimento al secondo file di configuraizone
es. C:\Program Files (x86)\ownCloud2\owncloud2.exe" --confdir "C:\Users\xxxx\owncloudconf2"
dove owncloudconf2 e' la directory del file di configurazione. (ocio che non ci deve essere il "\" alla fine del nome della directory del file di configurazione.
Scritto alle 19:16 | Permalink | Commenti (5) | TrackBack (0)
A seguito di questo mio post
Il congresso USA con maggioranza bipartisan decide che ciò che fa l'NSA va bene - a Quinta 's weblog : un Blog di Stefano Quintarelli.
mi ha dato da pensare un dettaglio:
quando non si capiva una cosa, si spiegava con la magia. dire "è magico" in fondo vuol dire "non ho la più pallida idea della cosa".
il servizio della corrispondente del TG1 citava Snowden come "un genio dell'informatica"...
su twitter (mi pare) era partito un thread in cui, se non ricordo male, si argomentava a turno che fosse un mega hacker, un sysadmin con privilegi elevatissimi, ecc. mentre io tendevo a sminuire le sue abilità e ruolo e commentavo sul fatto che non mi sembrava grande idea lasciare masterizzatori (Manning) e porte USB (Snowden) aperte.
in una intervista aggiungevo che se hai molte migliaia di persone che hanno privilegi per accedere a info segrete, non puoi aspettarti che non ci sia qualcuno che viola (sia per diffondere tabulati che provano infedelta' del futuro coniuge a pochi giorni dalle nozze (caso Telecom in Italia) che informazioni ad alto livello di astrazione sulla operativita' interna (Snowden) che informazioni ad aziende concorrenti (scommetto 100 dollari contro un penny che qualcuno non degno di fiducia esiste))
oggi leggo che...
Exclusive: Snowden persuaded other NSA workers to give up passwords - sources | Reuters.
(Reuters) - Former U.S. National Security Agency contractor Edward Snowden used login credentials and passwords provided unwittingly by colleagues at a spy base in Hawaii to access some of the classified material he leaked to the media, sources said. A handful of agency employees who gave their login details to Snowden were identified, questioned and removed from their assignments, said a source close to several U.S. government investigations into the damage caused by the leaks.
...
The revelation is the latest to indicate that inadequate security measures at the NSA played a significant role in the worst breach of classified data in the super-secret eavesdropping agency's 61-year history.
...
"What agencies are having a hard time grappling with is the insider threat, the idea that the guy in the next cubicle may not be reliable," he added.
Scritto alle 17:25 | Permalink | Commenti (0) | TrackBack (0)
Presentazione del libro di Gianni Riotta, "Il web ci rende liberi?", Einaudi editore.
Venerdì 15 novembre, ore 17, Camera dei Deputati, Palazzo Montecitorio, Sala Aldo Moro
1. Il punto di vista della politica
Sergio Boccadutri, deputato SEL
Matteo Orfini, deputato PD
Antonio Palmieri, deputato PDL-FI
Stefano Quintarelli, deputato Scelta Civica
Modera: Gianni Riotta, editorialista, scrittore
2. La risposta di chi opera nel web
Stefano Parisi, presidente Confindustria Digitale
Selene Biffi, imprenditrice sociale
Federico Morello, Commissione Europea
Andrea Stroppa, informatico
Modera: Antonio Palmieri
Conclusioni: Gianni Riotta.
se qualcuno volesse partecipare, me lo faccia sapere asap
Scritto alle 10:50 | Permalink | Commenti (3) | TrackBack (0)
On October 26, 2013, users of both Facebook and Twitter discovered that their accounts were responsible for spamming both social networks with unauthorized posts, many of which promoted a weight-loss scheme. It wasn’t long before the social posting and scheduling service Buffer realized that it was the source of those posts. Its infrastructure had been compromised and, for a brief period, the attackers inherited Buffer’s carte blanche authority to make posts to both Twitter and Facebook on behalf of the Hootsuite-like company’s registered users.In an attempt at transparency, Buffer’s executives blogged about the initial intrusion, offering details of the attack and the remedy over the course of that weekend. Judging by the comments on that blog, Buffer was applauded by its users for its quick response and openness. However, as it turns out, Buffer has so far fallen short in disclosing some of the most important details of the attack and its remedy.
The incident casts a spotlight on the blind faith that end-users are hastily placing in many of the applications to which they’ve entrusted their Twitter and Facebook accounts. If anything, the attack on Buffer should serve as a wake-up call. The Web as it turns out, is not nearly as secure as many believe it to be. The incident also serves as a clarion call to Web developers as well as API providers that security must be their top priority. It is a discipline that is intolerant of short-cuts, cost savings, and incompetence. There’s simply too much at risk. This ProgrammableWeb investigation explains why.
Scritto alle 17:16 | Permalink | Commenti (0) | TrackBack (0)
Scritto alle 16:56 | Permalink | Commenti (0) | TrackBack (0)