The Cause Justifies The Means?

image

Here is a tricky one. When you read something like this, you usually end up with a huge question mark on your face. It seems that the FBI has been using spying programs in order to collect information about users on several websites and forums with the alleged pedophile content.

This is how we get to the point that unjustified means are being used for the justified cause. You do not have to be a rocket scientist to probably know by now that the Internet has become the most popular hideaway place and sharing mean for all kinds of cyber pedophiles. The FBI is definitely not an exception in this case.

However, the use of unauthorized or even prohibited methods in fighting some of the most troubling forms of crime is a little bit problematic. We can argue as long as we like. Pro et contra argumentation between the two parties with the opposite points of view will probably confuse you even more.

We are not saying that some of the pedophiles with a criminal record should be granted with an opportunity to sue the FBI. On the other side, the FBI and similar agencies should not be discouraged in their rightful efforts. Some acceptable modus has to be introduced. But how? We are not quite sure about?

CryptoLocker Unlocked

image

We sure hope you have not had a chance to deal with the misery caused by the CryptoLocker. Just imagine a situation when someone gets your precious things, puts them in a room, locks them, and then asks you to pay a ransom in an exchange for a key. Are you terrified enough?

This is exactly what happens to your files once the CryptoLocker gets its cyber hands on them. If you want them back, there is no other option than to pay money for a virtual key in order to free your precious files. Finally, someone has found a way to end your troubles with the merciless CryptoLocker.

For what is worth, the busy little bees from the Fox IT and Fire Eye give you a chance to upload your trapped files for free and release them with a proper key. Unfortunately, this option is only available for the certain versions of the KryptoLocker. Despite this flaw, we should treat one as the good news.

It comes without saying that in this case, it all comes down to the proper prevention IT security work. Better to lock your sensitive by yourself than to wait and hope someone else will not do it for you with dishonest intentions. Do not waste your time blinking, it is the right moment for some serious IT thinking.

Simpler, Better, Hacker…

image

To have an idea that the most successful hackers are top rocket scientists, who at one moment turned to the dark side is at least to say childish. In most of the cases they are educated fools with money on their minds. What is even more important to say they need a helping hand. Who could that be?

Unfortunately, when it comes to the cyber trouble you cannot believe how many times we are the accomplices of our own misfortune. The hackers themselves, on the other side, are practical people who look for the imperfections of the system and the negligence of the users. That is the catch.

Instead of whining about the endangered privacy and compromised cyber security, we can question our own behavior and habits for a change. At least what we can do is to make hackers work harder for their dirty profit. Do not leave them an open door and do not act as if it is not going to happen to you.

We all know these simple truths, and we keep forgetting them all the time. How strong and devastating a cyber blow into your face has to be in order for you to start learning and applying some basic IT self defense techniques? Be a quick doer and a careful listener in this one, will you?

Microsoft vs China

image

The golden road to the Chinese market is definitely covered with thorns. Google has had the honor to experience it first hand on behalf of the first group of the US based IT hunger of extra profit. It seems that Microsoft now has to hit the Great Wall in China, literally and mercilessly.

The Chinese authorities first paused the decision about introducing Windows 8 on its government’s computers. Then, they have decided to pay an unexpected visit to all major Microsoft’s offices all over China. You can rest assured that these were not entirely friendly talks about the weather and local food.

China has a nice alibi for all of these actions. It rides on a wave of the growing global concern closely associated with the spying controversies. However, you do not have to be a rocket scientist to see for yourself that something simpler is making all the noise here. Can you give your best shot?

It all comes down to the question of business and money, sooner or later, this way or another. The USA will pressure China with its accusations about the technology espionage, and China itself will fight back with the suspicions about the political spying activities. This is light years away from the win-win situation for both.

Gimme Your Source Code, Or…

image

We got ourselves an additional chapter in the bloody book of Ukraine crisis. This time the Russian government demands the source codes from the leading IT companies, which wish to do business on the Russian soil. So far, only the Microsoft showed the unreserved readiness to cooperate.

On the other side, Apple and SAP are having some second thoughts about it. The Russian government is deadly worried about the spying threat. It seems that in all software made in the USA they see the NSA and CIA signature. So, what is the response of the US based companies in this matter?

It seems that Apple and SAP are not willing to cooperate. The Russians were so kind to remind them of Microsoft’s flawless cooperation over the last couple of years. This is a nice test for US companies to evaluate how important is their business in Russia. Something similar Google has been experiencing in China.

It all comes down to numbers, eventually. If you want to play a game of profit in the certain country, you have no other choice than to embrace the local rules more or less willingly. In the Russian case a fragile balance between the economy and politics has to be achieved this way or another.

E-Mail + E-Guilt = Real Punishment

image

t is not too late, for all of you who are reading this post to think twice before write or send an email in the future. Unfortunately, all we needed was one federal judge to say emails are the legitimate evidence target. The police can treat them in the same way as they are already doing with our hard drives.

Just imagine a situation where someone knocks at your door informing you that there is a warrant, which allows him to keep and examine your emails. All what you have written or received in your inbox can be used against you as the legitimate evidence at the court of law. How do you feel about this one?

Without any exaggeration we can say that we are completely surrounded. First, our smartphones, and now emails. The federal government obviously has an intention to turn all elements associated with our privacy into bulletproof evidences. What is next? Do you dare to guess?

What are we supposed to do? To buy old typing machines just like Germans are doing after the recent spying controversy? To use pigeons messengers? Seriously? When we will have a courage to say enough is enough? Maybe, they will use these posts as the evidence in the near future? Who knows?

Privacy Data Punisher

image

Let us not act surprised, shall we? It simply had to happen sooner or later. For what is worth, this bad news for our privacy protection is very likely to have a positive epilogue. How? What happened? Well, after this one there will not be any more excuses. We will never be treated as the collateral damage of security breaches.

The United Kingdom’s Information Commissioner’s Office (ICO) has ordered that the Think W3 Limited as a distinguished UK online travel service has to pay almost $250,000 for fines. Why? It seems fair for almost one million stolen credit cards related data. Could this one have been prevented?

Honestly, it is hard to say, but there is one thing that puts a blame on this agency. Since they acquired their data system in 2006 they have not bothered, not even once as a matter of fact, to run an appropriate security test. Plenty of time for hackers to prepare accordingly, indeed.

Now, these guys from the travel service have more than 250,000 reasons to thoroughly examine all of their security vulnerabilities. Just imagine for a moment how significant saving could have achieved, if they were to conduct the simplest security test a couple of years ago.

Privacy Healthcare

image

How about this horror movie for a change? A laptop with the 500 patients personal data was stolen from the medical facility in South Carolina. What kind of personal data? Well, anything you can possibly think of including medical history for each and any of the 500 patients.

The laptop itself was password, but the data were not encrypted. Really hard to believe, and absolutely impossible to accept. Simply there is no excuse, which we can swallow. How about the patients themselves? It comes without saying that their condition just got worse.

What happened with the cloud storage system? What about prioritizing these type of data? You do not have to be a rocket scientist to ask these type of questions all day long. What is the purpose? In the paper era we were more secure than in the golden digital age.

Does this type of news about security breaches and identity thefts make you sick? What kind of an epic data catastrophe we have to experience in order to be awakened from our dreams of self-illusions? Enough is enough, let us do something about it for real this time. Shall we?

eBay Rainy Days in Louisiana

5_2177_imela_1

It simply had to happen one fine day, eventually, this way or another. The only difference is, the users themselves will not be a collateral damage, but the provider of services in charge the eBay itself. Why? Well, it should have done more and known better, as well.

The lawsuit eBay is about to face in Louisiana does not target some abstract unknown hackers, but rather a flesh and blood company responsible for one of the worst security and privacy breaches in the recent Internet history. So, what happened?

The users were kept in dark for months intentionally in a desperate attempt to cover up the catastrophic identity theft. This additional claim opens the second legal front for eBay, which has to deal with both serious accusations: negligence and cover ups.

It comes without saying that some of the biggest companies care more about their money than our privacy and well-being. If this is the only way to change something dramatically, then let it be. In order for the small ones to survive, one giant has to fall. Right?

Cisco Systems – Spying Systems

image

This is what happens when you leave an open door for the politics in the cyber space. The Chinese have become extremely spying sensitive and let us admit it even paranoid about this one. First, we had a situation with an iPhone, which was to blame for the tracking jeopardy completely unacceptable for the Chinese.

Now, the blacklist in China is very likely to include an additional name from the USA. The Cisco Systems are accused for supporting the US funded and organized spying activities. As expected, the Cisco Systems have denied it all, but the damage was already done. In the meantime, even Microsoft had some tough times.

Google has to play according to Chinese rules. Windows is no longer welcome on government’s computers. Apple is suspicious. Cisco is unreliable. It seems that Made In China definitely does not go hand in hand with the Made in the USA. Is there a solution for this serious problem?

Well, if the USA players want a piece of a billion market pie in China, they will have to play according to the Chinese rules with no exceptions or excuses. China can certainly afford it. One serious rumor has it that China has an infrastructure to launch a completely independent Internet on its own, any time they want. Enough said. Right?