My SOURCE Seattle presentation on heart of darkness style journey through startups, carriers, DDoS, and record setting disruptions by people who admit to their actions and somehow avoid consequences.
As most techsec professionals, I’ve been asked to do more and more in application security matters, an area that I’ve usually seen specialist ninjas dominate due to the often extreme […]
Current events have put into keen focus the balancing act between privacy, data controls, the reason secrets are kept, and ethics. So if you haven’t had an interest in Wikileaks, […]
There is a lot of perennial talk of social engineering and direct project/resource management. Attempts to solve complicated political situations with manipulation or a slick widget tend not to work […]
There has been several published works on the what the media calls hackers, the hacker underground, the information security industry, and the technorati class in general lately. Here are a […]
Another perennial topic that seems to come up whenever I am speaking to someone who is a consumer of technology. If they are one of the people that I actually […]
I’m surprised that some of these behaviors that I mentioned a year ago haven’t changed. Yesterday many Apple users were installing a system security update. Depending on what article you […]
You (the loan originator) have been paid and are not responsible for it anymore.I started reading about this more closely after seeing some petty whining from real estate agents on Yelp about Redfin…. I wish them the best of luck in their efforts as it is a true David vs Goliath challenge considering the profitability of the industry, the lobbying power of the MLS-running real estate companies, and how vehemently they protect their market.It reminds me a lot about how the established telecommunications companies freaked out over VOIP providers and how they wanted to maintain their artificial profit margin after several generations of technology increased efficiency from the 10 cents per minute levels of yesteryear to the 1 to 2 cent levels previous to the arrival of VOIP.Since trunking systems were already in place, the adoption of VOIP into corporate systems was as simple as getting the bandwidth and quality of service right for the voice data.Perhaps something along the same lines will evolve with MLS.
According to the Entertainment Software Association (ESA), the makers of the gaming consoles, game developers, and others in the industry have incurred billions of dollars in losses worldwide due to sales lost to those selling counterfeit and pirated video games.Counterfeiting and piracy is estimated to cost the U.S. economy between $200 billion and $250 billion annually and results in the loss of up to 750,000 jobs according to the U.S. Chamber of Commerce.From the August 1st press release on the ICE website.A response, characteristic of the hacker mentality outlined many places and occasionally in published works such as “A Hacker Manifesto” (McKenzie Wark)and possibly”The Hacker Ethic” (Pekka Himanen, Linus Torvalds)was presented in response to the raids:Much like the media slant against hackers in general the act of modding is criminalized in the US. I look at modding as an act of expression and something someone does to expand their own knowledge and use of a system…. Of course XBMC can only be used on a modified Xbox and while it would be possible to build and run such an application on a normal PC the novelty is in the utilization of cheap hardware (the Xbox costs less than $100 these days) and in many cases it’s not only hardware you already own but hardware that already fits properly within a TV room environment making it quite ideal, if it weren’t for the fact that it is illegal to use the free XBMC software with the Xbox hardware you own under the DMCA.said Twistedsymphony It is well known that the statistics put forward by groups such as the RIAA, MPAA, ESA, and BSA (to name a few) are on shaky factual ground.
Hacktivism and corporate culture seem to be more at odds than ever.