IT System Basics

IT System and Server Fundamentals, ignore at your own peril.

Equifax security breach

145.5 million accounts – most US adults are affected.

Identity theft will explode and Equifax will not be liable for the damage; when are we going to act?

https://www.bloomberg.com/news/features/2017-09-29/the-equifax-hack-has-all-the-hallmarks-of-state-sponsored-pros

Maybe worse is the under reported source code sharing by HP to the Russians of the security detection system that they provide the US military.

http://www.reuters.com/article/us-usa-cyber-russia-hpe-specialreport/special-report-hp-enterprise-let-russia-scrutinize-cyberdefense-system-used-by-pentagon-idUSKCN1C716M

When are we going to act?

Advertisements

Filed under: Security

Dragonfly 2.0 – U.S. and European Utilities

“The Dragonfly group appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so,”

https://www.cnet.com/news/hackers-access-to-hundreds-of-global-electric-systems-dragonfly-cyberattack/

https://www.theguardian.com/technology/2017/jul/18/energy-sector-compromised-state-hackers-leaked-gchq-memo-uk-national-cybersecurity-centre

Filed under: Security

Ransomwhere solutions

Ransomwhere cost over $1 billion dollars in 2016 with especially severe impact on small businesses.

https://press.malwarebytes.com/2017/07/27/new-global-research-ransomware-attacks-caused-22-percent-infected-small-medium-sized-organizations-cease-business-operations-immediately/?ncid=txtlnkusaolp00000618

However there are solutions:

http://www.zdnet.com/google-amp/article/no-more-ransomware-how-one-website-is-stopping-the-crypto-locking-crooks-in-their-tracks/

https://www.nomoreransom.org/

Filed under: All Systems, Security

Ransomware

The recent attacks have focused on the 7% of all PCs still running Windows XP.

https://finance.yahoo.com/news/microsoft-reveals-two-big-ways-stop-ransomware-attacks-195534139.html

What’s really needed is a commitment to upgrade all software more rapidly. A Moore’s law for security updates. Older software needs to be disabled from making an internet connection; no exceptions. Thus no vector for transmission of malware.

Filed under: All Systems, Security

250 million computers infected

Fireball malware:

https://www.grahamcluley.com/fireball-malwares-flames-touch-a-quarter-of-a-billion-computers/

Know where your free download is coming from.

Filed under: Security

Global Cyber Attack

Using the released NSA hacking tools Windows XP systems without the March update are now participating in one of the largest botnets attacking vulnerable machines.

http://www.msn.com/en-us/news/world/hackers-hit-dozens-of-countries-exploiting-stolen-nsa-tool/ar-BBB450m?li=BBmkt5R&ocid=spartandhp

There are many guilty parties contributing to this fiasco.

The administrators failing to patch systems

The software companies failing to properly support older software

The government for failing to secure its hacking tools

At some point modern systems may become unsustainable.

May 15 now over 200,000 computers in 150 countries. Total ransom collected $50,000 so far.

http://www.msn.com/en-us/news/technology/wannacry-cyberattack-what-we-know/ar-BBBa926?li=BBnbcA1&ocid=spartanntp

 

Filed under: Security

Limits of Computation

time e.g. weather forecast
power e.g. mining bit coin
as fundemental as thermodynamics is to mechanical engineering

Filed under: All Systems

Riemann Hypothesis and implications to cryptography

Intro – the video is very good. In fact it may take a quantum computer to prove the hypothesis.

http://www.mnn.com/green-tech/research-innovations/stories/greatest-unsolved-problem-mathematics-may-have-been-solved

However the distribution of primes that comes from the hypothesis does not speed up factoring the large numbers found in encryption protocols such as RSA.

https://www.quora.com/Is-it-true-that-if-the-Riemann-Hypothesis-is-true-no-encrypted-webpage-would-remain-safe

 

 

Filed under: Security

The Mathematics of Quantum Computing

Filed under: Uncategorized

Quantum Computer Programming

The typical Wikipedia starting point:
The conventional textbook:
Classical:
tut-intro1
Quantum:
tut-intro3

Filed under: All Systems

%d bloggers like this: