Saturday, October 29, 2011

Facebook stops 600,000 suspicious log-ins a day

This was an infographic released by Facebook that demonstrates how many accounts may be hacked or used maliciously and other information about the amount of log-ins a day that they face. In a world where everyone one can communicate via social websites such as Facebook and Twitter and post their information and pictures on these websities, secutiry issues have always been brought up and there will always be those 0.01% of the user population that are on these websites to hack and steal your identity in a scam. From the almost 1 billion log ins a day that Facebook has, they say that around 600,000 of those log-ins are compromised in the sense that it may not be the actual user and someone is on their account, or it could be the case where it actually is the account owner but the user is logging via a computer that is infected with a virus. Facebook says that in these cases, they attempt to "block" the account from further action and let them know to run a diagnostic on the infected computer to make sure they are able to get rid of the viruses and other malicious infections. Facebook does say that if your account does get hijacked, not to worry. They are coming up (and soon releasing) a new feature in which the actual owner can select up to 5 friends and Facebook would give the selected people a "code" that the user can use if their account is being stolen and are then they'll be able to retrieve the account.

Sunday, October 23, 2011

Cloud storage

Last week we discussed cloud computing and the concerns behind its implementation and possible weaknesses. Now I used to think that all cloud technology posed the same threats however, at the suggestion of a friend, I have been using dropbox.com recently to store files in one central location between all of my computer devices. And I have to say, I love it.

Why is cloud storage better than cloud computing? Because in some cases with cloud computing, if the server is down, my software is useless. But with cloud storage, as provided by Dropbox, the files are stored on a particular folder on my computer and after changes to one or more files in that folder are made, then my computer communicates with the central server to update its copies of those files. Once the server itself is updated, then it updates the folders on my other computer devices. But if the server goes down, I still have my files. This is a great medium through which to transfer raw data and files between devices and it doesn’t make me, the user, feel too worried about the server going down for an afternoon.

Sunday, October 16, 2011

Cloud computing

Today I want to discuss cloud computing and cloud storage. The former I have concerns about and the latter I love. Maybe the biggest beef I have with cloud computing is the name. I understand that in the tech industry, there’s the marketing side and the technology side and that the marketers most likely came up with the term “the cloud.” It is an effective marketing tool for this technology but I think that this phrase serves to make something simple seem mysterious and thus fool people into not seeing what is actually happening in the progression of technology. When computers were first developed, like those huge ones that took up entire rooms, you had the actual computing technology in a big machine and then something resembling today’s computer screens acted as a dumb terminal that allowed you to communicate with the big machine in the room. We called this setup: terminal-server. Then we figured out how to make those computing machines smaller so we created desktops that fitted onto your desk and eventually laptops that fitted onto your lap. Here, the majority if not all of the computing technology lies with your computer at home, not with the somewhat smaller but still big machines called servers that sit at a company’s headquarters. Your computer might occasionally communicate with them but you are mostly independent and self-reliant. We call this setup: client-server. In this phase, software is sold as a product and you control it on your machine. Now we are beginning to see the cloud emerge.

I think that cloud computing technology started to become popular and seen as an opportunity when individuals started spreading their computing across desktops, laptops, mobile phones, and tablets. All the software on these devices needed to communicate with each other so instead of making that happen companies decided to simplify it: instead of communicating with each other they will communicate with one central machine. In the cloud, instead of software being sold as a product, it is now sold as a service. The computing technology no longer lies with your machine but with the software company’s server. In a sense, we have regressed back to the original terminal-server setup. All of your eggs, will be in one basket, quite literally. The cloud is not a mysterious, omnipresent technological force. It’s a big machine in a big room. So what are the dangers here? In the words of Mark Twain, “If you put all your eggs into one basket, you better watch that basket!”

Next week we will look closer at cloud storage offered through Dropbox which I can definitely get behind.

Saturday, October 15, 2011

MIM Software

The amount of advancement the world has seen in technology for smart phones in the past decade has been nothing but amazing and spectacular; it has gone from regular usage for making calls and sending messages to now being able to view your MRI results on your iPhone or iPad.
According to their website, "MIM Software Inc. provides practical imaging solutions for radiologists and oncologists. Our initial product offering has become the leading third party PET/CT software package. Subsequently, we have developed industry-leading software in the fields of Radiology/Nuclear Medicine, Neuroimaging, Cardiac Imaging, and Radiation Oncology. Since our beginnings in 2001, MIM Software Inc. has grown to an unparalleled level of professionalism built on a foundation dedicated to enhancing patient care. Establishing strong relationships with customers, as well as anticipating future needs, has been essential to the success of the company."
This program can be used by both doctor's and patients, and the idea behind it quite interesting. For starters, there is a specific version used by doctor's and physicans and another version for patient use. Both programs are free of charge and can be downloaded from the Application Store on Apple products. The way it works is that the doctor sends the results of a patients exam to a server hosted by MIM for a fee of $1. Then, if the patient wants to view the results, they are able to using the same server and would be charged $1 on their iPhone's and $2 on their iPad's.

Saturday, October 8, 2011

The Evolution Of The Barcode... The RFID

Shopping at the grocery store, you walk up to the register and wait for the cashier to scan your items and pay. This has been the norm ever since the barcode has been introduced. Now, there is a new, more intricate version of the barcode known as a RFID or Radio Frequency Identification tag. These tags are more useful to users because they can transmit data wirelessly. From its conception, RFID tags track shipments all the way until they are placed in a cart and bought at a store. Here they can be read by antenna's, using electromagnetic energy to trigger the transmission of data.

The only reason RFID tags have not come full circle is because of how many different companies and sectors use barcodes. In the supply chain field, RFID has been implemented and makes distribution much more efficient. Now, tags are located on pallets and not individual products. The RFID scanners are used to track what leaves and enters the store or warehouse, where it's going/came from and at what time. This detailed information is sent to a system which records all data. As you can see this is much more efficient than scanning individual pallets and then entering information into a system because it is done for you and at a faster pace.

Here is an infographic featured in Baseline Magazine, of Wal-Mart and how they use RFID tags for their supply chain




Source: HowStuffWorks & Funnel Inc.

The evolution of mobile phones

It is hard today to imagine living in a world with no mobile phones. Almost everyone has at least one mobile phone (smart phone) or even two, whether your 5 years old or a fortune 500 CEO. Intoruced in the early 1980's, the DynaTAC 8000X was the first mobile phone made avaliable for the public by Motorola. The size of a brick and weighing in more than 2 pounds, the retail price for the phone was $3,900! (adjusted for inflation, that's around $8,800!). As techonology advanced, so did the mobile industry and more features are being introduced into mobile phones that were avaliabe in the last decade. The following link is a very wonderful link showing a timeline of the mobile phone and what it has been modifed today.
*Source CNN*

Hacktivists Part II

So last week we discussed the real threats that hacking organizations like LulzSec and Anonymous present and an emerging viewpoint that hackers should be hired by companies and governments to ensure cyber-security. This new perspective essentially advocates that we need to fight fire with fire. I also said last week that we would take a closer look at the hackers themselves. Well, for those of us who have seen the very intimidating, incognito youtube messages that Anonymous posts online, we ask ourselves, “What does this tells us about the hackers? How scary are they?” Are we talking about a group of nerds bent over computer screens in their basements with pizza and pepsi? Sophisticated people with a thrilling criminal life and a sexy car to boot? Or something in between?

Misha Glenny says that there are observable character traits present in the majority of hackers he has met. Interestingly enough, most of them have Asperger’s syndrome, a mild form of autism. This manifests itself as highly specialized technical skill coupled with awkward social skills. In the life stories of the hackers he met, many of them developed their computer/hacking skills in their early to mid teens when their moral compass was still developing. Even Ryan Cleary, the hacker discussed in the last post, was diagnosed with Asperger’s shortly after his arrest in June. This information tells us that there are psychological and social reasons to explain the circumstances that create a hacker. Please keep in mind that very little, if any, scientific research has been done on the correlation between hackers and their psychological states. Furthermore, the goal here is not to pigeon-hole hackers but to try to understand the kinds of circumstances that might surround the decision to enter the field of cyber crime.

Now that we more fully understand the kinds of individuals we might be dealing with, we should ask, “Do we like hackers?” Are they totally scary? Do they represent a new kind of civil disobedience called hacktivism? Or both? They definitely are scary for several reasons: they are highly motivated, highly skilled, they exercise control over companies and governments seemingly without effort, and they remain hidden. If you can hack into the CIA and live to tell the tale without any jail time, then wow! You are damn good at what you do. The CIA, supposed masters of espionage, cannot pinpoint the identities of its hackers. Well, I’m not sure that a group like LulzSec could be described as engaging in hacktivism since they just do it for the laughs. On the other hand, Anonymous is more serious. We do have to hand it to them, they do tend to take down organizations we don’t like and also fear for other reasons. But you know, what do we really benefit from their schemes? I don’t know about you but I haven’t noticed any differences in my life because of them. I guess that’s what we need to ask ourselves. Are they actively changing the world for the better or just taking minor, ultimately insignificant, shots at the powers that be? We will see what the future holds in store for hacktivism.

In the meantime, this is what I say: convert them! Cuz at the end of the day, they are better with computers than we are.

Monday, October 3, 2011

Tyson Recalls Ground Beef After E. Coli Threat




On September 28th, Tyson Fresh Meats Inc. had to recall over 130,000 pounds of beef due to the discover of E. Coli within their product. This was detected first in Ohio because a family fell ill from eating the product. The ground beef was distributed to 6 different supermarkets among those were: Kroger and Food Lion. According to the USDA, the beef came from a Tyson plant in Kansas. This product through its different distribution channels reached several states, including Wisconsin, east to New York, south to Florida and west all the way back to Texas.

This presented such a huge health risk, with the founding report citing the child was hospitalized for 10 days. The interesting part to me is how Tyson was able to identify and trace all 131,300 pounds of beef that could have possibly been contaminated and the amount of detail. Obviously when working with such a big issue it is important to provide as much detail and information as possible to help come up with a solution. The only solution for a problem including contamination of a meat would be communicating the issue and notifying the affected party. Tyson along with the USDA was able to track the contaminated beef using UPC and product codes.

A list of retail stores has been created by the USDA:

Saturday, October 1, 2011

Hacktivists Part I

In a recent TED discussion entitled Hire the Hackers!, Misha Glenny, a British journalist who specializes in organized crime, advocates quite obviously that we should be hiring hackers to improve our network security instead of arresting them. Glenny says that governments such as China and Russia have already started doing so and that the U.S.’s current technique is foolish: to hunt, capture, and incarcerate hackers. So how ‘bout it, should they be convicted or converted?

Well, who are we even talking about? If you haven’t already, meet the faces of cyber-insecurity:


LulzSec

&

Anonymous

Both are professional, worldwide hacking organizations. Both are very good at what they do. And both are very good at covering their tracks. What separates them is motivation. Anonymous is definitely more of a politically motivated group while LulzSec claims to do it just for entertainment value. They have hacked credit card companies, foreign governments, the FBI, the CIA, Sony Pictures, and the Sony PlayStation Network. In the battle between Chaos and Control, Chaos is winning, by a long shot. And if you don’t believe me then think of this, according to TIME magazine, cybersecurity incidents in U.S. government agencies have increased by 660% in the past five years. No that's not a typo, 660%. Not only that, some of these attacks came from foreign governments which I have no doubt were coordinated by their hired hackers. Needless to say, the threat is real.

That’s not to say law enforcement hasn’t made any headway. In June, 16 arrests were made nationwide for alleged members of Anonymous and in the same month Ryan Cleary, a 19-year-old with affiliations to LulzSec, was arrested as well. So what’s happened? LulzSec fled the scene! Despite asserting that Cleary’s participation was miniscule, LulzSec announced its retirement mere days after his arrest. In a tweet, they thanked their supporters and said, “The breeze is fresh and the sun is setting, so now we head for the horizon." We will see if their decision sticks or if it’s just a fake out. As for Anonymous, not much word from them, except for some current rumors that they will attack Facebook on November 5th. Why are they doing it? Cuz Facebook allegedly provided government agencies with personal account information. Again, we will have to wait and see what happens.

Stay tuned for Part II, where we will take a closer look at the individual hackers themselves, explore further the merits of hacktivism, and decide if hackers should be convicted or converted.

How BMW is dealing with an aging workforce



We all know that the world has advanced drastically over the last couple decades, and it has advanced even more in the technological factor. As more and more companies are seeking to become efficient and more productive, more and more jobs are going to robots since they can be programmed a certain way and produce the same product over and over in a fraction of the time. But that is not the case over at BMW, instead they are fearful of losing the craftsmanship and acquired skills of their older employees. Instead of forcing them to quit and bring in a much younger generation of workforce, BMW actually tweaked one of their assembly line to have an average worker age of 47 and then asked them what they would change to make it more comfortable for them. $50,000 and 70 small changes later, the assembly line saw an astonishing improvement in almost every factor.