Monthly Archives: February 2008
Security Review: Traffic Lights
As i’m sure everyone already aware of, one way our country (and many others) directs traffic is with these things call traffic lights. We place them at intersections, at about a one to one ratio of oncoming lanes to traffic … Continue reading
Electronic Voting in India
Given the upcoming elections, it seems like an appropriate time to cover an electronic voting system that is not our own, a system that has a significantly different view on security, usability and design.
Security Review: Cell Phone GPS
With the increasing popularity of auto-enabled GPS features in cell phones, a group at UC Berkeley is experimenting with using the phones as a means to gather real-time traffic information. The phones will broadcast their locations back to a central server … Continue reading
Security Review: Bodyguards
Security Review: Bodyguard Overview: Bodyguards are people who protect their clients from various treats such as assaults, assassination, and kidnapping. Depending on the importance of the client who is being protected, some clients might have a team of bodyguards while … Continue reading
Security Review: Blinger?
I’m going to guess that you, like me, have just found out about this device. According to news reports and their website (https://www.blingerstore.com/0/vnc/), BlingNation’s Blinger is a new, portable ATM device. It has a magstripe card reader on the back, … Continue reading
Search with a little help from your friends (on social networks)
Article As most of you know, social networks are rapidly becoming ubiquitous, with hundreds of millions of users between Facebook (62 million), Myspace (>100 million), and Linkedin (>17 million). Naturally, many companies are trying to take advantage of this fact … Continue reading
Security Review: iTunes Movie Rentals
Recently, Apple unveiled a new system that allows customers to browse the iTunes store and “rent” selected movies for a smaller fee than it would cost to purchase them. This fee also happens to be slightly more than one would … Continue reading
Security Review: Metal Detectors and Security Checkpoints
Anybody who has flown on a national airline or had business in a federal, state, or county government building has certainly had the experience of waiting in the queue to be ushered through a beeping metal-detecting portal, separated from bags … Continue reading
Latest on the RIAA and Copyright Infringement
(article) The RIAA is trying to push the PRO-IP bill through Congress, which would grant them more protection under copyright law, including the ability to sue even more for illegal copying of media. Thought $9,000 per song was too much? … Continue reading
Mega-D Botnet overtakes Storm Botnet
A new botnet, called Mega-D, is currently responsible for an estimated 32% of all spam, compared to the Storm botnet’s peak estimate of 21% in September 2007. The Mega-D botnet runs on a distributed peer to peer network, and the … Continue reading