States Throw Out Worthless Diebold Voting Machines

(Image is in the Public Domain)

It's actually very encouraging that the same states that were originally duped into buying these machines despite the vast mountain of evidence of their general worthlessness have become smart enough to remove them in time for the upcoming election.

And about this:

"I have a huge inventory of machines that I am not able to use," she complained. "They are just sitting in our warehouse basically useless." Stacked to floor to ceiling are 4,000 machines purchased at $3,500 each. Total cost of that system: $16 million.

How exactly does Diebold get away with selling defective merchandise to the government without being forced to issue a refund?

Update

Today Ars Technica also covers the story and adds some interesting details. For example, it turns out that in one case a voting machine company offered to buy back their machines from the state for $1 each (their original price was $5000 each). At least the state was smart enough to decline). Tags: ,

“Fakeproof” E-Passports Cloned Easily

Wireless passports. Who could have guessed they'd have security problems.
(Image is used under the Pixabay license)

So much for "Fakeproof". Of course, anyone who knows about RFID and the way they work could see this coming.

Tags: ,

University of Maryland Leaks Social Security Numbers

University of Maryland
(Image used under: Creative Commons 3.0 [SRC])

They sent out mailings that had the SSNs on the outside envelope. But don't worry! They're offering a free year of credit monitoring!

Whee.

Instead, do something useful and take advantage of Maryland's Credit Freeze law to actually protect yourself rather than get ripped off by credit monitoring

Tags: ,

China’s Surveillance Society Created By American Hands

China has history, but the recent part isn't so good.
(Image is in the Public Domain)
American companies are providing technology to China to be used in their mass surveillance of their people.
The Fourth Amendment prohibition against illegal search and seizure made it into the U.S. Constitution precisely because its drafters understood that the power to snoop is addictive. Even if we happen to trust in the good intentions of the snoopers, the nature of any government can change rapidly — which is why the Constitution places limits on the tools available to any regime. But the drafters could never have imagined the commercial pressures at play today. The global homeland-security business is now worth an estimated $200 billion — more than Hollywood and the music industry combined. Any sector of that size inevitably takes on its own momentum. New markets must be found — which, in the Big Brother business, means an endless procession of new enemies and new emergencies: crime, immigration, terrorism.

We're in very real danger of what they have over there being implemented here. And it's already begun.

Tags: ,

TJX Fires Employee for Publicizing Their Weak Security

(Image used under: Creative Commons 2.0 [SRC][Mod])

TJX, the company that is known for having the largest data breach in history (so far), has not implemented better security and might have gotten worse. The employee that blew the whistle on them has been caught and fired for it.

TJX now has a firm that scours the internet to find bad things posted about them, which is how they found the message and fired him for it. Too bad they don't appear to have hired anyone to beef up operational security or to convince people to use strong passwords.

Hey! That probably means they'll find THIS page. Sweet.

If that's the case, then here's my message to them: Stop storing all that personal data about us against our will and you won't have to pay for more security. You can't lose what you don't have, duh!

Tags: , , ,

Reunion.com Invades Your E-mail and Spreads Like a Virus

(Image is used under the Pixabay license)

Reunion.com is using a deceptive marketing strategy where they pretend to be someone you know who is inviting you to Reunion. If you go to Reunion.com to see who it is, sign up, and make the horrible gross mistake of giving them your e-mail address password, they will automatically send out false e-mails to all the people in your contact list.

Two things are going horribly wrong here. One is that Reunion.com is using false and deceptive practices and is doing nothing less than what a virus or hacker would do. I hope the hammer of law hits them hard and fast

The second thing is that people somehow believe it's ok to give up their e-mail address password which is a huge no no.

Tags: , ,

RFID Passports Allow Remote ID of Holder’s Nationality

(Image is used under the Pixabay license)

Well flipping duh.

Most newly issued passports carry an embedded RFID containing digitally signed biometric information. Access to this chip is wireless, which introduces a security risk, the possibility that an attacker might be able to access data on a person’s passport without the owner knowing.

It's this reason that putting RFID in passports was such a stupid idea to begin with. Put wireless into any system that protects private information and watch the world come crashing down around you.

I'm not saying that it's impossible to secure a system using wireless, but it takes a whole hell of a lot more effort that was put into the passports system.

Anyway, now that someone has proven this is viable, those fears that someone can just scan a crowd and find the Americans to target have been entirely validated.

Tags: ,

NXP RFID Encryption Hacked

(Image used under: Creative Commons 2.0 [SRC])

A university has hacked the encryption of an RFID chip maker who's contactless smartcard applications include fare collection, loyalty cards, and access control cards.

Tags:

Data Breaches More Common Than You Think

(Image used under: Creative Commons 2.0 [SRC])

There have been almost 40 data breaches in Maryland since January which have been reported only due to a new breach notification law in Maryland.

I'm betting the story would be similar for other states if they had similar laws.

Tags: ,

Unintended Dangers of Vista

(Image used under: Fair Use doctrine)

What can happen when you become numbed to the security alerts.

Tags: , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

passwords Tutorial
|INDEX|next: Password Tips and Tricks

Making Good Passwords

To understand what makes a good password, let's talk about what makes a bad one first.
Making good passwords can be complex, but here are some tips and tricks that will make it easier.

Password Protection

Once you've taken the trouble to make a good password, the next step is to keep it safe!
Now that you've done all this work, you have to learn the most important rule of all: DON'T GIVE THEM AWAY!

... or check out any of my other guides and tutorials by clicking here!

Bad Passwords

To understand what makes good passwords, first check out some of the worst passwords out there and what makes them so bad.

[Click for full description]

Password Tips and Tricks

It's impossible to expect someone to make good passwords by just giving them some rules. There are tricks that make your passwords secure and easy for you all at the same time.

[Click for full description]

Password Protection

It's really a skill to come up with secure passwords that you can remember. Once you've learned how, remember that it doesn't matter how good you are if you don't protect your password properly.

[Click for full description]

Password Mugging

A disturbing new practice among websites and services is where they ask you for your user name and password to other sites. I call this "Password Mugging"

[Click for full description]