Join our network of non-profits, companies and individuals who believe social change can happen through design.

Become A Member

Terry Spenser


Member since July 23, 2013

  • Image_177_

    More than a decade ago, I attended an excellent talk by well-known cryptographer and security expert Bruce Schneier, where his key point was that there was nothing new under the sun when it came to security issues.

    Yes, the scary stuff happening on the internet at the time, involving hackers and algorithm-cracking and malware, might seem particularly alarming because it was, or seemed, as if it had never been seen before. But actually, he argued, it was all the same old crimes, just done with new tools. Theft, identity-stealing, fraud – they’d all be familiar to a Roman.

    Every time I attend a security event, or, as last week, the launch of a security report, his point comes to mind, as it puts the latest trends in malware, or the most recent outrageous hacker exploit, in a useful context. It isn’t so much what’s being done, as how it’s being done. And that, as I discovered way back when I stumbled into my first security conference in Silicon Valley and was hooked like a phishing victim, is endlessly inventive and fascinating.

    And so it was, out at Symantec’s security centre in Dublin, as researchers talked through Symantec’s 2014 Internet Security Threat Report , which looks back over key developments in 2013.

    Hence Heartbleed, the internet security bug that has made headlines this month, didn’t feature at all. But there were many bizarre and intriguing developments.

    I found particularly fascinating a discussion on some of the potential ways to get money ...

  • Google’s_nest_buy_will_force_an_internet_of_things_privacy_debate_177_

    Deze morgen, zoals ik was het schrijven van deze blogpost, kreeg ik een e-mail van een van mijn collega's, zeggen "Is het raar dat aangezien Google Nest kocht, ik wil niet langer een?" Haar sentiment is niet dat ongebruikelijk, omdat, zo blijkt, veel mensen het gevoel dat Google + Nest = HAL. (Het is moeilijk te missen de gelijkenis).

    Mijn collega Frank Gillett onlangs een bericht waarin een verzameling van tien belangrijke gedachten over de acquisitie. Als de privacy-identiteit-persoonlijke gegevens wonk adviseren van Forrester marketing strategie cliënten, ik dacht dat ik zou inzoomen op enkele van de meer saillante punten voor deze kwesties.

    Het spreekt vanzelf dat Nest Labs mainstream huisautomatisering beter dan de meeste andere bedrijven hebben bedacht. Maar tot op heden nog niet had het bedrijf een sterke identiteitsverificatie ingebouwd in haar diensten. Dat betekent bijvoorbeeld dat mijn partner en ik verschillende temperatuur voorkeuren die Nest automatisch implementeert als we zowel home - maar in verschillende kamers kunnen niet ingesteld. Door Google verificatie en identiteit het protocol voor het delen van gegevens, voorkeuren en machtigingen over deze apparaten - deel van wat wij persoonlijke identiteitsbeheer noemen - zal dit binnenkort een realiteit.

    De volgende stap? De mogelijkheid om te verlenen anderen (bv: gasten of huis sitters) tijdelijke toegang tot uw Nest, hotels met Nest technologie ingebouwd in hun kamers, en zelfs algoritmisch geopt...

  • Europäische Versicherer entdecken Sie Cyber-Schutz-Markt

    Es ist bereits einem boomenden Markt in den Vereinigten Staaten, aber in Europa Unternehmen auch Wachen die Idee der Cyber Versicherung sich vor Internet-Angriffen zu schützen.

    Und Versicherungen sind starkes Wachstum in den kommenden Jahren zu projizieren.

    Auf der anderen Seite des Atlantiks, wo Unternehmen verpflichtet US-Behörden von online-Angriffen sind, ist der Cyber-Versicherungsmarkt bereits hoch entwickelt in Höhe von $1,3 Milliarden (960 Millionen Euro) pro Jahr, nach Christopher Lohmann, Leiter Deutschland und Zentraleuropa bei Allianz Global Corporate und Spezialität.

    Europa ist noch ein langer Weg.

    "Aber wir projizieren starkes Wachstum in den kommenden Jahren. Wir den Markt in Höhe von 700 Millionen Euro bis 2018 sehen", sagte Lohmann.

    Für Unternehmen und Privatpersonen sind die Gefahren aus dem Internet sehr real, zwischen Daten und Identitätsdiebstahl und Spionage.

    Unternehmen sehen ihre Infrastruktur gelähmt, ihre EDV-Systeme, die mit Viren und Malware infiziert.

    Aber das sind nicht die einzigen Risiken: menschliches Versagen und interne Schluckauf können auch jam Systeme und Daten.

    Erst letzten Monat war Mobilfunkbetreiber Vodafone das Opfer von massiven Datendiebstahl wo persönliche Informationen--einschließlich Bankverbindung--etwa 2 Millionen Menschen gestohlen wurde.

    Und mit dem exponentiellen Wachstum der elektronischen Nachrichten und die zunehmende Übertragung von...

  • Black_budget_1_177_

    US spying successes, failures, objectives detailed in top secret 'black budget'

    WASHINGTON — U.S. spy agencies have built an intelligence-gathering colossus since the attacks of Sept. 11, 2001, but remain unable to provide critical information to the president on a range of national security threats, according to the government's top secret budget.

    The $52.6 billion "black budget" for fiscal 2013, obtained by The Washington Post from former intelligence contractor Edward Snowden, maps a bureaucratic and operational landscape that has never been subject to public scrutiny. Although the government has annually released its overall level of intelligence spending since 2007, it has not divulged how it uses those funds or how it performs against the goals set by the president and Congress.

    The 178-page budget summary for the National Intelligence Program details the successes, failures and objectives of the 16 spy agencies that make up the U.S. intelligence community, which has 107,035 employees.

    The summary describes cutting-edge technologies, agent recruiting and ongoing operations. The Washington Post is withholding some information after consultation with U.S. officials who expressed concerns about the risk to intelligence sources and methods. Sensitive details are so pervasive in the documents that The Post is publishing only summary tables and charts online.

    "The United States has made a considerable investment in the Intelligence Community since the ...

  • Firewalls and firefights

    Community, Communication Design

    A new breed of internet-security firms are encouraging companies to fight back against computer hackers

    Source Link

    “IF SOMEONE is shooting at you, the last thing you should focus on is the calibre of the bullet,” says George Kurtz, the boss of CrowdStrike, a young tech company. Seated at a coffee table at Black Hat, a conference for the cyber-security industry held in Las Vegas recently, Mr Kurtz is expounding on the fundamental flaw he sees in the way many firms deal with cyber-intrusions. Most, he says, spend too much time trying to work out what hit them and far too little trying to understand the motivations of their attackers and how to counter future assaults.

    CrowdStrike is a vocal advocate of “active defence” technologies that are generating much buzz in the cyber-security world. Their proponents argue that those who think firewalls, antivirus programmes and other security software are enough to keep their networks safe are kidding themselves. Instead, companies should work on the assumption that their systems have been breached, and take the fight to the hackers. The methods they prescribe include planting false information on their systems to mislead data thieves, and creating “honeypot” servers, decoys that gather information about intruders.

    There are worries that such talk of active defence may encourage companies to go further, and “hack back” at their tormentors, even though many countries have laws that forbid such activity. In a survey of 181...

  • Abney Associates Asia Stocks Back on Track

    Community, Communication Design

    Source Link Abney Associates (1888PressRelease) July 18, 2013 - Stock prices in Asia gained their biggest advance since September 2012 amid signs the Japanese and U.S. economies are improving following this week's statement that reassured investors that the stimulus efforts by the Federal Reserve will remain in place for some time.

    Japanese exporters led gains as weaker yen boost the value of overseas income at carmakers and electronics manufacturers when repatriated. Toyota the world's biggest carmaker gained 1.5 percent. Honda Motor Co rose 2.2 percent. Panasonic Corp, Japan's second-biggest television maker, jumped 6.7 percent. Japanese lenders gained momentum after the nation's industrial output beat expectations, Mitsubishi UFJ Financial Group Inc, Japan's No. 1 lender led the way with 4.1 percent gains, Sumitomo Mitsui Financial Group Inc the number 2 lender followed with 2.9 percent gains.

    The MSCI Asia Pacific Index climbed 1.9 percent, Japan's Topix index rose 3.2 percent and the benchmark Nikkei 225 Stock Average jumped 3.5 percent extending gains for a second week, South Korea's Kospi index gained 1.6 percent and Taiwan's Taiex index added 2.3 percent. Singapore's Straits Times Index increased 1.1 percent. Hong Kong's Hang Seng Index advanced 1.2 percent. China's Shanghai Composite Index rose 0.7 percent, New Zealand's NZX 50 Index rose 0.5 percent, while Australia's S&P/ASX 200 Index lost 0.2 percent.

    "The Japan's prime minister Shinzo Abe is determine...