Latest reports indicate that in the first half of 2007 spam reached 59% of all the monitored email traffic, a substantial increase compared to the 54% of q4-2006.
A scaring 0,68% of these emails had a security threatening payload, in the form of a malicious attachment, which corresponds to a malware-based attack every 140 spam messages sent.
Since a few years now, crackers and criminal organizations that operate in the digital domain have been using a mix of social engineering and software exploiting techniques.
If you follow news related to IT security then you already know that using VoIP services, that use SIP isn’t the safest way to guarantee communication for your home or company. Session Initiation Protocol (SIP) devices can be vulnerable to eavesdropping. That’s a fact.
There are tons of hardware and software using SIP, and many of our and your internet providers are also using it. Let me explain how potentially harmful and dangerous this can be for us, the end-users.
Eavesdropping for adversarial purposes is the less danger, and possibility that this will happen, is low. More possible is, that these vulnerabilities will be used in espionage in industry, since these devices are well used in companies.
Powerful weapons are being studied, developed and deployed on the Middle East battlefield. They are lethal, and meant to destroy the opponent’s morale thanks to a well-known “shock and awe” tactic.
But they do not require explosives, nor they require expensive training to be launched or operated: on the contrary, they’re so cheap compared to the damage they can impose on the enemy, that they are more and more spread every day.
To build these weapons is also very easy: it just takes a few chicks and guys in need of some easy cash, a camera, and a web server.
If you use a finite resource it tends, well, to deplete. Especially if you use more and more of it, every year, just like it wasn’t *really* finite.
We live in a paradoxical age, where everyone, at every level, wishes and believes that, magically, hydrocarbons will continue to flow abundantly for some time, if not forever. Maybe in 20 years, they say, maybe in 30, oil will become scarce. By that time, they say, we’ll be prepared to manage it.
This is very wrong. Oil is not yet completely depleted, of course: but in 3 – 4 years it will be as if it were mostly gone, and nobody is ready to cope with this.
This incredible state of blindness is due to many reasons, one of them being our weak pattern-matching skills when adverse conditions build up slowly enough to go unnoticed by our collective nervous system. And, of course, we are being systematically deceived on this subject by the media and the powers-to-be, thanks to our will to be deceived.
Readers of this portal may have not been aware, but the 19th International Olympiad in Informatics ended last week in Zagreb, Croatia. There were total of 285 high school contestants from 77 countries, 11 of them were girls. The contestants were situated at the student dormitory of Stjepan Radic, while the contest and the opening and closing ceremony was held at the Zagreb Fair.
Each participating country can have a team with 4 contestants, a team leader, a deputy team leader, and one or more observers and/or guests. This year there was only one contestant with his team leader from Cuba, while the Egyptian team had about 20 members (next year’s olympiad will be in Egypt, so they wanted to get themselves very familiar with the organization of this year’s olympiad).