Let's say you work for a government agency and it becomes apparent that many computers on your network may be infected with some malware. What do you do? Well, if you're the Economic Development Administration, you cut your network off from the rest of the world, hire an outside security contractor, and then physically destroy $170,500 worth of equipment.
Peter Bright brought us the whole story in US agency baffled by modern technology, destroys mice to get rid of viruses. Naturally, this kind of knee-jerk reaction baffled and astounded many of our readers. "Dammit. I'm searching for an appropriate facepalm pic, but there are so many and none are adequate for this," Caedus wrote. LigerRed also sought to forcefully apply face to object in an expression of frustration. "I literally just facedesked," Red wrote.
Other readers were mostly astonished by reports that the EDA's path of destruction extended to the mice that the administration's employees used. "Ah, the scorched earth mouse pad policy. There's just no telling where an infected mouse might point, you know" ColinABQ wrote. maxp0wer was concerned about the EDA's outside security contractor, who seemed to know little about pest removal. "Despite spending all this money, the mouse infestation persists!" p0wer riffed.
But not everyone was so quick to assume that the EDA employs by a bunch of slack-jawed buffoons.Starcraftmazter wrote, "Anyone else reckon they just wanted an upgrade and didn't get the funding for it?"
"To be fair," Krutawn offered, "mice have been shown quite successful in targeted attacks. Most OS's install their 'drivers' without a second thought." InfernoBlade took that idea even further:
FerServadu took a more tongue-in-cheek approach to a generous opinion:
And UltimateLemon took the EDA's problem solving skills and ran with them: "What? Jenkins has a flu?! Quick! Burn him outside before he kills us all!"
No feds allowed
One big development from this week involved DefCon founder Jeff Moss asking feds to not attend the renowned hacker conference this year due to rising tensions in the aftermath of the Snowden leaks. Dan Goodin's article, For first time ever, feds asked to sit out DefCon hacker conference, reflected on the rift that's occurred between unaligned hackers and federal employees.
While many commenters got vitriolic in the comments section, some put their more reasoned opinions forward on both sides.
KenM disagreed with Moss' move because both feds and non-feds seem similarly bad. "At least the NSA and other government agencies weren't taking my information and publishing it publicly for laughs, or to 'show people things are broken.' Or taking credit card information and using it to buy things for themselves and forcing me to contact people and give them new credit card information... Both sides do things they shouldn't. There's a reason they're called 'black hats.'"awaken688 had similar reasoning, but came at it from the glass-half-full camp, arguing that both feds and non-feds had good members. "It seems like everyone is assuming all federal agents are bad. What about the FBI agents who go after hackers in bank cases or identity theft? I certainly am glad they are there and hope they can get the best of the best."
Of course, there were many who thought Moss had made the right decision asking feds not to attend DefCon. skippyvsjifshowdown wrote,
dlux saw the request as more of a strategic move to encourage feds to make changes, and to keep the focus on privacy infringement:
But Mike Gale thought that all that could have been gained will now be lost by excluding the very people most involved in the data collection programs put forward by the NSA. "I reckon a lot could be achieved by talking to one another," Gale wrote. "If a "fed" gets the message from a few hackers that he respects [saying] that they think the government has gone too far and is breaking the constitution, [that] might ultimately have some effect. Might never see it, but at the least there might be an increase in refusing to do marginal and maybe illegal things. Watching the event on a screen won't have that same impact, methinks."
Old tech, new solutions
Dan Goodin also brought us a look into how security experts handle password management in How elite security ninjas choose and safeguard their passwords. After the story went up, Ars tweeted, "Are you an elite security ninja?" to which @TimelessP responded, "If this article even mentions death of passwords and requires personal information instead I'll... ooh look a butterfly!" Definitely follow the butterfly, TimelessP.
In wackier news, Cyrus Farivar brought us a brief about Russia's new security strategy to prevent Wikileaks-style breaches: do away with computers altogether. You can find the details in the story To avoid leaks, Russia turns to… typewriters. "Everything old is new again," wrote@Ziya_Discovery.
Casey Johnston also got hands-on time with Nokia's new Lumia 1020 this week, and you can see her photo gallery In the dark and on the move with the Nokia Lumia 1020’s camera. At the event, Nokia went out of its way to accommodate its audience. "Nokia has us at little blogger desks, each with its own Ethernet cable, bless their hearts," @caseyjohnston tweeted. A bit anachronistic, but hey, it got the job done.
No comments:
Post a Comment