This is the old ChiefTech blog.: Enterprise 2.0 in 2006 and into 2007

ChiefTech

in 2006 and into 2007 No time to comment on these, but Ive had them flagged for a while a posts of interest about Enterprise 2.0 in 2006 (see his predictions for 2007 below); On the Collaboration Loop blog, Larry Cannell explains why there is more to Enterprise 2.0 This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009.

Paper 40

This is the old ChiefTech blog.: Slides from Rebooting the Enterprise (11 Oct 2006)

ChiefTech

Tuesday, 18 September 2007 Slides from Rebooting the Enterprise (11 Oct 2006) In anticipation of sharing my workshop slides later in the week, I have finally bitten the bullet [point!] This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion.

Paper 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

WEF: 217 More Years Until Women and Men Reach Economic Equality

Dark Reading

Progress toward economic parity is in reverse for the first time since 2006, but cybersecurity can help change the game

15-Year-Old Malware Proxy Network VIP72 Goes Dark

Krebs on Security

org was originally registered in 2006 to “ Corpse ,” the handle adopted by a Russian-speaking hacker who gained infamy several years prior for creating and selling an extremely sophisticated online banking trojan called A311 Death , a.k.a.

A very brief history of cloud computing

DXC

You can argue over when cloud computing really began, but one good starting point is 2006 when then Google CEO Eric Schmidt said at a conference: “I don’t think people have really understood how big this opportunity really is. It starts with the premise that the data services and architecture should be on servers. We call […]. Cloud Platform Uncategorized

Cloud 85

NSA Attacks Against Virtual Private Networks

Schneier on Security

A 2006 document from the Snowden archives outlines successful NSA operations against "a number of "high potential" virtual private networks, including those of media organization Al Jazeera, the Iraqi military and internet service organizations, and a number of airline reservation systems.".

Fears over DNA privacy as 23andMe goes public in deal with Richard Branson

The Guardian Data Protection

Launched in 2006, 23andMe sells tests to determine consumers’ genetic ancestry and risk of developing certain illnesses, using saliva samples sent in by mail. Genetic testing company with 10 million customers’ data has ‘huge cybersecurity implications’ The genetic testing company 23andMe will go public through a partnership with a firm backed by the billionaire Richard Branson, in a deal that has raised fresh privacy questions about the information of millions of customers.

500M Avira Antivirus Users Introduced to Cryptomining

Krebs on Security

Founded in 2006, Avira Operations GmbH & Co. Many readers were surprised to learn recently that the popular Norton 360 antivirus suite now ships with a program which lets customers make money mining virtual currency.

Mining 280

Needless Panic Over a Wi-FI Network Name

Schneier on Security

In 2006, I wrote an essay titled " Refuse to be Terrorized." (I A Turkish Airlines flight made an emergency landing because someone named his wireless network (presumably from his smartphone) "bomb on board.". I am also reminded of my 2007 essay, " The War on the Unexpected." A decade later, it seems that the frequency of incidents like the one above is less, although not zero. Progress, I suppose. airtravel overreactions warontheunexpected wifi wireless

SAS 2019: 4 Stuxnet-Related APTs Form Gossip Girl, an ‘Apex Threat Actor’

Threatpost

Flowershop, Equation, Flame and Duqu appear to have a hand in the different phases of Stuxnet development, all working as part of an operation active as early as 2006. Malware Security Analyst Summit apt chronicle Duqu Equation flame flowershop gossip girl SAS 2019 stuxnet development supra group

When Your Smart ID Card Reader Comes With Malware

Krebs on Security

“The Army Reserve started using CAC logon in May 2006,” Danberry wrote on his “About” page. Millions of U.S.

Deutsche Telekom sells data by turning clunkers into smart cars

Information Management Resources

Europe’s largest phone carrier is offering owners of cars built 2006 or later a service that will monitor driving data and turn the vehicle into a Wi-Fi hotspot. Hardware and software Driverless Mobile technology

28

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

According to iDefense, in 2006 the group was responsible for crafting a rootkit that took advantage of a zero-day vulnerability in Microsoft Word, and was used in attacks on “a large DoD entity” within the USA. The U.S.

A Light at the End of Liberty Reserve’s Demise?

Krebs on Security

” The government says from 2006 until the service’s takedown, Liberty Reserve processed an estimated 55 million financial transactions worth more than $6 billion, with more than 600,000 accounts associated with users in the United States alone. In May 2013, the U.S.

Threat actors offer for sale data for 50 millions of Moscow drivers

Security Affairs

Stolen data spans from 2006 and 2019, local media outlets have confirmed their authenticity. “The cybercriminals put up for sale for $ 800 a database of 50 million lines with the data of drivers that were registered in Moscow and the Moscow region from 2006 to 2019.

Sales 87

Putting the Human back in the Data: Using Data to Lead Change

ARMA International

The unprecedented effort to compensate the victims of 9/11, 2006. When you think about data, what is the first thing that comes to mind? Do you love it? Or do you think you’re “not a numbers person”? Do you have concerns about security? Or validity of the data you collect?

Has Innovation Died in Marketing?

John Battelle's Searchblog

” The series kicked off with an insight that now feels obvious, but in 2006 was relatively fresh: Most media being made at the time was still a product of what I called a “packaged goods” mentality.

“FudCo” Spam Empire Tied to Pakistani Software Firm

Krebs on Security

Also we are running business since 2006.”

The Evolving Risk in Aging Legacy Applications

Hanzo Learning Center

A white paper by Carl Weber fired a warning shot in 2006, when software had grown quickly into Software-as-a-Service: Application RetirementThe time gap between what defines modern apps and legacy apps is constricting as fast as a rubber band. At this point, actually, we’re watching it happen like that frog in the metaphor of the boiling water: Artificial intelligence, powered by metadata and the right set of rules, is already morphing today’s apps into applications ready for retirement.

Hacked Data Broker Accounts Fueled Phony COVID Loans, Unemployment Claims

Krebs on Security

In 2006, The Washington Post reported that a group of five men used stolen or illegally created accounts at LexisNexis subsidiaries to lookup SSNs and other personal information more than 310,000 individuals.

Russians Shut Down Huge Card Fraud Ring

Krebs on Security

In 2006, Stroganov and an associate Gerasim Silivanon (a.k.a. Federal investigators in Russia have charged at least 25 people accused of operating a sprawling international credit card theft ring.

Retail 227

OpenSubtitles data breach impacted 7 million subscribers

Security Affairs

The hack is the result of poor cyber security since its launch in 2006, administrator OSS said. OpenSubtitles has suffered a data breach, the maintainers confirmed that the incident impacted 7 Million subscribers.

Attacks against SolarWinds Serv-U SW were possible due to the lack of ASLR mitigation

Security Affairs

SolarWinds did not enable anti-exploit mitigation available since 2006 allowing threat actors to target SolarWinds Serv-U FTP software in July attacks.

Bart Gellman on Snowden

Schneier on Security

This isn't news; we learned about this in 2006. Bart Gellman's long-awaited (at least by me) book on Edward Snowden, Dark Mirror: Edward Snowden and the American Surveillance State , will finally be published in a couple of weeks. There is an adapted excerpt in the Atlantic.

MI5 seized Boris Johnson’s phone over security risk fears

Security Affairs

In April, media reported that Boris Johnson ‘s personal mobile phone number has been freely available on the internet for the past 15 years after it was published in a think tank press release in 2006, but never deleted.

Risk 108

How to Overcome the 4 Most Common Obstacles to Invoice Automation

Docuware

In 2006, there was a popular movie starring Matthew McConaughey and Sarah Jessica Parkercalled Failure to Launch. The film focuses on a 35-year-old man who lives in the home of his parents and shows no interest in leaving the comfortable life his parents, especially his mother, have made for him there.

29

Revoked NARA Bulletins

National Archives Records Express

July 12, 2006. Over the past several months, we have undertaken a review of NARA bulletins to determine if any require revisions or should be revoked. NARA Bulletin 2019-01 notifies agencies that the following bulletins are no longer needed or do not reflect current policy: Bulletin Number and Title. Date Issued. 2006-03 : Availability of the Federal Enterprise Architecture Records Management Profile, version 1.0. December 23, 2005.

Tribute: Rick Ocasek

Archives Blogs

On November 11, 2006 Ric Ocasek, vocalist and front man of The Cars, spoke to Leonard Lopate about a new DVD featuring never-before-seen live performances from the band’s US tours. The DVD, The Cars Unlocked was sourced from footage he had in his basement. English

Episode 222: US Rep. Himes on Congress’s About-face on Cybersecurity

The Security Ledger

In this week’s podcast, we speak with Congressman Jim Himes (D-CT) about Congress’s sudden focus on cybersecurity - an about face that Rep. Himes says was encouraged by the devastating Colonial Pipeline hack. The post Episode 222: US Rep.

Crooks target US universities with malware used by nation-state actors

Security Affairs

Hupigon is a remote access Trojan (RAT) that has been active since at least 2006, it was first detected by FireEye in 2010. Several US universities and colleges were targeted in phishing attacks aimed at delivering malware previously used by China-linked APT groups.

New Report: The Cost of Data Breaches

Rippleshot

To put the evolution of data breaches into context, IBM's data said the average cost of a data breach to a company has doubled since 2006 — to more than $8 million in the U.S. The fallout from the Equifax breach has kept companies and financial institutions on high alert for how their customers are impacted by evolving fraud schemes. Newly released data from IBM this week confirms what many already suspect: Data breaches are getting much, much worse.

Crooks target US universities with malware used by nation-state actors

Security Affairs

Hupigon is a remote access Trojan (RAT) that has been active since at least 2006, it was first detected by FireEye in 2010. Several US universities and colleges were targeted in phishing attacks aimed at delivering malware previously used by China-linked APT groups.

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

The Archiveus Trojan from 2006 was the first one to use RSA cipher, but it was reminiscent of a proof of concept and used a static 30-digit decryption password that was shortly cracked. Ransomware is undoubtedly one of the most unnerving phenomena in the cyber threat landscape.

SAML: Still Going Strong After Two Decades

eSecurity Planet

led the way, the first two iterations of OIDC, OpenID, were released in 2006 and 2007 as alternative authentication protocols. SAML is an open standard facilitating the communication and verification of credentials between identity providers and service providers for users everywhere.

How we ended up in an era of intentional ignorance

WIRED Threat Level

Firstly, because I was an early-ish analyst blogger in the learning space (2006) and blogged the same way the writer did back then (quick commentary vs in-depth analysis) and secondly, it’s a sad and accurate story of how we got to where we are today – from WordPress-powered “Hello World” reflective blogs to memes and to trolls on Reddit – basically, a whole bunch of garbage.

This is the old ChiefTech blog.: The "E" has it

ChiefTech

This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.

Paper 43

This is the old ChiefTech blog.: Uploaded to SlideShare: Enterprise RSS, What?

ChiefTech

This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances. Sunday, 13 April 2008 Uploaded to SlideShare: Enterprise RSS, What?

Paper 40

Experts found three new 15-year-old bugs in a Linux kernel module

Security Affairs

The flaws were present in the component since it was being developed in 2006. Three 15-year-old flaws in Linux kernel could be exploited by local attackers with basic user privileges to gain root privileges on vulnerable Linux systems.

Risk 113

NASA data breach – The agency notifies employees of a security intrusion

Security Affairs

The Space Agency confirmed that the breach may impact NASA Civil Service employees on-boarded, separated from the agency, or transferred between centers from July 2006 to October 2018. National Aeronautics and Space Administration (NASA) notifies employees of a data breach that exposed social security numbers and other personal information.

This is the old ChiefTech blog.: Interviews with Ward Cunningham and Ross Mayfield

ChiefTech

This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.

Paper 40