Month: August 2010

ceo, cfo, pants on fire?

A recently published research paper entitled “Detecting Deceptive Discussions in Conference Calls” provides an interesting look at lies and the liars who tell them (in…

Continue Reading

password strength take 2

A few days ago, I posted on the subject of password strength… and then I saw some new research on the issue from Georgia Tech which…

Continue Reading

the great helium shortage of 2035?

It turns out that helium is important for more than party balloons and making our voices high and squeaky… and that we may run out…

Continue Reading

this conversation may be recorded, just cause i wanna…

From the US Federal Courts (via ThreatLevel)… it turns out that recording a conversation on your iPhone (and I assume any other device capable of…

Continue Reading

under the sea…

A while back, I did a post about the global undersea communications network which forms the underpinning of the global Internet.  Here’s a great way…

Continue Reading

it turns out that some pens are at least as mighty as some swords…

Of course, if you are using one of those new fangled high speed digital computers with their cutting edge (in more than one way) floppy…

Continue Reading

154 killed by malware?

Did a malware infection play a  part in killing 154 people in the crash of Spanair 5022 at Madrid’s Barajas airport?  According to a story…

Continue Reading

so long, SAS70!

Since 1992, many organizations have relied on SAS70 audit reports to determine whether their service providers’ controls are appropriately designed and effectively implemented.  In the…

Continue Reading

google and the government

The US Federal Government has given Google the FISMA certification needed to allow government agencies to outsource their (non secret) email and calendar systems to…

Continue Reading

truecrypt – disk encryption for everyone

  It is amazing how much (sensitive) information we can now carry around every day.  I have 8 gigs of all sorts of interesting stuff…

Continue Reading