“At least three US oil companies were the target of a series of previously undisclosed cyberattacks that may have originated in China and that…were focused on one of the crown jewels of the industry: valuable “bid data” detailing the quantity, value, and location of oil discoveries worldwide”
The fallacy of secure software
More on China v. Google at Information Dissemenation
Reverse templating for spam detection
Picking padlocks
This entry was posted on Tuesday, January 26th, 2010 at 21:13 and is filed under Communications security, Random bits, Security. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
Δ
Why Poissonian traffic models matter more now than ever, part 1 2 3 4 5 6
Common data sets and the illusion of scientific security testing
A minimal periodic coloring theorem part 1 2 3
Dynamical bias in the dice roll
The fundamental law of statistical physics
Jaynes and the Gibbs paradox
A graded lexicographic index, part 1 2 3
Solution of second-order matrix difference equations
Birds on a wire and the Ising model
The chimera of cyberdeterrence
Martingales from finite Markov processes, part 1
Initial software release
[All Equilibrium-related posts]
[All commentary]
[Nonrandom bits]