IT Staff and Leaders at Odds Over Job Performance

There's a considerable difference of opinion between IT professionals and their bosses with respect to employee performance management, according to a recent survey from TEKsystems. Supervisors overlook poor performance for far too long, some IT pros say. And while managers generally do a decent job at clarifying expectations, they fall far short when it comes to evaluating staffers for advancement and aligning individual achievement with company strategies.

See & read more at :
http://www.baselinemag.com/it-management/slideshows/it-staff-and-leaders-at-odds-over-job-performance/?kc=EWKNLEDP11082012C


Smishing Vulnerability in Multiple Android Platforms
http://www.csc.ncsu.edu/faculty/jiang/smishing.html

Firefox to make life harder for HTTPS snoopers
http://www.h-online.com/security/news/item/Firefox-to-make-life-harder-for-HTTPS-snoopers-1746127.html
https://blog.mozilla.org/security/2012/11/01/preloading-hsts/


Cray Titan Supercomputer Now the World’s Fastest; IBM’s Sequoia No. 2

IBM's Sequoia supercomputer in June became the first U.S.-based system to reach No. 1 on the Top500 list of the world's fastest supercomputers. Six months later, the system—at Lawrence Livermore Laboratory—was moved to No. 2, displaced by Cray's huge Titan supercomputer, housed at the Oak Ridge National Laboratory in Tennessee. Titan, a massive XK7 system powered by Opteron processors from Advanced Micro Devices and GPU accelerators from Nvidia, hit a performance of 17.59 petaflops—or quadrillions of calculations per second—outdistancing Sequoia's 16.32 petaflops.

See & read more at :
http://www.eweek.com/servers/slideshows/cray-titan-supercomputer-now-the-worlds-fastest-ibms-sequoia-no.-2?kc=EWKNLEDP11142012A


This is interesting. Early launch anti-malware. (downloadable ms word file)

http://msdn.microsoft.com/library/windows/hardware/br259096

M³AAWG Best Practices for Implementing DKIM To Avoid Key Length Vulnerability
https://www.maawg.org/sites/maawg/files/news/M3AAWG_Key_Implementation_BP-2012-11.pdf

A critical Analysis of Dropbox Software Security
http://archive.hack.lu/2012/Dropbox%20security.pdf

HTTP Strict Transport Security becomes Internet Standard
http://www.h-online.com/security/news/item/HTTP-Strict-Transport-Security-becomes-Internet-Standard-1754549.html

Homeland Security spent $430M on radios its employees don’t know how to use
http://arstechnica.com/tech-policy/2012/11/homeland-security-spent-430m-on-radios-its-employees-dont-know-how-to-use/
http://www.oig.dhs.gov/assets/Mgmt/2013/OIG_13-06_Nov12.pdf

An Overview of Exploit Packs (Update 17) October 12, 2012
http://contagiodump.blogspot.de/2010/06/overview-of-exploit-packs-update.html

Surveillance software: Gamma Group’s offshore companies uncovered
http://www.h-online.com/security/news/item/Surveillance-software-Gamma-Group-s-offshore-companies-uncovered-1759834.html
http://www.guardian.co.uk/uk/2012/nov/28/offshore-company-directors-military-intelligence
http://linuxch.org/poc2012/Tora,%20Devirtualizing%20FinSpy.pdf

The Email that Hacks You
http://www.acunetix.com/blog/web-security-zone/the-email-that-hacks-you/

New DARPA Program Seeks to Reveal Backdoors and Other Hidden Malicious Functionality in Commercial IT Devices
http://www.darpa.mil/NewsEvents/Releases/2012/11/30.aspx
https://www.fbo.gov/utils/view?id=14741b368fcfda0fcf22e361e0b34bd2

Windows 8 ASLR Internals
http://blog.ptsecurity.com/2012/12/windows-8-aslr-internals.html

Security Threat Report 2013 (Sophos)
http://www.sophos.com/en-us/security-news-trends/reports/security-threat-report.aspx
http://www.sophos.com/en-us/medialibrary/PDFs/other/sophossecuritythreatreport2013.pdf

Skynet, a Tor-powered botnet straight from Reddit
https://community.rapid7.com/community/infosec/blog/2012/12/06/skynet-a-tor-powered-botnet-straight-from-reddit

An Evaluation of the Application (“App”) Verification Service in Android 4.2
http://www.cs.ncsu.edu/faculty/jiang/appverify/

Internet Explorer Data Leakage
http://spider.io/blog/2012/12/internet-explorer-data-leakage/
http://iedataleak.spider.io/demo

I can only show credits of this research (or, in other words, I can only get interested in the results) if I can see the name of the antimalware x results table.
What I can see is that Google Service is not being able to scan not even half of the malware… Poor.

  1. Not sure why, as it’s not really important for the final verdict, but OK, here you go. :wink:
    In Table 2, we show the comparison with ten representative anti-virus engines from VirusTotal (i.e., Avast, AVG, TrendMicro, Symantec, BitDefender, ClamAV, F-Secure, Fortinet, Kaspersky, and Kingsoft).
  2. It’s even worse, as the detection rate is under 25%. :o :frowning: